Secret key generation based on estimated channel state information for TDD-OFDM systems over fading channels

Y Peng, P Wang, W Xiang, Y Li - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
One of the fundamental problems in cryptography is the generation of a common secret key
between two legitimate parties to prevent eavesdropping. In this paper, we propose an …

Securing NextG networks with physical-layer key generation: A survey

Q Xiao, J Zhao, S Feng, G Li, A Hu - Security and Safety, 2024 - sands.edpsciences.org
As the development of next-generation (NextG) communication networks continues,
tremendous devices are accessing the network and the amount of information is exploding …

Stochastic Geometry-Based Physical-Layer Security Performance Analysis of a Hybrid NOMA-PDM-Based IoT System

H Chamkhia, A Erbad, A Mohamed… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
With the development of low-cost computer chips and wireless networks, any object or thing
can become a component of the Internet of Things (IoT). As a result, these disparate things …

Joint random subcarrier selection and channel-based artificial signal design aided PLS

S Naderi, DB da Costa, H Arslan - IEEE Wireless …, 2020 - ieeexplore.ieee.org
A novel method for providing physical layer security (PLS) depending on the randomness of
wireless channel is proposed. Specifically, a channel-based joint random subcarrier …

PLS performance analysis of a hybrid NOMA-OMA based IoT system with mobile sensors

H Chamkhia, A Erbad, A Al-Ali… - 2022 IEEE Wireless …, 2022 - ieeexplore.ieee.org
With the advent of Internet of Things (IoT) systems, privacy and integrity of messages are
becoming critical issues and are threatened, especially with mobile sensors. The broadcast …

Exploiting Spatial Correlations: Group Key Generation for Secure IoT Device Networks

M Omar, A Badawy, K Abualsaud… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
Generating lightweight and efficient group secret keys (GSKs) by leveraging the inherent
physical characteristics of the wireless communication channels for Internet of Things (IoT) …

Security performance analysis of a health system using hybrid NOMA-OMA based IoT system

H Chamkhia, A Erbad, A Al-Ali… - 2021 IEEE …, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) systems have been playing a significant role in improving the quality
of various applications and services. With the expansion increase of loT devices and users …

Secret key generation from wireless channels

M Sandell - 2024 - IET
Wireless communication networks are rapidly expanding, especially in the Internet of Things
(IoT) and machine-to-machine (MTM) applications. Although this offers flexibility, mobility …

Performance Analysis of PLS key generation-based Secure NOMA-enabled IoT Networks in the presence of Untrusted Users

H Chamkhia, A Al-Ali, A Mohamed… - 2021 IEEE 7th World …, 2021 - ieeexplore.ieee.org
In Internet of Things (IoT), a massive amount of sensitive data is generated and transmitted
by IoT devices. Security risks represent a major concern in IoT, especially when using …

[PDF][PDF] Practical Secrecy at the Physical Layer: Key Extraction Methods with Applications in Cognitive Radio.

A Badawy - 2017 - core.ac.uk
The broadcast nature of wireless communication imposes the risk of information leakage to
adversarial or unauthorized receivers. Therefore, information security between intended …