Articles with "key generation" as a keyword



Photo from wikipedia

Disordered Mixture of Self-Assembled Molecular Functional Groups on Heterointerfaces with p-Si Leads to Multiple Key Generation in Physical Unclonable Functions.

Sign Up to like & get
recommendations!
Published in 2022 at "ACS applied materials & interfaces"

DOI: 10.1021/acsami.2c18740

Abstract: Physical unclonable function (PUF) security devices based on hardware are becoming an effective strategy to overcome the dependency of the internet cloud and software-based hacking vulnerabilities. On the other hand, existing Si-based artificial security devices… read more here.

Keywords: multiple key; mixture; key generation; self assembled ... See more keywords
Photo by scottwebb from unsplash

A Novel Security Key Generation Method for SRAM PUF Based on Fourier Analysis

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Access"

DOI: 10.1109/access.2018.2868824

Abstract: Most of the current security key generation schemes for static random access memory physical unclonable function (SRAM PUF) are based on a fuzzy extractor. However, it is difficult to deploy the fuzzy extractor in resource-constrained… read more here.

Keywords: sram puf; security key; key generation;
Photo by papaioannou_kostas from unsplash

LORENA: Low memORy symmEtric-key geNerAtion method for based on group cryptography protocol applied to the Internet of Healthcare Things

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3143210

Abstract: The advent of the Internet of Things (IoT) has revolutionized the way we, as a society, perform different daily tasks, such as healthcare. The Internet of Health Things (IoHT) is an example of the IoT… read more here.

Keywords: key generation; group; symmetric key; cryptography ... See more keywords
Photo from wikipedia

Helper Data Masking for Physically Unclonable Function-based Key Generation Algorithms

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3165284

Abstract: Key exchange protocols are a crucial part of the internet-based communication between connected devices in IoT. In this regard, Physically Unclonable Function (PUF) has been an enabler to provide intrinsic highly randomized source for key… read more here.

Keywords: function; unclonable function; physically unclonable; key generation ... See more keywords
Photo by mbrunacr from unsplash

Physical-layer Secret Key Generation in Power Line Communication Networks

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3168842

Abstract: Due to the inherent broadcast nature, power line communication (PLC) is vulnerable to eavesdropping. Traditionally, the secret keys are generated/distributed by pre-shared keys, adaptive tone mapping, or asymmetric encryption algorithm. All of these methods face… read more here.

Keywords: physical layer; power line; power; key generation ... See more keywords
Photo by hudsoncrafted from unsplash

Secret Key Generation With Multiantenna Relays

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Access"

DOI: 10.1109/access.2023.3239299

Abstract: One effective way of generating and distributing secret keys for secure communication is to exploit the randomness of wireless channels. Since a potential eavesdropper has a different propagation channel than two legitimate users, it can… read more here.

Keywords: secret key; multiantenna relays; generation multiantenna; key generation ... See more keywords
Photo from wikipedia

Secret Key Generation Between Ambient Backscatter Devices

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Access"

DOI: 10.1109/access.2023.3243063

Abstract: We analyze secret key generation between ambient backscatter devices where the channel between an ambient transmitter and the backscatter devices is used as a source of randomness. The devices do not need to estimate or… read more here.

Keywords: secret key; key; key generation; backscatter devices ... See more keywords
Photo from wikipedia

Group-Based Cooperation on Symmetric Key Generation for Wireless Body Area Networks

Sign Up to like & get
recommendations!
Published in 2017 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2017.2761700

Abstract: Wireless body area networks (WBANs) require lightweight and resource efficient security approaches. In the literature, biometric-based security approaches have been well studied for WBANs when each individual person may have unique biometric features. However, additional… read more here.

Keywords: body area; wireless body; group; key generation ... See more keywords
Photo from wikipedia

A Physical-Layer Key Generation Approach Based on Received Signal Strength in Smart Homes

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2021.3119053

Abstract: Due to the characteristics of wireless network transmission, smart home devices are vulnerable to malicious attacks. Malicious attackers can not only intercept the transmission data of smart home devices to grasp the user’s personal privacy… read more here.

Keywords: key generation; physical layer; quantization; home devices ... See more keywords
Photo by hudsoncrafted from unsplash

Scalable Secret Key Generation for Wireless Sensor Networks

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Systems Journal"

DOI: 10.1109/jsyst.2022.3198521

Abstract: Future sensor networks require energy and bandwidth efficient designs to support the growing number of nodes. The security aspect is often neglected due to the extra computational burden imposed on the sensor nodes. In this… read more here.

Keywords: secret key; wireless; sensor; key generation ... See more keywords
Photo by alvarordesign from unsplash

Double-Layered Random Coding for Secret Key Generation in Gaussian Wiretap Channels

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Communications Letters"

DOI: 10.1109/lcomm.2019.2961904

Abstract: Most of the existing information-theoretic secure key generation schemes have characterized maximum achievable secrecy rate or secrecy capacity over noiseless public broadcast channels. However, in many practical systems even legitimate nodes have to communicate over… read more here.

Keywords: wiretap channels; generation; gaussian wiretap; secret key ... See more keywords