A Practical Man-In-The-Middle Attack on Signal-Based Key Generation Protocols.
Generating secret keys using physical properties of the wireless channel has recently become a popular research area. The main security assumption of these protocols is that a sufficiently distant adversary is unable to guess a generated secret due to the unpredictable behavior of multipath signal p...
Hlavní autoři: | , , , |
---|---|
Další autoři: | |
Médium: | Journal article |
Jazyk: | English |
Vydáno: |
Springer
2012
|