CSI-based versus RSS-based secret-key generation under correlated eavesdropping
Physical-layer security (PLS) has the potential to strongly enhance the overall system
security as an alternative to or in combination with conventional cryptographic primitives …
security as an alternative to or in combination with conventional cryptographic primitives …
Secret group-key generation at physical layer for multi-antenna mesh topology
In this paper, we propose a secret group-key generation scheme in physical layer, where an
arbitrary number of multi-antenna LNs (LN) exist in mesh topology with a multi-antenna …
arbitrary number of multi-antenna LNs (LN) exist in mesh topology with a multi-antenna …
The passive eavesdropper affects my channel: Secret-key rates under real-world conditions
Channel-reciprocity based key generation (CRKG) has gained significant importance as it
has recently been proposed as a potential lightweight security solution for IoT devices …
has recently been proposed as a potential lightweight security solution for IoT devices …
Group secret-key generation using algebraic rings in wireless networks
H Jagadeesh, R Joshi, M Rao - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
It is well known that physical-layer Group Secret-Key (GSK) generation techniques allow
multiple nodes of a wireless network to synthesize a common secret-key, which can be …
multiple nodes of a wireless network to synthesize a common secret-key, which can be …
Secret key generation via localization and mobility
We consider secret key generation by a pair of mobile nodes utilizing observations of their
relative locations in the presence of a mobile eavesdropper. In our proposed algorithm, the …
relative locations in the presence of a mobile eavesdropper. In our proposed algorithm, the …
Physical layer key generation scheme through scrambling the correlated eavesdropping channel
Y Chen, K Huang, Y Zhou, K Ma, H Jin, X Xu - IEEE Access, 2020 - ieeexplore.ieee.org
In this paper, we investigate the physical layer key generation scheme in most realistic
scenarios where the correlation between the legitimate channel and the eavesdropping …
scenarios where the correlation between the legitimate channel and the eavesdropping …
Secret-key generation: Full-duplex versus half-duplex probing
H Vogt, ZH Awan, A Sezgin - IEEE transactions on …, 2018 - ieeexplore.ieee.org
A secret-key agreement for in-band full-duplex (FD) technology can be regarded as a
valuable method for establishing security at the physical layer level. In this paper, we study …
valuable method for establishing security at the physical layer level. In this paper, we study …
Secrecy outage probability of DF‐based C‐NOMA under half and full duplex
Abstract Cooperative Non‐orthogonal Multiple Access (C‐NOMA) is projected as the
dominant technology for 5G and beyond. Also, physical layer security, due to the presence …
dominant technology for 5G and beyond. Also, physical layer security, due to the presence …
A two-layer secure quantization algorithm for secret key generation with correlated eavesdropping channel
H Jin, K Huang, S Xiao, Y Lou, X Xu, Y Chen - IEEE Access, 2019 - ieeexplore.ieee.org
When the eavesdropping channel has a certain correlation with the legitimate channel, the
physical layer key is susceptible to eavesdroppers. To ensure the security of the secret key …
physical layer key is susceptible to eavesdroppers. To ensure the security of the secret key …
Secret Key Distillation with Speech Input and Deep Neural Network-Controlled Privacy Amplification
J Radomirović, M Milosavljević, Z Banjac, M Jovanović - Mathematics, 2023 - mdpi.com
We propose a new high-speed secret key distillation system via public discussion based on
the common randomness contained in the speech signal of the protocol participants. The …
the common randomness contained in the speech signal of the protocol participants. The …