2020 International Conferences on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE 2020
DOI: 10.1109/ithings-greencom-cpscom-smartdata-cybermatics50389.2020.00025
|View full text |Cite
|
Sign up to set email alerts
|

Physical-Layer Cooperative Key Generation with Correlated Eavesdropping Channels in IoT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 12 publications
(5 citation statements)
references
References 21 publications
0
5
0
Order By: Relevance
“…In order to overcome these shortcomings, some studies have used multiantenna [27,28], multibit quantization [29,30], or adaptive quantization methods [31,32] to improve the secret key generation rate, but these methods still lose a lot of useful information, which is not conducive to the secret key generation. ere are also some studies which start from the wireless channel characteristic information and improve the key generation ability by sending artificial noise [33,34] and introducing wireless cooperative nodes [35,36], but these ways add extra cost and are also more complex to implement. In addition, some research studies start from the dimension of wireless channel characteristics, improving the one-dimensional characteristics of the channel and extracting the secret key through the channel multicharacteristic information to overcome the problems of the abovementioned secret key generation scheme.…”
Section: Introductionmentioning
confidence: 99%
“…In order to overcome these shortcomings, some studies have used multiantenna [27,28], multibit quantization [29,30], or adaptive quantization methods [31,32] to improve the secret key generation rate, but these methods still lose a lot of useful information, which is not conducive to the secret key generation. ere are also some studies which start from the wireless channel characteristic information and improve the key generation ability by sending artificial noise [33,34] and introducing wireless cooperative nodes [35,36], but these ways add extra cost and are also more complex to implement. In addition, some research studies start from the dimension of wireless channel characteristics, improving the one-dimensional characteristics of the channel and extracting the secret key through the channel multicharacteristic information to overcome the problems of the abovementioned secret key generation scheme.…”
Section: Introductionmentioning
confidence: 99%
“…However, the proposed scheme assumes that Eve is located near Bob, and considers the eavesdropping channel between Alice and Eve to be correlated with the legitimate channel, which is not a realistic assumption. Also under the same channels correlation assumption, in Reference 27, the key agreement process in the proposed key generation scheme is performed over three consecutive phases. First, the channel difference between each legitimate relay node's channel and the eavesdropping channel is utilized to generate a secret key.…”
Section: Related Workmentioning
confidence: 99%
“…The BS and the nodes wish to agree on secret keys based on the characteristics of wireless channels. IoT nodes can be deployed at any location, and some nodes may be deployed close to each other, such as node 1 and node 2, which leads to channel correlation between nodes [15]. The BS is equipped with M antennas, while all the nodes are equipped with a single antenna.…”
Section: Proposed Ris Aided Skg Scheme a System Modelmentioning
confidence: 99%