ARQ Security in Wi-Fi and RFID Networks

Preprint English OPEN
Elsabagh, Mohamed; Abdallah, Yara; Youssef, Moustafa; Gamal, Hesham El;
(2010)
  • Subject: Computer Science - Information Theory | Computer Science - Cryptography and Security

In this paper, we present two practical ARQ-Based security schemes for Wi-Fi and RFID networks. Our proposed schemes enhance the confidentiality and authenticity functions of these networks, respectively. Both schemes build on the same idea; by exploiting the statistica... View more
  • References (32)
    32 references, page 1 of 4

    [1] A. D. Wyner, “The wire-tap channel,” Bell Systems Technical Journal, vol. 54, no. 8, pp. 1355-1387, January 1975.

    [2] L. H. Ozarow and A. D. Wyner, “The wire-tap channel II,” Bell System Technical Journal, vol. 63, no. 10, pp. 2135-2157, 1984.

    [3] I. Csiszar and J. Korner, “Broadcast channels with confidential messages,” vol. 24, no. 3, pp. 339-348, May 1978.

    [4] P. K. Gopala, L. Lai, and H. El Gamal, “On the secrecy capacity of fading channels,” vol. 54, no. 10, pp. 4687-4698, Oct. 2008.

    [5] X. Tang, R. Liu, P. Spasojevic, and H. V. Poor, “On the throughput of secure hybrid-ARQ protocols for gaussian block-fading channels,” in ISIT 2007, jun 2007, pp. 1355-1387.

    [6] M. A. Latif, A. Sultan, and H. El Gamal, “ARQ-based secret key sharing,” in Proc. IEEE International Conference on Communications ICC '09, Jun. 14-18, 2009, pp. 1-6.

    [7] M. Latif, A. Sultan, and H. El Gamal, “Arq secrecy over correlated fading channels,” jan. 2010, pp. 1 -5.

    [8] Y. Omar, M. Youssef, and H. El Gamal, “ARQ secrecy: From theory to practice,” in Proc. IEEE Information Theory Workshop ITW 2009, Oct. 11-16, 2009, pp. 6-10.

    [9] J. Edney and W. A. Arbaugh, Real 802.11 Security: Wi-Fi Protected Access and 802.11i. Addison Wesley, July 2003.

    [10] N. Borisov, I. Goldberg, and D. Wagner, “Intercepting mobile communications: The insecurity of 802.11,” 2001, pp. 180-189.

  • Related Organizations (1)
  • Metrics
Share - Bookmark