KEYWORDS: Quantization, Received signal strength, Digital filtering, Wireless communications, Network security, Electrical engineering, Information technology, Telecommunications, Cryptography, Information security
Secure communication in a wireless environment is very vital, and cryptographic schemes are usually used to ensure it. Secret keys that are unknown to the tappers are needed by cryptographic schemes to secure communication between two legitimate users. In recent years the secret key generation scheme that utilizes a wireless channel as a secret key generation source has become a very interesting and promising topic. The main problem of this scheme is the high wireless channel mismatch between two users due to nonsimultaneous measurements and noise from the device. In this paper, we proposed a secret key generation scheme that uses the Savitzky-Golay filter method to reduce the high mismatch wireless channel. The scheme that was built was also equipped with a multibit quantization method to increase the speed of generation of secret keys. The results of our tests show a decrease in wireless channel mismatch between two users and an increase in the speed of generation of secret keys.
Broadcast authentication is used to determine legitimate packet from authorized user. The received packet can be forwarded or used for the further purpose. The use of digital signature is one of the compromising methods but it is followed by high complexity especially in the verification process. That phenomenon is used by the adversary to force the user to verify a lot of false packet data. Kind of Denial of Service (DoS) which attacks the main signature can be mitigated by using pre-authentication methods as the first layer to filter false packet data. The objective of the filter is not replacing the main signature but as an addition to actual verification in the sensor node. This paper contributes in comparing the cost of computation, storage, and communication among several filters. The result shows Pre- Authenticator and Dos Attack-Resistant scheme have the lower overhead than the others. Thus followed by needing powerful sender. Moreover, the key chain is promising methods because of efficiency and effectiveness.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.