1. Trang chủ
  2. » Luận Văn - Báo Cáo

Principle of information security key generation technique from wireless channels

33 0 0
Tài liệu đã được kiểm tra trùng lặp

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Tiêu đề Principle of Information Security Key Generation Technique From Wireless Channels
Tác giả Trần Thị Kim Ngọc, Phùng Phương Uyên, Trần Thị Hương Ly, Nguyễn Hương Trà
Người hướng dẫn ThS. Đinh Văn Linh
Trường học Vietnam National University International School
Thể loại graduation project
Năm xuất bản 2024
Thành phố Hanoi
Định dạng
Số trang 33
Dung lượng 2,09 MB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Cấu trúc

  • Chapter 1: KEY GENERATION AND WIRELESS CHANNELS (4)
    • I. Key Generation (4)
    • II. Wireless Channels (6)
  • Chap 2: KEY GENERATION TECHNIQUES (8)
    • I. Symmetric Key Cryptography (8)
    • II. Asymmetric Key Cryptography (14)
  • Chapter 3: DISCUSSION (24)
    • I. Security Analysis (24)
    • II. Applications and Future Directions (25)

Nội dung

Wireless Channel Reciprocity This technique uses this property to generate secret keys using informationabout the variations of the signal passing through the channel.. Operation, and li

KEY GENERATION AND WIRELESS CHANNELS

Key Generation

Key Generation is the process of creating a random string or set of characters that acts as a key for encrypting plaintext or decrypting ciphertext This key, a shared code between the sender and receiver, utilizes mathematical operations and algorithms to convert information into an unreadable format These algorithms serve as a locking mechanism, ensuring that only authorized personnel can access electronic and digital information.

Key generation can be broadly categorized into two major methods: Symmetric key cryptography and Asymmetric key cryptography.

Symmetric Key Cryptography, also referred to as Symmetric Encryption, utilizes a single secret key for both the encryption and decryption of data This method contrasts with asymmetric encryption, which employs separate keys for these functions By transforming data into an unreadable format, symmetric encryption ensures that only individuals possessing the secret key can access the original information.

Asymmetric key cryptography, or public-key cryptography, utilizes a pair of keys: a publicly shared key for encryption and a confidential private key for decryption The public key is available to anyone, while the private key remains secure, ensuring data protection This cryptographic method relies on intricate mathematical challenges, which enhances security by making it nearly impossible for attackers to decrypt information or extract the private key from the public one It is extensively employed for secure communications, digital signatures, and key exchanges across various applications.

In the key generation process, randomness and entropy are critical factors as they ensure security and prevent key predictability

Randomness plays a critical role in safeguarding encrypted data It ensures that cryptographic keys are unpredictable, making them impossible for attackers

The unpredictability inherent in encryption is crucial for its security, as only authorized users with the correct key can access the confidential data Randomness enhances the strength of cryptographic algorithms, making it extremely difficult for attackers to employ brute-force or pattern recognition techniques This heightened complexity significantly raises the effort needed to breach encryption, thereby reinforcing the overall security of the system.

In cryptography, entropy refers to the level of randomness or uncertainty in data, with higher entropy indicating greater unpredictability This unpredictability is essential for developing robust cryptographic keys, as the strength of a key relies on the randomness of its source Keys generated from predictable sources exhibit low entropy, making them weak and susceptible to attacks, while those created from highly random sources possess high entropy, resulting in significantly enhanced security.

3 Unique Features for Key Generation

Wireless channels are inherently dynamic and unpredictable, influenced by fading, interference, and multipath propagation These fluctuations can be harnessed to produce random or pseudo-random numbers, which play a crucial role in cryptographic key generation.

Wireless channels offer both spatial and temporal diversity through multipath propagation, allowing for the utilization of various signal paths and their unique characteristics This diversity can be harnessed to create a range of cryptographic keys, thereby improving the security and resilience of cryptographic systems.

Environmental factors significantly impact wireless channels, affecting the reliability, security, and performance of wireless communication systems Key generation processes depend on the unique characteristics of these channels, which can be distorted by obstacles like mountains and buildings, as well as weather conditions such as rain, snow, and fog that dampen signals Additionally, electronic devices and power lines introduce unwanted noise, disrupting the transmission of information.

Wireless Channels

A wireless channel serves as the medium for signal transmission between devices in a wireless network, utilizing radio waves instead of cables This air-based method of data transfer, while convenient, exposes wireless channels to various external factors that can impact signal quality and reliability.

A good understanding of the wireless channel, its key physical parameters and the modeling issues, lays the foundation for the rest of the book

Wireless channels experience signal fading, akin to the flickering of a candle's flame As signals travel through the air, their strength diminishes, leading to variations in the power received This phenomenon can occur due to several factors.

-Distance: Signals naturally weaken with distance traveled.

-Frequency: Higher frequencies are more susceptible to fading.

-Obstacles: Walls, buildings, and trees can block or reflect signals, leading to fading.

Fading can manifest in different ways:

-Fast Fading: Rapid signal fluctuations happening over short time intervals. -Slow Fading: Gradual changes in signal strength over longer durations. b Interference:

Think of a crowded conversation with background noise That's analogous to interference in wireless channels Unwanted signals from various sources can disrupt the intended signal, leading to errors:

- Man-made Interference: Electronic devices like microwaves, Bluetooth, and other wireless networks can create interference.

