• Publications
  • Influence
Secret Key Extraction from Wireless Signal Strength in Real Environments
TLDR
We evaluate the effectiveness of secret key extraction, for private communication between two wireless devices, from the received signal strength variations on the wireless channel between the two devices. Expand
  • 428
  • 62
  • PDF
Reliable multicast in multi-access wireless LANs
  • J. Kuri, S. Kasera
  • Computer Science
  • IEEE INFOCOM '99. Conference on Computer…
  • 21 March 1999
TLDR
We present a new approach to overcome the problem of feedback collision in single channel multi-access wireless LANs, both for the purpose of acquiring the channel and for reliability. Expand
  • 250
  • 34
  • PDF
High-Rate Uncorrelated Bit Extraction for Shared Secret Key Generation from Channel Measurements
TLDR
This paper introduces high-rate uncorrelated bit extraction (HRUBE), a framework for interpolating, transforming for decorrelation, and encoding channel measurements using a multibit adaptive quantization scheme which allows multiple bits per component. Expand
  • 300
  • 31
  • PDF
Robust location distinction using temporal link signatures
TLDR
We propose using a temporal link signature to uniquely identify the link between a transmitter and a receiver. Expand
  • 234
  • 19
  • PDF
On Fast and Accurate Detection of Unauthorized Wireless Access Points Using Clock Skews
TLDR
We explore the use of clock skew of a wireless local area network access point (AP) as its fingerprint to detect unauthorized APs quickly and accurately. Expand
  • 147
  • 14
  • PDF
Scalable fair reliable multicast using active services
TLDR
We present a reliable multicast architecture that invokes active services at strategic locations inside the network to comprehensively address loss recovery, retransmission scoping, and congestion control. Expand
  • 158
  • 11
On Fast and Accurate Detection of Unauthorized Wireless Access Points Using Clock Skews
TLDR
We explore the use of clock skew of a wireless local area network access point (AP) as its fingerprint to detect unauthorized APs quickly and accurately and propose a heuristic for differentiating original packets from those sent by the fake APs. Expand
  • 121
  • 11
  • PDF
Advancing wireless link signatures for location distinction
TLDR
Location distinction is the ability to determine when a device has changed its position. Expand
  • 125
  • 10
  • PDF
Expected data rate: an accurate high-throughput path metric for multi-hop wireless routing
  • J. Park, S. Kasera
  • Computer Science
  • Second Annual IEEE Communications Society…
  • 12 December 2005
TLDR
We present a new metric, Expected Data Rate (EDR), for accurately finding high-throughput paths in multi- hop ad hoc wireless networks. Expand
  • 64
  • 10
  • PDF
Secret Key Extraction from Wireless Signal Strength in Real Environments
TLDR
We evaluate the effectiveness of secret key extraction, for private communication between two wireless devices, from the received signal strength variations on the wireless channel between the two devices. Expand
  • 111
  • 9
  • PDF