Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








6,038 Hits in 5.7 sec

Security Analysis of Quantization Schemes for Channel-based Key Extraction

Christian Zenger, Jan Zimmer, Christof Paar
2015 Proceedings of the 12th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services  
Further, we answer for the first time a variety of security and performance related questions about the behavior of 10 channelbased key establishment schemes from the literature.  ...  The use of reciprocal and random properties of wireless channels for the generation of secret keys is a highly attractive option for many applications that operate in a mobile environment.  ...  Contributions We apply a security analysis of all (to the best of the authors' knowledge) published works on practice-oriented protocols for channel-based key extraction.  ... 
doi:10.4108/eai.22-7-2015.2260194 dblp:journals/sesa/ZengerZP15 fatcat:owgpx6s66rar3leea23esxnffi

A Method for Detecting Amplitude-Phase Joint Characteristic Parameters of Wireless Channel for Generating Key Parameters

Qiongying Tan, Shuanglin Huang, Sanjun Liu
2021 Complexity  
Aiming at the problems of poor adaptability and low secret key generation rate of secret key generation scheme based on single characteristic parameter of wireless channel, a secret key generation method  ...  The test results show that the proposed scheme can significantly improve the rate, reliability, and security of generating key random parameters.  ...  1 e secret key generation method based on joint amplitude-phase characteristic parameters of wireless channel Scheme 2 e secret key generation scheme based on phase characteristics of wireless channel  ... 
doi:10.1155/2021/9951742 doaj:32197d855c9442c3912b569e2e6066c7 fatcat:hlnmwh3jtveprnby4ec5hc4kfy

Establishing Secret Key in Wireless Environment by Using Techniques of Keyless Cryptosystem

2015 International Journal of Science and Research (IJSR)  
These ambiguous keys do not allow the middle man to get an idea on the key imagining that the channel of communication is anonymous.  ...  This technique is efficiently used in smart phones running on iOS, Android for assuring at most security  ...  Wallace's [8] scheme on how to extract secret key based on the keyless scheme is briefed here. ISSN (Online C.  ... 
doi:10.21275/v4i2.sub151640 fatcat:xchkltz75zf4dobk7es3gp6r2e

Physical Layer Key Generation Method Based on SVD Pre-processing

Zehui Liu, Min Guo, Yun Ju
2023 Journal of Cyber Security and Mobility  
This method uses the SVD feature processing algorithm to pre-process the channel features extracted from both sides of the communication before quantization, in order to simultaneously improve key consistency  ...  Environmental factors such as channel noise and hardware fingerprints affect the encryption effect of physical layer key generation techniques, resulting in low consistency of generated keys.  ...  In the literature [8] , based on the analysis of key BER, provides a reliable key synthesis algorithm for messaging based on the channel transmission characteristics. Liu Jingmei et al.  ... 
doi:10.13052/jcsm2245-1439.1163 fatcat:uwojb7x6vvaebax62zfrwwmfou

Robust Key Agreement From Received Signal Strength in Stationary Wireless Networks

2016 KSII Transactions on Internet and Information Systems  
Our analysis shows that the shared key generated by our proposed RSKA scheme has features of high randomness and a high bit rate compared to traditional RSS-based key agreement schemes.  ...  Key agreement is paramount in secure wireless communications. A promising approach to address key agreement schemes is to extract secure keys from channel characteristics.  ...  proposed RSKA scheme consists of three steps: Normalized quantization, bit reshape, and modified fuzzy-vault based key extraction.  ... 
doi:10.3837/tiis.2016.05.023 fatcat:g4yuzsevgnbrdk6bwnehv7qoia

A Multihop Key Agreement Scheme for Wireless Ad Hoc Networks Based on Channel Characteristics

Zhuo Hao, Sheng Zhong, Nenghai Yu
2013 The Scientific World Journal  
A number of key agreement schemes based on wireless channel characteristics have been proposed recently.  ...  Both performance analysis and simulation results demonstrate that the improved scheme is efficient. Consequently, the improved key agreement scheme is suitable for multihop wireless ad hoc networks.  ...  [3] propose a novel key agreement scheme for wireless networks, which is based on the secrecy of the wireless channel itself.  ... 
doi:10.1155/2013/935604 pmid:23766725 pmcid:PMC3673334 fatcat:y6yo6xr2uzdcznlkodk7lqzpiq

Survey on channel reciprocity based key establishment techniques for wireless systems

Tao Wang, Yao Liu, Athanasios V. Vasilakos
2015 Wireless networks  
In this survey, we reviewed different types of existing techniques based on (1) how they quantize the wireless channel reciprocity into binary bits to form a secret key; (2) how they handle communication  ...  Channel reciprocity based key establishment techniques have attracted more and more attention from the wireless security research community for its easy implementation, low computational requirement, and  ...  Feasibility, security and new techniques of key extraction In this section, we will present three key factors that substantially affect the feasibility and security of key extraction: channel reciprocity  ... 
doi:10.1007/s11276-014-0841-8 fatcat:b2f3h2k4dzcjfns7rgq27iiwau

Key Distribution Scheme for Optical Fiber Channel Based on SNR Feature Measurement

