Secret key establishment using temporally and spatially correlated wireless channel coefficients

C Chen, MA Jensen - IEEE Transactions on Mobile Computing, 2010 - ieeexplore.ieee.org
When implementing data encryption and decryption in a symmetric cryptosystem, secure
distribution of the secret key to legitimate nodes can be a challenge. In this paper, we …

Applying beamforming to address temporal correlation in wireless channel characterization-based secret key generation

MG Madiseh, SW Neville… - IEEE Transactions on …, 2012 - ieeexplore.ieee.org
Wireless secret key generation (WKG) methods based on communications channel
characterizations have gained significant interest as a mechanism for providing secure point …

Fast and scalable secret key generation exploiting channel phase randomness in wireless networks

Q Wang, H Su, K Ren, K Kim - 2011 Proceedings IEEE …, 2011 - ieeexplore.ieee.org
Recently, there has been great interest in physical layer security techniques that exploit the
randomness of wireless channels for securely extracting cryptographic keys. Several …

On the using of discrete wavelet transform for physical layer key generation

F Zhan, N Yao - Ad Hoc Networks, 2017 - Elsevier
For key generation between wireless transceivers, key generation leveraging channel
reciprocity is a promising alternative to public key cryptography. Several existing schemes …

A survey on secret key generation mechanisms on the physical layer in wireless networks

YEH Shehadeh, D Hogrefe - Security and Communication …, 2015 - Wiley Online Library
Traditional security mechanisms are mainly based on the distribution of shared secret keys.
Yet, this task is nontrivial in large wireless networks, because of mobility and scalability …

Security analysis of quantization schemes for channel-based key extraction

C Zenger, J Zimmer, C Paar - EAI Endorsed Transactions on Security and …, 2015 - eudl.eu
The use of reciprocal and random properties of wireless channels for the generation of
secret keys is a highly attractive option for many applications that operate in a mobile …

Information-theoretically secret key generation for fading wireless channels

C Ye, S Mathur, A Reznik, Y Shah… - IEEE Transactions …, 2010 - ieeexplore.ieee.org
The multipath-rich wireless environment associated with typical wireless usage scenarios is
characterized by a fading channel response that is time-varying, location-sensitive, and …

Secret key generation exploiting channel characteristics in wireless communications

K Ren, H Su, Q Wang - IEEE Wireless Communications, 2011 - ieeexplore.ieee.org
Due to the broadcast nature of wireless channels, wireless communication is vulnerable to
eavesdropping, message modification, and node impersonation. Securing the wireless …

On the key generation from correlated wireless channels

J Zhang, B He, TQ Duong… - IEEE Communications …, 2017 - ieeexplore.ieee.org
This letter investigates the secret key capacity of key generation from correlated wireless
channels in a source model. We systematically study a practical scenario by taking into …

Exploiting channel diversity in secret key generation from multipath fading randomness

Y Liu, SC Draper, AM Sayeed - IEEE Transactions on …, 2012 - ieeexplore.ieee.org
We design and analyze a method to extract secret keys from the randomness inherent to
wireless channels. We study a channel model for a multipath wireless channel and exploit …