Radio-telepathy: extracting a secret key from an unauthenticated wireless channel
Proceedings of the 14th ACM international conference on Mobile computing and networking
Minimum energy per bit for secret key acquisition over multipath wireless channels
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 4
Secure physical layer key generation schemes: performance and information theoretic limits
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Information-theoretically secret key generation for fading wireless channels
IEEE Transactions on Information Forensics and Security
Channel Identification: Secret Sharing Using Reciprocity in Ultrawideband Channels
IEEE Transactions on Information Forensics and Security - Part 1
Guaranteeing Secrecy using Artificial Noise
IEEE Transactions on Wireless Communications
Distributed source coding using syndromes (DISCUS): design and construction
IEEE Transactions on Information Theory
Secret-key agreement over unauthenticated public channels .I. Definitions and a completeness result
IEEE Transactions on Information Theory
Secret-key agreement over unauthenticated public channels-Part II: the simulatability condition
IEEE Transactions on Information Theory
Secret-key agreement over unauthenticated public channels .II. Privacy amplification
IEEE Transactions on Information Theory
Secure space-time communication
IEEE Transactions on Information Theory
Reconciliation of a quantum-distributed Gaussian key
IEEE Transactions on Information Theory
Wireless Information-Theoretic Security
IEEE Transactions on Information Theory
Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies
From RSSI to CSI: Indoor localization via channel response
ACM Computing Surveys (CSUR)
Hi-index | 0.00 |
Information theoretic limits for random key generation in multiple-input multiple-output (MIMO) wireless systems exhibiting a reciprocal channel response are investigated experimentally with a new three-node MIMO measurement campaign. As background, simple expressions are presented for the number of available key bits, as well as the number of bits that are secure from a close eavesdropper. Two methods for generating secret keys are analyzed in the context of MIMO channels and their mismatch rate and efficiency are derived. A new wideband indoor MIMO measurement campaign in the 2.51- to 2.59-GHz band is presented, whose purpose is to study the number of available key bits in both line-of-sight and nonline-of-sight environments. Application of the key generation methods to measured propagation channels indicates key generation rates that can be obtained in practice for four-element arrays.