Secret-key reconciliation by public discussion
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
Secrecy, authentication, and public key systems.
Secrecy, authentication, and public key systems.
Ethereal Packet Sniffing
Estimating the Entropy Rate of Spike Trains via Lempel-Ziv Complexity
Neural Computation
Foundations of Fuzzy Control
Robust key generation from signal envelopes in wireless networks
Proceedings of the 14th ACM conference on Computer and communications security
Radio-telepathy: extracting a secret key from an unauthenticated wireless channel
Proceedings of the 14th ACM international conference on Mobile computing and networking
On the effectiveness of secret key extraction from wireless signal strength in real environments
Proceedings of the 15th annual international conference on Mobile computing and networking
High-Rate Uncorrelated Bit Extraction for Shared Secret Key Generation from Channel Measurements
IEEE Transactions on Mobile Computing
Information-theoretically secret key generation for fading wireless channels
IEEE Transactions on Information Forensics and Security
Exploiting multiple-antenna diversity for shared secret key generation in wireless networks
INFOCOM'10 Proceedings of the 29th conference on Information communications
Secret Key Establishment Using Temporally and Spatially Correlated Wireless Channel Coefficients
IEEE Transactions on Mobile Computing
Secret key generation for a pairwise independent network model
IEEE Transactions on Information Theory
Generalized privacy amplification
IEEE Transactions on Information Theory - Part 2
On the Complexity of Finite Sequences
IEEE Transactions on Information Theory
Common randomness in information theory and cryptography. I. Secret sharing
IEEE Transactions on Information Theory
Secret key agreement by public discussion from common information
IEEE Transactions on Information Theory
Adaptive Wireless Channel Probing for Shared Key Generation Based on PID Controller
IEEE Transactions on Mobile Computing
Hi-index | 0.00 |
Probing the wireless channel in wireless networks to generate a shared key is an increasingly interesting security topic. However, not much work has been focused on wireless channel probing in multi-user applications for Shared Key Generation (SKG). In this paper we propose a scheme of multi-user wireless channel probing using a broadcast approach and a fuzzy controller. In the proposed scheme, the concept of Desired-Weighting Factor (DWF) is introduced to meet a user's Key Generation Rate (KGR) requirement. The experimental results in this primary study show that the fuzzy controller can be used to satisfy KGR requirement by efficiently tuning the probing rate under dynamic conditions. Compared with the conventional Proportional-Integral-Derivative (PID) controller, the proposed probing scheme with a fuzzy controller may produce smaller overshoots and fewer oscillations. The fuzzy controller in the proposed scheme also stabilizes the KGR at desired values, improves the SKG accuracy, enhances the control capability, and increases the entropy rate. The study indicates that the proposed multi-user probing scheme can be used to make a trade-off between probing efficiency and the user's KGR requirement.