Advances on security threats and countermeasures for cognitive radio networks: A survey

RK Sharma, DB Rawat - IEEE Communications Surveys & …, 2014 - ieeexplore.ieee.org
Cognitive radio (CR) is regarded as an emerging technology, which equips wireless devices
with the capability to adapt their operating parameters on the fly based on the radio …

CSI-based versus RSS-based secret-key generation under correlated eavesdropping

F Rottenberg, TH Nguyen, JM Dricot… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
Physical-layer security (PLS) has the potential to strongly enhance the overall system
security as an alternative to or in combination with conventional cryptographic primitives …

Adaptive wireless channel probing for shared key generation based on PID controller

Y Wei, K Zeng, P Mohapatra - IEEE Transactions on Mobile …, 2012 - ieeexplore.ieee.org
Generating a shared key between two parties from the wireless channel is an increasingly
interesting topic. The process of obtaining information from the wireless channel is called …

Code constructions for physical unclonable functions and biometric secrecy systems

O Günlü, O İşcan, V Sidorenko… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
The two-terminal key agreement problem with biometric or physical identifiers is considered.
Two linear code constructions based on Wyner-Ziv coding are developed. The first …

Privacy, secrecy, and storage with multiple noisy measurements of identifiers

O Günlü, G Kramer - IEEE Transactions on Information …, 2018 - ieeexplore.ieee.org
The key-leakage-storage region is derived for a generalization of a classic two-terminal key
agreement model. The additions to the model are that the encoder observes a hidden, or …

Key agreement with physical unclonable functions and biometric identifiers

O Gunlu - Cryptology ePrint Archive, 2021 - eprint.iacr.org
This thesis addresses security and privacy problems for digital devices and biometrics,
where a secret key is generated for authentication, identification, or secure computations. A …

On the security of key extraction from measuring physical quantities

M Edman, A Kiayias, Q Tang… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Key extraction via measuring a physical quantity is a class of information theoretic key
exchange protocols that rely on the physical characteristics of the communication channel …

The role of feedback in two-way secure communications

X He, A Yener - IEEE Transactions on Information Theory, 2013 - ieeexplore.ieee.org
Most practical communication links are bidirectional. In these models, since the source node
also receives signals, its encoder has the option of computing its output based on the …

Wiretap channels with random states non-causally available at the encoder

Z Goldfeld, P Cuff, HH Permuter - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
We study the state-dependent (SD) wiretap channel (WTC) with non-causal channel state
information (CSI) at the encoder. This model subsumes all instances of CSI availability as …

Secret-key agreement over non-coherent block-fading channels with public discussion

A Khisti - IEEE Transactions on Information Theory, 2016 - ieeexplore.ieee.org
Motivated by recent interest in physical-layer secret-key generation over wireless fading
channels, we study the non-coherent secret-key generation capacity of a block-fading …