89,858 Hits in 11.4 sec

Unleashing the secure potential of the wireless physical layer: Secret key generation methods

Ahmed Badawy, Tarek Elfouly, Tamer Khattab, Amr Mohamed, Mohsen Guizani
2016 Physical Communication  
We present the steps used to extract the secret key from the estimated common source of randomness. We describe the metrics used to evaluate the strength of the generated key.  ...  This key is then used to encrypt the data to hide information from eavesdroppers. In this paper, we survey the most recent common sources of randomness used to generate the secret key.  ...  One main advantage of exploiting channel estimates to generate the secret key is its high key generation rate.  ... 
doi:10.1016/j.phycom.2015.11.005 fatcat:xk6kafqsunfbrndfefkm3ujzf4

Enhanced Security Frame Work for Smart IoT Environment using Received Signal Strength

Tawseef Naqishbandi
2018 International Journal for Research in Applied Science and Engineering Technology  
The idea behind this is to generate the key based on the received signal strength (RSS) of the wireless signals.  ...  The aim of this paper is to create a secret key between two different IoT wireless entities while not the necessity for sharing the key manually.  ...  The authors acknowledge valuable contribution from anonymous reviewers, and useful discussion with Er.  ... 
doi:10.22214/ijraset.2018.1480 fatcat:xfbxoa5d2reerjhscgvyua2eie

Survey on channel reciprocity based key establishment techniques for wireless systems

Tao Wang, Yao Liu, Athanasios V. Vasilakos
2015 Wireless networks  
In this survey, we reviewed different types of existing techniques based on (1) how they quantize the wireless channel reciprocity into binary bits to form a secret key; (2) how they handle communication  ...  This survey attempts to summarize the emerging research on channel reciprocity based key establishment, which may provide insights for us to identify wireless security problems and propose comprehensive  ...  With a high generation rate, two wireless devices can establish a shared secret key in a short time, thereby achieving a high communication efficiency.  ... 
doi:10.1007/s11276-014-0841-8 fatcat:b2f3h2k4dzcjfns7rgq27iiwau

On the effectiveness of secret key extraction from wireless signal strength in real environments

Suman Jana, Sriram Nandha Premnath, Mike Clark, Sneha K. Kasera, Neal Patwari, Srikanth V. Krishnamurthy
2009 Proceedings of the 15th annual international conference on Mobile computing and networking - MobiCom '09  
The secret key bit streams generated by our scheme also pass the randomness tests of the NIST test suite [21] that we conduct.  ...  We evaluate the effectiveness of secret key extraction, for private communication between two wireless devices, from the received signal strength (RSS) variations on the wireless channel between the two  ...  In summary, the existing approaches that use RSS measurements do not generate secret bits at a high rate and/or with high entropy.  ... 
doi:10.1145/1614320.1614356 dblp:conf/mobicom/JanaPCKPK09 fatcat:haymiqibcbbb7e7rvhhsvf5cae

Enhancing LSB Using Binary Message Size Encoding for High Capacity, Transparent and Secure Audio Steganography–An Innovative Approach

Mahmoud M. Mahmoud, Huwaida T. Elshoush
2022 IEEE Access  
A secure key BMSE , output from the BMSE mechanism, is used to embed the secret message in random blocks and bytes adaptively according to its size.  ...  The fidelity was tested using Mean Square Error, Peak Signal to Noise Ratio and Signal-to-Noise Ratio.  ...  Moreover, its output key BMSE is used to hide secret message arbitrarily in random blocks and bytes. • The proposed BMSE method acts as a pseudo-Random Number Generator (PRGN). • Our proposed method achieved  ... 
doi:10.1109/access.2022.3155146 fatcat:ugtgdyvwzrb2vp2cnixm4e7x6u

A Method for Detecting Amplitude-Phase Joint Characteristic Parameters of Wireless Channel for Generating Key Parameters

Qiongying Tan, Shuanglin Huang, Sanjun Liu
2021 Complexity  
Aiming at the problems of poor adaptability and low secret key generation rate of secret key generation scheme based on single characteristic parameter of wireless channel, a secret key generation method  ...  to generate the secret key random parameters.  ...  the problems of poor secret key adaptability, low rate of the secret key generation, or high inconsistency rate.  ... 
doi:10.1155/2021/9951742 doaj:32197d855c9442c3912b569e2e6066c7 fatcat:hlnmwh3jtveprnby4ec5hc4kfy

Efficient Key Agreement Algorithm for Wireless Body Area Networks Using Reusable ECG-Based Features

Yasmeen Al-Saeed, Eman Eldaydamony, Ahmed Atwan, Mohammed Elmogy, Osama Ouda
2021 Electronics  
Experimental results illustrate the superiority of the proposed key agreement protocol in terms of both feature extraction and key agreement phases with an accuracy of 99.50% and an error rate of 0.005%  ...  This will reduce the time required for establishing the shared key as well as avoid retransmitting extracted features in the medium and hence thwarting eavesdropping attacks while maintaining randomness  ...  Data Availability Statement: The used dataset is a benchmark dataset from MIT ECG database and it is available online for download from the following link:  ... 
doi:10.3390/electronics10040404 fatcat:2xkuodzpljbexfovzs36vrvqsy

