A new frontier for IoT security emerging from three decades of key generation relying on wireless channels
The Internet of Things (IoT) is a transformative technology, which is revolutionizing our
everyday life by connecting everyone and everything together. The massive number of …
everyday life by connecting everyone and everything together. The massive number of …
Deep-learning-based physical-layer secret key generation for FDD systems
Physical-layer key generation (PKG) establishes cryptographic keys from highly correlated
measurements of wireless channels, which relies on reciprocal channel characteristics …
measurements of wireless channels, which relies on reciprocal channel characteristics …
Security of emergent automotive systems: A tutorial introduction and perspectives on practice
Security of Emergent Automotive Systems: A Tutorial Introduction and Perspectives on Practice
Page 1 10 2168-2356/19©2019 IEEE Copublished by the IEEE CEDA, IEEE CASS, IEEE SSCS …
Page 1 10 2168-2356/19©2019 IEEE Copublished by the IEEE CEDA, IEEE CASS, IEEE SSCS …
IoT-CAD: Context-aware adaptive anomaly detection in IoT systems through sensor association
R Yasaei, F Hernandez, MAA Faruque - Proceedings of the 39th …, 2020 - dl.acm.org
The deployment of Internet of Things (IoT) devices in cyber-physical applications has
introduced a new set of vulnerabilities. The new security and reliability challenges require a …
introduced a new set of vulnerabilities. The new security and reliability challenges require a …
Vehicle-key: A secret key establishment scheme for LoRa-enabled IoV communications
The rapid growth of the Internet of Vehicles (IoV) has highlighted the need for effective secret
key establishment, as the dynamic and ad-hoc nature of IoV communication remains a …
key establishment, as the dynamic and ad-hoc nature of IoV communication remains a …
Adaptive and optimum secret key establishment for secure vehicular communications
In intelligent transportation systems (ITS), communications between vehicles, ie vehicle-to-
vehicle (V2V) communications are of greatest importance to facilitate autonomous driving …
vehicle (V2V) communications are of greatest importance to facilitate autonomous driving …
LoRa-based physical layer key generation for secure V2V/V2I communications
In recent years, Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) communication
brings more and more attention from industry (eg, Google and Uber) and government (eg …
brings more and more attention from industry (eg, Google and Uber) and government (eg …
Channel state information-based cryptographic key generation for intelligent transportation systems
S Ribouh, K Phan, AV Malawade… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
Due to the sensitivity of the information exchanged in Vehicle to Vehicle (V2V) and Vehicle
to Infrastructure (V2I) communication, generating secret keys is critical to secure these …
to Infrastructure (V2I) communication, generating secret keys is critical to secure these …
Implementing homomorphic encryption based secure feedback control
This paper is about an encryption based approach to the secure implementation of feedback
controllers for physical systems. Specifically, Paillier's homomorphic encryption is used to …
controllers for physical systems. Specifically, Paillier's homomorphic encryption is used to …
Physical layer key generation scheme for MIMO system based on feature fusion autoencoder
Y Chen, Z Chen, Y Zhang, Z Luo, Y Li… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
Recently, the use of wireless channel state information (CSI) to generate encryption keys in
the physical layer has gained significant attention from researchers. Unlike classical …
the physical layer has gained significant attention from researchers. Unlike classical …