Robust location distinction using temporal link signatures
Proceedings of the 13th annual ACM international conference on Mobile computing and networking
Radio-telepathy: extracting a secret key from an unauthenticated wireless channel
Proceedings of the 14th ACM international conference on Mobile computing and networking
On the effectiveness of secret key extraction from wireless signal strength in real environments
Proceedings of the 15th annual international conference on Mobile computing and networking
Universal Estimation of Information Measures for Analog Sources
Foundations and Trends in Communications and Information Theory
Information Theoretic Security
Foundations and Trends in Communications and Information Theory
BodyNets '09 Proceedings of the Fourth International Conference on Body Area Networks
Divergence estimation for multidimensional densities via k-nearest-neighbor distances
IEEE Transactions on Information Theory
Secret key agreement using asymmetry in channel state knowledge
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 4
Minimum energy per bit for secret key acquisition over multipath wireless channels
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 4
A Novel Approach for Physical Layer Cryptography in Wireless Networks
Wireless Personal Communications: An International Journal
An adaptive quantization algorithm for secret key generation using radio channel measurements
NTMS'09 Proceedings of the 3rd international conference on New technologies, mobility and security
Secrecy extraction from increased randomness in a time-variant MIMO channel
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
EPSON: enhanced physical security in OFDM networks
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Information-theoretically secret key generation for fading wireless channels
IEEE Transactions on Information Forensics and Security
Automatic secret keys from reciprocal MIMO wireless channels: measurement and analysis
IEEE Transactions on Information Forensics and Security
Physical Layer Cryptography and Cognitive Networks
Wireless Personal Communications: An International Journal
Research challenges towards the Future Internet
Computer Communications
Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies
Zero reconciliation secret key generation for body-worn health monitoring devices
Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks
Limitations of generating a secret key using wireless fading under active adversary
IEEE/ACM Transactions on Networking (TON)
Hi-index | 0.06 |
To establish a secure communications link between any two transceivers, the communicating parties require some shared secret, or key, with which to encrypt the message so that it cannot be understood by an enemy observer. Using the theory of reciprocity for antennas and electromagnetic propagation, a key distribution method is proposed that uses the ultrawideband (UWB) channel pulse response between two transceivers as a source of common randomness that is not available to enemy observers in other locations. The maximum size of a key that can be shared in this way is characterized by the mutual information between the observations of two radios, and an approximation and upper bound on mutual information is found for a general multipath channel and examples given for UWB channel models. The exchange of some information between the parties is necessary to achieve these bounds, and various information-sharing strategies are considered and their performance is simulated. A qualitative assessment of the vulnerability of such a secret sharing system to attack from a radio in a nearby location is also given.