Secret Key Agreement Over Multipath Channels Exploiting a Variable-Directional Antenna
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2012, Vol 3, Issue 1
Abstract
We develop an approach of key distribution protocol(KDP) proposed recently by T.Aono et al., where the security of KDP is only partly estimated in terms of eavesdropper's key bit errors. Instead we calculate the Shannon's information leaking to a wire tapper and also we apply the privacy amplification procedure from the side of the legal users. A more general mathematical model based on the use of Variable-Directional Antenna (VDA) under the condition of multipath wave propagation is proposed. The new method can effectively be used even in noiseless interception channels providing thus a widened area with respect to practical applications. Statistical characteristics of the VDA are investigated by simulation, allowing to specify the model parameters. We prove that the proposed KDP provides both security and reliability of the shared keys even for very short distances between legal users and eavesdroppers. Antenna diversity is proposed as a mean to enhance the KDP security. In order to provide a better performance evaluation of the KDP, it is investigated the use of error correcting codes.
Authors and Affiliations
Valery Korzhik , Viktor Yakovlev , Yuri Kovajkin , Guillermo Morales-Luna
Student Facial Authentication Model based on OpenCV’s Object Detection Method and QR Code for Zambian Higher Institutions of Learning
Facial biometrics captures human facial physiological data, converts it into a data item variable so that this stored variable may be used to provide information security services, such as authentication, integrity manag...
Issues Elicitation and Analysis of CMMI Based Process Improvement in Developing Countries Theory and Practice
Researchers have tried to find out the pattern of rising and fall of Pakistani software industry and also the reasons for what is going exactly wrong with this industry. Different studies have witnessed that in Pakistan,...
Anti-noise Capability Improvement of Minimum Energy Combination Method for SSVEP Detection
Minimum energy combination (MEC) is a widely used method for frequency recognition in steady state visual evoked potential based BCI systems. Although it can reach acceptable performances, this method remains sensitive t...
Achieving Flatness: Honeywords Generation Method for Passwords based on user behaviours
Honeywords (decoy passwords) have been proposed to detect attacks against hashed password databases. For each user account, the original password is stored with many honeywords in order to thwart any adversary. The honey...
A Cloud-Based Platform for Democratizing and Socializing the Benchmarking Process
Performances evaluation, benchmarking and re-producibility represent significant aspects for evaluating the practical impact of scientific research outcomes in the Computer Science field. In spite of all the benefits (e....