Filters








40,453 Hits in 6.7 sec

Insider-Attacks on Physical-Layer Group Secret-Key Generation in Wireless Networks

J. Harshan, Sang-Yoon Chang, Yih-Chun Hu
2017 2017 IEEE Wireless Communications and Networking Conference (WCNC)  
Physical-layer group secret-key (GSK) generation is an effective way of generating secret keys in wireless networks, wherein the nodes exploit inherent randomness in the wireless channels to generate group  ...  Index terms-physical-layer security, secret key generation, group keys, insider attacks 978-1-5090-4183-1/17/$31.00 ©2017 IEEE  ...  and Research (A*STAR).  ... 
doi:10.1109/wcnc.2017.7925526 dblp:conf/wcnc/HarshanCH17 fatcat:dcasrxk7onao3cnjlduenwteiy

Physical Layer Security for Beyond 5G: Ultra Secure Low Latency Communications

Anil Kumar Yerrapragada, Taylor Eisman, Brian Kelley
2021 IEEE Open Journal of the Communications Society  
Lastly, additional results show the performance of the PLS algorithm in terms of Key Bit Error Rates and secret key transmission rates.  ...  We design protocols that advance a specific form of Physical Layer Security, known as Key-based Physical Layer Security, from the theoretical realm into the practical.  ...  Physical Layer Security (PLS), demonstrated in this work, shows promising privacy and latency features for emerging B5G/6G wireless networks.  ... 
doi:10.1109/ojcoms.2021.3105185 fatcat:flxsgxbp5nggvfldtttq7ccuvm

Insider-Attacks on Physical-Layer Group Secret-Key Generation in Wireless Networks [article]

J. Harshan, Sang-Yoon Chang, Yih-Chun Hu
2017 arXiv   pre-print
Physical-layer group secret-key (GSK) generation is an effective way of generating secret keys in wireless networks, wherein the nodes exploit inherent randomness in the wireless channels to generate group  ...  fail to recover group messages despite possessing the group key, and (ii) low-rate key attacks, wherein an insider alters the common source of randomness so as to reduce the key-rate.  ...  and Research (A*STAR).  ... 
arXiv:1701.03568v1 fatcat:thmegp27vzclbauajrkphyxjpa

Information-theoretically Secure Key Agreement over Partially Corrupted Channels [article]

Reihaneh Safavi-Naini, Pengwei Wang
2016 arXiv   pre-print
We formalize security and reliability of key agreement protocols, derive bounds on the rate of key agreement, and give constructions that achieve the bound.  ...  It has been proved that key agreement protocols with security against computationally unbounded adversaries cannot exist in a setting where Alice and Bob do not have dependent variables and communication  ...  The perfect secret key capacity C 0 SK is the largest achievable secret key rate of all key agreement protocols over the channel.  ... 
arXiv:1604.03824v1 fatcat:yaqxobqxqnadtnkrhlknl3tdhe

Double Layer Key: Integrated Verification of Relay Generated Node Key and User Based Mutual with Erasure Concepts

S. Soundararajan, S. Aswini, M. Namrutha, S. Sandhya
2017 International Journal of Advanced Research in Computer Science and Software Engineering  
Furthermore, in most of the proposed practical works, the name of the game key generation rates achieved are only a few tens of bits in line with 2d.  ...  Double layer key encryption is the process of encrypting an already encrypted data with the shared and mutual key. The nodes share a secret agreement protocol.  ...  the physical layer.  ... 
doi:10.23956/ijarcsse/v7i3/0160 fatcat:tdulcuc3ufhdbcwwpzva5nclwa

Collaborative secret key extraction leveraging Received Signal Strength in mobile wireless networks

Hongbo Liu, Jie Yang, Yan Wang, Yingying Chen
2012 2012 Proceedings IEEE INFOCOM  
Using physical layer information of radio channel to generate keys secretly among wireless devices has been proposed as an alternative in wireless mobile networks.  ...  To enable secure group communication, two protocols, namely star-based and chain-based, are developed in our framework by exploiting RSS from multiple devices to perform group key generation collaboratively  ...  The main advantage of the secret key generation utilizing physical layer information of radio channel is that it allows any two wireless devices within transmission range of each other to extract a shared  ... 
doi:10.1109/infcom.2012.6195843 dblp:conf/infocom/LiuYWC12 fatcat:my7cs64tgnfchammmtbqilkcsi

Channel Whispering: a Protocol for Physical Layer Group Key Generation. Application to IR-UWB through Deconvolution [article]

Iulia Tunaru and Benoît Denis and Régis Perrier and Bernard Uguen
2018 arXiv   pre-print
Compared to physical layer key distribution methods, the proposed key generation protocol requires less traffic overhead for small cooperative groups while being robust at medium and high signal-to-noise  ...  The physical layer security framework provides models, algorithms, and proofs of concept for generating pairwise symmetric keys over single links between two nodes within communication range.  ...  Single-link physical layer key generation Secret key generation based on the physical layer in wireless communications is a particular case of information theoretic secret generation, a more general framework  ... 
arXiv:1801.04473v1 fatcat:m6jco7mg2jakrlvjkh4aaqkcfa

