2005
DOI: 10.1109/tap.2005.858853
|View full text |Cite
|
Sign up to set email alerts
|

Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
173
1

Year Published

2006
2006
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 275 publications
(174 citation statements)
references
References 15 publications
0
173
1
Order By: Relevance
“…In [5], it was shown that is possible to generate secret keys using the Bit Error Rates (BER) statistics. In [3], [7], [8], secret keys are generated exploiting the received signal strength indicator (RSSI) profile. The channel fluctuations are created artificially by an electronic steerable parasitic antenna (ESPAR).…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…In [5], it was shown that is possible to generate secret keys using the Bit Error Rates (BER) statistics. In [3], [7], [8], secret keys are generated exploiting the received signal strength indicator (RSSI) profile. The channel fluctuations are created artificially by an electronic steerable parasitic antenna (ESPAR).…”
Section: Related Workmentioning
confidence: 99%
“…In [6], the authors show that it is possible to extract secret keys based on the measurements of arrival time difference at both authorised users. However, this solution requires a specific antenna like in [3], [5], [8], [7] and an overhead bandwidth for the exchange phase to generate secret key. It is shown in [10], that the secret key agreement can be ensured when the transceivers use LDPC decoders to resolve the differences between the reciprocal channel estimations.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In [10], threshold magnitude carrier variations in time and frequency are measured. In [11] and [12], threshold magnitude-only signal-strength variation is measured in time with pseudorandom variation added via switched parasitic antenna elements [13], [17]. In [14], an ultra-wideband pulse is used to measure the channel impulse response in time.…”
Section: Related Workmentioning
confidence: 99%
“…In recent years there has been a significant interest in developing secret-key agreement protocols over fading channels, see e.g., [1]- [7] and the references therein. In time-division duplex (TDD) wireless systems, a natural reciprocity between uplink and downlink exists, which is clearly a valuable resource for generating a shared secret key.…”
Section: Introductionmentioning
confidence: 99%