Publication

Secure key exchange in wireless networks

Christina Fragouli, László Czap
2011
Conference paper
Abstract

We investigate the problem of exchanging a se- cret key within a group of wireless devices. In particular, we are interested in information theoretically secure key exchange schemes that enable honest nodes of a multi-hop network to establish a secret group key in the presence of an eavesdropping adversary. Similarly to [1], the scheme presented here makes use of erasures over the wireless channel. In essence, this work can be seen as an extension of [1] for multi-hop networks instead of a single-hop network. We extend the approach and investigate the performance of our proposed protocol.

About this result
This page is automatically generated and may contain information that is not correct, complete, up-to-date, or relevant to your search query. The same applies to every other page on this website. Please make sure to verify the information with EPFL's official sources.

Graph Chatbot

Chat with Graph Search

Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.

DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.