Physical layer security-from theory to practice
In this article we present the evolutionary journey of physical layer security (PLS), starting
from its theoretical foundations in wiretap coding and secret key generation followed by to …
from its theoretical foundations in wiretap coding and secret key generation followed by to …
How physicality enables trust: A new era of trust-centered cyberphysical systems
Multi-agent cyberphysical systems enable new capabilities in efficiency, resilience, and
security. The unique characteristics of these systems prompt a reevaluation of their security …
security. The unique characteristics of these systems prompt a reevaluation of their security …
A physical layer, zero-round-trip-time, multifactor authentication protocol
Lightweight physical layer security schemes that have recently attracted a lot of attention
include physical unclonable functions (PUFs), RF fingerprinting/proximity based …
include physical unclonable functions (PUFs), RF fingerprinting/proximity based …
Smart Channel State Information Pre-Processing for Authentication and Symmetric Key Distillation
M Srinivasan, S Skaperas, M Mitev… - … Machine Learning in …, 2023 - ieeexplore.ieee.org
While the literature on channel state information (CSI)-based authentication and key
distillation is vast, the two topics have customarily been studied separately. This paper …
distillation is vast, the two topics have customarily been studied separately. This paper …
Machine Learning-based Robust Physical Layer Authentication Using Angle of Arrival Estimation
TM Pham, L Senigagliesi, M Baldi… - … 2023-2023 IEEE …, 2023 - ieeexplore.ieee.org
In this paper, we study the use of the angle of arrival (AoA) as a feature for performing
robust, machine learning (ML)-based physical layer authentication (PLA). In fact, whereas …
robust, machine learning (ML)-based physical layer authentication (PLA). In fact, whereas …
Physical Layer Secret Key Generation with Kalman Filter Detrending
M Mitev, A Chorti, G Fettweis - GLOBECOM 2023-2023 IEEE …, 2023 - ieeexplore.ieee.org
The massive deployment of low-end wireless Internet of things (IoT) devices opens the
challenge of finding de-centralized and lightweight alternatives for secret key distribution. A …
challenge of finding de-centralized and lightweight alternatives for secret key distribution. A …
Integration of Device Fingerprint Authentication and Physical-Layer Secret Key Generation
Z Chai, L Zhang, X Huang, M Li… - IEEE Signal Processing …, 2023 - ieeexplore.ieee.org
An integrated physical-layer security scheme is proposed, which combines dynamic
physical-layer secret key generation (SKG) and static device fingerprint authentication (DFA) …
physical-layer secret key generation (SKG) and static device fingerprint authentication (DFA) …
Smart channel state information pre-processing for joint authentication and symmetric key distillation
While the literature on RF fingerprinting-based authentication and key distillation is vast, the
two topics have customarily been studied separately. In this paper, starting from the …
two topics have customarily been studied separately. In this paper, starting from the …
Smart Channel State Information Pre-processing for Joint Authentication and Secret Key Distillation
While the literature on RF fingerprinting-based authentication and key distillation is vast, the
two topics have customarily been studied separately. In this paper, starting from the …
two topics have customarily been studied separately. In this paper, starting from the …
THE EFFECTIVENESS OF HANDWRITING INTERVENTION ON HANDWRITING AND SPELLING OUTCOMES DELIVERED VIA TELEHEALTH
L Bray - uknowledge.uky.edu
Abstract Across the United States, there has been a push to improve the literacy of our
population, especially in the school systems. This has resulted in emphasizing reading skill …
population, especially in the school systems. This has resulted in emphasizing reading skill …