Physical layer security for authentication, confidentiality, and malicious node detection: a paradigm shift in securing IoT networks

E Illi, M Qaraqe, S Althunibat… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
The pervasiveness of commercial Internet of Things (IoT) around the globe is expected to
reach significant levels with the upcoming sixth generation of mobile networks (6G) …

LoRaWAN physical layer-based attacks and countermeasures, a review

H Ruotsalainen, G Shen, J Zhang, R Fujdiak - Sensors, 2022 - mdpi.com
As LoRaWAN is one of the most popular long-range wireless protocols among low-power
IoT applications, more and more focus is shifting towards security. In particular, physical …

Hybrid KuFaI: A novel secure key generation algorithm using fast independent component analysis for physical layer security techniques

T Sarsodia, UR Bhatt, R Upadhyay… - Security and …, 2024 - Wiley Online Library
Many real‐world applications, such as smart cities, industrial automation, health care, and
so forth, utilize IoT‐enabled devices as a part of wireless networks. IoT devices must have …

[PDF][PDF] PCA based components selection criteria for computationally efficient Physical Layer Key Generation (PLKG) system

T Sarsodia, UR Bhatt, R Upadhyay… - International Journal of …, 2023 - journals.pan.pl
Data security is one of the prime concerns in wireless networks. PLKG has been emerging
as an attractive alternative to traditional cryptographic techniques. PLKG is more …

A Novel Secure Physical Layer Key Generation Method in Connected and Autonomous Vehicles (CAVs)

MS Alam, SM Hossain, J Oluoch… - 2022 IEEE Conference …, 2022 - ieeexplore.ieee.org
A novel secure physical layer key generation method for Connected and Autonomous
Vehicles (CAVs) against an attacker is proposed under fading and Additive White Gaussian …

RSSignal: um arcabouço para evolução de técnicas de geração de chaves baseadas em RSSI

LA de Oliveira, LJ Chaves, EF Silva - Anais do XXII Simpósio …, 2022 - sol.sbc.org.br
O crescente número de dispositivos conectados à Internet das coisas e a já conhecida
fragilidade dos meios de comunicação sem fio demandam por soluções de segurança …

Explorando o RSSI na Geração de Chaves para LoRaWAN

LA de Oliveira, LJ Chaves, EF Silva - Anais do XXIII Simpósio …, 2023 - sol.sbc.org.br
A criptografia é fundamental para a segurança das redes sem fio. No contexto de LoRa para
a Internet das Coisas, a distribuição de chaves simétricas é um desafio. Como alternativa, é …

Attacks Against RSS-Based Symmetric Key Generation in Wireless Networks

AR Nobel - 2023 - search.proquest.com
Abstract Received Signal Strength (RSS) determined from communication between two
wireless devices can be utilized as a tool for generating cryptographic keys, particularly …