AvDR-Based Wireless Secure Key Generation with Colored Noise for IoT

Physical layer key generation exploiting inherent channel randomness is an open research area in securing the networks with resource constraint nodes; therefore reduction of numerical computation i...

[1]  Bochuan Zheng,et al.  A chaotic encryption system using PCA neural networks , 2008, 2008 IEEE Conference on Cybernetics and Intelligent Systems.

[2]  Vijay Devabhaktuni,et al.  An Upper Bound on PHY-Layer Key Generation for Secure Communications Over a Nakagami-M Fading Channel With Asymmetric Additive Noise , 2018, IEEE Access.

[3]  Mahmoud H. Ismail,et al.  RSS fingerprints dimensionality reduction in WLAN-based indoor positioning , 2016, 2016 Wireless Telecommunications Symposium (WTS).

[4]  Chen Sun,et al.  High-Agreement Uncorrelated Secret Key Generation Based on Principal Component Analysis Preprocessing , 2018, IEEE Transactions on Communications.

[5]  Junqing Zhang,et al.  On the Key Generation From Correlated Wireless Channels , 2017, IEEE Communications Letters.

[6]  Ting Jiang,et al.  Physical-layer security in Internet of Things based on compressed sensing and frequency selection , 2017, IET Commun..

[7]  Gong Zhang,et al.  A Tensor-Based Covariance Differencing Method for Direction Estimation in Bistatic MIMO Radar With Unknown Spatial Colored Noise , 2017, IEEE Access.

[8]  Nianmin Yao,et al.  On the using of discrete wavelet transform for physical layer key generation , 2017, Ad Hoc Networks.

[9]  Junqing Zhang,et al.  Key Generation From Wireless Channels: A Review , 2016, IEEE Access.

[10]  Xenofon Fafoutis,et al.  Physical layer secret-key generation with discreet cosine transform for the Internet of Things , 2017, 2017 IEEE International Conference on Communications (ICC).

[11]  Meriam A. Bibile,et al.  Detection error rate analysis using coloured noise for the movement of chipless RFID tag , 2018, 2018 Australian Microwave Symposium (AMS).

[12]  H.T. Friis,et al.  A Note on a Simple Transmission Formula , 1946, Proceedings of the IRE.

[13]  Guimei Zheng,et al.  DOA Estimation in MIMO Radar With Non-Perfectly Orthogonal Waveforms , 2017, IEEE Communications Letters.

[14]  Rong Jin,et al.  Delay Analysis of Physical-Layer Key Generation in Dynamic Roadside-to-Vehicle Networks , 2017, IEEE Transactions on Vehicular Technology.

[15]  Mohsen Guizani,et al.  Comparative simulation for physical layer key generation methods , 2015, 2015 International Wireless Communications and Mobile Computing Conference (IWCMC).

[16]  Mohammad Abdullah Al Faruque,et al.  Exploiting Wireless Channel Randomness to Generate Keys for Automotive Cyber-Physical System Security , 2016, 2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS).

[17]  GuizaniMohsen,et al.  Unleashing the secure potential of the wireless physical layer , 2016 .

[18]  Quan Pan,et al.  Nonlinear Gaussian Smoothers With Colored Measurement Noise , 2015, IEEE Transactions on Automatic Control.

[19]  Werner Henkel,et al.  LDPC code construction for wireless physical-layer key reconciliation , 2012, 2012 1st IEEE International Conference on Communications in China (ICCC).

[20]  Sally McClean,et al.  Characterization of Received Signal Strength Perturbations Using Allan Variance , 2018, IEEE Transactions on Aerospace and Electronic Systems.

[21]  Jing Wang,et al.  New targets number estimation method under colored noise background , 2012 .

[22]  Abhay Kumar,et al.  Wireless physical layer key generation with improved bit disagreement for the internet of things using moving window averaging , 2019, Phys. Commun..

[23]  Soung Chang Liew,et al.  Asynchronous Physical-Layer Network Coding: Symbol Misalignment Estimation and Its Effect on Decoding , 2017, IEEE Transactions on Wireless Communications.

[24]  Mohsen Guizani,et al.  Unleashing the secure potential of the wireless physical layer: Secret key generation methods , 2016, Phys. Commun..

[25]  Qi Shi,et al.  A Novel Physical Layer Secure Key Generation and Refreshment Scheme for Wireless Sensor Networks , 2018, IEEE Access.

[26]  Pradeepa Yahampath,et al.  Steepest-Descent Optimization of CDMA Signatures for Multiple Correlated Sources With Applications to Joint Source-Channel Coding , 2015, IEEE Transactions on Communications.

[27]  Keshav P. Dahal,et al.  On the study of wireless signal noise for designing network infrastructure of knowledge management systems , 2015, 2015 9th International Conference on Software, Knowledge, Information Management and Applications (SKIMA).

[28]  Sneha Kumar Kasera,et al.  High-Rate Uncorrelated Bit Extraction for Shared Secret Key Generation from Channel Measurements , 2010, IEEE Transactions on Mobile Computing.