Limitations of Generating a Secret Key Using Wireless Fading Under Active Adversary.
Murtaza ZaferDakshi AgrawalMudhakar SrivatsaPublished in: IEEE/ACM Trans. Netw. (2012)
Keyphrases
- secret key
- wireless communication
- smart card
- wireless channels
- pseudorandom
- authentication scheme
- public key
- secure communication
- security level
- wireless networks
- key management
- encryption scheme
- key distribution
- stream cipher
- multipath
- mobile ad hoc networks
- hash functions
- computer simulation
- signal to noise ratio
- ciphertext
- mobile devices
- block cipher
- secret data
- mobile networks
- cost effective
- security protocols
- multi dimensional
- data structure
- feature selection
- data sets