Advances on security threats and countermeasures for cognitive radio networks: A survey
RK Sharma, DB Rawat - IEEE Communications Surveys & …, 2014 - ieeexplore.ieee.org
Cognitive radio (CR) is regarded as an emerging technology, which equips wireless devices
with the capability to adapt their operating parameters on the fly based on the radio …
with the capability to adapt their operating parameters on the fly based on the radio …
CSI-based versus RSS-based secret-key generation under correlated eavesdropping
Physical-layer security (PLS) has the potential to strongly enhance the overall system
security as an alternative to or in combination with conventional cryptographic primitives …
security as an alternative to or in combination with conventional cryptographic primitives …
Adaptive wireless channel probing for shared key generation based on PID controller
Y Wei, K Zeng, P Mohapatra - IEEE Transactions on Mobile …, 2012 - ieeexplore.ieee.org
Generating a shared key between two parties from the wireless channel is an increasingly
interesting topic. The process of obtaining information from the wireless channel is called …
interesting topic. The process of obtaining information from the wireless channel is called …
Code constructions for physical unclonable functions and biometric secrecy systems
The two-terminal key agreement problem with biometric or physical identifiers is considered.
Two linear code constructions based on Wyner-Ziv coding are developed. The first …
Two linear code constructions based on Wyner-Ziv coding are developed. The first …
Privacy, secrecy, and storage with multiple noisy measurements of identifiers
The key-leakage-storage region is derived for a generalization of a classic two-terminal key
agreement model. The additions to the model are that the encoder observes a hidden, or …
agreement model. The additions to the model are that the encoder observes a hidden, or …
Key agreement with physical unclonable functions and biometric identifiers
O Gunlu - Cryptology ePrint Archive, 2021 - eprint.iacr.org
This thesis addresses security and privacy problems for digital devices and biometrics,
where a secret key is generated for authentication, identification, or secure computations. A …
where a secret key is generated for authentication, identification, or secure computations. A …
On the security of key extraction from measuring physical quantities
Key extraction via measuring a physical quantity is a class of information theoretic key
exchange protocols that rely on the physical characteristics of the communication channel …
exchange protocols that rely on the physical characteristics of the communication channel …
The role of feedback in two-way secure communications
X He, A Yener - IEEE Transactions on Information Theory, 2013 - ieeexplore.ieee.org
Most practical communication links are bidirectional. In these models, since the source node
also receives signals, its encoder has the option of computing its output based on the …
also receives signals, its encoder has the option of computing its output based on the …
Wiretap channels with random states non-causally available at the encoder
We study the state-dependent (SD) wiretap channel (WTC) with non-causal channel state
information (CSI) at the encoder. This model subsumes all instances of CSI availability as …
information (CSI) at the encoder. This model subsumes all instances of CSI availability as …
Secret-key agreement over non-coherent block-fading channels with public discussion
A Khisti - IEEE Transactions on Information Theory, 2016 - ieeexplore.ieee.org
Motivated by recent interest in physical-layer secret-key generation over wireless fading
channels, we study the non-coherent secret-key generation capacity of a block-fading …
channels, we study the non-coherent secret-key generation capacity of a block-fading …