Vulnerabilities of wireless key exchange based on channel reciprocity

14Citations
Citations of this article
31Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Wireless key exchange on the physical layer is a key exchange protocol independent of computational assumptions. It relies only on the physical properties of the wireless channels to generate a common secret key between two parties. Precise conditions, however, for such a key exchange to be secure remain unclear. An argument why unconditional security does not hold for general scenarios is provided. Finally, a novel side-channel attack against such key exchange schemes is described and experimentally validated. © 2011 Springer-Verlag.

Cite

CITATION STYLE

APA

Döttling, N., Lazich, D., Müller-Quade, J., & De Almeida, A. S. (2011). Vulnerabilities of wireless key exchange based on channel reciprocity. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6513 LNCS, pp. 206–220). Springer Verlag. https://doi.org/10.1007/978-3-642-17955-6_15

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free