A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
Security Analysis of Quantization Schemes for Channel-based Key Extraction
2015
Proceedings of the 12th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services
Further, we answer for the first time a variety of security and performance related questions about the behavior of 10 channelbased key establishment schemes from the literature. ...
The use of reciprocal and random properties of wireless channels for the generation of secret keys is a highly attractive option for many applications that operate in a mobile environment. ...
Contributions We apply a security analysis of all (to the best of the authors' knowledge) published works on practice-oriented protocols for channel-based key extraction. ...
doi:10.4108/eai.22-7-2015.2260194
dblp:journals/sesa/ZengerZP15
fatcat:owgpx6s66rar3leea23esxnffi
A Method for Detecting Amplitude-Phase Joint Characteristic Parameters of Wireless Channel for Generating Key Parameters
2021
Complexity
Aiming at the problems of poor adaptability and low secret key generation rate of secret key generation scheme based on single characteristic parameter of wireless channel, a secret key generation method ...
The test results show that the proposed scheme can significantly improve the rate, reliability, and security of generating key random parameters. ...
1 e secret key generation method based on joint amplitude-phase characteristic parameters of wireless channel Scheme 2 e secret key generation scheme based on phase characteristics of wireless channel ...
doi:10.1155/2021/9951742
doaj:32197d855c9442c3912b569e2e6066c7
fatcat:hlnmwh3jtveprnby4ec5hc4kfy
Establishing Secret Key in Wireless Environment by Using Techniques of Keyless Cryptosystem
2015
International Journal of Science and Research (IJSR)
These ambiguous keys do not allow the middle man to get an idea on the key imagining that the channel of communication is anonymous. ...
This technique is efficiently used in smart phones running on iOS, Android for assuring at most security ...
Wallace's [8] scheme on how to extract secret key based on the keyless scheme is briefed here.
ISSN (Online
C. ...
doi:10.21275/v4i2.sub151640
fatcat:xchkltz75zf4dobk7es3gp6r2e
Physical Layer Key Generation Method Based on SVD Pre-processing
2023
Journal of Cyber Security and Mobility
This method uses the SVD feature processing algorithm to pre-process the channel features extracted from both sides of the communication before quantization, in order to simultaneously improve key consistency ...
Environmental factors such as channel noise and hardware fingerprints affect the encryption effect of physical layer key generation techniques, resulting in low consistency of generated keys. ...
In the literature [8] , based on the analysis of key BER, provides a reliable key synthesis algorithm for messaging based on the channel transmission characteristics. Liu Jingmei et al. ...
doi:10.13052/jcsm2245-1439.1163
fatcat:uwojb7x6vvaebax62zfrwwmfou
Robust Key Agreement From Received Signal Strength in Stationary Wireless Networks
2016
KSII Transactions on Internet and Information Systems
Our analysis shows that the shared key generated by our proposed RSKA scheme has features of high randomness and a high bit rate compared to traditional RSS-based key agreement schemes. ...
Key agreement is paramount in secure wireless communications. A promising approach to address key agreement schemes is to extract secure keys from channel characteristics. ...
proposed RSKA scheme consists of three steps: Normalized quantization, bit reshape, and modified fuzzy-vault based key extraction. ...
doi:10.3837/tiis.2016.05.023
fatcat:g4yuzsevgnbrdk6bwnehv7qoia
A Multihop Key Agreement Scheme for Wireless Ad Hoc Networks Based on Channel Characteristics
2013
The Scientific World Journal
A number of key agreement schemes based on wireless channel characteristics have been proposed recently. ...
Both performance analysis and simulation results demonstrate that the improved scheme is efficient. Consequently, the improved key agreement scheme is suitable for multihop wireless ad hoc networks. ...
[3] propose a novel key agreement scheme for wireless networks, which is based on the secrecy of the wireless channel itself. ...
doi:10.1155/2013/935604
pmid:23766725
pmcid:PMC3673334
fatcat:y6yo6xr2uzdcznlkodk7lqzpiq
Survey on channel reciprocity based key establishment techniques for wireless systems
2015
Wireless networks
In this survey, we reviewed different types of existing techniques based on (1) how they quantize the wireless channel reciprocity into binary bits to form a secret key; (2) how they handle communication ...
Channel reciprocity based key establishment techniques have attracted more and more attention from the wireless security research community for its easy implementation, low computational requirement, and ...
Feasibility, security and new techniques of key extraction In this section, we will present three key factors that substantially affect the feasibility and security of key extraction: channel reciprocity ...
doi:10.1007/s11276-014-0841-8
fatcat:b2f3h2k4dzcjfns7rgq27iiwau
Key Distribution Scheme for Optical Fiber Channel Based on SNR Feature Measurement
2021
Photonics
We propose a novel key distribution scheme based on signal-to-noise ratio (SNR) measurements to extract the fingerprint of the fiber channel and improve the physical level of security. ...
