A new frontier for IoT security emerging from three decades of key generation relying on wireless channels

J Zhang, G Li, A Marshall, A Hu, L Hanzo - IEEE Access, 2020 - ieeexplore.ieee.org
The Internet of Things (IoT) is a transformative technology, which is revolutionizing our
everyday life by connecting everyone and everything together. The massive number of …

Survey on joint paradigm of 5G and SDN emerging mobile technologies: Architecture, security, challenges and research directions

SHA Kazmi, F Qamar, R Hassan, K Nisar… - Wireless Personal …, 2023 - Springer
Modern communication systems are probable to surface new challenges while introducing
innovative fronts concerning context consciousness in wireless networks. The main outcome …

A comprehensive survey of 5G mm-wave technology design challenges

BT Jijo, SRM Zeebaree… - … of Research in …, 2021 - scholar.researcherseuropeans.com
Physical layer protection, which protects data confidentiality using information-theoretic
methods, has recently attracted a lot of research attention. Using the inherent randomness of …

On maximizing the sum secret key rate for reconfigurable intelligent surface-assisted multiuser systems

G Li, C Sun, W Xu, M Di Renzo… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Channel reciprocity-based key generation (CRKG) has recently emerged as a new
technique to address the problem of key distribution in wireless networks. However, as this …

Deep-learning-based physical-layer secret key generation for FDD systems

X Zhang, G Li, J Zhang, A Hu, Z Hou… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
Physical-layer key generation (PKG) establishes cryptographic keys from highly correlated
measurements of wireless channels, which relies on reciprocal channel characteristics …

Beyond the bound: A new performance perspective for identification via channels

C Von Lengerke, A Hefele, JA Cabrera… - IEEE Journal on …, 2023 - ieeexplore.ieee.org
Identification via channels (ID) is a goal-oriented (Post-Shannon) communications paradigm
that verifies the matching of message (identity) pairs at source and sink. To date, ID research …

Radio frequency fingerprint identification based on denoising autoencoders

J Yu, A Hu, F Zhou, Y Xing, Y Yu, G Li… - … on Wireless and …, 2019 - ieeexplore.ieee.org
Radio Frequency Fingerprinting (RFF) is one of the promising passive authentication
approaches for improving the security of the Internet of Things (IoT). However, with the …

[HTML][HTML] Analysis of spectrum sensing using deep learning algorithms: CNNs and RNNs

A Kumar, N Gaur, S Chakravarty, MH Alsharif… - Ain Shams Engineering …, 2024 - Elsevier
Spectrum sensing is a critical component of cognitive radio systems, enabling the detection
and utilization of underutilized frequency bands. Convolutional neural networks (CNNs) and …

Encrypting wireless communications on the fly using one-time pad and key generation

G Li, Z Zhang, J Zhang, A Hu - IEEE Internet of Things Journal, 2020 - ieeexplore.ieee.org
The one-time pad (OTP) secure transmission relies on the random keys to achieve perfect
secrecy, while the unpredictable wireless channel is shown to be a good random source …

Location-invariant physical layer identification approach for WiFi devices

G Li, J Yu, Y Xing, A Hu - Ieee Access, 2019 - ieeexplore.ieee.org
Recently, Radio Frequency Fingerprinting (RFF) becomes a promising technique which
augments existing multifactor authentication schemes at the device level to counter forgery …