Passive preparation of BB84 signal states with coherent light

Marcos CURTY, Xiongfeng MA, Hoi-Kwong LO, Norbert LUTKENHAUS
2011 Progress in Informatics  
setups operating at high transmission rates.  ...  Here we show that coherent light is also suitable for passive generation of BB84 signal states.  ...  Note, however, that this configuration might still be much less of a problem than using a polarization modulator to actively generate BB84 signal states at high rates, since no RNG is needed to control  ... 
doi:10.2201/niipi.2011.8.7 fatcat:4axhbepqnveovoujzw327noj5i

Secret Key Generation Using Reciprocity in Ultra-wideband Outdoor Wireless Channels

2014 KSII Transactions on Internet and Information Systems  
In comparison to the conventional method using received signal strength (RSS) as a common random source, our mechanism achieves better performance in terms of common secret bit generation.  ...  Simulation results demonstrate that the number of multipath proportionally affects key generation rate and key-mismatch probability.  ...  Key Randomness It's important to ensure the randomness of secret keys. Hence we employ a widely used randomness test suit NIST to verify the randomness of our generated secret key bits [32] .  ... 
doi:10.3837/tiis.2014.02.011 fatcat:r4bnuo4uvfesthksfddilcb5bm

Establishing Secret Key in Wireless Environment by Using Techniques of Keyless Cryptosystem

2015 International Journal of Science and Research (IJSR)  
Keyless does not mean that there are no keys; it actually means the procedure of hiding the senders Identity by using the random secret key.  ...  Security guaranteed by different crypto ways of encryption, decryption, secret key establishment, etc.One such way is Keyless Cryptosystem.  ...  The method produces secret key bits at a higher rate than previously reported, and is validated using extensive measurements B.  ... 
doi:10.21275/v4i2.sub151640 fatcat:xchkltz75zf4dobk7es3gp6r2e

Efficient secret key generation scheme of physical layer security communication in ubiquitous wireless networks

Hailiang Xiong, Guangyuan Wang, Jian Ding, Weihong Zhu, Hongji Xu, Changwu Hu, Zhenzhen Mai, Ruochen Bian
2021 IET Communications  
To generate a high-rate secret key and improve the communication efficiency over quasi-static block fading channels, a novel multi-randomness device-to-device secret key generation strategy and a cooperative  ...  The secret key rate via traditional physical-layer approach could be limited when the wireless propagation channels connecting two sensors change slowly.  ...  In the proposed secret key generation scheme, the common randomness between two communication nodes is enhanced by exploiting the two-way random signals, and the generated secret key rate outperforms traditional  ... 
doi:10.1049/cmu2.12147 fatcat:tiiivx6mp5cdpawbkqw3wath44

Partially random phase attack to the practical two-way quantum-key-distribution system

Shi-Hai Sun, Ming Gao, Mu-Sheng Jiang, Chun-Yan Li, Lin-Mei Liang
2012 Physical Review A. Atomic, Molecular, and Optical Physics  
Our analysis shows that Eve can break the security of a two-way QKD system by using our attack, even if an active phase randomization is adopted by Alice.  ...  Phase randomization is a very important assumption in the Bennett-Brassard 1984 quantum key distribution (QKD) system with a weak coherent source.  ...  Here the legitimate parties use the one decoy state method to estimate the key rate.  ... 
doi:10.1103/physreva.85.032304 fatcat:wpy3oyqkgbg45jgjivma3pbgdq

A Multihop Key Agreement Scheme for Wireless Ad Hoc Networks Based on Channel Characteristics

Zhuo Hao, Sheng Zhong, Nenghai Yu
2013 The Scientific World Journal  
However, previous key agreement schemes require that two nodes which need to agree on a key are within the communication range of each other.  ...  A number of key agreement schemes based on wireless channel characteristics have been proposed recently.  ...  Randomness of the Generated Key. We test the randomness of the generated key using the NIST randomness test suite [50] .  ... 
doi:10.1155/2013/935604 pmid:23766725 pmcid:PMC3673334 fatcat:y6yo6xr2uzdcznlkodk7lqzpiq

Zero reconciliation secret key generation for body-worn health monitoring devices

Syed Taha Ali, Vijay Sivaraman, Diethelm Ostry
2012 Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks - WISEC '12  
In this work we propose a secret-key generation mechanism which uses signal strength fluctuations caused by incidental motion of body-worn devices to construct shared keys with near-perfect agreement,  ...  correlation between the two ends without reducing entropy, and (3) we develop a method to restrict key generation to periods of channel fluctuation, ensuring near-perfect key agreement.  ...  Ideally a scheme should generate keys with high agreement, at a fast rate, and with high entropy.  ... 
doi:10.1145/2185448.2185455 dblp:conf/wisec/AliSO12 fatcat:zviahaqyn5gnpircalrk5ywetm

Efficient and Secure Key Extraction using CSI without Chasing down Errors [article]

Jizhong Zhao, Wei Xi, Jinsong Han, Shaojie Tang, Xiangyang Li, Yunhao Liu, Yihong Gong, Zehua Zhou
2012 arXiv   pre-print
An ingenious solution is to generate common secret keys by two communicating parties separately without the need of key exchange or distribution, and regenerate them on needs.  ...  Generating keys and keeping them secret is critical in secure communications. Due to the "open-air" nature, key distribution is more susceptible to attacks in wireless communications.  ...  Rate of Key Generation An important quantity of interest is the rate of generating secret bits, expressed in secret-bits per second or s-bits/sec.  ... 
arXiv:1208.0688v1 fatcat:wsrnsuugpvfifdlgkgagr27k6m
« Previous Showing results 1 — 15 out of 89,858 results