Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security 2021
DOI: 10.1145/3460120.3484789
|View full text |Cite
|
Sign up to set email alerts
|

DroneKey: A Drone-Aided Group-Key Generation Scheme for Large-Scale IoT Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(2 citation statements)
references
References 25 publications
0
2
0
Order By: Relevance
“…Te main challenge in applying deep learning to physical layer key generation is the additional need for computational resources. Terefore, we choose to train the network on the base station side and deploy it to meet the demand of training and storing the network without additional consumption on the user side [28,35]. Moreover, the network's training can be conducted in the cloud without consuming node resources.…”
Section: Channel Reciprocal Compensation Networkmentioning
confidence: 99%
“…Te main challenge in applying deep learning to physical layer key generation is the additional need for computational resources. Terefore, we choose to train the network on the base station side and deploy it to meet the demand of training and storing the network without additional consumption on the user side [28,35]. Moreover, the network's training can be conducted in the cloud without consuming node resources.…”
Section: Channel Reciprocal Compensation Networkmentioning
confidence: 99%
“…the second is source authentication, which ensures that the messages originate from a specific source. Group authentication is generally addressed by group key management techniques [7][8][9][10]. However, source authentication is more difficult because the group key can't be used to verify a specific multicast source, as it is known by the group members.…”
Section: Introductionmentioning
confidence: 99%