Mobility Assisted Secret Key Generation Using Wireless Link Signatures

@article{Zhang2010MobilityAS,
  title={Mobility Assisted Secret Key Generation Using Wireless Link Signatures},
  author={Junxing Zhang and Sneha Kumar Kasera and Neal Patwari},
  journal={2010 Proceedings IEEE INFOCOM},
  year={2010},
  pages={1-5}
}
We propose an approach where wireless devices, interested in establishing a secret key, sample the channel impulse response (CIR) space in a physical area to collect and combine uncorrelated CIR measurements to generate the secret key. We study the impact of mobility patterns in obtaining uncorrelated measurements. Using extensive measurements in both indoor and outdoor settings, we find that (i) when movement step size is larger than one foot the measured CIRs are mostly uncorrelated, and (ii… CONTINUE READING

Citations

Publications citing this paper.
SHOWING 1-10 OF 36 CITATIONS

Secure key design approaches using entropy harvesting in wireless sensor network: A survey

  • J. Network and Computer Applications
  • 2017
VIEW 4 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

Physical Layer Secure Communications over Wireless Channels via Common Zeros

  • 2018 IEEE International Symposium on Information Theory (ISIT)
  • 2018

Quantisation feasibility and performance of RSS-based secret key extraction in VANETs

  • 2018 International Conference on Cyber Security and Protection of Digital Services (Cyber Security)
  • 2018
VIEW 2 EXCERPTS
CITES BACKGROUND

Channel reciprocity improvement of secret key generation with loop-back transmissions

  • 2017 IEEE 17th International Conference on Communication Technology (ICCT)
  • 2017
VIEW 1 EXCERPT
CITES METHODS

Empirical statistical inference attack against PHY-layer key extraction in real environments

  • MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM)
  • 2017
VIEW 1 EXCERPT
CITES METHODS

References

Publications referenced by this paper.
SHOWING 1-10 OF 12 REFERENCES

and A

S. Mathur, W. Trappe, N. B. Mandayam, C. Ye
  • Reznik, “Radiotelepathy: extracting a secret key from an unauthenticated wireless channel.” in MOBICOM. ACM
  • 2008
VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL

and S

S. Jana, S. P. Nandha, M. Clark, S. K. Kasera, N. Patwari
  • Krishnamurty, “On the effectiveness of secret key extraction using wireless signal strength in real environments,” in Mobicom
  • 2009
VIEW 1 EXCERPT

On the levy-walk nature of human mobility

  • IEEE/ACM Trans. Netw.
  • 2007
VIEW 1 EXCERPT

Extracting Secrecy from Jointly Gaussian Random Variables

  • 2006 IEEE International Symposium on Information Theory
  • 2006
VIEW 1 EXCERPT

Wireless communications

A. Goldsmith
  • Cambridge Univ Pr
  • 2005
VIEW 1 EXCERPT

and H

L. Breslau, D. Estrin, +7 authors Y. Xu
  • Yu., “Advances in network simulation (ns),” IEEE Computer
  • 2000
VIEW 1 EXCERPT

Digital communications

J. Proakis, M. Salehi
  • McGraw-Hill New York
  • 1995
VIEW 1 EXCERPT