PPS / P Methodologies of Secret - Key Agreement Using Wireless Channel Characteristics

نویسندگان

  • Syed Taha Ali
  • Vijay Sivaraman
چکیده

In this article, we give an overview of current research on shared secret-key agreement between two parties. This agree⁃ ment is based on radio wireless channel characteristics. We discuss the advantages of this approach over traditional cryp⁃ tographic mechanisms and present the theoretical background of this approach. We then give a detailed description of the key-agreement process and the threat model, and we summarize the typical performance metrics for shared se⁃ cret-key agreement. There are four processes in shared secret-key agreement: sampling, quantization, information recon⁃ ciliation, and privacy amplification. We classify prior and current research in this area according to innovation on these four processes. We conclude with a discussion of existing challenges and directions for future work. physical-layer security; secret key generation

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Physical Layer Secret Key Agreement Using One-Bit Quantization and Low-Density Parity-Check Codes

PHYSICAL LAYER SECRET KEY AGREEMENT USING ONE-BIT QUANTIZATION AND LOW-DENSITY PARITY-CHECK CODES John A. Snoap Old Dominion University, 2016 Director: Dr. Dimitrie C. Popescu Physical layer approaches for generating secret encryption keys for wireless systems using channel information have attracted increased interest from researchers in recent years. This paper presents a new approach for cal...

متن کامل

Secret-Key Agreement Capacity over Reciprocal Fading Channels: A Separation Approach

Fundamental limits of secret-key agreement over reciprocal wireless channels are investigated. We consider a two-way block-fading channel where the channel gains in the forward and reverse links between the legitimate terminals are correlated. The channel gains between the legitimate terminals are not revealed to any terminal, whereas the channel gains of the eavesdropper are revealed to the ea...

متن کامل

Security Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System

Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...

متن کامل

Poster: Exploiting Multiple-Antenna Diversity for Shared Secret Key Generation in Wireless Networks

Generating a secret key between two parties by extracting the shared randomness in the wireless fading channel is an emerging area of research. Previous works focus mainly on single-antenna systems. Multiple-antenna devices have the potential to provide more randomness for key generation than single-antenna ones. However, the performance of key generation using multiple-antenna devices in a rea...

متن کامل

IMNTV-Identifying Malicious Nodes using Trust Value in Wireless Sensor Networks

Security is the major area of concern in communication channel. Security is very crucial in wireless sensor networks which are deployed in remote environments. Adversary can disrupt the communication within multi hop sensor networks by launching the attack. The common attacks which disrupt the communication of nodes are packet dropping, packet modification, packet fake routing, badmouthing atta...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013