Ambekar et al., 2012 - Google Patents
Improving channel reciprocity for effective key management systemsAmbekar et al., 2012
- Document ID
- 4345138086884487044
- Author
- Ambekar A
- Hassan M
- Schotten H
- Publication year
- Publication venue
- 2012 International Symposium on Signals, Systems, and Electronics (ISSSE)
External Links
Snippet
We propose a secret key management system for wireless ad-hoc networks, by utilizing the random and reciprocal variations of the wireless channel. We record the variations of the received signal strength and pre-process it before quantizing. The pre-processing of …
- 238000005259 measurement 0 abstract description 21
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W52/00—Power Management, e.g. TPC [Transmission Power Control], power saving or power classes
- H04W52/02—Power saving arrangements
- H04W52/0209—Power saving arrangements in terminal devices
- H04W52/0212—Power saving arrangements in terminal devices managed by the network, e.g. network or access point is master and terminal is slave
- H04W52/0216—Power saving arrangements in terminal devices managed by the network, e.g. network or access point is master and terminal is slave using a pre-established activity schedule, e.g. traffic indication frame
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
- H04L2209/805—Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Ambekar et al. | Improving channel reciprocity for effective key management systems | |
Wang et al. | Fast and scalable secret key generation exploiting channel phase randomness in wireless networks | |
Jana et al. | On the effectiveness of secret key extraction from wireless signal strength in real environments | |
Premnath et al. | Secret key extraction from wireless signal strength in real environments | |
Liu et al. | Fast and practical secret key extraction by exploiting channel response | |
Epiphaniou et al. | Nonreciprocity compensation combined with turbo codes for secret key generation in vehicular ad hoc social IoT networks | |
Badawy et al. | Unleashing the secure potential of the wireless physical layer: Secret key generation methods | |
Margelis et al. | Physical layer secret-key generation with discreet cosine transform for the Internet of Things | |
US11582035B2 (en) | Method of generating a secret key for data communication and key generator thereof | |
Wang et al. | MobiKey: Mobility-based secret key generation in smart home | |
Ambekar et al. | Enhancing channel reciprocity for effective key management in wireless ad-hoc networks | |
Zhang et al. | Secure key generation from OFDM subcarriers' channel responses | |
Adil et al. | On quantization for secret key generation from wireless channel samples | |
Soni et al. | Wireless physical layer key generation with improved bit disagreement for the internet of things using moving window averaging | |
Yuliana | Performance evaluation of the key extraction schemes in wireless indoor environment | |
Gao et al. | A novel model-based security scheme for LoRa key generation | |
Huang et al. | Secret key generation exploiting ultra‐wideband indoor wireless channel characteristics | |
Peng et al. | Securing M2M transmissions using nonreconciled secret keys generated from wireless channels | |
Jin et al. | A two-layer secure quantization algorithm for secret key generation with correlated eavesdropping channel | |
Ambekar et al. | Improved method of secret key generation based on variations in wireless channel | |
Xi et al. | Keep: Secure and efficient communication for distributed iot devices | |
Usman et al. | A Channel State Information‐Based Key Generation Scheme for Internet of Things | |
Yasukawa et al. | A secret key agreement scheme with multi-level quantization and parity check using fluctuation of radio channel property | |
Felkaroski et al. | Secret key generation based on channel state information in a mmWave communication system | |
Cheng et al. | Towards an effective secret key generation scheme for imperfect channel state information |