Articles with "key generation" as a keyword



Disordered Mixture of Self-Assembled Molecular Functional Groups on Heterointerfaces with p-Si Leads to Multiple Key Generation in Physical Unclonable Functions.

Sign Up to like & get
recommendations!
Published in 2022 at "ACS applied materials & interfaces"

DOI: 10.1021/acsami.2c18740

Abstract: Physical unclonable function (PUF) security devices based on hardware are becoming an effective strategy to overcome the dependency of the internet cloud and software-based hacking vulnerabilities. On the other hand, existing Si-based artificial security devices… read more here.

Keywords: multiple key; mixture; key generation; self assembled ... See more keywords

A Novel Security Key Generation Method for SRAM PUF Based on Fourier Analysis

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Access"

DOI: 10.1109/access.2018.2868824

Abstract: Most of the current security key generation schemes for static random access memory physical unclonable function (SRAM PUF) are based on a fuzzy extractor. However, it is difficult to deploy the fuzzy extractor in resource-constrained… read more here.

Keywords: sram puf; security key; key generation;

LORENA: Low memORy symmEtric-key geNerAtion method for based on group cryptography protocol applied to the Internet of Healthcare Things

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3143210

Abstract: The advent of the Internet of Things (IoT) has revolutionized the way we, as a society, perform different daily tasks, such as healthcare. The Internet of Health Things (IoHT) is an example of the IoT… read more here.

Keywords: key generation; group; symmetric key; cryptography ... See more keywords

Helper Data Masking for Physically Unclonable Function-based Key Generation Algorithms

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3165284

Abstract: Key exchange protocols are a crucial part of the internet-based communication between connected devices in IoT. In this regard, Physically Unclonable Function (PUF) has been an enabler to provide intrinsic highly randomized source for key… read more here.

Keywords: function; unclonable function; physically unclonable; key generation ... See more keywords

Physical-layer Secret Key Generation in Power Line Communication Networks

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3168842

Abstract: Due to the inherent broadcast nature, power line communication (PLC) is vulnerable to eavesdropping. Traditionally, the secret keys are generated/distributed by pre-shared keys, adaptive tone mapping, or asymmetric encryption algorithm. All of these methods face… read more here.

Keywords: physical layer; power line; power; key generation ... See more keywords

Secret Key Generation With Multiantenna Relays

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Access"

DOI: 10.1109/access.2023.3239299

Abstract: One effective way of generating and distributing secret keys for secure communication is to exploit the randomness of wireless channels. Since a potential eavesdropper has a different propagation channel than two legitimate users, it can… read more here.

Keywords: secret key; multiantenna relays; generation multiantenna; key generation ... See more keywords

Secret Key Generation Between Ambient Backscatter Devices

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Access"

DOI: 10.1109/access.2023.3243063

Abstract: We analyze secret key generation between ambient backscatter devices where the channel between an ambient transmitter and the backscatter devices is used as a source of randomness. The devices do not need to estimate or… read more here.

Keywords: secret key; key; key generation; backscatter devices ... See more keywords

A Lightweight Image Encryption Algorithm Based on Secure Key Generation

Sign Up to like & get
recommendations!
Published in 2024 at "IEEE Access"

DOI: 10.1109/access.2024.3414334

Abstract: Data confidentiality and security are important issues due to the sensitivity of the data and its relationship with users’ privacy. Sensitive data includes images and texts that can be transmitted over the Internet, Internet of… read more here.

Keywords: advanced encryption; function; key generation; encryption ... See more keywords

Secret Key Generation Driven by Attention-Based Convolutional Autoencoder and Quantile Quantization for IoT Security in 5G and Beyond

Sign Up to like & get
recommendations!
Published in 2025 at "IEEE Access"

DOI: 10.1109/access.2025.3590926

Abstract: Physical-layer secret key generation (PSKG) has emerged as a promising technique for enhancing wireless security in Internet of Things (IoT) networks by exploiting the reciprocity of uplink and downlink channels. However, in time-division duplex (TDD)… read more here.

Keywords: autoencoder; generation; secret key; key generation ... See more keywords

Group-Based Cooperation on Symmetric Key Generation for Wireless Body Area Networks

Sign Up to like & get
recommendations!
Published in 2017 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2017.2761700

Abstract: Wireless body area networks (WBANs) require lightweight and resource efficient security approaches. In the literature, biometric-based security approaches have been well studied for WBANs when each individual person may have unique biometric features. However, additional… read more here.

Keywords: body area; wireless body; group; key generation ... See more keywords

A Physical-Layer Key Generation Approach Based on Received Signal Strength in Smart Homes

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2021.3119053

Abstract: Due to the characteristics of wireless network transmission, smart home devices are vulnerable to malicious attacks. Malicious attackers can not only intercept the transmission data of smart home devices to grasp the user’s personal privacy… read more here.

Keywords: key generation; physical layer; quantization; home devices ... See more keywords