www.seminarsonly.com

 

 

Secret Key Establishment Using Temporally and Spatially Correlated Wireless Channel Coefficients

Abstract

When implementing data encryption and decryption in a symmetric cryptosystem, secure distribution of the secret key to legitimate nodes can be a challenge. In this paper, we consider establishing secret keys using the common wireless channel, with particular emphasis on the spatial and temporal correlations of the channel coefficients. Specifically, we investigate the influence of channel correlation on the bound of the key size generated from the common channel using a simple single-input single-output channel model, and we verify the existence of a sampling approach able to generate a key using the minimum possible sampling window.

We also explore decorrelation of the channel coefficients in a multiple-input multiple-output channel, and we use a statistical independence test to demonstrate that this process cannot be separated into spatial and temporal decorrelation processes.

The insights gained from these studies assist in the development of a practical key generation protocol based on a published channel coefficient quantization method and incorporating flexible quantization levels, transmission of the correlation eigenvector matrix, and LDPC coding to improve key agreement in an authenticated public channel. Finally, we present simulations with real channel measurements that solidify the fundamental conclusions.

 

 

 

 

<< back

Related Projects : Online Real Estate Property Management ,Online Recruitment System ,Online Rental House Web Portal ,Online University ,Optimal Channel Access Management with QoS Support for Cognitive Vehicular Networks ,Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks ,Orkut Using Java ,Personal Authentication Based On Iris Recognition ,Planning of Wireless Sensor Networks ,Predicting Missing Items in Shopping Carts ,Project Controller ,Project Scheduler ,Project Tracking ,Promotional Portal ,Random Cast ,Real-Time Detection Of Clone Attacks ,Reality Shows Organization ,Record Tracker ,Remote Administration using Mobile ,Remote PC Administration Using J2ME ,Resilient Online Coverage For Surveillance Applications , Resource Allocation in OFDMA Wireless Communications Systems Supporting Multimedia Services ,RITAS: Services For Randomized Intrusion Tolerance ,Route Stability in MANETs under the Random Direction Mobility Model ,Script Identification Through Temporal Sequence Of The Strokes ,Secret Key Establishment Using Temporally and Spatially Correlated Wireless Channel Coefficients ,Secure and Policy-Compliant Source Routing ,Secure Data Transmission , Ship Store System ,Smart Network Profile Manager

 

 

 
Copyright © V2computers 2006 through 2017