期刊文献+

Methodologies of Secret-Key Agreement Using Wireless Channel Characteristics

Methodologies of Secret-Key Agreement Using Wireless Channel Characteristics
下载PDF
导出
摘要 In this article, we give an overview of current research on shared secret-key agreement between two parties. This agreement is based on radio wireless channel characteristics. We discuss the advantages of this approach over traditional cryptographic mechanisms and present the theoretical background of this approach. We then give a detailed description of the key-agreement process and the threat model, and we summarize the typical performance metrics for shared secret-key agreement. There are four processes in shared secret-key agreement: sampling, quantization, information reconciliation, and privacy amplification. We classify prior and current research in this area according to innovation on these four processes. We conclude with a discussion of existing challenges and directions for future work. In this article, we give an overview of current research on shared secret-key agreement between two parties. This agreement is based on radio wireless channel characteristics. We discuss the advantages of this approach over traditional cryptographic mechanisms and present the theoretical background of this approach. We then give a detailed description of the key-agreement process and the threat model, and we summarize the typical performance metrics for shared secret-key agreement. There are four processes in shared secret-key agreement: sampling, quantization, information reconciliation, and privacy amplification. We classify prior and current research in this area according to innovation on these four processes. We conclude with a discussion of existing challenges and directions for future work.
出处 《ZTE Communications》 2013年第3期20-25,共6页 中兴通讯技术(英文版)
关键词 physical-layer security secret key generation physical-layer security secret key generation
  • 相关文献

参考文献21

  • 1W. Diffie and M. E. Hellman, "New Directions in Cryptography," IEEE Transac- tions on Information Theory, vol. 22, no. 6, pp. 644-654, Nov. 1976.
  • 2S. Mathur, W. Trappe, N. Mandayam, C. Ye, and A. Reznik, "Radio-telepathy: extracting a secret Key from an unauthenticated wireless channel," In ACMMo- biCom, San Francisco, CA, 2008, pp. 128-129.
  • 3E. Blass and M. Zitterbart, "Efficient implementation of elliptic curve cryptogra- phy for wireless sensor networks," University at Karlsruhe, Tech. Rep., 2005.
  • 4A. D. Wyner, "The wire-tap channel," Bell System Technical Journal, vol. 54, no. 8, pp. 1355-1387, Oct. 1975.
  • 5U. M. Maurer, "Secret key agreement by public discussion from common infor- mation," IEEE Transactions on IrnCormation Theory, vol. 39, no. 3, pp. 733-742, May 1993.
  • 6U. M. Maurer, "Perfect cryptographie security from partially independent chan- nels," in Prec. STOC '91, New Orleans, pp. 561-571.
  • 7W. C. Jakes, Microwave Mobile Communications, New York: Wiley, 1974.
  • 8S. T. Ali, V. Sivaraman, and D. Ostry, "Zero reconciliation secret key generation for body-worn health monitoring devices," in Proc. WISEC'12, Tucson, USA, pp. 39-50.
  • 9J. Croft, N. Patwafi, and S. Kasera, "Robust uncorrelated bit extraction methodol- ozies for wireless sensors." in Proc. IPSN'IO. Stockholm. Sweden. PP. 70-81.
  • 10L. E. Bassham Ⅲ, et al., "A statistical test suite for random and pseudorandom number generators for cryptographic applications," NIST, Tech. Rep. SP 800-22 Rev. la., 2001.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部