2016
DOI: 10.1049/iet-com.2015.1219
|View full text |Cite
|
Sign up to set email alerts
|

Moving window scheme for extracting secret keys in stationary environments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
11
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
6

Relationship

3
3

Authors

Journals

citations
Cited by 11 publications
(11 citation statements)
references
References 24 publications
0
11
0
Order By: Relevance
“…In fact, due to the complexity of the wireless channel environment, we have inability to predict the CSI of eavesdroppers [29]. Some elementary and solid works aiming at extracting keys from channels were proposed in [30]. This paper mainly focuses on the physical layer encryption technology based on wireless channel characteristics, aiming at encrypting and protecting physical layer information such as physical layer channel coding.…”
Section: Physical Layer Encryption Transmission Technologymentioning
confidence: 99%
“…In fact, due to the complexity of the wireless channel environment, we have inability to predict the CSI of eavesdroppers [29]. Some elementary and solid works aiming at extracting keys from channels were proposed in [30]. This paper mainly focuses on the physical layer encryption technology based on wireless channel characteristics, aiming at encrypting and protecting physical layer information such as physical layer channel coding.…”
Section: Physical Layer Encryption Transmission Technologymentioning
confidence: 99%
“…In addition, Figure 6 illustrates the secret key capacity of these 2 schemes with fixed variance of each subchannel. 24 In these simulations, The secret key capacity vs SNR for equal and GP-based power allocation schemes with N = 16. GP indicates geometric program; SNR, signal-to-noise ratio FIGURE 5 The secret key capacity of 2 schemes for N = 8, 16, 32 at low SNR region.…”
Section: Numerical and Simulation Resultsmentioning
confidence: 99%
“…In addition, Figure illustrates the secret key capacity of these 2 schemes with fixed variance of each subchannel . In these simulations, σh2=[1.18192pt2pt1.09352pt2pt0.76532pt1.20423.0235pt2.48452pt1.02993.3235pt0.35973pt0.820] for the case N = 8, σh2=[1.119440.619040.37064pt1pt0.70791pt1pt1.0966 0.9597 1.0638 0.2884 0.4019 0.8906 1.4591 0.5037 1.4586 0.8723 1.2445 0.6251] for N = 16 and σh2= [1.1997 0.9788 0.9412 0.7271 1.5351 2.0229 1.3886 1.4335 1.1822 0.9545 0.4923 0.9560 2.5430 0.5750 0.9384 0.3889 1.0682 0.3771 0.9178 0.5328 0.8034 0.4233 0.3446 0.2924 0.4517 0.3455 0.…”
Section: Numerical and Simulation Resultsmentioning
confidence: 99%
“…In addition, the broadcasting nature of the wireless channels causes the wireless communication channel easily to be eavesdropped on or intercepted by an adversary [1,2]. Therefore, the interest in exploiting the characteristics of the wireless channels at the PHYlayer to enhance and complement the conventional security mechanisms is growing, such as the secret key extraction from the characteristics of wireless channels [3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][19] and PHYlayer authentication [20][21][22][23][24][25][26][27].…”
Section: Introductionmentioning
confidence: 99%
“…Since then, many investigators pay attention to extract secret keys from received signal strength (RSS) [6][7][8][9], since the RSS is easy to acquire from the offthe-shelf wireless cards. However, these methods suffer from scalability and low secret key generation rate (KGR) which is defined as the average amount of secret key bits produced in one measurement/second [10][11][12]. To resolve these issues, researchers exploit the channel state information (CSI) to extract secret keys [13][14][15].…”
Section: Introductionmentioning
confidence: 99%