2015 International Conference on Wireless Communications &Amp; Signal Processing (WCSP) 2015
DOI: 10.1109/wcsp.2015.7341290
|View full text |Cite
|
Sign up to set email alerts
|

Secret key generation via random beamforming in stationary environment

Abstract: Extracting secret key from the common randomness of wireless channel has gained significant interest as a mechanism for providing secure point-to-point communications. Current works focus on the methods of exploiting channel characterizations based on Received Signal Strength Indication (RSSI), channel phase and Channel Impulse Response (CIR) under different propagation environments. However, when the channel fading is static or quasi-static, the secret key bits derived from the channel may be identical or nea… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
7
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
5

Relationship

2
3

Authors

Journals

citations
Cited by 9 publications
(7 citation statements)
references
References 15 publications
0
7
0
Order By: Relevance
“…Then, the measurements which combine random probing signals and the CSI are used to extract key bits. Our previous work [21] (denoted as random beamforming and stochastic amplitude probe signal (RBSAPS)‐WKG) is similar to RPSCR‐WKG scheme. However, the fluctuation range of the random source in [20, 21] is limited when the transmit power is constrained.…”
Section: Related Workmentioning
confidence: 99%
“…Then, the measurements which combine random probing signals and the CSI are used to extract key bits. Our previous work [21] (denoted as random beamforming and stochastic amplitude probe signal (RBSAPS)‐WKG) is similar to RPSCR‐WKG scheme. However, the fluctuation range of the random source in [20, 21] is limited when the transmit power is constrained.…”
Section: Related Workmentioning
confidence: 99%
“…[1][2][3][4][5][6][7][8][9][10][11][12] Among these schemes, extracting secret keys from the characteristics of wireless channels, which makes it possible for one-time pad, becomes a hot issue. Traditional security protocols and algorithms mainly rely on cryptography, hash functions, and some other mathematical properties to support the security services.…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, the interest in physical layer security schemes, which exploits the inherent physical properties of the wireless medium to complement or enhance the existing cryptosystems, is growing. [1][2][3][4][5][6][7][8][9][10][11][12] Among these schemes, extracting secret keys from the characteristics of wireless channels, which makes it possible for one-time pad, becomes a hot issue. So far, numerous research works have focused on extracting secret keys based on the received signal strength indication, 3,4 channel impulse response, 3,5-7 channel phase 8 and multipath relative-delay, 9 etc in various scenarios.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations