Secret Key Generation Via Localization and Mobility

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Mobility Independent Secret Key Generation for Wearable Health-care Devices

Security in Wireless Body Area Networks (WBAN) is of major concern as the miniature personal health-care devices need to protect the sensitive health information transmitted in wireless medium. It is essential for these devices to generate the shared secret key used for data encryption periodically. Recent studies have exploited wireless channel characteristics, e.g., received signal strength i...

متن کامل

Secret Key Generation for Fading Wireless Channel

The multipath-rich wireless atmosphere allied with typical wireless usage scenarios is characterized by a vanishing channel retort that is time-varying, location-sensitive, and only shared by a given transmitter–receiver pair. The complexity allied with a highly scattering atmosphere implies that the short-term vanishing process is intrinsically hard to envisage and best modeled stochastically,...

متن کامل

Secret Key Generation by Virtual Link Estimation

In recent years, researchers have explored using unique radio propagation characteristics between two devices for extracting symmetric keys. However, the state-of-the-art has the following limitations: (i) paying more attention to only when the two devices are in communication range, and (ii) generating keys only when the devices are in motion. Secret key generation for devices which are not in...

متن کامل

Common randomness and secret key generation with a helper

We consider the generation of common randomness (CR), secret or not secret, by two user terminals with aid from a “helper” terminal. Each terminal observes a different component of a discrete memoryless multiple source. The helper aids the users by transmitting information to them over a noiseless public channel subject to a rate constraint. Furthermore, one of the users is allowed to transmit ...

متن کامل

Lattice Codes for Secure Communication and Secret Key Generation

In this work, we study two problems in information-theoretic security. Firstly, we study a wireless network where two nodes want to securely exchange messages via an honestbut-curious bidirectional relay. There is no direct link between the user nodes, and all communication must take place through the relay. The relay behaves like a passive eavesdropper, but otherwise follows the protocol it is...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Vehicular Technology

سال: 2015

ISSN: 0018-9545,1939-9359

DOI: 10.1109/tvt.2014.2342714