Several keyexchange methods for wireless channels have been proposed in the literature. They are referred to as physical-layer security techniques and are usually based on the channel's fading characteristics and...
详细信息
Several keyexchange methods for wireless channels have been proposed in the literature. They are referred to as physical-layer security techniques and are usually based on the channel's fading characteristics and the principle of channel reciprocity. In this study, the authors present key exchange algorithms for wireless fading channels whose operation is based on channel estimation. Specifically, the authors present a complete keyexchange scheme that includes channel sampling, thresholding and error reconciliation. Two error reconciliation methods are proposed. The first one is based on neural networks and the second one is based on linear block coding. Simulations of the proposed methods' performances and levels of security are presented and conclusions are drawn regarding their overall utility.
in this paper we have modeled traffic and energy consumption in a secured, power managed wireless sensor network implemented using IEEE 802.15.4 technology. The network is secured through a variant of the secure socke...
详细信息
in this paper we have modeled traffic and energy consumption in a secured, power managed wireless sensor network implemented using IEEE 802.15.4 technology. The network is secured through a variant of the secure socket layer protocol, with ephemeral Diffie-Hellman keyexchange using elliptic curve cryptography. Our traffic and energy model allows calculations of cluster populations under the simultaneous constraints of prescribed secure event sensing reliability and lifetime of the whole network. (C) 2008 Elsevier B.V. All rights reserved.
暂无评论