Group Secret Key Generation via Received Signal Strength: Protocols, Achievable Rates, and Implementation
نویسندگان
چکیده
منابع مشابه
Extracting Secret Key from Received Signal Strength (rss) Measurements in Wireless Networks
Evaluate the effectiveness of secret key extraction, for private communication between two wireless devices, from the received signal strength (RSS) variations on the wireless channel between the two devices. In a variety of environments, RSS may vary due to lack of variations in the wireless channel; the extracted bits have very low entropy making these bits unsuitable for a secret key, In sig...
متن کاملCollaborative Group Key Extraction Leveraging Received Signal Strength in Real Mobile Environments
Secret key generation among wireless devices using physical layer information of radio channel has been an attractive alternative for ensuring security in mobile environments. Received Signal Strength (RSS) based secret key extraction gains much attention due to its readily availability in wireless infrastructure. However, the problem of using RSS to generate keys among multiple devices to ensu...
متن کاملConstructing UC Secure and Constant-Round Group Key Exchange Protocols via Secret Sharing
Group key exchange (GKE) is one of the basic building blocks in securing group communication. A number of solutions to GKE problem have been proposed, but most of them are not scalable and require a number of rounds linear with the number of group members. We present a method of constructing constant-round and identity-based protocol via secret sharing for GKE within universally composability (...
متن کاملEmitter localization using received-strength-signal data
This paper considers a scenario in which signals from an emitter at an unknown location are received at a number of different collinear locations. The receiver can determine the received signal strength, but no other parameters of the signal. Postulating a log-normal transmission model with a constant but unknown path loss exponent and, also, an unknown transmit power and known noise variance, ...
متن کاملNetwork Coding Protocols for Secret Key Distribution
Recent contributions have uncovered the potential of network coding, i.e. algebraic mixing of multiple information flows in a network, to provide enhanced security in packet oriented wireless networks. We focus on exploiting network coding for secret key distribution in a sensor network with a mobile node. Our main contribution is a set of extensions for a simple XOR based scheme, which is show...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Mobile Computing
سال: 2014
ISSN: 1536-1233,1558-0660,2161-9875
DOI: 10.1109/tmc.2014.2310747