Privacy amplification by public discussion
SIAM Journal on Computing - Special issue on cryptography
Elements of information theory
Elements of information theory
A universal statistical test for random bit generators
Journal of Cryptology
Secret-key reconciliation by public discussion
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Wireless Communications: Principles and Practice
Wireless Communications: Principles and Practice
WISE Design of Indoor Wireless Systems: Practical Computation and Optimization
IEEE Computational Science & Engineering
Securing wireless systems via lower layer enforcements
WiSe '06 Proceedings of the 5th ACM workshop on Wireless security
Quantum Cryptography and Secret-Key Distillation
Quantum Cryptography and Secret-Key Distillation
Robust location distinction using temporal link signatures
Proceedings of the 13th annual ACM international conference on Mobile computing and networking
Robust key generation from signal envelopes in wireless networks
Proceedings of the 14th ACM conference on Computer and communications security
Channel Identification: Secret Sharing Using Reciprocity in Ultrawideband Channels
IEEE Transactions on Information Forensics and Security - Part 1
Secret-key agreement over unauthenticated public channels-Part II: the simulatability condition
IEEE Transactions on Information Theory
Jamming for good: a fresh approach to authentic communication in WSNs
Proceedings of the second ACM conference on Wireless network security
We saw each other on the subway: secure, anonymous proximity-based missed connections
Proceedings of the 10th workshop on Mobile Computing Systems and Applications
On the effectiveness of secret key extraction from wireless signal strength in real environments
Proceedings of the 15th annual international conference on Mobile computing and networking
SMILE: encounter-based trust for mobile social services
Proceedings of the 16th ACM conference on Computer and communications security
Secret keys from entangled sensor motes: implementation and analysis
Proceedings of the third ACM conference on Wireless network security
An adaptive quantization algorithm for secret key generation using radio channel measurements
NTMS'09 Proceedings of the 3rd international conference on New technologies, mobility and security
Robust uncorrelated bit extraction methodologies for wireless sensors
Proceedings of the 9th ACM/IEEE International Conference on Information Processing in Sensor Networks
Ensemble: cooperative proximity-based authentication
Proceedings of the 8th international conference on Mobile systems, applications, and services
Information-theoretically secret key generation for fading wireless channels
IEEE Transactions on Information Forensics and Security
Mobility assisted secret key generation using wireless link signatures
INFOCOM'10 Proceedings of the 29th conference on Information communications
Secure wireless communication with dynamic secrets
INFOCOM'10 Proceedings of the 29th conference on Information communications
Exploiting multiple-antenna diversity for shared secret key generation in wireless networks
INFOCOM'10 Proceedings of the 29th conference on Information communications
Secret key extraction in MIMO-like sensor networks using wireless signal strength
ACM SIGMOBILE Mobile Computing and Communications Review
Automatic secret keys from reciprocal MIMO wireless channels: measurement and analysis
IEEE Transactions on Information Forensics and Security
Exploiting the physical layer for enhanced security
IEEE Wireless Communications
AmbiSec: securing smart spaces using entropy harvesting
AmI'10 Proceedings of the First international joint conference on Ambient intelligence
SeCA: A framework for Secure Channel Assignment in wireless mesh networks
Computer Communications
Vulnerabilities of wireless key exchange based on channel reciprocity
WISA'10 Proceedings of the 11th international conference on Information security applications
On passive inference attacks against physical-layer key extraction?
Proceedings of the Fourth European Workshop on System Security
ProxiMate: proximity-based secure pairing using ambient wireless signals
MobiSys '11 Proceedings of the 9th international conference on Mobile systems, applications, and services
CRMA: collision-resistant multiple access
MobiCom '11 Proceedings of the 17th annual international conference on Mobile computing and networking
A secure and anonymous cooperative sensing protocol for cognitive radio networks
Proceedings of the 4th international conference on Security of information and networks
Poster: mimicry attacks against wireless link signature
Proceedings of the 18th ACM conference on Computer and communications security
BANA: body area network authentication exploiting channel characteristics
Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks
Zero reconciliation secret key generation for body-worn health monitoring devices
Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks
Improving secret key generation performance for on-body devices
Proceedings of the 6th International Conference on Body Area Networks
Higher layer issues in cognitive radio network
Proceedings of the International Conference on Advances in Computing, Communications and Informatics
Privacy in mobile technology for personal healthcare
ACM Computing Surveys (CSUR)
Secure ad hoc trust initialization and key management in wireless body area networks
ACM Transactions on Sensor Networks (TOSN)
Cloud-enabled privacy-preserving collaborative learning for mobile sensing
Proceedings of the 10th ACM Conference on Embedded Network Sensor Systems
Limitations of generating a secret key using wireless fading under active adversary
IEEE/ACM Transactions on Networking (TON)
Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks
Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks
Dhwani: secure peer-to-peer acoustic NFC
Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM
Towards trustworthy medical devices and body area networks
Proceedings of the 50th Annual Design Automation Conference
An identity based encryption using elliptic curve cryptography for secure M2M communication
Proceedings of the First International Conference on Security of Internet of Things
Securing data provenance in body area networks using lightweight wireless link fingerprints
Proceedings of the 3rd international workshop on Trustworthy embedded devices
Securing data provenance in body area networks using lightweight wireless link fingerprints
Proceedings of the 11th ACM Conference on Embedded Networked Sensor Systems
From RSSI to CSI: Indoor localization via channel response
ACM Computing Surveys (CSUR)
Multi-user wireless channel probing for shared key generation with a fuzzy controller
Computer Networks: The International Journal of Computer and Telecommunications Networking
Hi-index | 0.00 |
Securing communications requires the establishment of cryptographic keys, which is challenging in mobile scenarios where a key management infrastructure is not always present. In this paper, we present a protocol that allows two users to establish a common cryptographic key by exploiting special properties of the wireless channel: the underlying channel response between any two parties is unique and decorrelates rapidly in space. The established key can then be used to support security services (such as encryption) between two users. Our algorithm uses level-crossings and quantization to extract bits from correlated stochastic processes. The resulting protocol resists cryptanalysis by an eavesdropping adversary and a spoofing attack by an active adversary without requiring an authenticated channel, as is typically assumed in prior information-theoretic key establishment schemes. We evaluate our algorithm through theoretical and numerical studies, and provide validation through two complementary experimental studies. First, we use an 802.11 development platform with customized logic that extracts raw channel impulse response data from the preamble of a format-compliant 802.11a packet. We show that it is possible to practically achieve key establishment rates of ~ 1 bit/sec in a real, indoor wireless environment. To illustrate the generality of our method, we show that our approach is equally applicable to per-packet coarse signal strength measurements using off-the-shelf 802.11 hardware.