“…Therefore, key distribution has always been a challenge in symmetric encryption. Fortunately, physical layer communication is found to be robust when the security performance is considered [9][10][11][12][13]. Physical layer security technique is becoming an alternative approach to prevent attacks in UWNs since it takes the following advantages: (1) less computational power needed; (2) the communication can still be secure in the case where there are eavesdroppers.…”
This paper focuses on high efficiency secret key generation mechanism of physical-layer communication over fading channels in ubiquitous wireless networks. The secret key rate via traditional physical-layer approach could be limited when the wireless propagation channels connecting two sensors change slowly. To generate a high-rate secret key and improve the communication efficiency over quasi-static block fading channels, a novel multi-randomness device-to-device secret key generation strategy and a cooperative communication mechanism aided by relay nodes are proposed. In the proposed schemes, the legitimate members to send random signals rotationally in every coherent time T are set; thus, two legitimate ubiquitous wireless network members, Alice and Bob, can obtain the potential correlated information by exploiting the randomness and the reciprocity of the wireless propagation channels. Considering the reciprocity of wireless channels is variable while the forward channel gain and backward channel gain are correlated in coherent time, a modified secret key generation scheme is proposed via layered coding with theoretical secret key rates derived. The simulation results show that the proposed scheme outperforms traditional approaches with favourable application prospects in ubiquitous wireless communications networks and internet of things. This is an open access article under the terms of the Creative Commons Attribution License, which permits use, distribution and reproduction in any medium, provided the original work is properly cited.
“…Therefore, key distribution has always been a challenge in symmetric encryption. Fortunately, physical layer communication is found to be robust when the security performance is considered [9][10][11][12][13]. Physical layer security technique is becoming an alternative approach to prevent attacks in UWNs since it takes the following advantages: (1) less computational power needed; (2) the communication can still be secure in the case where there are eavesdroppers.…”
This paper focuses on high efficiency secret key generation mechanism of physical-layer communication over fading channels in ubiquitous wireless networks. The secret key rate via traditional physical-layer approach could be limited when the wireless propagation channels connecting two sensors change slowly. To generate a high-rate secret key and improve the communication efficiency over quasi-static block fading channels, a novel multi-randomness device-to-device secret key generation strategy and a cooperative communication mechanism aided by relay nodes are proposed. In the proposed schemes, the legitimate members to send random signals rotationally in every coherent time T are set; thus, two legitimate ubiquitous wireless network members, Alice and Bob, can obtain the potential correlated information by exploiting the randomness and the reciprocity of the wireless propagation channels. Considering the reciprocity of wireless channels is variable while the forward channel gain and backward channel gain are correlated in coherent time, a modified secret key generation scheme is proposed via layered coding with theoretical secret key rates derived. The simulation results show that the proposed scheme outperforms traditional approaches with favourable application prospects in ubiquitous wireless communications networks and internet of things. This is an open access article under the terms of the Creative Commons Attribution License, which permits use, distribution and reproduction in any medium, provided the original work is properly cited.
“…Fourier Transform is first introduced by Jean Baptiste Joseph Fourier [1] to solve the computational complexity in wide varities of fields including earth and science, chemistry, communications, and signal processing [2][3][4][5]. In signal processing, Fourier Transform [6][7][8][9][10][11] has long been established as an instrumental tool applied in electrical signal spectrum and filter analysis, sampling and series, antenna, television image convolution as well as radio broadcasting [1].…”
Fast Fourier Transform has long been established as an essential tool in signal processing. To address the computational issues while helping the analysis work for multi-dimensional signals in image processing, sparse Fast Fourier Transform model is reviewed here when applied in different applications such as lithography optimization, cancer detection, evolutionary arts and wasterwater treatment. As the demand for higher dimensional signals in various applications especially multimedia appplications, the need for sparse Fast Fourier Transform grows higher.
“…Researchers proposed several strategies to calculate the quality of the transmitted data, such as bose-chaudhuri-hocquenghem (BCH), reed solomon (RS), and low-density parity check (LDPC). The challenging part is to identify the suitable strategy in terms of power efficiency for error correction [11,12]. This open research question makes this topic to be the interest of many researchers.…”
Despite the rapid growth in the market demanding for wireless sensor networks (WSNs), they are far from being secured or efficient. WSNs are vulnerable to malicious attacks and utilize too much power. At the same time, there is a significant increment of the security threats due to the growth of the several applications that employ wireless sensor networks. Therefore, introducing physical layer security is considered to be a promising solution to mitigate the threats. This paper evaluates popular coding techniques like Reed solomon (RS) techniques and scrambled error correcting codes specifically in terms of security gap. The difference between the signal to nose ratio (SNR) of the eavesdropper and the legitimate receiver nodes is defined as the security gap. We investigate the security gap, energy efficiency, and bit error rate between RS and scrambled t-error correcting codes for wireless sensor networks. Lastly, energy efficiency in RS and Bose-Chaudhuri-Hocquenghem (BCH) is also studied. The results of the simulation emphasize that RS technique achieves similar security gap as scrambled error correcting codes. However, the analysis concludes that the computational complexities of the RS is less compared to the scrambled error correcting codes. We also found that BCH code is more energy-efficient than RS.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.