K Ren, H Su, Q Wang - IEEE Wireless Communications, 2011 - ieeexplore.ieee.org
Due to the broadcast nature of wireless channels, wireless communication is vulnerable to eavesdropping, message modification, and node impersonation. Securing the wireless …
D Chen, Z Qin, X Mao, P Yang, Z Qin… - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
Leveraging a wireless multipath channel as the source of common randomness, many key generation methods have been proposed according to the information-theory security …
Q Wang, H Su, K Ren, K Kim - 2011 Proceedings IEEE …, 2011 - ieeexplore.ieee.org
Recently, there has been great interest in physical layer security techniques that exploit the randomness of wireless channels for securely extracting cryptographic keys. Several …
This paper presents a thorough experimental study on key generation principles, ie, temporal variation, channel reciprocity, and spatial decorrelation, through a testbed …
Key generation from the randomness of wireless channels is a promising alternative to public key cryptography for the establishment of cryptographic keys between any two users …
J Wallace - 2009 IEEE International Conference on …, 2009 - ieeexplore.ieee.org
There is growing interest in wireless security methods that provide strong or even perfect secrecy by taking advantage of features of the physical propagation channel. In advantage …
This letter investigates the secret key capacity of key generation from correlated wireless channels in a source model. We systematically study a practical scenario by taking into …
G Li, L Hu, P Staat, H Elders-Boll… - IEEE Wireless …, 2022 - ieeexplore.ieee.org
Physical layer key generation (PKG) is a promising means to provide on-the-fly shared secret keys by exploiting the intrinsic randomness of the radio channel. However, the …
C Chen, MA Jensen - IEEE Transactions on Mobile Computing, 2010 - ieeexplore.ieee.org
When implementing data encryption and decryption in a symmetric cryptosystem, secure distribution of the secret key to legitimate nodes can be a challenge. In this paper, we …