An Adaptive Quantization Algorithm for Secret Key Generation Using Radio Channel Measurements

@article{Hamida2009AnAQ,
  title={An Adaptive Quantization Algorithm for Secret Key Generation Using Radio Channel Measurements},
  author={Sana Tmar Ben Hamida and Jean-Beno{\^i}t Pierrot and Claude Castelluccia},
  journal={2009 3rd International Conference on New Technologies, Mobility and Security},
  year={2009},
  pages={1-5}
}
New approaches that generate secret keys from radio channel characteristics have been recently proposed. The security of these schemes usually relies on the reciprocity principle which states that the channel fluctuations can be a source of common randomness for two communicating peers and these fluctuations can't be measured by any eavesdropper. A validation of these properties for indoor environments is presented in this work. The shared keys are created by measuring the reciprocal channel… CONTINUE READING

Citations

Publications citing this paper.
SHOWING 1-10 OF 49 CITATIONS

Physical layer secret key generation for decentralized wireless networks

VIEW 13 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

Public discussion strategies for secret key generation from sampled IR-UWB channel responses

  • 2014 10th International Conference on Communications (COMM)
  • 2014
VIEW 8 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

Random patterns of secret keys from sampled IR-UWB channel responses

  • 2014 IEEE International Conference on Ultra-WideBand (ICUWB)
  • 2014
VIEW 10 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

Side channel analysis attacks against channel state information based key generation

  • 2012 International Conference on Systems and Informatics (ICSAI2012)
  • 2012
VIEW 3 EXCERPTS
CITES METHODS & BACKGROUND
HIGHLY INFLUENCED

Empirical analysis of UWB channel characteristics for secret key generation in indoor environments

  • 21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications
  • 2010
VIEW 4 EXCERPTS
CITES BACKGROUND & METHODS

References

Publications referenced by this paper.
SHOWING 1-10 OF 12 REFERENCES

A Private Key Agreement Scheme Based on Fluactions of BER in wireless Communications

  • The 9th International Conference on Advanced Communication Technology
  • 2007
VIEW 3 EXCERPTS