Group Secret Key Generation via Received Signal Strength: Protocols, Achievable Rates, and Implementation

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Extracting Secret Key from Received Signal Strength (rss) Measurements in Wireless Networks

Evaluate the effectiveness of secret key extraction, for private communication between two wireless devices, from the received signal strength (RSS) variations on the wireless channel between the two devices. In a variety of environments, RSS may vary due to lack of variations in the wireless channel; the extracted bits have very low entropy making these bits unsuitable for a secret key, In sig...

متن کامل

Collaborative Group Key Extraction Leveraging Received Signal Strength in Real Mobile Environments

Secret key generation among wireless devices using physical layer information of radio channel has been an attractive alternative for ensuring security in mobile environments. Received Signal Strength (RSS) based secret key extraction gains much attention due to its readily availability in wireless infrastructure. However, the problem of using RSS to generate keys among multiple devices to ensu...

متن کامل

Constructing UC Secure and Constant-Round Group Key Exchange Protocols via Secret Sharing

Group key exchange (GKE) is one of the basic building blocks in securing group communication. A number of solutions to GKE problem have been proposed, but most of them are not scalable and require a number of rounds linear with the number of group members. We present a method of constructing constant-round and identity-based protocol via secret sharing for GKE within universally composability (...

متن کامل

Emitter localization using received-strength-signal data

This paper considers a scenario in which signals from an emitter at an unknown location are received at a number of different collinear locations. The receiver can determine the received signal strength, but no other parameters of the signal. Postulating a log-normal transmission model with a constant but unknown path loss exponent and, also, an unknown transmit power and known noise variance, ...

متن کامل

Network Coding Protocols for Secret Key Distribution

Recent contributions have uncovered the potential of network coding, i.e. algebraic mixing of multiple information flows in a network, to provide enhanced security in packet oriented wireless networks. We focus on exploiting network coding for secret key distribution in a sensor network with a mobile node. Our main contribution is a set of extensions for a simple XOR based scheme, which is show...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Mobile Computing

سال: 2014

ISSN: 1536-1233,1558-0660,2161-9875

DOI: 10.1109/tmc.2014.2310747