The rest of the paper is organized as follows. A brief
review of related research is given in Section 2. The
proposed approach for cryptographic key generation
from the fingerprints of sender and receiver is given in
Section 3. The experimental results and security analysis