Proceedings of the 20th International Conference on Information Processing in Sensor Networks (Co-Located With CPS-IoT Week 202 2021
DOI: 10.1145/3412382.3458256
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Model-Based Security Scheme for LoRa Key Generation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 13 publications
(1 citation statement)
references
References 37 publications
0
1
0
Order By: Relevance
“…The two main advantages of radio frequency fingerprinting are as follows: (i) it is theoretically secured and hard to imitate, (ii) it is suitable for devices with limited power and computing resources since it does not need extra transmission, but rather uses standard communication signals. Wireless identification is also widely used in localization scenarios [14][15][16][17][18][19][20]. There are two kinds of features that are commonly used as transceiver fingerprints.…”
Section: Radio Frequency Fingerprintingmentioning
confidence: 99%
“…The two main advantages of radio frequency fingerprinting are as follows: (i) it is theoretically secured and hard to imitate, (ii) it is suitable for devices with limited power and computing resources since it does not need extra transmission, but rather uses standard communication signals. Wireless identification is also widely used in localization scenarios [14][15][16][17][18][19][20]. There are two kinds of features that are commonly used as transceiver fingerprints.…”
Section: Radio Frequency Fingerprintingmentioning
confidence: 99%