A new frontier for IoT security emerging from three decades of key generation relying on wireless channels

J Zhang, G Li, A Marshall, A Hu, L Hanzo - IEEE Access, 2020 - ieeexplore.ieee.org
The Internet of Things (IoT) is a transformative technology, which is revolutionizing our
everyday life by connecting everyone and everything together. The massive number of …

[HTML][HTML] Securing wireless communications of the internet of things from the physical layer, an overview

J Zhang, TQ Duong, R Woods, A Marshall - Entropy, 2017 - mdpi.com
The security of the Internet of Things (IoT) is receiving considerable interest as the low
power constraints and complexity features of many IoT devices are limiting the use of …

Physical layer security for the Internet of Things: Authentication and key generation

J Zhang, S Rajendran, Z Sun… - IEEE Wireless …, 2019 - ieeexplore.ieee.org
A low-complexity, yet secure framework is proposed for protecting the IoT and for achieving
both authentication and secure communication. In particular, the slight random difference …

Experimental study on key generation for physical layer security in wireless communications

J Zhang, R Woods, TQ Duong, A Marshall, Y Ding… - IEEE …, 2016 - ieeexplore.ieee.org
This paper presents a thorough experimental study on key generation principles, ie,
temporal variation, channel reciprocity, and spatial decorrelation, through a testbed …

Reconfigurable security: Edge-computing-based framework for IoT

RH Hsu, J Lee, TQS Quek, JC Chen - IEEE Network, 2018 - ieeexplore.ieee.org
In various scenarios, achieving security between IoT devices is challenging since the
devices may have different dedicated communication standards and resource constraints as …

{JEDI}:{Many-to-Many}{End-to-End} encryption and key delegation for {IoT}

S Kumar, Y Hu, MP Andersen, RA Popa… - 28th USENIX security …, 2019 - usenix.org
As the Internet of Things (IoT) emerges over the next decade, developing secure
communication for IoT devices is of paramount importance. Achieving end-to-end encryption …

Reliable and secure data transfer in IoT networks

SP Gochhayat, C Lal, L Sharma, DP Sharma, D Gupta… - Wireless …, 2020 - Springer
With the rapid technological improvements in mobile devices and their inclusion in Internet
of Things (IoT), secure key management becomes mandatory to ensure security of …

Emerging security threats and countermeasures in IoT

ZK Zhang, MCY Cho, S Shieh - Proceedings of the 10th ACM symposium …, 2015 - dl.acm.org
IoT (Internet of Things) diversifies the future Internet, and has drawn much attention. As more
and more gadgets (ie Things) connected to the Internet, the huge amount of data exchanged …

Lightweight collaborative key establishment scheme for the Internet of Things

YB Saied, A Olivereau, D Zeghlache, M Laurent - Computer Networks, 2014 - Elsevier
This work addresses new security issues in the Internet of Things (IoT). The heterogeneous
nature of IoT communications and imbalance in resource capabilities between IoT entities …

SecIoT: a security framework for the Internet of Things

X Huang, P Craig, H Lin, Z Yan - Security and communication …, 2016 - Wiley Online Library
The 5th generation wireless system (5G) will support Internet of Things (IoT) by increasing
the interconnectivity of electronic devices to support a variety of new and promising …