6th Annual Communication Networks and Services Research Conference (Cnsr 2008) 2008
DOI: 10.1109/cnsr.2008.52
|View full text |Cite
|
Sign up to set email alerts
|

Secret Key Extraction in Ultra Wideband Channels for Unsynchronized Radios

Abstract: Secure communications in UWB based on cryptographic keys generated from channel measurements without a trusted third party have been developed. The fine time resolution of UWB allows high levels of mutual information to be obtained by a given A and B through independent characterizations of their shared communication channel. This mutual information determines the maximum secret key rate available to A and B. Since UWB channel gains change drastically with small antenna movements, it is inherently difficult fo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2008
2008
2019
2019

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 26 publications
(14 citation statements)
references
References 16 publications
0
14
0
Order By: Relevance
“…Systems have been previously proposed for the use of UWB channel measurements for secret key generation [7]. However, it has been shown that these methods do not come close to obtaining all the available secret key bits from UWB channel impulse response measurements [8].…”
Section: Introductionmentioning
confidence: 99%
“…Systems have been previously proposed for the use of UWB channel measurements for secret key generation [7]. However, it has been shown that these methods do not come close to obtaining all the available secret key bits from UWB channel impulse response measurements [8].…”
Section: Introductionmentioning
confidence: 99%
“…However these bounds are only theoretically possible and practically unattainable without using specialised equipment. The maximum size as well as generation of shared secret keys from the observation and processing of radio channel parameters have also been examined in [7], [12], [13], [14]. However the aforementioned works examine the subject either purely from a theoretical informational-theoretic perspective, or by performing the observations with specialised hardware.…”
Section: Prior Workmentioning
confidence: 99%
“…Sayeed et al use random phase for secret key extraction in an OFDM system [5], whereas Wang et al propose a scheme for efficient key establishment [6]. The impulse response of a wireless channel is used to generate a shared secret [4], [22], [23], [24]. Ultra-wideband radios are used to measure the impulse response [23], [24], while Mathur et al and Ye et al propose to estimate the impulse response from Wilar signals [4], [22], respectively.…”
Section: Related Workmentioning
confidence: 99%
“…The impulse response of a wireless channel is used to generate a shared secret [4], [22], [23], [24]. Ultra-wideband radios are used to measure the impulse response [23], [24], while Mathur et al and Ye et al propose to estimate the impulse response from Wilar signals [4], [22], respectively. Statistics of the angle-of-arrival (AOA) is used as a signature for key generation [2], however, it requires an access point to have a programmable phased array antenna received signal strength or channel gain is the most commonly used radio channel feature for secret key extraction due to it is readily available in existing wireless infrastructure, and thus it is easy to measure with little effort.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation