Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Hybrid Approach in Information-Hypothetically Furtive Solution Generation for Vanishing Wireless Channels


Affiliations
1 Centre for Computer Applications, Sri Krishna College of Technology, Coimbatore - 42, TamilNadu, India
2 Department of MCA, Sona College of Technology, Salem, TamilNadu, India
     

   Subscribe/Renew Journal


The multipath-rich wireless environment associated with typical wireless usage scenarios is characterized by a fading channel response that is time-varying, location-sensitive, and uniquely shared by a given transmitter-receiver pair. The complexity associated with a richly scattering environment implies that the shortterm fading process is inherently hard to predict and best modeled stochastically, with rapid decorrelation properties in space, time, and frequency. In this paper, we demonstrate how the channel state between a wireless transmitter and receiver can be used as the basis for building practical secret key generation protocols between two entities. We begin by presenting a scheme based on the "Reciprocity based key exchange model" allows two parties jointly establish physically secure key combined with a (standard) computationally secure key, over an insecure communication channel. This key can then be used to encrypt subsequent communications. The channel state between a wireless transmitter and receiver can be used as the basis for building practical secret key generation protocols between two entities. We validate both proposed protocols through experimentations using a customized 802.11a platform, and show for the typical Wi-Fi channel that reliable secret key establishment can be accomplished at rates on the order of 11 b/s.


Keywords

Wireless, Wi-Fi, Cryptography, MOPI.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 288

PDF Views: 3




  • Hybrid Approach in Information-Hypothetically Furtive Solution Generation for Vanishing Wireless Channels

Abstract Views: 288  |  PDF Views: 3

Authors

J. Nagaraj
Centre for Computer Applications, Sri Krishna College of Technology, Coimbatore - 42, TamilNadu, India
G. M. Kadhar Nawaz
Department of MCA, Sona College of Technology, Salem, TamilNadu, India

Abstract


The multipath-rich wireless environment associated with typical wireless usage scenarios is characterized by a fading channel response that is time-varying, location-sensitive, and uniquely shared by a given transmitter-receiver pair. The complexity associated with a richly scattering environment implies that the shortterm fading process is inherently hard to predict and best modeled stochastically, with rapid decorrelation properties in space, time, and frequency. In this paper, we demonstrate how the channel state between a wireless transmitter and receiver can be used as the basis for building practical secret key generation protocols between two entities. We begin by presenting a scheme based on the "Reciprocity based key exchange model" allows two parties jointly establish physically secure key combined with a (standard) computationally secure key, over an insecure communication channel. This key can then be used to encrypt subsequent communications. The channel state between a wireless transmitter and receiver can be used as the basis for building practical secret key generation protocols between two entities. We validate both proposed protocols through experimentations using a customized 802.11a platform, and show for the typical Wi-Fi channel that reliable secret key establishment can be accomplished at rates on the order of 11 b/s.


Keywords


Wireless, Wi-Fi, Cryptography, MOPI.