Secret key generation based on aoa estimation for low snr conditions

A Badawy, T Khattab, T El-Fouly… - 2015 IEEE 81st …, 2015 - ieeexplore.ieee.org
In the context of physical layer security, a physical layer characteristic is used as a common
source of randomness to generate the secret key. Therefore an accurate estimation of this …

Robust secret key extraction from channel secondary random process

A Badawy, T Elfouly, T Khattab… - Wireless …, 2016 - Wiley Online Library
The vast majority of existing secret key generation protocols exploit the inherent
randomness of the wireless channel as a common source of randomness. However …

Secret key generation based on channel and distance measurements

A Badawy, T Khattab, T ElFouly… - … Congress on Ultra …, 2014 - ieeexplore.ieee.org
Within the paradigm of physical layer secrecy, typically a physical layer specific
characteristic is used as key generator to guarantee information hiding from eavesdroppers …

Channel secondary random process for robust secret key generation

A Badawy, T Khattab, T ElFouly… - 2015 International …, 2015 - ieeexplore.ieee.org
The broadcast nature of wireless communications imposes the risk of information leakage to
adversarial users or unauthorized receivers. Therefore, information security between …

Channel estimation for secret key generation

M McGuire - 2014 IEEE 28th International Conference on …, 2014 - ieeexplore.ieee.org
Generating secret keys from radio channel measurements has been shown to allow private
communications. Previously described methods for performing wireless key generation have …

A survey on secret key generation mechanisms on the physical layer in wireless networks

YEH Shehadeh, D Hogrefe - Security and Communication …, 2015 - Wiley Online Library
Traditional security mechanisms are mainly based on the distribution of shared secret keys.
Yet, this task is nontrivial in large wireless networks, because of mobility and scalability …

Fast secret key generation in static wireless networks: A virtual channel approach

P Huang, X Wang - 2013 Proceedings IEEE INFOCOM, 2013 - ieeexplore.ieee.org
Physical layer secret key generation exploits the inherent randomness of wireless channels.
However, for wireless channels with long coherence time, key generation rate can be …

On the key generation from correlated wireless channels

J Zhang, B He, TQ Duong… - IEEE Communications …, 2017 - ieeexplore.ieee.org
This letter investigates the secret key capacity of key generation from correlated wireless
channels in a source model. We systematically study a practical scenario by taking into …

On quantization for secret key generation from wireless channel samples

M Adil, S Wyne, SJ Nawaz - IEEE Access, 2021 - ieeexplore.ieee.org
Physical layer security (PLS) techniques hold promise for augmenting secure
communications in the 5 th generation of mobile wireless networks. Secret key generation …

Secret key generation via random beamforming in stationary environment

L Cheng, W Li, D Ma - 2015 International Conference on …, 2015 - ieeexplore.ieee.org
Extracting secret key from the common randomness of wireless channel has gained
significant interest as a mechanism for providing secure point-to-point communications …