Key generation from wireless channels: A review

J Zhang, TQ Duong, A Marshall, R Woods - Ieee access, 2016 - ieeexplore.ieee.org
Key generation from the randomness of wireless channels is a promising alternative to
public key cryptography for the establishment of cryptographic keys between any two users …

A new frontier for IoT security emerging from three decades of key generation relying on wireless channels

J Zhang, G Li, A Marshall, A Hu, L Hanzo - IEEE Access, 2020 - ieeexplore.ieee.org
The Internet of Things (IoT) is a transformative technology, which is revolutionizing our
everyday life by connecting everyone and everything together. The massive number of …

Physical layer security for authentication, confidentiality, and malicious node detection: a paradigm shift in securing IoT networks

E Illi, M Qaraqe, S Althunibat… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
The pervasiveness of commercial Internet of Things (IoT) around the globe is expected to
reach significant levels with the upcoming sixth generation of mobile networks (6G) …

On maximizing the sum secret key rate for reconfigurable intelligent surface-assisted multiuser systems

G Li, C Sun, W Xu, M Di Renzo… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Channel reciprocity-based key generation (CRKG) has recently emerged as a new
technique to address the problem of key distribution in wireless networks. However, as this …

Physical layer key generation in 5G and beyond wireless communications: Challenges and opportunities

G Li, C Sun, J Zhang, E Jorswieck, B Xiao, A Hu - Entropy, 2019 - mdpi.com
The fifth generation (5G) and beyond wireless communications will transform many exciting
applications and trigger massive data connections with private, confidential, and sensitive …

Encrypting wireless communications on the fly using one-time pad and key generation

G Li, Z Zhang, J Zhang, A Hu - IEEE Internet of Things Journal, 2020 - ieeexplore.ieee.org
The one-time pad (OTP) secure transmission relies on the random keys to achieve perfect
secrecy, while the unpredictable wireless channel is shown to be a good random source …

Experimental study on key generation for physical layer security in wireless communications

J Zhang, R Woods, TQ Duong, A Marshall, Y Ding… - IEEE …, 2016 - ieeexplore.ieee.org
This paper presents a thorough experimental study on key generation principles, ie,
temporal variation, channel reciprocity, and spatial decorrelation, through a testbed …

CSI-based versus RSS-based secret-key generation under correlated eavesdropping

F Rottenberg, TH Nguyen, JM Dricot… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
Physical-layer security (PLS) has the potential to strongly enhance the overall system
security as an alternative to or in combination with conventional cryptographic primitives …

Security enhancement on a lightweight authentication scheme with anonymity fog computing architecture

L Wang, H An, Z Chang - IEEE Access, 2020 - ieeexplore.ieee.org
The multi-level, heterogeneous and third-party attributes of fog computing (FC) have caused
great concern in the communication security of next-generation IoT systems. This paper …

A simple secret key generation by using a combination of pre-processing method with a multilevel quantization

M Yuliana, Wirawan, Suwadi - Entropy, 2019 - mdpi.com
Limitations of the computational and energy capabilities of IoT devices provide new
challenges in securing communication between devices. Physical layer security (PHYSEC) …