A Practical Man-In-The-Middle Attack on Signal-Based Key Generation Protocols.
Generating secret keys using physical properties of the wireless channel has recently become a popular research area. The main security assumption of these protocols is that a sufficiently distant adversary is unable to guess a generated secret due to the unpredictable behavior of multipath signal p...
Autori principali: | , , , |
---|---|
Altri autori: | |
Natura: | Journal article |
Lingua: | English |
Pubblicazione: |
Springer
2012
|