A Survey on Secure Information Transfer with Authentication Service

M. Elakkiyathasan
2018 International Journal for Research in Applied Science and Engineering Technology  
In order to realize secure information sharing, it is common to encrypt information, using a common key called 'Group Key' among group members.  ...  possesses the group key.  ...  In this paper a physical layer approach is been proposed to remove the hardware requirements. A practical group solution is been provided to increase high efficient key generation.  ... 
doi:10.22214/ijraset.2018.2028 fatcat:rzhkphdcyvcutkkzjvlpqvj4fa

A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends

Yulong Zou, Jia Zhu, Xianbin Wang, Lajos Hanzo
2016 Proceedings of the IEEE  
protocol layer.  ...  Then, we discuss the state-of-the-art in physical-layer security, which is an emerging technique of securing the open communications environment against eavesdropping attacks at the physical layer.  ...  , security-oriented diversity, and physical-layer secret key generation techniques.  ... 
doi:10.1109/jproc.2016.2558521 fatcat:yttlvv4vlne5hh5l4zs6qlh2ra

Wireless physical layer security

Merouane Debbah
2009 2009 International Conference on Advanced Technologies for Communications  
, it is possible for him to generate a secret key through public communication over an insecure yet authenticated channel.  ...  Traditionally, security is viewed as an independent feature addressed above the physical layer, and all widely used cryptographic protocols are designed and implemented assuming the physical layer has  ...  We also would like to thank the devoted staff of Hindawi for their high level of professionalism, and Luc Vandendorpe, the Editor-in-Chief of the journal, for trusting us with this important assignment  ... 
doi:10.1109/atc.2009.5349415 fatcat:bshw2bufsfbk3lbxdpcrhan35m

Wireless Physical Layer Security

Mérouane Debbah, Hesham El-Gamal, HVincent Poor, Shlomo Shamai (Shitz)
2009 EURASIP Journal on Wireless Communications and Networking  
, it is possible for him to generate a secret key through public communication over an insecure yet authenticated channel.  ...  Traditionally, security is viewed as an independent feature addressed above the physical layer, and all widely used cryptographic protocols are designed and implemented assuming the physical layer has  ...  We also would like to thank the devoted staff of Hindawi for their high level of professionalism, and Luc Vandendorpe, the Editor-in-Chief of the journal, for trusting us with this important assignment  ... 
doi:10.1155/2009/404061 fatcat:unvq322sdfav7ny5xhghtgcogq

Layered quantum key distribution

Matej Pivoluska, Marcus Huber, Mehul Malik
2018 Physical Review A  
We introduce a family of QKD protocols for distributing shared random keys within a network of n users.  ...  This approach is more efficient in the number of quantum channel uses than conventional quantum key distribution using bipartite links.  ...  ACKNOWLEDGEMENTS We acknowledge the support of the funding from the Austrian Science Fund (FWF) through the START project Y879-N27 and the joint Czech-Austrian project MultiQUEST (I 3053-N27 and GF17-33780L  ... 
doi:10.1103/physreva.97.032312 fatcat:ii2cb4wehnbvzddqcu7exxjj6a

GROUP SECRET KEY GENERATION FOR 5G Networks

2019 KSII Transactions on Internet and Information Systems  
This paper realizes the generation of a group secret key for multi-terminals communicated through a wireless network in FDD mode, by utilizing the nature of the physical layer for the wireless links between  ...  I determine the upper bound for the generation rate of the secret key shared among multi-node, for the three multi-terminals topologies, and give numerical cases to expose the achievement of my offered  ...  Now, I'm studying the possibility of generating a shared secret key depending on physical layer features of the wireless network in FDD mode with a non-zero rate.  ... 
doi:10.3837/tiis.2019.08.012 fatcat:ys4fwkzpjjcvjper544hrzzs2i

Group Secret Key Generation via Received Signal Strength: Protocols, Achievable Rates, and Implementation

Hongbo Liu, Jie Yang, Yan Wang, Yingying Jennifer Chen, Can Emre Koksal
2014 IEEE Transactions on Mobile Computing  
Secret key generation among wireless devices using physical layer information of radio channel has been an attractive alternative for ensuring security in mobile environments.  ...  To enable secure group communication, two protocols are developed to perform collaborative group key generation via star and chain topologies respectively.  ...  This work was supported in part by the US National Science Foundation under grant numbers CNS-0954020, CCF-1018270, CNS-1318751, CNS-1318748, CNS-1054738, CCF-0916664 and Army Research Office W911NF-13  ... 
doi:10.1109/tmc.2014.2310747 fatcat:mminsdmzzbemvayptzidfem72q

Enhancing Information Security via Physical Layer Approaches in Heterogeneous IoT with Multiple Access Mobile Edge Computing in Smart City

Dong Wang, Bo Bai, Kai Lei, Wenbo Zhao, Yanping Yang, Zhu Han
2019 IEEE Access  
Specifically, we investigate the secure wiretap coding, resource allocation, signal processing, and multi-node cooperation, along with physical layer key generation and authentication, to cope with the  ...  Therefore, in this paper, the solutions to address the security threats are investigated from physical layer perspectives, since physical layer security technologies have the advantages of achieving perfect  ...  This approach is popular, since such an approach can achieve a higher key generation rate and implement efficient group key generation [64] . iv) The wiretap code based approach actually uses the secure  ... 
doi:10.1109/access.2019.2913438 fatcat:bk2b4tiy4jf5pmrmtpu72w5x7a
« Previous Showing results 1 — 15 out of 40,453 results