#### Filter Results:

#### Publication Year

2001

2012

#### Publication Type

#### Co-author

#### Publication Venue

#### Key Phrases

Learn More

Securing communications requires the establishment of cryptographic keys, which is challenging in mobile scenarios where a key management infrastructure is not always present. In this paper, we present a protocol that allows two users to establish a common cryptographic key by exploiting special properties of the wireless channel: the underlying channel… (More)

The multipath-rich wireless environment associated with typical wireless usage scenarios is characterized by a fading channel response that is time-varying, location-sensitive, and uniquely shared by a given transmitter-receiver pair. The complexity associated with a richly scattering environment implies that the short-term fading process is inherently hard… (More)

We consider secret key generation for a “pairwise independent network” model in which every pair of terminals observes correlated sources that are independent of sources observed by all other pairs of terminals. The terminals are then allowed to communicate publicly with all such communication being observed by all the terminals. The objective… (More)

—a variable-length code is a fix-free code if no code-word is a prefix or a suffix of any other codeword. This class of codes is applied to speed up the decoding process, for the decoder can decode from both sides of the compressed file simultaneously. In this paper, we study some basic properties of fix-free codes. We prove a sufficient and a necessary… (More)

We consider a model for secrecy generation, with three terminals, by means of public interterminal communication, and examine the problem of characterizing all the rates at which all three terminals can generate a "secret key," and - simultaneously - two designated terminals can generate a "private key" which is effectively concealed from the remaining… (More)

We present a method for secrecy extraction from jointly Gaussian random sources. The approach is motivated by and has applications in enhancing security for wireless communications. The problem is also found to be closely related to some well known lossy source coding problems

- Suhas Mathur, Alex Reznik, Chunxuan Ye, R. Mukherjee, A. Rahman, Yogendra Shah +2 others
- IEEE Wireless Commun.
- 2010

— While conventional cryptographic security mechanisms are essential to the overall problem of securing wireless networks, they do not directly leverage the unique properties of the wireless domain to address security threats. The wireless medium is a powerful source of domain-specific information that can complement and enhance traditional security… (More)

We consider a pair-wise independent network in which every pair of terminals observes a common pair-wise source that is independent of all the sources accessible to the other pairs. We propose a method for secret key agreement in such a network that is based on well-established point-to- point techniques and repeated application of the one-time pad over a… (More)

Binary prefix codes ending in a '1', " IEEE Trans. A dynamic programming algorithm for constructing optimal '1'-ended binary prefix-free codes, " in Proc. IEEE Int. Abstract—Upper bounds on the redundancy of Huffman codes have been extensively studied in the literature. Almost all of these bounds are in terms of the probability of either the most likely or… (More)

—Since the IEEE 802.11 DCF adopted the Binary Exponential Back-off (BEB) algorithm in its contention window adjustment scheme, many alternative back-off algorithms were proposed in order to enhance the performance. Among them is an Exponential Increase Exponential Decrease (EIED) back-off algorithm, whose performance was simulated and analyzed in a special… (More)