3.8 Proceedings Paper

Bipartite Graph Matching Based Secret Key Generation

Related references

Note: Only part of the references are listed.
Article Computer Science, Information Systems

KEEP: Secure and Efficient Communication for Distributed IoT Devices

Wei Xi et al.

Summary: The paper introduces a fast mobile key extraction protocol, KEEP, which generates encryption keys from channel-state information to establish secure connections between communication parties. It avoids traditional methods like public-key authentication, providing higher security and reliability.

IEEE INTERNET OF THINGS JOURNAL (2021)

Article Computer Science, Information Systems

Efficient DCT-based secret key generation for the Internet of Things

George Margelis et al.

AD HOC NETWORKS (2019)

Article Engineering, Electrical & Electronic

Design of an Efficient OFDMA-Based Multi-User Key Generation Protocol

Junqing Zhang et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2019)

Article Computer Science, Theory & Methods

Secret Key Establishment via RSS Trajectory Matching Between Wearable Devices

Zi Li et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)

Article Computer Science, Information Systems

Using Wireless Link Dynamics to Extract a Secret Key in Vehicular Scenarios

Xiaojun Zhu et al.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2017)

Proceedings Paper Computer Science, Information Systems

Instant and Robust Authentication and Key Agreement among Mobile Devices

Wei Xi et al.

CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2016)

Article Engineering, Electrical & Electronic

Physical Layer Key Generation in Wireless Networks: Challenges and Opportunities

Kai Zeng

IEEE COMMUNICATIONS MAGAZINE (2015)

Article Computer Science, Theory & Methods

Exploiting Channel Diversity in Secret Key Generation From Multipath Fading Randomness

Yanpei Liu et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2012)

Article Computer Science, Theory & Methods

Channel identification: Secret sharing using reciprocity in ultrawideband channels

Robert Wilson et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2007)

Proceedings Paper Computer Science, Information Systems

Robust Key Generation from Signal Envelopes in Wireless Networks

Babak Azimi-Sadjadi et al.

CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2007)