2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing 2010
DOI: 10.1109/euc.2010.103
|View full text |Cite
|
Sign up to set email alerts
|

Secret Key Generation Rate vs. Reconciliation Cost Using Wireless Channel Characteristics in Body Area Networks

Abstract: Abstract-In this paper, we investigate the feasibility of realtime derivation of cryptographic keys in body area networks using unique characteristics of the underlying wireless channel. We perform experiments to confirm that motion does indeed provide significant highly correlated randomness on either end of the wireless link between basestation and mobile mote to enable real-time key generation. Furthermore, we demonstrate that channel characteristics for a dynamic body area network consist of two different … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
28
0

Year Published

2012
2012
2019
2019

Publication Types

Select...
4
2
2

Relationship

2
6

Authors

Journals

citations
Cited by 36 publications
(28 citation statements)
references
References 10 publications
0
28
0
Order By: Relevance
“…In [14], the authors demonstrate an RSS-based key generation scheme for body area networks where the Savitzky Golay filter is used to isolate different frequency components of the dynamic wireless channel, highlighting their individual contribution to key generation. Temporal diversity is ensured by sampling the wireless channel at very low rates.…”
Section: Prior Workmentioning
confidence: 99%
“…In [14], the authors demonstrate an RSS-based key generation scheme for body area networks where the Savitzky Golay filter is used to isolate different frequency components of the dynamic wireless channel, highlighting their individual contribution to key generation. Temporal diversity is ensured by sampling the wireless channel at very low rates.…”
Section: Prior Workmentioning
confidence: 99%
“…As the wireless network became the main Internet way and the country's attention was drew to the network security, it was imperative to enable Portal access certification [6][7][8][9][10]. In order to implement the deployment of Portal access, and to improve the experience of the Internet, the combination of Portal and Mac were used in the whole school.…”
Section: Non-sensory Authentication Topologymentioning
confidence: 99%
“…TelosB [29] [30] and MicaZ motes [31] [32] [33]. In [29], the authors propose a solution allowing multiple sensors worn by a subject to authenticate each other, and in [30], to undertake authenticated secret-key agreement.…”
Section: Security From Wireless Channel Characteristicsmentioning
confidence: 99%
“…In [29], the authors propose a solution allowing multiple sensors worn by a subject to authenticate each other, and in [30], to undertake authenticated secret-key agreement. The authors in [31] decompose the wireless channel into fast and slow components, enabling the user to configure secretkey generation as per his requirements. [32] suggest the use of filtering techniques to reduce the effects of noise and asymmetric components in the channel profile and further improve the correlation between Alice and Bob for improved secret-key agreement.…”
Section: Security From Wireless Channel Characteristicsmentioning
confidence: 99%