M Mitev, TM Pham, A Chorti… - IEEE BITS the …, 2023 - ieeexplore.ieee.org
In this article we present the evolutionary journey of physical layer security (PLS), starting from its theoretical foundations in wiretap coding and secret key generation followed by to …
Lightweight physical layer security schemes that have recently attracted a lot of attention include physical unclonable functions (PUFs), RF fingerprinting/proximity based …
In this paper, we devise preprocessing schemes to disentangle channel state information (CSI) into predictable and unpredictable components to simultaneously provide two …
Multi-agent cyberphysical systems enable new capabilities in efficiency, resilience, and security. The unique characteristics of these systems prompt a reevaluation of their security …
M Srinivasan, S Skaperas, M Mitev… - … Machine Learning in …, 2023 - ieeexplore.ieee.org
While the literature on channel state information (CSI)-based authentication and key distillation is vast, the two topics have customarily been studied separately. This paper …
A Mayya, M Mitev, A Chorti… - GLOBECOM 2023-2023 …, 2023 - ieeexplore.ieee.org
Physical layer security (PLS) is seen as the means to enhance physical layer trustworthiness in 6G. This work provides a proof-of-concept for one of the most mature PLS technologies …
F Yang, X Zuo, B Denby - 2024 International Conference on …, 2024 - ieeexplore.ieee.org
The randomization of WiFi MAC addresses mandated by recent data privacy legislation has created an urgent need for audience estimation techniques that can function without unique …
While the literature on RF fingerprinting-based authentication and key distillation is vast, the two topics have customarily been studied separately. In this paper, starting from the …
R Shahabade, M Zuber - MACHINE LEARNING, 2023 - machineintelligenceresearchs.com
The communication device on the internet of things has limited resources such as bandwidth and memory. The limitation of resources cannot afford the computational cost of classical …