A Secured Approach for Secret Key Extraction From Wireless Signal Strength Preserving Authentication and Security

Provided by: Creative Commons
Topic: Security
Format: PDF
Currently, the most common method for establishing a secret key is by using public key cryptography. However, public key cryptography consumes significant amount of computing resources and power which might not be available in certain scenarios. Hence, this paper discovers the scheme which implements the concept, when source sends a data to the destination, data is being forwarded to the intermediate nodes one by one, based on Received Signal Strength (RSS) secret key will be generated which is passed to both the source and the destination.

Find By Topic