A Practical Man-In-The-Middle Attack on Signal-Based Key Generation Protocols.
Generating secret keys using physical properties of the wireless channel has recently become a popular research area. The main security assumption of these protocols is that a sufficiently distant adversary is unable to guess a generated secret due to the unpredictable behavior of multipath signal p...
المؤلفون الرئيسيون: | , , , |
---|---|
مؤلفون آخرون: | |
التنسيق: | Journal article |
اللغة: | English |
منشور في: |
Springer
2012
|