Key generation from wireless channels: A review

J Zhang, TQ Duong, A Marshall, R Woods - Ieee access, 2016 - ieeexplore.ieee.org
Key generation from the randomness of wireless channels is a promising alternative to
public key cryptography for the establishment of cryptographic keys between any two users …

A new frontier for IoT security emerging from three decades of key generation relying on wireless channels

J Zhang, G Li, A Marshall, A Hu, L Hanzo - IEEE Access, 2020 - ieeexplore.ieee.org
The Internet of Things (IoT) is a transformative technology, which is revolutionizing our
everyday life by connecting everyone and everything together. The massive number of …

Physical layer security for authentication, confidentiality, and malicious node detection: a paradigm shift in securing IoT networks

E Illi, M Qaraqe, S Althunibat… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
The pervasiveness of commercial Internet of Things (IoT) around the globe is expected to
reach significant levels with the upcoming sixth generation of mobile networks (6G) …

Experimental study on key generation for physical layer security in wireless communications

J Zhang, R Woods, TQ Duong, A Marshall, Y Ding… - IEEE …, 2016 - ieeexplore.ieee.org
This paper presents a thorough experimental study on key generation principles, ie,
temporal variation, channel reciprocity, and spatial decorrelation, through a testbed …

CSI-based versus RSS-based secret-key generation under correlated eavesdropping

F Rottenberg, TH Nguyen, JM Dricot… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
Physical-layer security (PLS) has the potential to strongly enhance the overall system
security as an alternative to or in combination with conventional cryptographic primitives …

LoRa-based physical layer key generation for secure V2V/V2I communications

B Han, S Peng, C Wu, X Wang, B Wang - Sensors, 2020 - mdpi.com
In recent years, Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) communication
brings more and more attention from industry (eg, Google and Uber) and government (eg …

Verification of key generation from individual ofdm subcarrier's channel response

J Zhang, R Woods, A Marshall… - 2015 IEEE Globecom …, 2015 - ieeexplore.ieee.org
This paper presents a key generation system derived from the channel response of
individual subcarrier in orthogonal frequency-division multiplexing (OFDM) systems …

Applying beamforming to address temporal correlation in wireless channel characterization-based secret key generation

MG Madiseh, SW Neville… - IEEE Transactions on …, 2012 - ieeexplore.ieee.org
Wireless secret key generation (WKG) methods based on communications channel
characterizations have gained significant interest as a mechanism for providing secure point …

Secret key generation using chaotic signals over frequency selective fading channels

MF Haroun, TA Gulliver - IEEE Transactions on Information …, 2015 - ieeexplore.ieee.org
This paper presents a practical key generation algorithm based on the reciprocity of wireless
fading channels. A broadband chaotic signal is employed for transmission so that the fading …

Secret key extraction from a UWB channel: Analysis in a real environment

F Marino, E Paolini, M Chiani - 2014 IEEE International …, 2014 - ieeexplore.ieee.org
In this paper, experimental results about secret key extraction from the physical parameters
of an ultra-wideband (UWB) channel are presented. In the channel probing phase, the …