2021
DOI: 10.1109/jiot.2021.3060438
|View full text |Cite
|
Sign up to set email alerts
|

A Lightweight Key Generation Scheme for the Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 26 publications
(10 citation statements)
references
References 34 publications
0
10
0
Order By: Relevance
“…more than one half-wavelength away from legitimate users will experience uncorrelated fading. This spatial decorrelation assumption guarantees the security of the generated key, which is claimed in most related papers [2]- [6].…”
Section: Introductionmentioning
confidence: 77%
See 2 more Smart Citations
“…more than one half-wavelength away from legitimate users will experience uncorrelated fading. This spatial decorrelation assumption guarantees the security of the generated key, which is claimed in most related papers [2]- [6].…”
Section: Introductionmentioning
confidence: 77%
“…These schemes require key distribution by a secure management center and may become ineffective in the future due to the rapidly growing computational capacity. In contrast, physical layer security (PLS) can achieve information-theoretical security without aid from other users or infrastructures [2]. Thus, it has attracted increasing attention from the security community.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The HRUBE technique, which is used to design systems with a defined constraint on the possibility of bit discrepancy, includes an analysis to quantify the probability of bit disagreement. To increase the reciprocity of channel parameters, Dengke Guo [14] presented a simple key generation approach that includes a moving average filtering (MAF) pre-processing phase prior to quantization. In this study, Kalyani et al [15] employ cryptographicbased ways to improve IoT security authentication.…”
Section: Related Workmentioning
confidence: 99%
“…The extraction of the physical layer channel response is performed by the legitimate receiver. According to the wireless channel model [ 35 , 36 ], the expression of the received signal can be written as where t is the time slot, h denotes the channel impulse response, x is a pilot signal known to the transmitter and receiver for estimating channel information, and n ( t ) is the additive white Gaussian noise with variance . The corresponding frequency-domain representation obtained through Fourier transform is where Y , H , X , and N represents y , h , x and n , respectively, in frequency domain.…”
Section: System Modelmentioning
confidence: 99%