Journal of Engineering and Applied Sciences

Year: 2017
Volume: 12
Issue: 12 SI
Page No. 9455 - 9460

Efficient and Secure Key Extraction Approach for OFDM System with Adaptive Filtration

Authors : Preeti Pathania and Rajpreet Singh

References

Attar, A., H. Tang, A.V. Vasilakos, F.R. Yu and V.C. Leung, 2012. A survey of security challenges in cognitive radio networks: Solutions and future research directions. Proc. IEEE., 100: 3172-3186.
CrossRef  |  Direct Link  |  

Islam, M.S. and H. Ajra, 2015. Comparative study of adaptive filter algorithm of a QO-STBC encoded MIMO CDMA system. Intl. J. Comput. Networks Appl., 2: 254-260.
Direct Link  |  

Liu, H., Y. Wang, J. Yang and Y. Chen, 2013. Fast and practical secret key extraction by exploiting channel response. Proceedings of the 2013 IEEE International Conference on INFOCOM, April 14-19, 2013, IEEE, Turin, Italy, ISBN:978-1-4673-5944-3, pp: 3048-3056.

Mathai, V. and K.M. Sagayam, 2013. Comparison and analysis of channel estimation algorithms in OFDM systems. Intl. J. Sci. Technol. Res., 2: 76-80.
Direct Link  |  

Mathur, S., W. Trappe, N. Mandayam, C. Ye and A. Reznik, 2008. Radio-telepathy: Extracting a secret key from an unauthenticated wireless channel. Proceedings of the 14th ACM International Conference on Mobile Computing and Networking, September 14-19, 2008, ACM, San Francisco, California, USA., ISBN:978-1-60558-096-8, pp: 128-139.

Minn, H., V.K. Bhargava and K.B. Letaif, 2003. A robot timing and frequency synchronization for OFDM system. IEEE. Trans. Wireless Commun., 2: 822-839.
CrossRef  |  Direct Link  |  

Patwari, N., J. Croft, S. Jana and S.K. Kasera, 2010. High-rate uncorrelated bit extraction for shared secret key generation from channel measurements. IEEE. Trans. Mobile Comput., 9: 17-30.
CrossRef  |  Direct Link  |  

Shrivas, A.K., 2015. A comparative analysis of LS and MMSE channel estimation techniques for MIMO-OFDM system. Intl. J. Sci. Res. Dev., 1: 44-48.
Direct Link  |  

Wallace, J.W. and R.K. Sharma, 2010. Automatic secret keys from reciprocal MIMO wireless channels: Measurement and analysis. IEEE. Trans. Inf. Forensics Secur., 5: 381-392.
CrossRef  |  Direct Link  |  

Wallace, J.W., C. Chen and M.A. Jensen, 2009. Key generation exploiting MIMO channel evolution: Algorithms and theoretical limits. Proceedings of the 3rd European Conference on Antennas and Propagation EuCAP, March 23-27, 2009, IEEE, Berlin, Germany, ISBN:978-1-4244-4753-4, pp: 1499-1503.

Wilson, R., D. Tse and R.A. Scholtz, 2007. Channel identification: Secret sharing using reciprocity in ultra-wideband channels. IEEE. Trans. Inf. Forensics Secur., 2: 364-375.
CrossRef  |  Direct Link  |  

Xi, W., X.Y. Li, C. Qian, J. Han and S. Tang et al., 2014. KEEP: Fast secret key extraction protocol for D2D communication. Proceedings of the 2014 IEEE 22nd International Symposium on Quality of Service (IWQoS), May 26-27, 2014, IEEE, Hong Kong, China, ISBN:978-1-4799-4852-9, pp: 350-359.

Yang, H., Y. Zhang, Y. Zhou, X. Fu and H. Liu et al., 2014. Provably secure three-party authenticated key agreement protocol using smart cards. Comput. Networks, 58: 29-38.
Direct Link  |  

Zhang, J., A. Marshall, R. Woods and T.Q. Duong, 2014. Secure key generation from OFDM subcarriers channel responses. Proceedings of the International Workshops on Globecom (GC Wkshps), December 8-12, 2014, IEEE, Austin, Texas, USA., ISBN:978-1-4799-7470-2, pp: 1302-1307.

Zhang, J., A. Marshall, R. Woods and T.Q. Duong, 2016. Efficient key generation by exploiting randomness from channel responses of individual OFDM subcarriers. IEEE. Trans. Commun., 64: 2578-2588.
CrossRef  |  Direct Link  |  

Zhang, J., T.Q. Duong, A. Marshall and R. Woods, 2016. Key generation from wireless channels: A review. IEEE. Access, 4: 614-626.
CrossRef  |  Direct Link  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved