Key Generation From Wireless Channels: A Review
Citations
457 citations
Cites background from "Key Generation From Wireless Channe..."
...4 In this approach [22], designers are mostly interested in measuring the length of the key extracted from the channel since the longer the key is the better the secrecy level will be as it would be harder for Eve to crack the key....
[...]
115 citations
Cites background from "Key Generation From Wireless Channe..."
...Key generation, an active research direction of PLS, automatically generates keys at each side of two legitimate users, Alice and Bob, from the randomness of their common wireless channel [8], [9]....
[...]
109 citations
Cites background from "Key Generation From Wireless Channe..."
...RFF identification and key generation thus have attracted much research interest (see [2, 3] and references therein)....
[...]
...The random nature of the wireless channel between users can be exploited as common information and employed as the cryptographic key, which is termed as key generation from wireless channels [3]....
[...]
...Resisting an attack is a common challenge both in RFF identifi cation and in key generation [3]....
[...]
109 citations
Cites background from "Key Generation From Wireless Channe..."
...In fact, chaotic maps are used ordinarily in generating the encryption keys for the cipher structure [12], or for key generation from wireless channels [13]....
[...]
92 citations
Cites background from "Key Generation From Wireless Channe..."
...Physical layer secret key generation has emerged as a strong candidate to complement PKC by exploiting common randomness from the wireless channels [4]....
[...]
...Key generation usually contains four main steps: channel sounding, quantization, information reconciliation and privacy amplification [4]....
[...]
References
13,597 citations
8,777 citations
"Key Generation From Wireless Channe..." refers background in this paper
...Later on, Shannon laid the theoretical basis for perfect secrecy [13]....
[...]
[...]
7,129 citations
"Key Generation From Wireless Channe..." refers background in this paper
...Pioneered by Wyner’s wiretap channel model [11], keyless security does not require keys for encryption but employs code design and channel properties of legitimate users and eavesdroppers to achieve secrecy (see [8] and references therein)....
[...]