Ambekar et al., 2012 - Google Patents
Improving channel reciprocity for effective key management systemsAmbekar et al., 2012
- Document ID
- 4345138086884487044
- Author
- Ambekar A
- Hassan M
- Schotten H
- Publication year
- Publication venue
- 2012 International Symposium on Signals, Systems, and Electronics (ISSSE)
External Links
Snippet
We propose a secret key management system for wireless ad-hoc networks, by utilizing the random and reciprocal variations of the wireless channel. We record the variations of the received signal strength and pre-process it before quantizing. The pre-processing of …
- 238000005259 measurement 0 abstract description 21
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W52/00—Power Management, e.g. TPC [Transmission Power Control], power saving or power classes
- H04W52/02—Power saving arrangements
- H04W52/0209—Power saving arrangements in terminal devices
- H04W52/0212—Power saving arrangements in terminal devices managed by the network, e.g. network or access point is master and terminal is slave
- H04W52/0216—Power saving arrangements in terminal devices managed by the network, e.g. network or access point is master and terminal is slave using a pre-established activity schedule, e.g. traffic indication frame
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
- H04L2209/805—Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Ambekar et al. | Improving channel reciprocity for effective key management systems | |
Wang et al. | Fast and scalable secret key generation exploiting channel phase randomness in wireless networks | |
Ren et al. | Secret key generation exploiting channel characteristics in wireless communications | |
Premnath et al. | Secret key extraction from wireless signal strength in real environments | |
Liu et al. | Fast and practical secret key extraction by exploiting channel response | |
Epiphaniou et al. | Nonreciprocity compensation combined with turbo codes for secret key generation in vehicular ad hoc social IoT networks | |
Badawy et al. | Unleashing the secure potential of the wireless physical layer: Secret key generation methods | |
Margelis et al. | Physical layer secret-key generation with discreet cosine transform for the Internet of Things | |
Wang et al. | MobiKey: Mobility-based secret key generation in smart home | |
Ambekar et al. | Enhancing channel reciprocity for effective key management in wireless ad-hoc networks | |
Zhang et al. | Secure key generation from OFDM subcarriers' channel responses | |
US11582035B2 (en) | Method of generating a secret key for data communication and key generator thereof | |
Li et al. | Efficient and consistent key extraction based on received signal strength for vehicular ad hoc networks | |
Soni et al. | Wireless physical layer key generation with improved bit disagreement for the internet of things using moving window averaging | |
Yuliana | Performance evaluation of the key extraction schemes in wireless indoor environment | |
Sudarsono et al. | A reciprocity approach for shared secret key generation extracted from received signal strength in the wireless networks | |
Gao et al. | A novel model-based security scheme for LoRa key generation | |
Huang et al. | Secret key generation exploiting Ultra‐wideband indoor wireless channel characteristics | |
Peng et al. | Securing M2M transmissions using nonreconciled secret keys generated from wireless channels | |
Jin et al. | A two-layer secure quantization algorithm for secret key generation with correlated eavesdropping channel | |
Ambekar et al. | Improved method of secret key generation based on variations in wireless channel | |
Usman et al. | A Channel State Information‐Based Key Generation Scheme for Internet of Things | |
Xi et al. | Keep: Secure and efficient communication for distributed iot devices | |
Han et al. | FLoRa: Sequential fuzzy extractor based physical layer key generation for LPWAN | |
CN113194466A (en) | Hybrid key system and method based on wireless channel characteristic simulation |