Challenge-response physical layer authentication over partially controllable channels

S Tomasin, H Zhang, A Chorti… - IEEE Communications …, 2022 - ieeexplore.ieee.org
Challenge-response is a security mechanism well known for authentication using
encryption. In this article, we propose new challenge-response mechanisms in the context of …

Lightweight and anonymous mutual authentication protocol for edge IoT nodes with physical unclonable function

H Wang, J Meng, X Du, T Cao… - Security and …, 2022 - Wiley Online Library
Internet of Things (IoT) has been widely used in many fields, bringing great convenience to
people's traditional work and life. IoT generates tremendous amounts of data at the edge of …

Joint localization-based node authentication and secret key generation

M Srinivasan, S Skaperas, MS Herfeh… - ICC 2022-IEEE …, 2022 - ieeexplore.ieee.org
In this paper, we devise preprocessing schemes to disentangle channel state information
(CSI) into predictable and unpredictable components to simultaneously provide two …

From the cloud to the edge towards a distributed and light weight secure big data pipelines for iot applications

FM Awaysheh - Trust, security and privacy for big data, 2022 - taylorfrancis.com
Part of the broader development of Internet-of-Things (IoT) architecture for intelligent
environments is the developing of sophisticated Edge communications that support the …

[PDF][PDF] Lightweight and anonymous mutual authentication protocol for iot devices with physical unclonable functions

J Meng, X Zhang, T Cao, Y Xie - Secur Commun Netw, 2021 - pdfs.semanticscholar.org
The past few years have seen the topic of Internet of Things (IoT) rush into the forefront of
various industries, which is changing people's conventional production methods and …

Survey on Hardware-based Physical Layer Authentication in Next Generation Networks

SB Mallikarjun, M Dixit, A Weinand… - … ; 28. ITG-Fachtagung, 2024 - ieeexplore.ieee.org
With the rise of mobile communication, ensuring security in wireless networks is paramount.
Threats like manin-the-middle attacks, data leakage, and jamming pose risks. Authentication …

AI/ML‐Aided Processing for Physical‐Layer Security

M Srinivasan, S Skaperas… - … ‐Layer Security for …, 2024 - Wiley Online Library
This chapter introduces methodologies for preprocessing channel state information (CSI)
data in the context of authentication and secret key generation (SKG) for wireless …

Smart channel state information pre-processing for joint authentication and symmetric key distillation

M Srinivasan, S Skaperas, A Chorti… - Authorea …, 2023 - techrxiv.org
While the literature on RF fingerprinting-based authentication and key distillation is vast, the
two topics have customarily been studied separately. In this paper, starting from the …

Smart Channel State Information Pre-processing for Joint Authentication and Secret Key Distillation

M Srinivasan, S Skaperas, A Chorti, MS Herfeh… - arXiv preprint arXiv …, 2022 - arxiv.org
While the literature on RF fingerprinting-based authentication and key distillation is vast, the
two topics have customarily been studied separately. In this paper, starting from the …