Security concepts in emerging 6G communication: Threats, countermeasures, authentication techniques and research directions
Challenges faced in network security have significantly steered the deployment timeline of
Fifth Generation (5G) communication at a global level; therefore, research in Sixth …
Fifth Generation (5G) communication at a global level; therefore, research in Sixth …
Physical layer security-from theory to practice
In this article we present the evolutionary journey of physical layer security (PLS), starting
from its theoretical foundations in wiretap coding and secret key generation followed by to …
from its theoretical foundations in wiretap coding and secret key generation followed by to …
A physical layer, zero-round-trip-time, multifactor authentication protocol
Lightweight physical layer security schemes that have recently attracted a lot of attention
include physical unclonable functions (PUFs), RF fingerprinting/proximity based …
include physical unclonable functions (PUFs), RF fingerprinting/proximity based …
Joint localization-based node authentication and secret key generation
In this paper, we devise preprocessing schemes to disentangle channel state information
(CSI) into predictable and unpredictable components to simultaneously provide two …
(CSI) into predictable and unpredictable components to simultaneously provide two …
How physicality enables trust: A new era of trust-centered cyberphysical systems
Multi-agent cyberphysical systems enable new capabilities in efficiency, resilience, and
security. The unique characteristics of these systems prompt a reevaluation of their security …
security. The unique characteristics of these systems prompt a reevaluation of their security …
Smart Channel State Information Pre-Processing for Authentication and Symmetric Key Distillation
M Srinivasan, S Skaperas, M Mitev… - … Machine Learning in …, 2023 - ieeexplore.ieee.org
While the literature on channel state information (CSI)-based authentication and key
distillation is vast, the two topics have customarily been studied separately. This paper …
distillation is vast, the two topics have customarily been studied separately. This paper …
A SKG security challenge: Indoor SKG under an on-the-shoulder eavesdropping attack
A Mayya, M Mitev, A Chorti… - GLOBECOM 2023-2023 …, 2023 - ieeexplore.ieee.org
Physical layer security (PLS) is seen as the means to enhance physical layer trustworthiness
in 6G. This work provides a proof-of-concept for one of the most mature PLS technologies …
in 6G. This work provides a proof-of-concept for one of the most mature PLS technologies …
Privacy-Preserving Randomized-MAC WiFi Client Counting with Short-Term-Coherent Waveform Features and a Bayesian Information Criterion
F Yang, X Zuo, B Denby - 2024 International Conference on …, 2024 - ieeexplore.ieee.org
The randomization of WiFi MAC addresses mandated by recent data privacy legislation has
created an urgent need for audience estimation techniques that can function without unique …
created an urgent need for audience estimation techniques that can function without unique …
Smart channel state information pre-processing for joint authentication and symmetric key distillation
While the literature on RF fingerprinting-based authentication and key distillation is vast, the
two topics have customarily been studied separately. In this paper, starting from the …
two topics have customarily been studied separately. In this paper, starting from the …
[PDF][PDF] MACHINE LEARNING BASED PHYSICAL LAYER KEY GENERATION APPROACH FOR INTERNET OF THINGS.
R Shahabade, M Zuber - MACHINE LEARNING, 2023 - machineintelligenceresearchs.com
The communication device on the internet of things has limited resources such as bandwidth
and memory. The limitation of resources cannot afford the computational cost of classical …
and memory. The limitation of resources cannot afford the computational cost of classical …