Key Generation Recommended Reading
Published:
This paper summarizes some important key generation references.
Review/Survey/Tutorial on Key Generation
- Junqing Zhang, Guyue Li, Alan Marshall, Aiqun Hu, and Lajos Hanzo, “A New Frontier for IoT Security Emerging From Three Decades of Key Generation Relying on Wireless Channels,” IEEE Access, vol. 8, pp. 138406 - 138446, 2020. link
- Junqing Zhang, Trung Q. Duong, Alan Marshall, and Roger Woods, “Key generation from wireless channels: A review,” IEEE Access, vol. 4, pp. 614- 626, Mar. 2016. Open Access. link
- Junqing Zhang, Trung Q. Duong, Roger Woods, and Alan Marshall, “Securing wireless communications of the Internet of Things from the physical layer, An overview,” Entropy, vol. 19, no. 8, 420, 2017. (Invited Paper) link
- Guyue Li, Chen Sun, Junqing Zhang, Eduard Jorswieck, Bin Xiao, Aiqun Hu, “Physical Layer Key Generation in 5G and Beyond Wireless Communications: Challenges and Opportunities,” Entropy, vol. 21, no. 5, 497, 2019. link
- Christopher Huth, René Guillaume, Thomas Strohm, Paul Duplys, Irin Ann Samuel, and Tim Güneysu. “Information reconciliation schemes in physical-layer security: A survey.” Computer Networks, vol. 109, pp: 84-104, Nov. 2016. link
- Tao Wang, Yao Liu, and Athanasios V. Vasilakos, ‘‘Survey on channel reciprocity based key establishment techniques for wireless systems,’’ Wireless Networks, vol. 21, no. 6, pp. 1835–1846, Aug. 2015. link
- Kai Zeng, ‘‘Physical layer key generation in wireless networks: Challenges and opportunities,’’ IEEE Communications Magazine, vol. 53, no. 6, pp. 33–39, Jun. 2015. link
- Kui Ren, Hai Su, and Qian Wang, ‘‘Secret key generation exploiting channel characteristics in wireless communications,’’ IEEE Wireless Communications, vol. 18, no. 4, pp. 6–12, Aug. 2011. link
Key Generation With Wireless Technologies
WiFi/IEEE 802.11
- Junqing Zhang, Roger Woods, Trung Q. Duong, Alan Marshall, Yuan Ding, Yi Huang, and Qian Xu, “Experimental study on key generation for physical layer security in wireless communications,” IEEE Access, vol. 4, pp. 4464 – 4477, Sept. 2016. Open Access. link
- S. Jana, S. N. Premnath, M. Clark, S. K. Kasera, N. Patwari, and S. V. Krishnamurthy, ‘‘On the effectiveness of secret key extraction from wireless signal strength in real environments,’’ in Proc. 15th Annu. Int. Conf. Mobile Comput. Netw. (MobiCom), Beijing, China, Sep. 2009, pp. 321–332
- S. Mathur, W. Trappe, N. Mandayam, C. Ye, and A. Reznik, ‘‘Radiotelepathy: Extracting a secret key from an unauthenticated wireless channel,’’ in Proc. 14th Annu. Int. Conf. Mobile Comput. Netw. (MobiCom), San Francisco, CA, USA, Sep. 2008, pp. 128–139.
ZigBee/IEEE 802.15.4
- C. T. Zenger, M. Pietersz, J. Zimmer, J.-F. Posielek, T. Lenze, and C. Paar, “Authenticated key establishment for low-resource devices exploiting correlated random channels,” Comput. Netw., vol. 109, pp. 105–123, 2016.
- S. T. Ali, V. Sivaraman, and D. Ostry, ‘‘Eliminating reconciliation cost in secret key generation for body-worn health monitoring devices,’’ IEEE Trans. Mobile Comput., vol. 13, no. 12, pp. 2763–2776, Dec. 2014.
Bluetooth
- S. N. Premnath, P. L. Gowda, S. K. Kasera, N. Patwari, and R. Ricci, ‘‘Secret key extraction using Bluetooth wireless signal strength measurements,’’ in Proc. 11th Annu. IEEE Int. Conf. Sens., Commun., Netw. (SECON), Singapore, Jun./Jul. 2014, pp. 293–301.
LoRa/LoRaWAN
- H. Ruotsalainen and S. Grebeniuk, “Towards wireless secret key agree-ment with LoRa physical layer,” in Proc. Int. Conf. Availability, Reliabilityand Security, Hamburg, Germany, Aug. 2018, p. 23.
- J. Zhang, A. Marshall, and L. Hanzo, “Channel-envelope differencingeliminates secret key correlation: LoRa-based key generation in low powerwide area networks,” IEEE Trans. Veh. Technol., vol. 67, no. 12, pp.12 462–12 466, 2018.
- W. Xu, S. Jha, and W. Hu, “Lora-key: Secure key generation system for LoRa-based network,” IEEE Internet Things J., 2018.
Tool
- NIST SP 800-22: A Statistical Test Suite for the Validation of Random Number Generators and Pseudo Random Number.[Link] C code available for download. Python implementation can be downloaded from here.
Return to the Main Page of Key Generation From Wireless Channels.