Secure Authentication scheme using CEEK technique for Trusted Environment

K Sudharson, M Akshaya, M Lokeswari… - 2022 International …, 2022 - ieeexplore.ieee.org
Distributed computing is imperative to move the IT area forward, yet cloud information
security is essential. Unfortunately, the veracity of cloud information is at serious risk …

A channel frequency response-based secret key generation scheme in in-band full-duplex MIMO-OFDM systems

H Luo, N Garg, T Ratnarajah - IEEE Journal on Selected Areas …, 2023 - ieeexplore.ieee.org
Physical layer-based secret key generation (PHY-SKG) schemes have attracted significant
attention in recent years due to their lightweight implementation and ability to achieve …

Securing NextG networks with physical-layer key generation: A survey

Q Xiao, J Zhao, S Feng, G Li, A Hu - Security and Safety, 2024 - sands.edpsciences.org
As the development of next-generation (NextG) communication networks continues,
tremendous devices are accessing the network and the amount of information is exploding …

A lightweight hierarchical key management approach for internet of things

Z Najafi, S Babaie - Journal of Information Security and Applications, 2023 - Elsevier
Abstract Internet of Things (IoT) as an emerging technology connects a wide range of
various elements that have a unique identifier to create an intelligent computing system …

Channel Prediction-Based Security Authentication for Artificial Intelligence of Things

X Qiu, J Yu, W Zhuang, G Li, X Sun - Sensors, 2023 - mdpi.com
The emerging physical-layer unclonable attribute-aided authentication (PLUA) schemes are
capable of outperforming traditional isolated approaches, with the advantage of having …

A secure data transmission framework for IoT enabled healthcare

S Saif, P Das, S Biswas, S Khan, MA Haq, V Kovtun - Heliyon, 2024 - cell.com
Abstract The Internet of Medical Things (IoMT) has transformed healthcare by connecting
medical devices, sensors, and patients, significantly improving patient care. However, the …

In-Band Full-Duplex Radios in 6G Networks: Implementation and Applications

H Luo, A Bishnu, T Ratnarajah - Foundations and Trends® in …, 2023 - nowpublishers.com
Abstract Sixth-generation (6G) wireless communication networks will transform connected
things in 5G into connected intelligence. The networks can have human-like cognition …

A Secure Transmission Scheme With Efficient and Lightweight Group Key Generation for Underwater Acoustic Sensor Networks

P Pan, Y Su, G Pan, C Yuan… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
Physical-layer-based key generation is a promising technique for enhancing the security of
underwater acoustic sensor networks (UASNs) and has been widely studied in point-to-point …

Generalization of multicast encryption for Internet of Things deployment

P Sharma, BR Purushothama - Journal of Information Security and …, 2023 - Elsevier
The problem of multicast encryption has been a focus of attention in the Internet of Things
environment for the last decade, in which one central server generates and securely …

Secure and Controllable Secret Key Generation Through CSI Obfuscation Matrix Encapsulation

Y Du, H Liu, Z Shao, Y Ren, S Li… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Physical-layer key generation has emerged as a promising avenue for establishing secret
keys using reciprocal channel measurements between wireless devices. However, channel …