Robust secret key extraction from channel secondary random process
نویسندگان
چکیده
منابع مشابه
Robust Extraction of Secret Bits from Minutiae
Our goal is to extract consistent bits from the same fingerprint in a noisy environment. Such bits can then be used as a secret key in several cryptographic applications. In order to correct inevitable noise during scanning and processing, a known approach extracts and publishes an additional information, known as secure sketch from the minutiae. During subsequent scanning, the sketch aids in c...
متن کاملOptimal SVD-based Precoding for Secret Key Extraction from Correlated OFDM Sub-Channels
Secret key extraction is a crucial issue in physical layer security and a less complex and, at the same time, a more robust scheme for the next generation of 5G and beyond. Unlike previous works on this topic, in which Orthogonal Frequency Division Multiplexing (OFDM) sub-channels were considered to be independent, the effect of correlation between sub-channels on the secret key rate is address...
متن کاملRobust Key Extraction from Physical Uncloneable Functions
Physical Uncloneable Functions (PUFs) can be used as a cost-e ective means to store key material in an uncloneable way. Due to the fact that the key material is obtained by performing measurements on a physical system, noise is inevitably present in each readout. In this paper we present a number of methods that improve the robustness of bit-string extraction from noisy PUF measurements in gene...
متن کاملShadowing Model For Secret Key Extraction From WSN
We propose a new solution for key generation process on the basis of Received Signal Strength (RSS) for wireless sensor nodes. We use simulation environments to show that RSS at both the communicating parties is same due to high data transmission rates is a random characteristic and can be used to generate a secret key. We also try to show that how it can become vulnerable if proper care is not...
متن کاملSecret Key Extraction from Level Crossings over Unauthenticated Wireless Channels
We present an algorithm that allows two users to establish a common cryptographic key by exploiting special properties of the wireless channel: the underlying channel response between any two parties is unique and decorrelates rapidly in space. The established key can then be used to encrypt further communications between two users. This is especially useful in mobile and ah-hoc scenarios where...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Wireless Communications and Mobile Computing
سال: 2016
ISSN: 1530-8669,1530-8677
DOI: 10.1002/wcm.2695