Xiangqing Wang, Jie Zhang, Bo Wang, Kongni Zhu, Haokun Song, Ruixia Li, Fenghui Zhang
2021 Photonics  
We propose a novel key distribution scheme based on signal-to-noise ratio (SNR) measurements to extract the fingerprint of the fiber channel and improve the physical level of security.  ...  The extracted SNR of the optical fiber channel can be used as the basis of key generation.  ...  The funders had no role in the design of the study; in the collection, analysis, or interpretation of data; in the writing of the manuscript, or in the decision to publish the results.  ... 
doi:10.3390/photonics8060208 fatcat:pqbr45t4ibhqnawb63peyjcwgu

A New Fuzzy Key Generation Method Based on PHY-Layer Fingerprints in Mobile Cognitive Radio Networks

2016 KSII Transactions on Internet and Information Systems  
much more robust for key generation in mobile CRNs.  ...  We give security analyses of these algorithms in both the spatial and temporal domains, and prove the upper bound of the entropy loss in theory.  ...  In our scheme, Security Analysis The spatial security of the scheme is guaranteed based on the previous assumption that the e SU at a third location whose distance is more than a few wavelengths from  ... 
doi:10.3837/tiis.2016.07.030 fatcat:gwuws32dt5eljphquaf7t4evdq

On-line Entropy Estimation for Secure Information Reconciliation

Christian Zenger, Jan Zimmer, Jan-Felix Posielek, Christof Paar
2015 Proceedings of the 12th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services  
In the present paper, we investigate on-line statistical testing for channel-based key extraction schemes, which is independent from channel abstractions due to the capability to verify the entropy of  ...  Further, we present real-world evaluation results of 10 recent protocols for the generation of keys with a verified security level of 128-bit.  ...  Next, we focus on reconciliation-as well as on-line statistical testing-schemes from the literature and show why a connection of both is especially important for the security of a key extraction scheme  ... 
doi:10.4108/eai.22-7-2015.2260196 dblp:conf/mobiquitous/ZengerZPP15 fatcat:4x6xne27rrbvjexvc4qv2blglq

Efficient Physical-Layer Secret Key Generation and Authentication Schemes Based on Wireless Channel-Phase

Longwang Cheng, Li Zhou, Boon-Chong Seet, Wei Li, Dongtang Ma, Jibo Wei
2017 Mobile Information Systems  
In the secret key generation scheme, to simplify the extracting procedure, only one legitimate party is chosen to probe the channel and quantize the measurements to obtain the preliminary key.  ...  However, the existing secret key generation schemes suffer from miscellaneous extracting procedure. Many PHY-layer authentication schemes assume that the knowledge of the shared key is preknown.  ...  Networks Lab, National Key Laboratory of Anti-Jamming Communication Technology.  ... 
doi:10.1155/2017/7393526 fatcat:jiueqdasszhnbducg7t3sfzwhu

Collaborative secret key extraction leveraging Received Signal Strength in mobile wireless networks

Hongbo Liu, Jie Yang, Yan Wang, Yingying Chen
2012 2012 Proceedings IEEE INFOCOM  
The proposed framework consists of a secret key extraction scheme exploiting the trend exhibited in RSS resulted from shadow fading, which is robust to outsider adversary performing stalking attacks.  ...  In this work, we propose a framework for collaborative key generation among a group of wireless devices leveraging RSS.  ...  This observation validates the high security of using channel measurements for secret key extraction. C.  ... 
doi:10.1109/infcom.2012.6195843 dblp:conf/infocom/LiuYWC12 fatcat:my7cs64tgnfchammmtbqilkcsi

Secure key distribution system based on optical channel physical features

Xiangqing Wang, Jie Zhang, Yajie Li, Yongli Zhao, Xiaokun Yang
2019 IEEE Photonics Journal  
The security of generated keys in the system is enhanced by the use of the encryption base and the randomness of the channel.  ...  The 10G bit/s-200 km coherent optical communication system is used to measure the BER of the security feature information of the extracted channel.  ...  Design of Key Distribution System Based on Optical Security Transmission Channel Feature Extraction BER Key Extraction Scheme Design The specific design scheme is as follows.  ... 
doi:10.1109/jphot.2019.2953783 fatcat:t3hcqorv4feapfeq3dovuuvxva

Exploiting the Physical Environment for Securing the Internet of Things

Christian T. Zenger, Jan Zimmer, Mario Pietersz, Jan-Felix Posielek, Christof Paar
2015 Proceedings of the New Security Paradigms Workshop on ZZZ - NSPW '15  
The majority of those protocols is based on a standard model consisting channel probing, quantization, information reconciliation, privacy amplification, and key verification.  ...  For example, security analyses often only address single components and not the entire system or are based on broad abstractions of the physical source of randomness.  ...  The classical system model for channel-based symmetric key extraction schemes is based on the following scenario.  ... 
doi:10.1145/2841113.2841117 dblp:conf/nspw/ZengerZPPP15 fatcat:ifkrsewvhzfhzfkuqe2cxu7gru

A New Low-BMR Quantization Method for Wireless Channel Characteristics-based Secret Key Generation

2017 KSII Transactions on Internet and Information Systems  
Channel characteristics-based secret key generation is an effective physical-layer security method.  ...  In this paper, to reduce the effect of random noise and extract more secret bits, a new quantization scheme with high key generation rate and low bit mismatch rate is proposed.  ...  For example, our proposed scheme can extract 3 secret bits per measurement compared to average 1.63 for the guard-interval approach with N=8. 5 Security As for the security, on the one hand, Eve's  ... 
doi:10.3837/tiis.2017.10.021 fatcat:7seahonk6rgltl5ryha7vetoy4
« Previous Showing results 1 — 15 out of 6,038 results