A New Low-BMR Quantization Method for Wireless Channel Characteristics-based Secret Key Generation

[1]  Jie Yang,et al.  Collaborative secret key extraction leveraging Received Signal Strength in mobile wireless networks , 2012, 2012 Proceedings IEEE INFOCOM.

[2]  Wade Trappe,et al.  ProxiMate: proximity-based secure pairing using ambient wireless signals , 2011, MobiSys '11.

[3]  Marco Gruteser,et al.  Improving robustness of key extraction from wireless channels with differential techniques , 2012, 2012 International Conference on Computing, Networking and Communications (ICNC).

[4]  Claude Castelluccia,et al.  An Adaptive Quantization Algorithm for Secret Key Generation Using Radio Channel Measurements , 2009, 2009 3rd International Conference on New Technologies, Mobility and Security.

[5]  Sneha Kumar Kasera,et al.  Secret Key Extraction from Wireless Signal Strength in Real Environments , 2013, IEEE Trans. Mob. Comput..

[6]  Gregory D. Durgin,et al.  Space-Time Wireless Channels , 2002 .

[7]  Christof Paar,et al.  Fair Comparison and Evaluation of Quantization Schemes for PHY-based Key Generation , 2014 .

[8]  Q Wang,et al.  A privacy amplification protocol against active attacks in information theoretically secret key agreement , 2015 .

[9]  Zhijie Jerry Shi,et al.  RSS-based secret key generation in underwater acoustic networks: advantages, challenges, and performance improvements , 2016, IEEE Communications Magazine.

[10]  A. Ambekar,et al.  Improving channel reciprocity for effective key management systems , 2012, 2012 International Symposium on Signals, Systems, and Electronics (ISSSE).

[11]  Athanasios V. Vasilakos,et al.  Survey on channel reciprocity based key establishment techniques for wireless systems , 2015, Wirel. Networks.

[12]  Yang Wang,et al.  Fast and practical secret key extraction by exploiting channel response , 2013, 2013 Proceedings IEEE INFOCOM.

[13]  Christof Paar,et al.  Bringing PHY-Based Key Generation into the Field: An Evaluation for Practical Scenarios , 2015, 2015 IEEE 82nd Vehicular Technology Conference (VTC2015-Fall).

[14]  Yi Luo,et al.  Analysis of the information theoretically secret key agreement by public discussion , 2015, Secur. Commun. Networks.

[15]  Hai Su,et al.  Secret key generation exploiting channel characteristics in wireless communications , 2011, IEEE Wireless Communications.

[16]  Sneha Kumar Kasera,et al.  Secret Key Extraction from Wireless Signal Strength in Real Environments , 2009, IEEE Transactions on Mobile Computing.

[17]  Kui Ren,et al.  Cooperative Secret Key Generation from Phase Estimation in Narrowband Fading Channels , 2011, IEEE Journal on Selected Areas in Communications.

[18]  Xiaodai Dong,et al.  Verification of Secret Key Generation from UWB Channel Observations , 2009, 2009 IEEE International Conference on Communications.

[19]  Wade Trappe,et al.  Information-Theoretically Secret Key Generation for Fading Wireless Channels , 2009, IEEE Transactions on Information Forensics and Security.

[20]  Ueli Maurer,et al.  Generalized privacy amplification , 1994, Proceedings of 1994 IEEE International Symposium on Information Theory.

[21]  John McEachen,et al.  Unconditionally secure communications over fading channels , 2001, 2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277).

[22]  Prasant Mohapatra,et al.  Exploiting Multiple-Antenna Diversity for Shared Secret Key Generation in Wireless Networks , 2010, 2010 Proceedings IEEE INFOCOM.

[23]  Jingjing Huang,et al.  Dynamic secret key generation exploiting Ultra-wideband wireless channel characteristics , 2015, 2015 IEEE Wireless Communications and Networking Conference (WCNC).

[24]  Syed Taha Ali,et al.  Eliminating Reconciliation Cost in Secret Key Generation for Body-Worn Health Monitoring Devices , 2014, IEEE Transactions on Mobile Computing.