encryption key but reduces a key generation rate due
to increased channel non-reciprocity.
The future research work should be aligned at the
performance evaluation and security analysis of the
meteor cryptography systems. Non-reciprocity
effects of meteor radio propagation and spatial
correlation features of meteor burst channel should
be considered to address the above problems.
REFERENCES
Bennett, C., Brassard, G., 1984. Quantum Cryptography:
Public key distribution and coin tossing. In
Proceedings of IEEE International Conference on
Computers, Systems and Signal Processing
(Bangalore, India), pp. 175-179.
Desourdis, R.J., Wojtaszek, H., Sidorov, V.V. et el., 1993.
Nonreciprocity of Meteor Scatter Radio Links. In
IES’93, Proceedings of Ionospheric Effects
Symposium, pp. 165-173.
Hershey, J.E., Hassan, A.A., Yarlagadda, R., 1995.
Unconventional cryptographic keying variable
management. In IEEE Transactions on
Communications, vol.43., iss.1, pp.3-6.
Karpov, A., Tereshin, S., Abrosimov, J., 2001. The
computer model “KAMET”: The new generation
version. In Proceedings of the Meteroids 2001
Conference (Kiruna, Sweden, 6-10 August 2001),
pp.367-370.
Karpov, A.V., Sidorov, V. V., 2005. Method for
protecting information in meteor radio channel by
encryption by random natural occurrence. Russian
Federation Patent No. RU 2265957, published at
10.12.2005 in Bull. 34
Khuzyashev, R.G., 1984. Calculation of the amplitude and
phase characteristics of a signal scattered obliquely off
a meteor trail. In Radiophysics and Quantum
Electronics, vol. 27, iss.9, pp. 778-782.
Korneyev, V.A., Epictetov, L.A., Sidorov, V. V., 2003.
Time & Frequency coordination using unsteady,
variable-precision measurements in meteor burst
channel. In Proceedings of 17th European Frequency
and Time Forum (Tampa, USA), 4-8 May.
Korneyev, V.A., Sidorov, V.V., 2007. Optimization of
concurrent data and high-precision time transfer
modes in meteor burst synchronization equipment. In
TimeNav’07, Proceedings of 21st European
Frequency and Time Forum, pp. 923-926.
Madiseh, M.G., McGuire, M. L., Neville, S. S., Cai L.,
2008. Secret key generation and agreement in UWB
communication channels. In GLOBECOM 2008,
Proceedings of the IEEE Global Telecommunications
Conference, pp.1-5.
Madiseh, M.G., He, S., McGuire, M.L., Neville, S. W.,
Dong, X., 2009. Verification of secret key generation
from UWB channel observations. In ICC’09,
Proceedings of the IEEE International Conference on
Communications, pp. 593-597.
Mathur, S., Trappe, W., Mandayam, N., Ye, C., Reznik,
A., 2008. Radio-Telepathy: extracting a secret key
from an unauthenticated wireless channel. In
MobiCom’08, Proceedings of the 14th ACM
international conference on Mobile computing and
networking, pp. 128-139.
McKinley, D.W.R., 1961. Meteor science and
engineering, McGraw-Hill, 309 p.
Sidorov, V.V., Epictetov, L.A., 1993. Application of
Meteor Burst Equipment for High Precision
Comparisons of Time and Frequency Standards. In
EFTF’93, Proceedings of 7th European Frequency
and Time Forum, pp. 413-416.
Sidorov, V.V., Karpov, A.V., Korneev, V.A., Nasyrov,
A.F, 2007. Meteor Time Transfer and Meteor
Cryptography. In TimeNav’07, Proceedings of 21st
European Frequency and Time Forum, pp. 315-317.
Weitzen, J.A., Sowa, M., Scofidio, R., Quinn, J., 1987.
Characterizing the Multipath and Doppler Spreads of
the High-Latitude Meteor Burst Communication
Channel. In IEEE Trans. on Comm., vol.35, pp.1050-
1058.
SECRYPT2014-InternationalConferenceonSecurityandCryptography
450