CSI-based versus RSS-based secret-key generation under correlated eavesdropping

F Rottenberg, TH Nguyen, JM Dricot… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
Physical-layer security (PLS) has the potential to strongly enhance the overall system
security as an alternative to or in combination with conventional cryptographic primitives …

Secret group-key generation at physical layer for multi-antenna mesh topology

CDT Thai, J Lee, J Prakash… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
In this paper, we propose a secret group-key generation scheme in physical layer, where an
arbitrary number of multi-antenna LNs (LN) exist in mesh topology with a multi-antenna …

The passive eavesdropper affects my channel: Secret-key rates under real-world conditions

C Zenger, H Vogt, J Zimmer, A Sezgin… - 2016 IEEE Globecom …, 2016 - ieeexplore.ieee.org
Channel-reciprocity based key generation (CRKG) has gained significant importance as it
has recently been proposed as a potential lightweight security solution for IoT devices …

Group secret-key generation using algebraic rings in wireless networks

H Jagadeesh, R Joshi, M Rao - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
It is well known that physical-layer Group Secret-Key (GSK) generation techniques allow
multiple nodes of a wireless network to synthesize a common secret-key, which can be …

Secret key generation via localization and mobility

O Gungor, F Chen, CE Koksal - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
We consider secret key generation by a pair of mobile nodes utilizing observations of their
relative locations in the presence of a mobile eavesdropper. In our proposed algorithm, the …

Physical layer key generation scheme through scrambling the correlated eavesdropping channel

Y Chen, K Huang, Y Zhou, K Ma, H Jin, X Xu - IEEE Access, 2020 - ieeexplore.ieee.org
In this paper, we investigate the physical layer key generation scheme in most realistic
scenarios where the correlation between the legitimate channel and the eavesdropping …

Secret-key generation: Full-duplex versus half-duplex probing

H Vogt, ZH Awan, A Sezgin - IEEE transactions on …, 2018 - ieeexplore.ieee.org
A secret-key agreement for in-band full-duplex (FD) technology can be regarded as a
valuable method for establishing security at the physical layer level. In this paper, we study …

Secrecy outage probability of DF‐based C‐NOMA under half and full duplex

S Gadi, SP Singh, A Kumar, RK Singh… - IET …, 2023 - Wiley Online Library
Abstract Cooperative Non‐orthogonal Multiple Access (C‐NOMA) is projected as the
dominant technology for 5G and beyond. Also, physical layer security, due to the presence …

A two-layer secure quantization algorithm for secret key generation with correlated eavesdropping channel

H Jin, K Huang, S Xiao, Y Lou, X Xu, Y Chen - IEEE Access, 2019 - ieeexplore.ieee.org
When the eavesdropping channel has a certain correlation with the legitimate channel, the
physical layer key is susceptible to eavesdroppers. To ensure the security of the secret key …

Secret Key Distillation with Speech Input and Deep Neural Network-Controlled Privacy Amplification

J Radomirović, M Milosavljević, Z Banjac, M Jovanović - Mathematics, 2023 - mdpi.com
We propose a new high-speed secret key distillation system via public discussion based on
the common randomness contained in the speech signal of the protocol participants. The …