2009
DOI: 10.1109/tce.2009.5373765
|View full text |Cite
|
Sign up to set email alerts
|

Initial common secret key sharing using random plaintexts for short-range wireless communications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
5
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 4 publications
0
5
0
Order By: Relevance
“…Case 3: 1 = 0, 2 ∈ (0, 1), and 1 − 1 − 2 ∈ (0, 1). In this last case, we have (12) = ( 13) > (11). The only feasible solution to it is 1 = 0, 2 = 0.6, and 1 − 1 − 2 = 0.4.…”
Section: Numerical Examplementioning
confidence: 95%
See 1 more Smart Citation
“…Case 3: 1 = 0, 2 ∈ (0, 1), and 1 − 1 − 2 ∈ (0, 1). In this last case, we have (12) = ( 13) > (11). The only feasible solution to it is 1 = 0, 2 = 0.6, and 1 − 1 − 2 = 0.4.…”
Section: Numerical Examplementioning
confidence: 95%
“…In a different direction, the effect of wireless channel dynamics on the data link layer is utilized to share secrets 10 , 11 , 12 . The idea behind works along this line is as follows: Alice and Bob keep sending each other unicast packets without retry, using which the secret is derived; Eve would eventually lose a packet and be unable to figure out the secret even if she knew exactly the mechanism Alice and Bob use.…”
Section: Introductionmentioning
confidence: 99%
“…Although using the randomness of the wireless channel state to share secrets is very intuitive, its speed of secret sharing is limited by the speed of the variations of the wireless channel state. In a different approach, the consequences of the randomness of wireless channels in the data link layer, rather than the randomness of the wireless channels itself in the physical layer, is exploited to bypass the complexity of dealing with channel coding [13][14][15]. The idea behind these works is that Eve inevitably will lose some packets sent by Alice and Bob (due to the nature of wireless communications), and she will lose the secrets too, if the secrets are embedded into those packets.…”
Section: Related Work and Motivationsmentioning
confidence: 99%
“…The effect of wireless channel dynamics on the data link layer is utilized to share secrets [34][35][36]. It is based on the fact that packet transmissions over wireless channels are not always reliable [37], and the idea is as follows: Alice and Bob keep sending each other unicast packets without retry, with which the secret is derived; Eve will eventually lose a packet and be unable to extract the secret even if she knows exactly which mechanism Alice and Bob are using.…”
Section: Introductionmentioning
confidence: 99%