The Design of Rijndael
A Study of the Energy Consumption Characteristics of Cryptographic Algorithms and Security Protocols
IEEE Transactions on Mobile Computing
Space-time wireless channels
New Stream Cipher Designs: The eSTREAM Finalists
New Stream Cipher Designs: The eSTREAM Finalists
IEEE Transactions on Wireless Communications
BodyNets '09 Proceedings of the Fourth International Conference on Body Area Networks
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless physical layer security
Information-theoretically secret key generation for fading wireless channels
IEEE Transactions on Information Forensics and Security
On the distribution of signal phase in body area networks
IEEE Communications Letters
Automatic secret keys from reciprocal MIMO wireless channels: measurement and analysis
IEEE Transactions on Information Forensics and Security
EUC '10 Proceedings of the 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing
Channel Identification: Secret Sharing Using Reciprocity in Ultrawideband Channels
IEEE Transactions on Information Forensics and Security - Part 1
Using the physical layer for wireless authentication in time-variant channels
IEEE Transactions on Wireless Communications
Wireless Information-Theoretic Security
IEEE Transactions on Information Theory
On the Secrecy Capacity of Fading Channels
IEEE Transactions on Information Theory
Hi-index | 0.00 |
Utilizing the randomness of the wireless channel for securing on-body communication in the presence of an on-body eavesdropper is considered. The feasibility of establishing a secure, unique and random key is investigated using a radio platform operating in the 2.4GHz ISM band. A low-complexity algorithm for establishing a symmetric encryption key tailored to the on-body propagation environment is proposed and justified. The algorithm uses the readily available radio signal strength indicator from existing packets going back and forth over the communication link and presents marginal system overheads. The secret bit sequences generated by the algorithm are evaluated for matching between the two communicating parties, mismatching with an eavesdropper placed on the body, and degree of randomness. It is shown that the algorithm generates long and highly random bit sequences which are perfectly matched between the legitimate communicating parties yet weakly matched with the eavesdropper's bit sequences.