An upper bound on phy-layer key generation for secure communications over a nakagami-m fading channel with asymmetric additive noise

A Albehadili, K Al Shamaileh, A Javaid, J Oluoch… - IEEE …, 2018 - ieeexplore.ieee.org
The establishment of convenient and reliable cryptographic keys is not always feasible,
especially in low-powered wireless devices where a complex key management …

Secret key generation exploiting channel characteristics in wireless communications

K Ren, H Su, Q Wang - IEEE Wireless Communications, 2011 - ieeexplore.ieee.org
Due to the broadcast nature of wireless channels, wireless communication is vulnerable to
eavesdropping, message modification, and node impersonation. Securing the wireless …

RSS based phy layer key generation in wireless communication

A Soni, R Upadhyay, A Kumar - Proceedings of Recent Advances …, 2019 - papers.ssrn.com
Achieving wireless communication security exploiting the inherent properties of the physical
layer is a promising field. Received signal strength (RSS) based key generation is one of the …

Reciprocity enhancement and decorrelation schemes for PHY-based key generation

S Gopinath, R Guillaume, P Duplys… - 2014 IEEE Globecom …, 2014 - ieeexplore.ieee.org
Providing secure communication links between devices of low computational power has
been increasingly investigated during recent years. The need for fast and easy-to-implement …

Cooperative secret key generation from phase estimation in narrowband fading channels

Q Wang, K Xu, K Ren - IEEE Journal on selected areas in …, 2012 - ieeexplore.ieee.org
By exploiting multipath fading channels as a source of common randomness, physical layer
(PHY) based key generation protocols allow two terminals with correlated observations to …

Physical layer key generation in wireless networks: challenges and opportunities

K Zeng - IEEE Communications Magazine, 2015 - ieeexplore.ieee.org
Physical layer key generation that exploits reciprocity and randomness of wireless fading
channels has attracted considerable research attention in recent years. Although theoretical …

Bringing PHY-based key generation into the field: An evaluation for practical scenarios

R Guillaume, F Winzer, A Czylwik… - 2015 IEEE 82nd …, 2015 - ieeexplore.ieee.org
The need for secured communication between computationally weak wireless devices has
driven the development of novel key generation protocols. Various schemes for extracting …

Generation of secret key for physical layer to evaluate channel characteristics in wireless communications

BU Prashanth, Y Pandurangaiah - arXiv preprint arXiv:1308.1206, 2013 - arxiv.org
This manuscript aims to generate a secret key for a PHY layer to evaluate the channel
characteristics in wireless communications. An algorithmic approach is adopted for …

Secure and robust symmetric key generation using physical layer techniques under various wireless environments

C Sahin, B Katz, KR Dandekar - 2016 IEEE radio and wireless …, 2016 - ieeexplore.ieee.org
Due to the unavoidable shared nature of the wireless radio spectrum, providing security for
wireless communications presents unique challenges. Cryptographic keys have been used …

Fair comparison and evaluation of quantization schemes for phy-based key generation

R Guillaume, A Mueller, CT Zenger… - OFDM 2014; 18th …, 2014 - ieeexplore.ieee.org
The generation of symmetric cryptographic keys out of wireless channel properties
represents a promising approach for the establishment of secured communication links …