Secure Authentication scheme using CEEK technique for Trusted Environment
K Sudharson, M Akshaya, M Lokeswari… - 2022 International …, 2022 - ieeexplore.ieee.org
Distributed computing is imperative to move the IT area forward, yet cloud information
security is essential. Unfortunately, the veracity of cloud information is at serious risk …
security is essential. Unfortunately, the veracity of cloud information is at serious risk …
A channel frequency response-based secret key generation scheme in in-band full-duplex MIMO-OFDM systems
Physical layer-based secret key generation (PHY-SKG) schemes have attracted significant
attention in recent years due to their lightweight implementation and ability to achieve …
attention in recent years due to their lightweight implementation and ability to achieve …
Securing NextG networks with physical-layer key generation: A survey
Q Xiao, J Zhao, S Feng, G Li, A Hu - Security and Safety, 2024 - sands.edpsciences.org
As the development of next-generation (NextG) communication networks continues,
tremendous devices are accessing the network and the amount of information is exploding …
tremendous devices are accessing the network and the amount of information is exploding …
A lightweight hierarchical key management approach for internet of things
Z Najafi, S Babaie - Journal of Information Security and Applications, 2023 - Elsevier
Abstract Internet of Things (IoT) as an emerging technology connects a wide range of
various elements that have a unique identifier to create an intelligent computing system …
various elements that have a unique identifier to create an intelligent computing system …
Channel Prediction-Based Security Authentication for Artificial Intelligence of Things
X Qiu, J Yu, W Zhuang, G Li, X Sun - Sensors, 2023 - mdpi.com
The emerging physical-layer unclonable attribute-aided authentication (PLUA) schemes are
capable of outperforming traditional isolated approaches, with the advantage of having …
capable of outperforming traditional isolated approaches, with the advantage of having …
A secure data transmission framework for IoT enabled healthcare
Abstract The Internet of Medical Things (IoMT) has transformed healthcare by connecting
medical devices, sensors, and patients, significantly improving patient care. However, the …
medical devices, sensors, and patients, significantly improving patient care. However, the …
In-Band Full-Duplex Radios in 6G Networks: Implementation and Applications
Abstract Sixth-generation (6G) wireless communication networks will transform connected
things in 5G into connected intelligence. The networks can have human-like cognition …
things in 5G into connected intelligence. The networks can have human-like cognition …
A Secure Transmission Scheme With Efficient and Lightweight Group Key Generation for Underwater Acoustic Sensor Networks
P Pan, Y Su, G Pan, C Yuan… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
Physical-layer-based key generation is a promising technique for enhancing the security of
underwater acoustic sensor networks (UASNs) and has been widely studied in point-to-point …
underwater acoustic sensor networks (UASNs) and has been widely studied in point-to-point …
Generalization of multicast encryption for Internet of Things deployment
P Sharma, BR Purushothama - Journal of Information Security and …, 2023 - Elsevier
The problem of multicast encryption has been a focus of attention in the Internet of Things
environment for the last decade, in which one central server generates and securely …
environment for the last decade, in which one central server generates and securely …
Secure and Controllable Secret Key Generation Through CSI Obfuscation Matrix Encapsulation
Physical-layer key generation has emerged as a promising avenue for establishing secret
keys using reciprocal channel measurements between wireless devices. However, channel …
keys using reciprocal channel measurements between wireless devices. However, channel …