A Practical Man-In-The-Middle Attack on Signal-Based Key Generation Protocols.
Generating secret keys using physical properties of the wireless channel has recently become a popular research area. The main security assumption of these protocols is that a sufficiently distant adversary is unable to guess a generated secret due to the unpredictable behavior of multipath signal p...
Main Authors: | , , , |
---|---|
Other Authors: | |
Format: | Journal article |
Language: | English |
Published: |
Springer
2012
|