Physical layer security for authentication, confidentiality, and malicious node detection: a paradigm shift in securing IoT networks
The pervasiveness of commercial Internet of Things (IoT) around the globe is expected to
reach significant levels with the upcoming sixth generation of mobile networks (6G) …
reach significant levels with the upcoming sixth generation of mobile networks (6G) …
LoRaWAN physical layer-based attacks and countermeasures, a review
As LoRaWAN is one of the most popular long-range wireless protocols among low-power
IoT applications, more and more focus is shifting towards security. In particular, physical …
IoT applications, more and more focus is shifting towards security. In particular, physical …
Hybrid KuFaI: A novel secure key generation algorithm using fast independent component analysis for physical layer security techniques
T Sarsodia, UR Bhatt, R Upadhyay… - Security and …, 2024 - Wiley Online Library
Many real‐world applications, such as smart cities, industrial automation, health care, and
so forth, utilize IoT‐enabled devices as a part of wireless networks. IoT devices must have …
so forth, utilize IoT‐enabled devices as a part of wireless networks. IoT devices must have …
[PDF][PDF] PCA based components selection criteria for computationally efficient Physical Layer Key Generation (PLKG) system
T Sarsodia, UR Bhatt, R Upadhyay… - International Journal of …, 2023 - journals.pan.pl
Data security is one of the prime concerns in wireless networks. PLKG has been emerging
as an attractive alternative to traditional cryptographic techniques. PLKG is more …
as an attractive alternative to traditional cryptographic techniques. PLKG is more …
A Novel Secure Physical Layer Key Generation Method in Connected and Autonomous Vehicles (CAVs)
A novel secure physical layer key generation method for Connected and Autonomous
Vehicles (CAVs) against an attacker is proposed under fading and Additive White Gaussian …
Vehicles (CAVs) against an attacker is proposed under fading and Additive White Gaussian …
RSSignal: um arcabouço para evolução de técnicas de geração de chaves baseadas em RSSI
O crescente número de dispositivos conectados à Internet das coisas e a já conhecida
fragilidade dos meios de comunicação sem fio demandam por soluções de segurança …
fragilidade dos meios de comunicação sem fio demandam por soluções de segurança …
Explorando o RSSI na Geração de Chaves para LoRaWAN
A criptografia é fundamental para a segurança das redes sem fio. No contexto de LoRa para
a Internet das Coisas, a distribuição de chaves simétricas é um desafio. Como alternativa, é …
a Internet das Coisas, a distribuição de chaves simétricas é um desafio. Como alternativa, é …
Attacks Against RSS-Based Symmetric Key Generation in Wireless Networks
AR Nobel - 2023 - search.proquest.com
Abstract Received Signal Strength (RSS) determined from communication between two
wireless devices can be utilized as a tool for generating cryptographic keys, particularly …
wireless devices can be utilized as a tool for generating cryptographic keys, particularly …