Skip to main content

Wireless Key Establishment

  • Reference work entry
  • First Online:
  • 16 Accesses

Synonyms

Channel reciprocity; Privacy amplification; Quantization; Reconciliation; Spatial uncorrelation

Definitions

Wireless key establishment is a method that allows two legitimate devices to establish a shared key utilizing the randomness inherent in the wireless channel. In wireless context, the receiver and the transmitter of one wireless link will observe the same channel simultaneously. Such reciprocity property enables two legitimate devices to extract the same characteristics of the channel and agree on the same shared key. Meanwhile, due to the spatial uncorrelation of wireless channels, for two transmitters at different locations, the channels observed by the same receiver are different. Thus, the key established between a pair of wireless devices is confidential to a third un-colocated party.

Historical Background

Wireless devices have been widely used due to its remarkable evolvement in the past two decades. Unlike traditional communication, a wireless device can...

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   1,399.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD   1,999.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  • Ahlswede R, Csiszár I (1993) Common randomness in information theory and cryptography. I. Secret sharing. IEEE Trans Inf Theory 39(4):1121–1132

    MathSciNet  MATH  Google Scholar 

  • Ali ST, Sivaraman V, Ostry D (2010) Secret key generation rate vs. reconciliation cost using wireless channel characteristics in body area networks. In: 2010 IEEE/IFIP 8th international conference on embedded and ubiquitous computing (EUC). IEEE, pp 644–650

    Google Scholar 

  • Liu Y, Draper SC, Sayeed AM (2012) Exploiting channel diversity in secret key generation from multipath fading randomness. IEEE Trans Inf Forensics Secur 7(5):1484–1497

    Google Scholar 

  • Mathur S, Trappe W, Mandayam N, Ye C, Reznik A (2008) Radio-telepathy: extracting a secret key from an unauthenticated wireless channel. In: Proceedings of the 14th ACM international conference on Mobile computing and networking. ACM, pp 128–139

    Google Scholar 

  • Mathur S, Miller R, Varshavsky A, Trappe W, Mandayam N (2011) Proximate: proximity-based secure pairing using ambient wireless signals. In: Proceedings of the 9th international conference on Mobile systems, applications, and services. ACM, pp 211–224

    Google Scholar 

  • Maurer UM (1993) Secret key agreement by public discussion from common information. IEEE Trans Inf Theory 39(3):733–742

    MathSciNet  MATH  Google Scholar 

  • Wang T, Liu Y, Vasilakos AV (2015) Survey on channel reciprocity based key establishment techniques for wireless systems. Wirel Netw 21(6):1835– 1846

    Google Scholar 

  • Zhu X, Xu F, Novak E, Tan CC, Li Q, Chen G (2013) Extracting secret key from wireless link dynamics in vehicular environments. In: INFOCOM, 2013 Proceedings IEEE. IEEE, pp 2283–2291

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yao Liu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this entry

Check for updates. Verify currency and authenticity via CrossMark

Cite this entry

Wang, T., Liu, Y. (2020). Wireless Key Establishment. In: Shen, X.(., Lin, X., Zhang, K. (eds) Encyclopedia of Wireless Networks. Springer, Cham. https://doi.org/10.1007/978-3-319-78262-1_288

Download citation

Publish with us

Policies and ethics