The European Conference on Wireless Technology, 2005.
DOI: 10.1109/ecwt.2005.1617683
|View full text |Cite
|
Sign up to set email alerts
|

Wireless Secret Key Generation Exploiting the Reactance-Domain Scalar Response of Multipath Fading Channels: RSSI Interleaving Scheme

Abstract: A secure communication scheme that uses the random fluctuation of the natural environment of communication channels is studied and an improved scheme for the secret key generation is proposed. We have been developing a novel secret key generation and agreement scheme that uses the fluctuation of channel characteristics with an Espar (Electronically Steerable Parasitic Array Radiator) antenna. This antenna consists of a single central active element surrounded by parasitic elements loaded with variable reactors… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
18
0

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 25 publications
(18 citation statements)
references
References 9 publications
0
18
0
Order By: Relevance
“…There has been an increasing interest in exploiting the randomness and reciprocity of the wireless channel to generate shared keys between two parties [2]- [5], [10]- [16]. Early research in this area focused on theoretical analysis [13]- [15], while most recent works are more interested in practical implementations of the key generation schemes using offthe-shelf wireless devices [2]- [4].…”
Section: Related Workmentioning
confidence: 98%
“…There has been an increasing interest in exploiting the randomness and reciprocity of the wireless channel to generate shared keys between two parties [2]- [5], [10]- [16]. Early research in this area focused on theoretical analysis [13]- [15], while most recent works are more interested in practical implementations of the key generation schemes using offthe-shelf wireless devices [2]- [4].…”
Section: Related Workmentioning
confidence: 98%
“…That is, each node without knowledge of the state of the other node can introduce pseudorandom reciprocal variations in the carrier of transmitted signal over any domain. Such a capability has been demonstrated in a system that varies antenna gain over time [11], [12]. Note that the variations must be independent as it is a tenet in cryptography that an adversary is presumed to be in possession of the encryption algorithm and that security rests solely on the secret key.…”
Section: Channel Variabilitymentioning
confidence: 99%
“…The ability of an eavesdropper to deduce the shared cryptographic key has been analyzed in several prior works [11], [12], [13], [14], [15], [20], however the effect of an interferer has not yet been considered. In the following section, the effects of a narrow-band FM transmitter and a low-power, broadband jammer on the performance of the key-generation system are discussed.…”
Section: Interferencementioning
confidence: 99%
See 2 more Smart Citations