Handbook of Applied Cryptography
Handbook of Applied Cryptography
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Robust key generation from signal envelopes in wireless networks
Proceedings of the 14th ACM conference on Computer and communications security
Group-based key predistribution for wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
Radio-telepathy: extracting a secret key from an unauthenticated wireless channel
Proceedings of the 14th ACM international conference on Mobile computing and networking
On the effectiveness of secret key extraction from wireless signal strength in real environments
Proceedings of the 15th annual international conference on Mobile computing and networking
High-Rate Uncorrelated Bit Extraction for Shared Secret Key Generation from Channel Measurements
IEEE Transactions on Mobile Computing
A secure and anonymous cooperative sensing protocol for cognitive radio networks
Proceedings of the 4th international conference on Security of information and networks
Zero reconciliation secret key generation for body-worn health monitoring devices
Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks
Improving secret key generation performance for on-body devices
Proceedings of the 6th International Conference on Body Area Networks
Creating shared secrets out of thin air
Proceedings of the 11th ACM Workshop on Hot Topics in Networks
Science of Computer Programming
Creating secrets out of erasures
Proceedings of the 19th annual international conference on Mobile computing & networking
Hi-index | 0.00 |
This paper presents novel methodologies which allow robust secret key extraction from radio channel measurements which suffer from real-world non-reciprocities and a priori unknown fading statistics. These methodologies have low computational complexity, automatically adapt to differences in transmitter and receiver hardware, fading distribution and temporal correlations of the fading signal to produce secret keys with uncorrelated bits. Moreover, the introduced method produces secret key bits at a higher rate than has previously been reported. We validate the method using extensive measurements between TelosB wireless sensors.