A Practical Man-In-The-Middle Attack on Signal-Based Key Generation Protocols.
Generating secret keys using physical properties of the wireless channel has recently become a popular research area. The main security assumption of these protocols is that a sufficiently distant adversary is unable to guess a generated secret due to the unpredictable behavior of multipath signal p...
Päätekijät: | , , , |
---|---|
Muut tekijät: | |
Aineistotyyppi: | Journal article |
Kieli: | English |
Julkaistu: |
Springer
2012
|