The extracted SNR of the optical fiber channel can be used as the basis of key generation. ...
The funders had no role in the design of the study; in the collection, analysis, or interpretation of data; in the writing of the manuscript, or in the decision to publish the results. ...
doi:10.3390/photonics8060208
fatcat:pqbr45t4ibhqnawb63peyjcwgu
A New Fuzzy Key Generation Method Based on PHY-Layer Fingerprints in Mobile Cognitive Radio Networks
2016
KSII Transactions on Internet and Information Systems
much more robust for key generation in mobile CRNs. ...
We give security analyses of these algorithms in both the spatial and temporal domains, and prove the upper bound of the entropy loss in theory. ...
In our scheme,
Security Analysis The spatial security of the scheme is guaranteed based on the previous assumption that the e SU at a third location whose distance is more than a few wavelengths from ...
doi:10.3837/tiis.2016.07.030
fatcat:gwuws32dt5eljphquaf7t4evdq
On-line Entropy Estimation for Secure Information Reconciliation
2015
Proceedings of the 12th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services
In the present paper, we investigate on-line statistical testing for channel-based key extraction schemes, which is independent from channel abstractions due to the capability to verify the entropy of ...
Further, we present real-world evaluation results of 10 recent protocols for the generation of keys with a verified security level of 128-bit. ...
Next, we focus on reconciliation-as well as on-line statistical testing-schemes from the literature and show why a connection of both is especially important for the security of a key extraction scheme ...
doi:10.4108/eai.22-7-2015.2260196
dblp:conf/mobiquitous/ZengerZPP15
fatcat:4x6xne27rrbvjexvc4qv2blglq
Efficient Physical-Layer Secret Key Generation and Authentication Schemes Based on Wireless Channel-Phase
2017
Mobile Information Systems
In the secret key generation scheme, to simplify the extracting procedure, only one legitimate party is chosen to probe the channel and quantize the measurements to obtain the preliminary key. ...
However, the existing secret key generation schemes suffer from miscellaneous extracting procedure. Many PHY-layer authentication schemes assume that the knowledge of the shared key is preknown. ...
Networks Lab, National Key Laboratory of Anti-Jamming Communication Technology. ...
doi:10.1155/2017/7393526
fatcat:jiueqdasszhnbducg7t3sfzwhu
Collaborative secret key extraction leveraging Received Signal Strength in mobile wireless networks
2012
2012 Proceedings IEEE INFOCOM
The proposed framework consists of a secret key extraction scheme exploiting the trend exhibited in RSS resulted from shadow fading, which is robust to outsider adversary performing stalking attacks. ...
In this work, we propose a framework for collaborative key generation among a group of wireless devices leveraging RSS. ...
This observation validates the high security of using channel measurements for secret key extraction.
C. ...
doi:10.1109/infcom.2012.6195843
dblp:conf/infocom/LiuYWC12
fatcat:my7cs64tgnfchammmtbqilkcsi
Secure key distribution system based on optical channel physical features
2019
IEEE Photonics Journal
The security of generated keys in the system is enhanced by the use of the encryption base and the randomness of the channel. ...
The 10G bit/s-200 km coherent optical communication system is used to measure the BER of the security feature information of the extracted channel. ...
Design of Key Distribution System Based on Optical Security Transmission Channel Feature Extraction
BER Key Extraction Scheme Design The specific design scheme is as follows. ...
doi:10.1109/jphot.2019.2953783
fatcat:t3hcqorv4feapfeq3dovuuvxva
Exploiting the Physical Environment for Securing the Internet of Things
2015
Proceedings of the New Security Paradigms Workshop on ZZZ - NSPW '15
The majority of those protocols is based on a standard model consisting channel probing, quantization, information reconciliation, privacy amplification, and key verification. ...
For example, security analyses often only address single components and not the entire system or are based on broad abstractions of the physical source of randomness. ...
The classical system model for channel-based symmetric key extraction schemes is based on the following scenario. ...
doi:10.1145/2841113.2841117
dblp:conf/nspw/ZengerZPPP15
fatcat:ifkrsewvhzfhzfkuqe2cxu7gru
A New Low-BMR Quantization Method for Wireless Channel Characteristics-based Secret Key Generation
2017
KSII Transactions on Internet and Information Systems
Channel characteristics-based secret key generation is an effective physical-layer security method. ...
In this paper, to reduce the effect of random noise and extract more secret bits, a new quantization scheme with high key generation rate and low bit mismatch rate is proposed. ...
For example, our proposed scheme can extract 3 secret bits per measurement compared to average 1.63 for the guard-interval approach with N=8. 5
Security As for the security, on the one hand, Eve's ...
doi:10.3837/tiis.2017.10.021
fatcat:7seahonk6rgltl5ryha7vetoy4
« Previous
Showing results 1 — 15 out of 6,038 results