2022 IEEE International Conference on Current Development in Engineering and Technology (CCET) 2022
DOI: 10.1109/ccet56606.2022.10080843
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on Different Application Areas based on RSS (Received Signal Strength) and Possible Hardware and Software Tools for the Collection of RSS

Abstract: Apart from serving basic communication to users, reach of wireless networks to users has been facilitating various applications and mechanisms which can add on multiple functionality of networks. Received signal strength Indicator (RSSI)/ Channel state Information (CSI) is one such statistics available on user device, which can be used to achieve multiple adjuncts network functionalities and few applications. This paper focuses mainly on RSSI based Human activity recognition (HAR), Node identification as appli… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 35 publications
0
1
0
Order By: Relevance
“…These traditional techniques require complex key distribution protocols that may not be suitable for power-limited networks such as IoT. 8 Physical layer key generation (PLKG) techniques [9][10][11] have been planned to explore additional facets of security in wireless communications 12 to address the above issues. In most PLKG techniques, legitimate node pairs use wireless channel randomness to generate keys.…”
Section: Introductionmentioning
confidence: 99%
“…These traditional techniques require complex key distribution protocols that may not be suitable for power-limited networks such as IoT. 8 Physical layer key generation (PLKG) techniques [9][10][11] have been planned to explore additional facets of security in wireless communications 12 to address the above issues. In most PLKG techniques, legitimate node pairs use wireless channel randomness to generate keys.…”
Section: Introductionmentioning
confidence: 99%