[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Ambekar et al., 2012 - Google Patents

Improving channel reciprocity for effective key management systems

Ambekar et al., 2012

Document ID
4345138086884487044
Author
Ambekar A
Hassan M
Schotten H
Publication year
Publication venue
2012 International Symposium on Signals, Systems, and Electronics (ISSSE)

External Links

Snippet

We propose a secret key management system for wireless ad-hoc networks, by utilizing the random and reciprocal variations of the wireless channel. We record the variations of the received signal strength and pre-process it before quantizing. The pre-processing of …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W52/00Power Management, e.g. TPC [Transmission Power Control], power saving or power classes
    • H04W52/02Power saving arrangements
    • H04W52/0209Power saving arrangements in terminal devices
    • H04W52/0212Power saving arrangements in terminal devices managed by the network, e.g. network or access point is master and terminal is slave
    • H04W52/0216Power saving arrangements in terminal devices managed by the network, e.g. network or access point is master and terminal is slave using a pre-established activity schedule, e.g. traffic indication frame
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • H04L2209/805Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN

Similar Documents

Publication Publication Date Title
Ambekar et al. Improving channel reciprocity for effective key management systems
Wang et al. Fast and scalable secret key generation exploiting channel phase randomness in wireless networks
Jana et al. On the effectiveness of secret key extraction from wireless signal strength in real environments
Premnath et al. Secret key extraction from wireless signal strength in real environments
Liu et al. Fast and practical secret key extraction by exploiting channel response
Epiphaniou et al. Nonreciprocity compensation combined with turbo codes for secret key generation in vehicular ad hoc social IoT networks
Badawy et al. Unleashing the secure potential of the wireless physical layer: Secret key generation methods
Margelis et al. Physical layer secret-key generation with discreet cosine transform for the Internet of Things
US11582035B2 (en) Method of generating a secret key for data communication and key generator thereof
Wang et al. MobiKey: Mobility-based secret key generation in smart home
Ambekar et al. Enhancing channel reciprocity for effective key management in wireless ad-hoc networks
Zhang et al. Secure key generation from OFDM subcarriers' channel responses
Adil et al. On quantization for secret key generation from wireless channel samples
Soni et al. Wireless physical layer key generation with improved bit disagreement for the internet of things using moving window averaging
Yuliana Performance evaluation of the key extraction schemes in wireless indoor environment
Gao et al. A novel model-based security scheme for LoRa key generation
Huang et al. Secret key generation exploiting ultra‐wideband indoor wireless channel characteristics
Peng et al. Securing M2M transmissions using nonreconciled secret keys generated from wireless channels
Jin et al. A two-layer secure quantization algorithm for secret key generation with correlated eavesdropping channel
Ambekar et al. Improved method of secret key generation based on variations in wireless channel
Xi et al. Keep: Secure and efficient communication for distributed iot devices
Usman et al. A Channel State Information‐Based Key Generation Scheme for Internet of Things
Yasukawa et al. A secret key agreement scheme with multi-level quantization and parity check using fluctuation of radio channel property
Felkaroski et al. Secret key generation based on channel state information in a mmWave communication system
Cheng et al. Towards an effective secret key generation scheme for imperfect channel state information