Wireless Communications: Principles and Practice
Wireless Communications: Principles and Practice
Wireless sensor networks: A survey on the state of the art and the 802.15.4 and ZigBee standards
Computer Communications
Robust key generation from signal envelopes in wireless networks
Proceedings of the 14th ACM conference on Computer and communications security
Radio-telepathy: extracting a secret key from an unauthenticated wireless channel
Proceedings of the 14th ACM international conference on Mobile computing and networking
SAIL: A Sensor Abstraction and Integration Layer for Context Awareness
SEAA '08 Proceedings of the 2008 34th Euromicro Conference Software Engineering and Advanced Applications
On the effectiveness of secret key extraction from wireless signal strength in real environments
Proceedings of the 15th annual international conference on Mobile computing and networking
Secret keys from entangled sensor motes: implementation and analysis
Proceedings of the third ACM conference on Wireless network security
Exploiting multiple-antenna diversity for shared secret key generation in wireless networks
INFOCOM'10 Proceedings of the 29th conference on Information communications
Hi-index | 0.00 |
Following the vision of Ambient Intelligence (AmI), this paper introduces and evaluates a novel security scheme that takes the advantage of the unpredictable and erratic behavior of wireless communication to generate secret keys. The main advantage is that the secret key generation is applicable to every wireless device, independently of their hardware characteristics as it only requires a wireless interface and a human movement, which inherently affects the signal propagation within the physical environment. To analyze the applicability of this scheme, we implement and systematically evaluate the key generation using a wireless sensor network deployed in a real-world scenario. The analysis clarifies how different factors influence the amount of randomness collected from the physical environment, and it also shows that guessing attacks from an eavesdropper are negligible even if it is able to eavesdrop the complete wireless communication.