Efficient key generation leveraging wireless channel reciprocity for MANETs

Journal of Network and Computer Applications - Tập 103 - Trang 18-28 - 2018
Furui Zhan1, Nianmin Yao1, Zhenguo Gao1, Haitao Yu2
1School of Computer Science and Technology, Dalian University of Technology, Dalian, China
2College of Tourism, Guilin University of Technology, Guilin, China

Tài liệu tham khảo

Ahlswede, 1993, Common randomness in information theory and cryptography - part i secret sharing, IEEE Trans. Inf. Theory, 39, 1121, 10.1109/18.243431 Arlinghaus, 1994 Badawy, A., Khattab, T., El-Fouly, T., Mohamed, A., Trinchero, D., Chiasserini, C.F., 2015. Secret key generation based on aoa estimation for low snr conditions. In: Proceedings of IEEE Vehicular Technology Conference. Bennett, 1988, Privacy amplification by public discussion, SIAM J. Comput., 17, 210, 10.1137/0217014 Brassard, G., Salvail, L., 1994. Secret-key reconciliation by public discussion. In: advances in Cryptology łEUROCRYPT93. Springer, pp. 410–423. Croft, J., Patwari, N., Kasera, S.K., 2010. Robust uncorrelated bit extraction methodologies for wireless sensors. In: Proceedings of the 9th ACM/IEEE International Conference on Information Processing in Sensor Networks. ACM; pp .70–81. Haroun, 2015, Secret key generation using chaotic signals over frequency selective fading channels, IEEE Trans. Inf. Forensics Secur., 10, 1764, 10.1109/TIFS.2015.2428211 Hassan, 1996, Cryptographic key agreement for mobile radio, Digit. Signal Process., 6, 207, 10.1006/dspr.1996.0023 Jana, S., Premnath, S.N., Clark, M., Kasera, S.K., Patwari, N., Krishnamurthy, S.V., 2009. On the effectiveness of secret key extraction from wireless signal strength in real environments. In: Proceedings of the 15th Annual International Conference on Mobile Computing and Networking. ACM; pp. 321–332. Johnston, 1999, Some properties of a simple moving average when applied to forecasting a time series, J. Oper. Res. Soc., 50, 1267, 10.1057/palgrave.jors.2600823 Koorapaty, H., Hassan, A., Chennakeshu, S., 1998. Secure information transmission for mobile radio. In: Information Theory. In: Proceedings of IEEE International Symposium on. IEEE; pp. 381. Liu, H., Yang, J., Wang, Y., Chen, Y., 2012. Collaborative secret key extraction leveraging received signal strength in mobile wireless networks. In: Proceedings IEEE, INFOCOM pp. 927–935. Liu, 2014, Group secret key generation via received signal strength: protocols, achievable rates, and implementation, IEEE Trans. Mob. Comput., 13, 2820, 10.1109/TMC.2014.2310747 Mathur, S., Trappe, W., Mandayam, N., Ye, C., Reznik, A. 2008. Radio-telepathy: extracting a secret key from an unauthenticated wireless channel. In: Proceedings of the 14th ACM International Conference on Mobile Computing and Networking. ACM; pp. 128–139. Maurer, 1993, Secret key agreement by public discussion from common information, IEEE Trans. Inf. Theory, 39, 733, 10.1109/18.256484 Patwari, 2010, High-rate uncorrelated bit extraction for shared secret key generation from channel measurements, IEEE Trans. Mob. Comput., 9, 17, 10.1109/TMC.2009.88 Premnath, 2013, Secret key extraction from wireless signal strength in real environments, IEEE Trans. Mob. Comput., 12, 917, 10.1109/TMC.2012.63 Primak, S., Liu, K., Wang, X., 2014. Secret key generation using physical channels with imperfect csi. In: Proceedings of IEEE 80th Vehicular Technology Conference (VTC Fall), pp. 1–5. Rappaport, 1996 Rukhin, A., Soto, J., Nechvatal, J., Smid, M., Barker, E., 2001. A statistical test suite for random and pseudorandom number generators for cryptographic applications. Technical Report; DTIC Document. Shehadeh, 2015, A survey on secret key generation mechanisms on the physical layer in wireless networks, Secur. Commun. Netw., 8, 332, 10.1002/sec.973 Simonoff, 2012 Strauss, 1992, Partial differential equations: an introduction, Math. Gaz., 77, 814 Wang, 2014, Efficient and secure key extraction using channel state information, J. Supercomput., 70, 1537, 10.1007/s11227-014-1247-1 Wei, Y., Zeng, K., Mohapatra, P., 2011. Adaptive wireless channel probing for shared key generation. In: Proceedings IEEE, INFOCOM, pp. 2165–2173. Wu X., Peng, Y., Hu, C., Zhao, H., Shu, L., 2013. A secret key generation method based on csi in ofdm-fdd system. In: Proceedings of IEEE Globecom Workshops, pp. 1297–1302.