Unleashing the secure potential of the wireless physical layer: Secret key generation methods
المؤلف | Badawy, Ahmed |
المؤلف | Elfouly, Tarek |
المؤلف | Khattab, Tamer |
المؤلف | Mohamed, Amr |
المؤلف | Guizani, Mohsen |
تاريخ الإتاحة | 2021-09-01T10:03:29Z |
تاريخ النشر | 2016 |
اسم المنشور | Physical Communication |
المصدر | Scopus |
الملخص | Within the paradigm of physical layer security, a physical layer characteristic is used as a common source of randomness to generate the secret key. This key is then used to encrypt the data to hide information from eavesdroppers. In this paper, we survey the most recent common sources of randomness used to generate the secret key. We present the steps used to extract the secret key from the estimated common source of randomness. We describe the metrics used to evaluate the strength of the generated key. We follow that with a qualitative comparison between different common sources of randomness along with a proposed new direction which capitalizes on hybridization of sources of randomness. We conclude by a discussion about current open research problems in secret key generation. 2015 The Authors. |
راعي المشروع | This research was made possible by NPRP 5-559-2-227 grant from the Qatar National Research Fund (a member of The Qatar Foundation). The statements made herein are solely the responsibility of the authors. |
اللغة | en |
الناشر | Elsevier B.V. |
الموضوع | Network layers Random processes Common source Physical layer security Secret key Secret key generations Wire-tap channels Cryptography |
النوع | Report |
رقم المجلد | 19 |
تحقق من خيارات الوصول
الملفات في هذه التسجيلة
هذه التسجيلة تظهر في المجموعات التالية
-
علوم وهندسة الحاسب [2402 items ]
-
الهندسة الكهربائية [2649 items ]