Key Generation Reference

1 minute read

Published:

This paper summarizes some important key generation references.

Review/Survey/Tutorial on Key Generation

  1. Junqing Zhang, Trung Q. Duong, Roger Woods, and Alan Marshall, “Securing wireless communications of the Internet of Things from the physical layer, An overview”, Entropy, vol. 19, no. 8, 420, 2017. (Invited Paper) DOI: 10.3390/e19080420
  2. Amrita Ghosal, Subir Halder, and Stefano Chessa. “Secure Key Design Approaches using Entropy Harvesting in Wireless Sensor Network: A Survey.” Journal of Network and Computer Applications, vol. 78, pp. 216 – 230, Jan. 2017. DOI: 10.1016/j.jnca.2016.11.019
  3. Christopher Huth, René Guillaume, Thomas Strohm, Paul Duplys, Irin Ann Samuel, and Tim Güneysu. “Information reconciliation schemes in physical-layer security: A survey.” Computer Networks, vol. 109, pp: 84-104, Nov. 2016. DOI: 10.1016/j.comnet.2016.06.014
  4. Junqing Zhang, Trung Q. Duong, Alan Marshall, and Roger Woods, “Key generation from wireless channels: A review,” IEEE Access, vol. 4, pp. 614- 626, Mar. 2016. Open Access. DOI: 10.1109/ACCESS.2016.2521718
  5. Tao Wang, Yao Liu, and Athanasios V. Vasilakos, ‘‘Survey on channel reciprocity based key establishment techniques for wireless systems,’’ Wireless Networks, vol. 21, no. 6, pp. 1835–1846, Aug. 2015. DOI: 10.1007/s11276-014-0841-8
  6. Kai Zeng, ‘‘Physical layer key generation in wireless networks: Challenges and opportunities,’’ IEEE Communications Magazine, vol. 53, no. 6, pp. 33–39, Jun. 2015. DOI: 10.1109/MCOM.2015.7120014
  7. Kui Ren, Hai Su, and Qian Wang, ‘‘Secret key generation exploiting channel characteristics in wireless communications,’’ IEEE Wireless Communications, vol. 18, no. 4, pp. 6–12, Aug. 2011. DOI: 10.1109/MWC.2011.5999759

Tool

  • NIST SP 800-22: A Statistical Test Suite for the Validation of Random Number Generators and Pseudo Random Number.[Link] C code available for download. Python implementation can be downloaded from here .