Wireless secret key generation versus capable adversaries
dc.contributor.author | Ghoreishi Madiseh, Masoud | |
dc.contributor.supervisor | McGuire, Michael Liam | |
dc.contributor.supervisor | Neville, Stephen William | |
dc.date.accessioned | 2011-12-22T21:04:52Z | |
dc.date.available | 2011-12-22T21:04:52Z | |
dc.date.copyright | 2011 | en_US |
dc.date.issued | 2011-12-22 | |
dc.degree.department | Dept. of Electrical and Computer Engineering | en_US |
dc.degree.level | Doctor of Philosophy Ph.D. | en_US |
dc.description.abstract | This dissertation applies theories and concepts of wireless communications and signal processing to the security domain to assess the security of a Wireless secret Key Generation (WKG) system against capable eavesdroppers, who employ all the feasible tools to compromise the system’s security. The security of WKG is evaluated via real wireless measurements, where adversary knows and applies appropriate signal processing tools in ordere to predict the generated key with the communicating pair. It is shown that in a broadband stationary wireless communication channel, (e.g. commercial off-the-shelf 802.11 WLAN devices), a capable eavesdropper can recover a large portion of the secret key bits. However, in an Ultra-wideband (UWB) communication, at the same stationary environment, secret key rates of 128 bits per channel probe are achievable. | en_US |
dc.description.scholarlevel | Graduate | en_US |
dc.identifier.bibliographicCitation | Masoud Ghoreishi Madiseh, Neville, S.W., McGuire, M.L., “On the Limits of Wireless Key Generation against Capable Eavesdroppers”, To be submitted to IEEE Transactions on Information Forensics and Security. | en_US |
dc.identifier.bibliographicCitation | Masoud Ghoreishi Madiseh, Neville, S.W., McGuire, M.L., “Secret Key Generation via Wireless Channel Characterization: Addressing Temporal Correlations through Beamforming”, Submitted to IEEE Transactions on Information Forensics and Security, Oct 2011. | en_US |
dc.identifier.bibliographicCitation | Masoud Ghoreishi Madiseh, Neville, S.W., McGuire, M.L., Dong, X., Horie, M. “Secret Key Generation via UWB Communication”, Submitted to IEEE Transactions on Information Forensics and Security, Jan 2011. | en_US |
dc.identifier.bibliographicCitation | Masoud Ghoreishi Madiseh, Neville, S.W., McGuire, M.L., “Time Correlation Analysis of Secret Key Generation via UWB Channels”, IEEE Globecom, Florida, USA, Dec 2010. | en_US |
dc.identifier.bibliographicCitation | Masoud Ghoreishi Madiseh, He, S., McGuire, M.L., Neville, S.W., Dong, X., “Verification of Secret Key Generation from UWB Channel Observations”, IEEE ICC, Dresden, Germany, June 2009. | en_US |
dc.identifier.bibliographicCitation | Shuai He; Dong, X.; Tian, Z.; Liu, T.C.-K.; Masoud Ghoreishi Madiseh; McGuire, M.L.; Neville, S.W.; Tin, N., “On the Empirical Evaluation of Spatial and Temporal Characteristics of Ultra-Wideband Channel”, IEEE VTC, Barcelona, Spain, April 2009. | en_US |
dc.identifier.bibliographicCitation | Masoud Ghoreishi Madiseh, McGuire, M.L., Neville, S.W., Cai, L., Horie, M., “Secret Key Generation and Agreement in UWB Communication Channels”, IEEE Globecom, New Orleans, USA, Nov 2008. | en_US |
dc.identifier.bibliographicCitation | Masoud Ghoreishi Madiseh, McGuire, M.L., Neville, S.W., Horie, M., He, S., Dong, X., “Secure Key Generation and Agreement in UWB Communication”, submitted to: Security Engineering Techniques and Solutions for Information Systems: Management and Implementation, April 2009. | en_US |
dc.identifier.uri | http://hdl.handle.net/1828/3766 | |
dc.language | English | eng |
dc.language.iso | en | en_US |
dc.rights.temp | Available to the World Wide Web | en_US |
dc.subject | Wireless Secret Key Generation | en_US |
dc.subject | Wireless Security | en_US |
dc.subject | Point to Point Secure Communication | en_US |
dc.subject | Secret Key Capacity | en_US |
dc.subject | Wire-tap channel | en_US |
dc.subject | Public Discussion | en_US |
dc.subject | Wireless Channel Characterization | en_US |
dc.subject | Ultrawide Band communication channels | en_US |
dc.subject | WLAN | en_US |
dc.subject | IEEE 802.11 | en_US |
dc.title | Wireless secret key generation versus capable adversaries | en_US |
dc.type | Thesis | en_US |