×

Secret key generation using OFDM samples. (English) Zbl 1495.94081


MSC:

94A62 Authentication, digital signatures and secret sharing
94A60 Cryptography
PDFBibTeX XMLCite
Full Text: DOI

References:

[1] Wyner, A. D., The wire-tap channel, Bell System Technical Journal, 54, 1355-1387 (1975) · Zbl 0316.94017
[2] Dzung, Dacfey, Data encryption on the physical layer of a data transmission system (2010)
[3] Gollakota, S.; Katabi, D., Physical layer wireless security made fast and channel independent, Proc. IEEE Int. Conf. Comp. Commun, 1125-1133 (2011)
[4] Diffie, Whit; Hellman, Martin, New Directions in Cryptography, IEEE Transactions on Information Theory, IT-22, 6, 644-654 (1976) · Zbl 0435.94018
[5] Handbook of Applied Cryptography; Menezes, A.; van Oorschot, P.; Vanstone, S. (1996), CRC Press
[6] Ye, C.; Reznik, A.; Sternberg, G.; Shah, Y., On the secrecy capabilities of ITU channels, Proc. IEEE 66th Veh. Tech. Conf, 2030-2034 (2007)
[7] Aono, T.; Higuchi, K.; Ohira, T.; Komiyama, B.; Sasaoka, H., Wireless Secret key generation exploiting reactance-domain scalar response of Multipath fading channels, IEEE Trans. Antennas Propag, 53, 11, 3776-3784 (2005)
[8] Sayeed, A.; Perrig, A., Proc. IEEE ICASSP, Secure wireless communications: Secret keys through multipath, 3013-3016 (2008)
[9] Lauter, Kristin; Mityagin, Anton, Security Analysis of KEA Authenticated Key Exchange Protocol, International Association for Cryptologic Research 2006, 378-394 (2006) · Zbl 1151.94532
[10] Neuman, B. C.; Theodore, Ts’o, Communications Magazine, IEEE (Volume: 32, Issue: 9), Kerberos:An Authentication Service for Computer Networks, 33-38 (1994)
[11] Shimizu, T.; Iwai, H.; Sasaoka, H., Reliability-based sliced errorcorrection in secret key agreement from fading channel, 1-6 (2010)
[12] Hwang, Taewon; Yang, Chenyang, OFDM and its Wireless Applications: A Survey, 1673-1694 (2008)
[13] Hossain, E., IEEE 802.16/WiMax based Broadband Wireless Networks: Protocol Engineering, Applications and Services, Fifth annual Conference, 72-83 (2007)
[14] Achatz, R. J., Modeling and simulation of a OFDM radio link, Wireless Communications Conference, 1997, 234-239 (1997)
[15] Stallings, W., Cryptography and Network Security Principles, 66-74 (2006), Prentice Hall: PTR. Communications, Prentice Hall
[16] Dong, L.; Han, Z.; Petropulu, A. P.; Poor, H. V., Cooperative jamming for wireless physical layer security (2009)
[17] Negi, R.; Goelm, S., Secret communication using artificial noise, Proc. IEEE Vehicular Tech. Conf, 3, 1906-1910 (2005)
[18] Strasser, M.; Danev, B.; Capkun, S., Detection of reactive jamming in sensor networks (2010)
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. In some cases that data have been complemented/enhanced by data from zbMATH Open. This attempts to reflect the references listed in the original paper as accurately as possible without claiming completeness or a perfect matching.