Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2022 at "ACS applied materials & interfaces"
DOI: 10.1021/acsami.2c18740
Abstract: Physical unclonable function (PUF) security devices based on hardware are becoming an effective strategy to overcome the dependency of the internet cloud and software-based hacking vulnerabilities. On the other hand, existing Si-based artificial security devices…
read more here.
Keywords:
multiple key;
mixture;
key generation;
self assembled ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2018 at "IEEE Access"
DOI: 10.1109/access.2018.2868824
Abstract: Most of the current security key generation schemes for static random access memory physical unclonable function (SRAM PUF) are based on a fuzzy extractor. However, it is difficult to deploy the fuzzy extractor in resource-constrained…
read more here.
Keywords:
sram puf;
security key;
key generation;
Sign Up to like & get
recommendations!
2
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3143210
Abstract: The advent of the Internet of Things (IoT) has revolutionized the way we, as a society, perform different daily tasks, such as healthcare. The Internet of Health Things (IoHT) is an example of the IoT…
read more here.
Keywords:
key generation;
group;
symmetric key;
cryptography ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3165284
Abstract: Key exchange protocols are a crucial part of the internet-based communication between connected devices in IoT. In this regard, Physically Unclonable Function (PUF) has been an enabler to provide intrinsic highly randomized source for key…
read more here.
Keywords:
function;
unclonable function;
physically unclonable;
key generation ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3168842
Abstract: Due to the inherent broadcast nature, power line communication (PLC) is vulnerable to eavesdropping. Traditionally, the secret keys are generated/distributed by pre-shared keys, adaptive tone mapping, or asymmetric encryption algorithm. All of these methods face…
read more here.
Keywords:
physical layer;
power line;
power;
key generation ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2023 at "IEEE Access"
DOI: 10.1109/access.2023.3239299
Abstract: One effective way of generating and distributing secret keys for secure communication is to exploit the randomness of wireless channels. Since a potential eavesdropper has a different propagation channel than two legitimate users, it can…
read more here.
Keywords:
secret key;
multiantenna relays;
generation multiantenna;
key generation ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
2
Published in 2023 at "IEEE Access"
DOI: 10.1109/access.2023.3243063
Abstract: We analyze secret key generation between ambient backscatter devices where the channel between an ambient transmitter and the backscatter devices is used as a source of randomness. The devices do not need to estimate or…
read more here.
Keywords:
secret key;
key;
key generation;
backscatter devices ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2017 at "IEEE Internet of Things Journal"
DOI: 10.1109/jiot.2017.2761700
Abstract: Wireless body area networks (WBANs) require lightweight and resource efficient security approaches. In the literature, biometric-based security approaches have been well studied for WBANs when each individual person may have unique biometric features. However, additional…
read more here.
Keywords:
body area;
wireless body;
group;
key generation ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
3
Published in 2022 at "IEEE Internet of Things Journal"
DOI: 10.1109/jiot.2021.3119053
Abstract: Due to the characteristics of wireless network transmission, smart home devices are vulnerable to malicious attacks. Malicious attackers can not only intercept the transmission data of smart home devices to grasp the user’s personal privacy…
read more here.
Keywords:
key generation;
physical layer;
quantization;
home devices ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Systems Journal"
DOI: 10.1109/jsyst.2022.3198521
Abstract: Future sensor networks require energy and bandwidth efficient designs to support the growing number of nodes. The security aspect is often neglected due to the extra computational burden imposed on the sensor nodes. In this…
read more here.
Keywords:
secret key;
wireless;
sensor;
key generation ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2020 at "IEEE Communications Letters"
DOI: 10.1109/lcomm.2019.2961904
Abstract: Most of the existing information-theoretic secure key generation schemes have characterized maximum achievable secrecy rate or secrecy capacity over noiseless public broadcast channels. However, in many practical systems even legitimate nodes have to communicate over…
read more here.
Keywords:
wiretap channels;
generation;
gaussian wiretap;
secret key ... See more keywords