Sciweavers

16 search results - page 3 / 4
» Information-theoretically secret key generation for fading w...
Sort
View
ICASSP
2011
IEEE
12 years 9 months ago
A robust quantization method using a robust Chinese remainder theorem for secret key generation
Traditional channel quantization based methods for encryption key generation usually suffer from the quantization error which may decrease the key agreement ratio between authoriz...
Wenjie Wang, Chen Wang, Xiang-Gen Xia
IPSN
2010
Springer
14 years 3 days ago
Robust uncorrelated bit extraction methodologies for wireless sensors
This paper presents novel methodologies which allow robust secret key extraction from radio channel measurements which suffer from real-world non-reciprocities and a priori unkno...
Jessica Croft, Neal Patwari, Sneha Kumar Kasera
ICASSP
2008
IEEE
13 years 11 months ago
Secure wireless communications: Secret keys through multipath
Secure wireless communications is a challenging problem due to the shared nature of the wireless medium. Most existing security protocols apply cryptographic techniques for bit sc...
Akbar M. Sayeed, Adrian Perrig
INFOCOM
2011
IEEE
12 years 8 months ago
Physical layer wireless security made fast and channel independent
Abstract – There is a growing interest in physical layer security. Recent work has demonstrated that wireless devices can generate a shared secret key by exploiting variations in...
Shyamnath Gollakota, Dina Katabi
CORR
2007
Springer
116views Education» more  CORR 2007»
13 years 5 months ago
Non-Coherent Capacity and Reliability of Sparse Multipath Channels in the Wideband Regime
— In contrast to the prevalent assumption of rich multipath in information theoretic analysis of wireless channels, physical channels exhibit sparse multipath, especially at larg...
Gautham Hariharan, Akbar M. Sayeed