Information-Theoretically Secret Key Generation for Fading Wireless Channels

@article{Ye2009InformationTheoreticallySK,
  title={Information-Theoretically Secret Key Generation for Fading Wireless Channels},
  author={Chunxuan Ye and Suhas Mathur and Alex Reznik and Yogendra Shah and Wade Trappe and Narayan B. Mandayam},
  journal={IEEE Transactions on Information Forensics and Security},
  year={2009},
  volume={5},
  pages={240-254}
}
The multipath-rich wireless environment associated with typical wireless usage scenarios is characterized by a fading channel response that is time-varying, location-sensitive, and uniquely shared by a given transmitter-receiver pair. The complexity associated with a richly scattering environment implies that the short-term fading process is inherently hard to predict and best modeled stochastically, with rapid decorrelation properties in space, time, and frequency. In this paper, we… CONTINUE READING

Citations

Publications citing this paper.
SHOWING 1-10 OF 234 CITATIONS

Modeling and Co-Design of Multi-domain Cyber-Physical Systems

VIEW 4 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

Energy harvesting in secret key generation systems under jamming attacks

  • 2017 IEEE International Conference on Communications (ICC)
  • 2017
VIEW 6 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

Secret key generation in Rayleigh block fading AWGN channels under jamming attacks

  • 2017 IEEE International Conference on Communications (ICC)
  • 2017
VIEW 6 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

Using Wireless Link Dynamics to Extract a Secret Key in Vehicular Scenarios

  • IEEE Transactions on Mobile Computing
  • 2017
VIEW 10 EXCERPTS
CITES BACKGROUND, METHODS & RESULTS
HIGHLY INFLUENCED

Wireless secret key generation versus capable adversaries

VIEW 10 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

Channel Camouflage and Manipulation Techniques in Wireless Networks

VIEW 4 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

FILTER CITATIONS BY YEAR

2009
2019

CITATION STATISTICS

  • 19 Highly Influenced Citations

  • Averaged 23 Citations per year from 2017 through 2019

References

Publications referenced by this paper.
SHOWING 1-10 OF 55 REFERENCES

LDPC-based Gaussian key reconciliation

  • 2006 IEEE Information Theory Workshop - ITW '06 Punta del Este
  • 2006
VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL

Secret Key Agreement by Public Discussion from Common Information

M. Maurer
  • 2004
VIEW 9 EXCERPTS
HIGHLY INFLUENTIAL

Secret key generation for correlated Gaussian sources

  • 2008 IEEE International Symposium on Information Theory
  • 2008