[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Ambekar et al., 2012 - Google Patents

Improving channel reciprocity for effective key management systems

Ambekar et al., 2012

Document ID
4345138086884487044
Author
Ambekar A
Hassan M
Schotten H
Publication year
Publication venue
2012 International Symposium on Signals, Systems, and Electronics (ISSSE)

External Links

Snippet

We propose a secret key management system for wireless ad-hoc networks, by utilizing the random and reciprocal variations of the wireless channel. We record the variations of the received signal strength and pre-process it before quantizing. The pre-processing of …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W52/00Power Management, e.g. TPC [Transmission Power Control], power saving or power classes
    • H04W52/02Power saving arrangements
    • H04W52/0209Power saving arrangements in terminal devices
    • H04W52/0212Power saving arrangements in terminal devices managed by the network, e.g. network or access point is master and terminal is slave
    • H04W52/0216Power saving arrangements in terminal devices managed by the network, e.g. network or access point is master and terminal is slave using a pre-established activity schedule, e.g. traffic indication frame
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • H04L2209/805Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN

Similar Documents

Publication Publication Date Title
Ambekar et al. Improving channel reciprocity for effective key management systems
Wang et al. Fast and scalable secret key generation exploiting channel phase randomness in wireless networks
Ren et al. Secret key generation exploiting channel characteristics in wireless communications
Premnath et al. Secret key extraction from wireless signal strength in real environments
Liu et al. Fast and practical secret key extraction by exploiting channel response
Epiphaniou et al. Nonreciprocity compensation combined with turbo codes for secret key generation in vehicular ad hoc social IoT networks
Badawy et al. Unleashing the secure potential of the wireless physical layer: Secret key generation methods
Margelis et al. Physical layer secret-key generation with discreet cosine transform for the Internet of Things
Wang et al. MobiKey: Mobility-based secret key generation in smart home
Ambekar et al. Enhancing channel reciprocity for effective key management in wireless ad-hoc networks
Zhang et al. Secure key generation from OFDM subcarriers' channel responses
US11582035B2 (en) Method of generating a secret key for data communication and key generator thereof
Li et al. Efficient and consistent key extraction based on received signal strength for vehicular ad hoc networks
Soni et al. Wireless physical layer key generation with improved bit disagreement for the internet of things using moving window averaging
Yuliana Performance evaluation of the key extraction schemes in wireless indoor environment
Sudarsono et al. A reciprocity approach for shared secret key generation extracted from received signal strength in the wireless networks
Gao et al. A novel model-based security scheme for LoRa key generation
Huang et al. Secret key generation exploiting Ultra‐wideband indoor wireless channel characteristics
Peng et al. Securing M2M transmissions using nonreconciled secret keys generated from wireless channels
Jin et al. A two-layer secure quantization algorithm for secret key generation with correlated eavesdropping channel
Ambekar et al. Improved method of secret key generation based on variations in wireless channel
Usman et al. A Channel State Information‐Based Key Generation Scheme for Internet of Things
Xi et al. Keep: Secure and efficient communication for distributed iot devices
Han et al. FLoRa: Sequential fuzzy extractor based physical layer key generation for LPWAN
CN113194466A (en) Hybrid key system and method based on wireless channel characteristic simulation