Configuration hopping: A secure communication protocol without explicit key exchange

1Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

By changing one or more physical layer parameters (such as spreading code, symbol duration, symbol constellation, center frequency, modulation method, transmission power, etc.) in an agreed upon manner between two communication parties, we are able to realize communication that is hard to detect, identify, and decode. We present a formal link layer protocol for secure communication based on this idea that, along with the use of channel reciprocity, notably eschews the use of cryptographic keys. We prove the security properties of the protocol in the Canetti-Krawczyk framework and study the feasibility of changing several physical layer parameters at the link packet level in Software Defined Radios.

Cite

CITATION STYLE

APA

Qiao, Y., Srinivasan, K., & Arora, A. (2014). Configuration hopping: A secure communication protocol without explicit key exchange. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8756, 268–282. https://doi.org/10.1007/978-3-319-11764-5_19

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free