Key Generation Using Physical Properties of Wireless Communication
A key exchange protocol between two parties that enables the calculation of a key on both sides while preventing an adversary to extract any nontrivial information about the key. The protocol assumes the parties have access to a correlated random source that is derived from the wireless communication link they employ. The adversary can be considered to be passive (eavesdropping) or active (modifying the communication environment).
In a wireless environment, the received signal suffers from external distortions that include mean propagation pathloss, fading, interference from other users’ signals, and thermal noise. Among these causes, fading may change in an unpredictable way as the wireless environment changes due to the frequency, location, direction, and reflecting coefficients of the surrounding objects. The unpredictability of these factors presents a wireless channel as a (nonstationary) stochastic process that may contain a substantial amou ...
- Aono, T, Higuchi, K, Ohira, T, Komiyama, B, Sasaoka, H (2005) Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels. IEEE Trans Antennas Propag 53: pp. 3776-3784 CrossRef
- Azimi-Sadjadi, B, Kiayias, A, Mercado, A, Yener, B (2007) Robust key generation from signal envelopes in wireless networks.
- Jana, S, Premnath, SN, Clark, M, Kasera, SK, Patwari, N, Krishnamurthy, SV (2009) On the effectiveness of secret key extraction from wireless signal strength in real environments. MOBICOM, Beijing
- Mathur, S, Trappe, W, Mandayam, NB, Ye, C, Reznik, A (2008) Radio-telepathy: extracting a secret key from an unauthenticated wireless channel. MOBICOM, San Francisco
- Key Generation Using Physical Properties of Wireless Communication
- Reference Work Title
- Encyclopedia of Cryptography and Security
- pp 682-683
- Print ISBN
- Online ISBN
- Springer US
- Copyright Holder
- Springer Science+Business Media, LLC
- Additional Links
- Industry Sectors
- eBook Packages
- Editor Affiliations
- 376. Department of Mathematics and Computing Science, Eindhoven University of Technology
- 377. Center for Secure Information Systems, George Mason University
- Author Affiliations
- 1. Department of Computer Science Engineering, University of Connecticut, 371 Fairfield Road, 6269, Storrs, CT, USA
- 2. Department of Computer Science, Rensselaer Polytechnic Institute, Lally 310, 110 Eighth Street, 12180-3590, Troy, NY, USA
To view the rest of this content please follow the download PDF link above.