LoRa-Key: Secure Key Generation System for LoRa-Based Network

作者: Weitao Xu , Sanjay Jha , Wen Hu

DOI: 10.1109/JIOT.2018.2888553

关键词:

摘要: Physical layer key generation that exploits reciprocity and randomness of wireless fading channels has attracted considerable attention in recent years. Despite much research efforts …

参考文章(37)
Christian Cachin, Ueli M Maurer, None, Linking information reconciliation and privacy amplification Journal of Cryptology. ,vol. 10, pp. 97- 110 ,(1997) , 10.1007/S001459900023
Hongbo Liu, Jie Yang, Yan Wang, Yingying Chen, Collaborative secret key extraction leveraging Received Signal Strength in mobile wireless networks international conference on computer communications. pp. 927- 935 ,(2012) , 10.1109/INFCOM.2012.6195843
Suman Jana, Sriram Nandha Premnath, Mike Clark, Sneha K Kasera, Neal Patwari, Srikanth V Krishnamurthy, None, On the effectiveness of secret key extraction from wireless signal strength in real environments Proceedings of the 15th annual international conference on Mobile computing and networking - MobiCom '09. pp. 321- 332 ,(2009) , 10.1145/1614320.1614356
Hongbo Liu, Jie Yang, Yan Wang, Yingying Chen, Can Emre Koksal, Group Secret Key Generation via Received Signal Strength: Protocols, Achievable Rates, and Implementation IEEE Transactions on Mobile Computing. ,vol. 13, pp. 2820- 2835 ,(2014) , 10.1109/TMC.2014.2310747
Lili Meng, Jie Liang, Upul Samarawickrama, Yao Zhao, Huihui Bai, Andre Kaup, Multiple Description Coding With Randomly and Uniformly Offset Quantizers IEEE Transactions on Image Processing. ,vol. 23, pp. 582- 595 ,(2014) , 10.1109/TIP.2013.2288928
Syed Taha Ali, Vijay Sivaraman, Diethelm Ostry, Eliminating Reconciliation Cost in Secret Key Generation for Body-Worn Health Monitoring Devices IEEE Transactions on Mobile Computing. ,vol. 13, pp. 2763- 2776 ,(2014) , 10.1109/TMC.2013.71
Suhas Mathur, Wade Trappe, Narayan Mandayam, Chunxuan Ye, Alex Reznik, Radio-telepathy Proceedings of the 14th ACM international conference on Mobile computing and networking - MobiCom '08. pp. 128- 139 ,(2008) , 10.1145/1409944.1409960
Dajiang Chen, Zhen Qin, Xufei Mao, Panlong Yang, Zhiguang Qin, Ruijin Wang, SmokeGrenade: An Efficient Key Generation Protocol With Artificial Interference IEEE Transactions on Information Forensics and Security. ,vol. 8, pp. 1731- 1745 ,(2013) , 10.1109/TIFS.2013.2278834
Amer A. Hassan, Wayne E. Stark, John E. Hershey, Sandeep Chennakeshu, Cryptographic Key Agreement for Mobile Radio Digital Signal Processing. ,vol. 6, pp. 207- 212 ,(1996) , 10.1006/DSPR.1996.0023
Zuyuan Yang, Wei Yan, Yong Xiang, On the Security of Compressed Sensing-Based Signal Cryptosystem IEEE Transactions on Emerging Topics in Computing. ,vol. 3, pp. 363- 371 ,(2015) , 10.1109/TETC.2014.2372151