2019
DOI: 10.1007/s11036-019-01219-5
|View full text |Cite|
|
Sign up to set email alerts
|

A Physical-Layer Key Distribution Mechanism for IoT Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
19
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
8

Relationship

2
6

Authors

Journals

citations
Cited by 18 publications
(24 citation statements)
references
References 24 publications
0
19
0
Order By: Relevance
“…For instance, a key generation protocol from multipath features of the wireless channel is presented in [16,17]. While the RSS-based key generation protocol is presented in [14,[18][19][20][21][22], the works in [12,[23][24][25][26][27] consider the phase randomness to generate a secret key. In particular, the work in [18] proposes a key distribution scheme exploiting the magnitude of the estimated channel.…”
Section: Related Workmentioning
confidence: 99%
“…For instance, a key generation protocol from multipath features of the wireless channel is presented in [16,17]. While the RSS-based key generation protocol is presented in [14,[18][19][20][21][22], the works in [12,[23][24][25][26][27] consider the phase randomness to generate a secret key. In particular, the work in [18] proposes a key distribution scheme exploiting the magnitude of the estimated channel.…”
Section: Related Workmentioning
confidence: 99%
“…In fact, these scenarios where a single user needs to establish keys with multiple users are quite common, e.g., roadside units (RSUs) with vehicles [25]. Alhasanat et al [26] proposed a novel physical layer key distribution mechanism for IoT networks. Each node could decode the broadcast signal of the central signal through independent signal modulation type and order.…”
Section: Related Workmentioning
confidence: 99%
“…In this paper, we discuss the secrecy capacity region and the corresponding optimal strategy in special scenarios. Furthermore, we introduce some practical transmission strategies that provide reasonable secrecy performances with a low computational complexity in general scenarios, where the 1 The achievable secrecy rate region is defined as a set of secrecy rate tuples (R s,1 , R s,2 , âĂę, R s,K ) that can be achieved by a certain coding scheme, and the secrecy capacity region is defined as a union of the secrecy rate regions for any coding schemes [10]. secrecy capacity region has not been derived.…”
Section: Two-user Bc With Confidential Messagesmentioning
confidence: 99%
“…In order to prevent the eavesdropping, the transmitter is required to take account of information leakage to the The associate editor coordinating the review of this manuscript and approving it for publication was Mostafa Zaman Chowdhury . eavesdroppers in message transmissions [1]. In point-topoint communications, there has been extensive work on the secure wireless communications in the information theoretic approach.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation