IEEE INFOCOM 2017 - IEEE Conference on Computer Communications 2017
DOI: 10.1109/infocom.2017.8057119
|View full text |Cite
|
Sign up to set email alerts
|

Secret key agreement using a virtual wiretap channel

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 16 publications
0
3
0
Order By: Relevance
“…Furthermore, it is an intuitive idea to further promote the SKGR by introducing the randomness of two-way transmitted signals. Such that, [17]- [20] explore the SKG methods using two-way random signals, which can completely avoid channel estimation and significantly improve the SKGR. Based on information theory, [17] analyzed the validity and security of two-way SKG protocol, and [18] derived the upper and lower bounds of the SKGR when transmitting two-way random signals.…”
Section: A Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Furthermore, it is an intuitive idea to further promote the SKGR by introducing the randomness of two-way transmitted signals. Such that, [17]- [20] explore the SKG methods using two-way random signals, which can completely avoid channel estimation and significantly improve the SKGR. Based on information theory, [17] analyzed the validity and security of two-way SKG protocol, and [18] derived the upper and lower bounds of the SKGR when transmitting two-way random signals.…”
Section: A Related Workmentioning
confidence: 99%
“…Such that, [17]- [20] explore the SKG methods using two-way random signals, which can completely avoid channel estimation and significantly improve the SKGR. Based on information theory, [17] analyzed the validity and security of two-way SKG protocol, and [18] derived the upper and lower bounds of the SKGR when transmitting two-way random signals. However, the critical issue faced in this method is how to design a proper common random source to obtain more randomness information.…”
Section: A Related Workmentioning
confidence: 99%
“…In general, jamming against eavesdroppers was introduced because the form of radiation was not responsible for the secure transmission to destroy the eavesdropper channel. Artificial noise generation is a method of disrupting eavesdropper(s) in a network that can sometimes be done by the transmitter [18] or even the legal receiver [19], but these disruption methods reduce the network's efficiency due to channel conditions and severe self-interference [20]. Instead, a more effective way is to use a friendly jammer in the network.…”
Section: Introductionmentioning
confidence: 99%