Proceedings of the 14th ACM Conference on Computer and Communications Security 2007
DOI: 10.1145/1315245.1315295
|View full text |Cite
|
Sign up to set email alerts
|

Robust key generation from signal envelopes in wireless networks

Abstract: The broadcast nature of a wireless link provides a natural eavesdropping and intervention capability to an adversary. Thus, securing a wireless link is essential to the security of a wireless network, and key generation algorithms are necessary for securing wireless links. However, traditional key agreement algorithms can be very costly in many settings, e.g. in wireless ad-hoc networks, since they consume scarce resources such as bandwidth and battery power.Traditional key agreement algorithms are not suitabl… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
219
0
1

Year Published

2009
2009
2016
2016

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 254 publications
(221 citation statements)
references
References 26 publications
1
219
0
1
Order By: Relevance
“…A scheme for generating periodically secret keys based on deep fades has been proposed in [4]. This work requires frequent fluctuations on channel to create secret keys.…”
Section: Related Workmentioning
confidence: 99%
“…A scheme for generating periodically secret keys based on deep fades has been proposed in [4]. This work requires frequent fluctuations on channel to create secret keys.…”
Section: Related Workmentioning
confidence: 99%
“…Existing research in this domain, has primarily focussed on using this component, i.e. channel variation, for key generation purposes [3] [5]. The slow component has not been identified and studied as such because application scenarios in the literature have not focussed on distance variation and line of sight between communicating parties but specifically on motion itself.…”
Section: Experimental Characterization Of Channel Variation Due mentioning
confidence: 99%
“…Different channel characteristics have been considered for this purpose in the literature, including radio signal strength [3] [4], signal envelope [5] and signal phase [6]. We specifically use the received signal strength (RSS) because it is the most convenient to measure for most small devices.…”
Section: Introductionmentioning
confidence: 99%
“…In [15], the authors present a MIMO system with two antennas per node which generates bits for a keying variable based on which antenna receives the stronger signal. In [16], threshold detection of deep fades in signal strength is measured in time.…”
Section: Related Workmentioning
confidence: 99%
“…In previously published work, metrics with nonlinear distributions and a static threshold yield key bits that are not equally distributed [16]. It is to emphasize the importance of conditioning that metrics and weights are defined separately.…”
Section: Constellationsmentioning
confidence: 99%