A new frontier for IoT security emerging from three decades of key generation relying on wireless channels
The Internet of Things (IoT) is a transformative technology, which is revolutionizing our
everyday life by connecting everyone and everything together. The massive number of …
everyday life by connecting everyone and everything together. The massive number of …
Survey on joint paradigm of 5G and SDN emerging mobile technologies: Architecture, security, challenges and research directions
Modern communication systems are probable to surface new challenges while introducing
innovative fronts concerning context consciousness in wireless networks. The main outcome …
innovative fronts concerning context consciousness in wireless networks. The main outcome …
A comprehensive survey of 5G mm-wave technology design challenges
BT Jijo, SRM Zeebaree… - … of Research in …, 2021 - scholar.researcherseuropeans.com
Physical layer protection, which protects data confidentiality using information-theoretic
methods, has recently attracted a lot of research attention. Using the inherent randomness of …
methods, has recently attracted a lot of research attention. Using the inherent randomness of …
On maximizing the sum secret key rate for reconfigurable intelligent surface-assisted multiuser systems
Channel reciprocity-based key generation (CRKG) has recently emerged as a new
technique to address the problem of key distribution in wireless networks. However, as this …
technique to address the problem of key distribution in wireless networks. However, as this …
Deep-learning-based physical-layer secret key generation for FDD systems
Physical-layer key generation (PKG) establishes cryptographic keys from highly correlated
measurements of wireless channels, which relies on reciprocal channel characteristics …
measurements of wireless channels, which relies on reciprocal channel characteristics …
Beyond the bound: A new performance perspective for identification via channels
Identification via channels (ID) is a goal-oriented (Post-Shannon) communications paradigm
that verifies the matching of message (identity) pairs at source and sink. To date, ID research …
that verifies the matching of message (identity) pairs at source and sink. To date, ID research …
Radio frequency fingerprint identification based on denoising autoencoders
Radio Frequency Fingerprinting (RFF) is one of the promising passive authentication
approaches for improving the security of the Internet of Things (IoT). However, with the …
approaches for improving the security of the Internet of Things (IoT). However, with the …
[HTML][HTML] Analysis of spectrum sensing using deep learning algorithms: CNNs and RNNs
Spectrum sensing is a critical component of cognitive radio systems, enabling the detection
and utilization of underutilized frequency bands. Convolutional neural networks (CNNs) and …
and utilization of underutilized frequency bands. Convolutional neural networks (CNNs) and …
Encrypting wireless communications on the fly using one-time pad and key generation
The one-time pad (OTP) secure transmission relies on the random keys to achieve perfect
secrecy, while the unpredictable wireless channel is shown to be a good random source …
secrecy, while the unpredictable wireless channel is shown to be a good random source …
Location-invariant physical layer identification approach for WiFi devices
Recently, Radio Frequency Fingerprinting (RFF) becomes a promising technique which
augments existing multifactor authentication schemes at the device level to counter forgery …
augments existing multifactor authentication schemes at the device level to counter forgery …