Efficient and Secure Key Extraction Using CSI Without Chasing Down Errors

Provided by: Illinois Institute of Technology
Topic: Security
Format: PDF
Generating keys and keeping them secret is critical in secure communications. Due to the "Open-air" nature, key distribution is more susceptible to attacks in wireless communications. An ingenious solution is to generate common secret keys by two communicating parties separately without the need of key exchange or distribution, and regenerate them on needs. Recently, it is promising to extract keys by measuring the random variation in wireless channels, e.g., RSS. In this paper, the authors propose an efficient Secret Key Extraction protocol without Chasing down Errors, SKECE. It establishes common cryptographic keys for two communicating parties in wireless networks via the real-time measurement of Channel State Information (CSI).

Find By Topic