How to reduce your enemy's information
Lecture notes in computer sciences; 218 on Advances in cryptology---CRYPTO 85
Privacy amplification by public discussion
SIAM Journal on Computing - Special issue on cryptography
Elements of information theory
Elements of information theory
Experimental quantum cryptography
Journal of Cryptology - Eurocrypt '90
Secret-key reconciliation by public discussion
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
Extracting all the randomness and reducing the error in Trevisan's extractors
STOC '99 Proceedings of the thirty-first annual ACM symposium on Theory of computing
Password authentication with insecure communication
Communications of the ACM
Quantum computation and quantum information
Quantum computation and quantum information
Wireless Communications: Principles and Practice
Wireless Communications: Principles and Practice
Microwave Mobile Communications
Microwave Mobile Communications
Wireless Communications
Robust location distinction using temporal link signatures
Proceedings of the 13th annual ACM international conference on Mobile computing and networking
Robust key generation from signal envelopes in wireless networks
Proceedings of the 14th ACM conference on Computer and communications security
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
SIAM Journal on Computing
Radio-telepathy: extracting a secret key from an unauthenticated wireless channel
Proceedings of the 14th ACM international conference on Mobile computing and networking
Information-theoretically secure secret-key agreement by NOT authenticated public discussion
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
Information-theoretic key agreement: from weak to strong secrecy for free
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
Detection of algebraic manipulation with applications to robust secret sharing and fuzzy extractors
EUROCRYPT'08 Proceedings of the theory and applications of cryptographic techniques 27th annual international conference on Advances in cryptology
Robust fuzzy extractors and authenticated key agreement from close secrets
CRYPTO'06 Proceedings of the 26th annual international conference on Advances in Cryptology
Channel Identification: Secret Sharing Using Reciprocity in Ultrawideband Channels
IEEE Transactions on Information Forensics and Security - Part 1
Using the physical layer for wireless authentication in time-variant channels
IEEE Transactions on Wireless Communications
Generalized privacy amplification
IEEE Transactions on Information Theory - Part 2
Distributed source coding using syndromes (DISCUS): design and construction
IEEE Transactions on Information Theory
Secret-key agreement over unauthenticated public channels .I. Definitions and a completeness result
IEEE Transactions on Information Theory
Secret-key agreement over unauthenticated public channels-Part II: the simulatability condition
IEEE Transactions on Information Theory
Secret-key agreement over unauthenticated public channels .II. Privacy amplification
IEEE Transactions on Information Theory
Reconciliation of a quantum-distributed Gaussian key
IEEE Transactions on Information Theory
Secrecy capacities for multiple terminals
IEEE Transactions on Information Theory
Low-Complexity Approaches to Slepian–Wolf Near-Lossless Distributed Data Compression
IEEE Transactions on Information Theory
Wireless Information-Theoretic Security
IEEE Transactions on Information Theory
Automatic secret keys from reciprocal MIMO wireless channels: measurement and analysis
IEEE Transactions on Information Forensics and Security
ProxiMate: proximity-based secure pairing using ambient wireless signals
MobiSys '11 Proceedings of the 9th international conference on Mobile systems, applications, and services
Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies
Creating shared secrets out of thin air
Proceedings of the 11th ACM Workshop on Hot Topics in Networks
Creating secrets out of erasures
Proceedings of the 19th annual international conference on Mobile computing & networking
From RSSI to CSI: Indoor localization via channel response
ACM Computing Surveys (CSUR)
Multi-user wireless channel probing for shared key generation with a fuzzy controller
Computer Networks: The International Journal of Computer and Telecommunications Networking
Hi-index | 0.00 |
The multipath-rich wireless environment associated with typical wireless usage scenarios is characterized by a fading channel response that is time-varying, location-sensitive, and uniquely shared by a given transmitter-receiver pair. The complexity associated with a richly scattering environment implies that the short-term fading process is inherently hard to predict and best modeled stochastically, with rapid decorrelation properties in space, time, and frequency. In this paper, we demonstrate how the channel state between a wireless transmitter and receiver can be used as the basis for building practical secret key generation protocols between two entities. We begin by presenting a scheme based on level crossings of the fading process, which is well-suited for the Rayleigh and Rician fading models associated with a richly scattering environment. Our level crossing algorithm is simple, and incorporates a self-authenticating mechanism to prevent adversarial manipulation of message exchanges during the protocol. Since the level crossing algorithm is best suited for fading processes that exhibit symmetry in their underlying distribution, we present a second and more powerful approach that is suited for more general channel state distributions. This second approach is motivated by observations from quantizing jointly Gaussian processes, but exploits empirical measurements to set quantization boundaries and a heuristic log likelihood ratio estimate to achieve an improved secret key generation rate. We validate both proposed protocols through experimentations using a customized 802.11a platform, and show for the typical WiFi channel that reliable secret key establishment can be accomplished at rates on the order of 10 b/s.