2017
DOI: 10.1016/j.jnca.2016.11.019
|View full text |Cite
|
Sign up to set email alerts
|

Secure key design approaches using entropy harvesting in wireless sensor network: A survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 61 publications
0
3
0
Order By: Relevance
“…Key generation can exploit different properties of wireless channel, including received signal strength (RSS), channel phase, and CSI [22], [23]. RSS has been widely applied for key extraction in the practical implementation as it is readily available [2], [9], [24], [25], [26], [27], [28], [29], [30].…”
Section: Related Workmentioning
confidence: 99%
“…Key generation can exploit different properties of wireless channel, including received signal strength (RSS), channel phase, and CSI [22], [23]. RSS has been widely applied for key extraction in the practical implementation as it is readily available [2], [9], [24], [25], [26], [27], [28], [29], [30].…”
Section: Related Workmentioning
confidence: 99%
“…Different approaches have been published in the public domain in secure key extraction protocols with different strengths and limitations with regards to entropy, secret bit extraction rate, key generation rate, number of nodes and threat models. For an exhaustive comparison of these protocols, readers are encouraged to see work in [15].…”
Section: Related Workmentioning
confidence: 99%
“…In addition, RSS is usually extracted by a single frequency resulting in low bit generation rates. On the other hand, channel-phased quantisation presents several benefits as higher level of secrecy can be achieved by the uniform distribution of the phases on the channel taps and increase key generation rate by leveraging the whole 2 channel impulse response (CIR) [15]. It is also noticed that a higher number of secret bits can be extracted that removes the need to estimate RSS over a certain time window.…”
Section: Related Workmentioning
confidence: 99%