Robust key generation from signal envelopes in wireless networks
Proceedings of the 14th ACM conference on Computer and communications security
Radio-telepathy: extracting a secret key from an unauthenticated wireless channel
Proceedings of the 14th ACM international conference on Mobile computing and networking
On the effectiveness of secret key extraction from wireless signal strength in real environments
Proceedings of the 15th annual international conference on Mobile computing and networking
Radio Tomographic Imaging with Wireless Networks
IEEE Transactions on Mobile Computing
Hi-index | 0.00 |
In this work, we evaluate the use of multiple sensors for secret key extraction. We find that the key generation rate increases linearly with the number of nodes. We show that the use of multiple nodes causes a significant mismatch in the extracted bits. We address the high bit mismatch problem by adding an iterative distillation stage to the key extraction process.