Key generation from wireless channels: A review

J Zhang, TQ Duong, A Marshall, R Woods - Ieee access, 2016 - ieeexplore.ieee.org
Key generation from the randomness of wireless channels is a promising alternative to
public key cryptography for the establishment of cryptographic keys between any two users …

Detecting node replication attacks in wireless sensor networks: a survey

WT Zhu, J Zhou, RH Deng, F Bao - Journal of Network and Computer …, 2012 - Elsevier
A wireless sensor network (WSN) consists of a number of tiny, low-cost, and resource-
constrained sensor nodes, but is often deployed in unattended and harsh environments to …

Physical-layer security in 6G networks

L Mucchi, S Jayousi, S Caputo… - IEEE Open Journal …, 2021 - ieeexplore.ieee.org
The sixth generation (6G) of mobile network will be composed by different nodes, from
macro-devices (satellite) to nano-devices (sensors inside the human body), providing a full …

User-centric view of unmanned aerial vehicle transmission against smart attacks

L Xiao, C Xie, M Min, W Zhuang - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Unmanned aerial vehicle (UAV) systems are vulnerable to smart attackers, who are selfish
and subjective end-users and use smart radio devices to change their attack types and …

Physical layer authentication for mobile systems with time-varying carrier frequency offsets

W Hou, X Wang, JY Chouinard… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
A novel physical layer authentication scheme is proposed in this paper by exploiting the time-
varying carrier frequency offset (CFO) associated with each pair of wireless communications …

Enhancing information security via physical layer approaches in heterogeneous IoT with multiple access mobile edge computing in smart city

D Wang, B Bai, K Lei, W Zhao, Y Yang, Z Han - IEEE Access, 2019 - ieeexplore.ieee.org
Heterogeneous Internet of Things (IoT) and multi-access mobile edge computing (MA-MEC)
are believed as supporting technologies for building a smart city. The advancement and …

On secure wireless communications for IoT under eavesdropper collusion

Y Zhang, Y Shen, H Wang, J Yong… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Wireless communication is one of the key technologies that actualize the Internet of Things
(IoT) concept into the real world. Understanding the security performance of wireless …

Physical layer authentication enhancement using two-dimensional channel quantization

J Liu, X Wang - IEEE Transactions on Wireless …, 2016 - ieeexplore.ieee.org
A novel physical layer authentication enhancement scheme is proposed in this paper by
integrating multipath delay characteristics of wireless channels into the channel impulse …

Broadcasting into the uncertainty: Authentication and confidentiality by physical-layer processing

E Jorswieck, S Tomasin, A Sezgin - Proceedings of the IEEE, 2015 - ieeexplore.ieee.org
The wireless medium offers many opportunities for broadcast communications. However, it
also opens the possibility for attackers to eavesdrop the broadcast data or to pretend to be …

RF fingerprint extraction from the energy envelope of an instantaneous transient signal

SU Rehman, K Sowerby… - 2012 Australian …, 2012 - ieeexplore.ieee.org
RF fingerprinting is a technique, where a transmitter is identified from its electromagnetic
emission. Most existing RF fingerprinting techniques require high sampling rates. This paper …