Channel level crossing-based security for communications over fading channels

5Citations
Citations of this article
15Readers
Mendeley users who have this article in their library.

Abstract

Several key exchange methods for wireless channels have been proposed in the literature. They are referred to as physical-layer security techniques and are usually based on the channel's fading characteristics and the principle of channel reciprocity. In this study, the authors present key exchange algorithms for wireless fading channels whose operation is based on channel estimation. Specifically, the authors present a complete key exchange scheme that includes channel sampling, thresholding and error reconciliation. Two error reconciliation methods are proposed. The first one is based on neural networks and the second one is based on linear block coding. Simulations of the proposed methods' performances and levels of security are presented and conclusions are drawn regarding their overall utility. © The Institution of Engineering and Technology 2013.

References Powered by Scopus

New Directions in Cryptography

10614Citations
N/AReaders
Get full text

Physical–layer security: From information theory to security engineering

1135Citations
N/AReaders
Get full text

SIMPLE UNPREDICTABLE PSEUDO-RANDOM NUMBER GENERATOR.

713Citations
N/AReaders
Get full text

Cited by Powered by Scopus

Nonreciprocity compensation combined with turbo codes for secret key generation in vehicular ad hoc social IoT networks

38Citations
N/AReaders
Get full text

A MIMO precoding based physical layer security technique for key exchange encryption

14Citations
N/AReaders
Get full text

Physical layer secret key exchange using phase randomization in MIMO-OFDM

10Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Karas, D. S., Karagiannidis, G. K., & Schober, R. (2013). Channel level crossing-based security for communications over fading channels. IET Information Security, 7(3), 221–229. https://doi.org/10.1049/iet-ifs.2011.0360

Readers over time

‘13‘14‘15‘16‘17‘18‘19‘20‘21‘2201234

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 6

60%

Researcher 3

30%

Lecturer / Post doc 1

10%

Readers' Discipline

Tooltip

Engineering 7

64%

Computer Science 4

36%

Article Metrics

Tooltip
Social Media
Shares, Likes & Comments: 10

Save time finding and organizing research with Mendeley

Sign up for free
0