- Natural Interference: The sun and other celestial bodies can emit radio waves that interfere with signals. c Multipath Transmission:

Just as a pebble creates ripples in a pond, radio waves generate similar effects when they encounter obstacles These signals can bounce off surfaces, resulting in multiple copies that ultimately reach the receiver.

- Delayed Arrivals: These copies arrive at the receiver slightly out of sync with the original signal.

- Signal Distortion: Overlapping copies can weaken or distort the original signal, causing reception issues.

KEY GENERATION TECHNIQUES

Symmetric Key Cryptography

Physical Unclonable Functions (PUFs)is a device that exploits inherent randomness introduced during manufacturing to give a physical entity a unique

‘fingerprint’ or trust anchor.[3]PUFs are primarily used for generating and storing cryptographic keys or as a means of device authentication and identification. a Functionality:

A Physical Unclonable Function (PUF) operates as a one-way function in hardware, where it processes a specific electrical signal, known as a challenge (input) In response, the PUF generates a unique output based on the inherent physical variations of the chip This challenge-response pair is exclusive to each PUF, making it difficult to predict or replicate The use of PUFs offers enhanced security and authentication in various applications.

The core strength of Physical Unclonable Functions (PUFs) lies in their uniqueness; each PUF device produces a distinct output, even among identically manufactured units This fingerprint-like characteristic makes replicating a PUF virtually impossible, ensuring its security and integrity.

Unpredictability in Physical Unclonable Functions (PUFs) significantly enhances security by making it challenging to anticipate responses to various challenges Even with an understanding of the input provided to a PUF, the unpredictable nature of its output prevents unauthorized access, ensuring protection even in cases of partial information.

Tamper-evident Physical Unclonable Functions (PUFs) are highly sensitive to alterations in their physiological state, meaning any unauthorized modifications to their physical structure will significantly affect their response This inherent characteristic allows for easy detection of tampering, making PUFs ideal for applications focused on tamper detection.

Analog/mixed signal Physical Unclonable Functions (PUFs) encompass units that capture analog measurements of electrical or electronic parameters Key types of analog electronic PUFs include ICID-PUF, Coating PUF, LC-PUF, and Power Grid PUF These PUFs are engineered to generate unique fingerprints for circuits, enhancing their effectiveness as secure identities in various applications.

Memory-based Physical Unclonable Functions (PUFs) leverage mismatches in memory elements to produce random values during the boot process Commonly found in Field Programmable Gate Arrays (FPGAs), these PUFs utilize memory chips to create unique signatures and identities for circuits Two notable examples of memory-based PUFs are Static RAM PUF (SRAM PUF) and butterfly PUF, both of which play a significant role in enhancing circuit security.

Delay-based Physical Unclonable Functions (PUFs) focus on the propagation delay within circuit paths, determining the speed at which microelectronic circuits can switch outputs between 0 and 1 Key types of delay-based PUFs include arbiter PUFs, ring oscillator (RO) PUFs, glitch PUFs, and IP-PUFs, each with unique applications in secure identification and hardware authentication.

Physical Unclonable Functions (PUFs) leverage the unique physical variations that occur during semiconductor manufacturing to create a robust security mechanism for verifying integrated circuits Widely adopted by the electronics industry, this security approach enhances data privacy and can be utilized in various applications, including identity authentication and secure cryptographic primitives.

Identity authentication plays a crucial role in both daily life and industrial production, serving as a fundamental element in safeguarding data and systems Physical Unclonable Functions (PUFs) offer an effective solution for verifying identities and enhancing data security, as each hardware component possesses unique physical traits This uniqueness ensures a high level of security and reliable authentication, significantly mitigating the risks of unauthorized access and cyberattacks.

Physical Unclonable Functions (PUFs) are essential secure cryptographic primitives that serve as a fundamental building block in cybersecurity Unlike traditional encryption algorithms, PUF-generated keys are unpredictable and uncopyable, enhancing the security of encryption and decryption processes Moreover, PUF-based primitives are resilient against multiple attack vectors, offering critical technical support for safeguarding data and systems In today's digital landscape, secure cryptographic primitives are increasingly vital for protecting information communication.

Recent advancements in PUF technology, as demonstrated by Li et al [4], have led to the development of the first generation of genetic PUFs integrated within human cells This pioneering research lays the groundwork for utilizing PUF technology in the biomedical sector, highlighting the potential of CRISPR-PUFs to establish robust provenance protocols that ensure data authenticity and traceability Furthermore, genetic PUF technology can be embedded in cell lines to verify their origin and function as a quality control tool for these lines.

While PUFs made of novel materials function exceptionally well in situations where silicon PUFs fail, some of them may still have drawbacks or need refinement.

One significant challenge associated with bionic optical Physical Unclonable Functions (PUFs) is the lack of reproducibility During the mold-making process for PUF cards, issues such as bubbles and transcoding errors in laser speckle optical processes can lead to inconsistencies in replication, even when the same plant tissue is used To address these challenges, researchers can implement advanced techniques like fuzzy authentication, which can help mitigate the minor variances caused by these flaws, a strategy also applicable to other types of PUFs.

Advanced Attacks:Sophisticated machine learning algorithms can potentially learn the relationship between challenges and responses, compromising the unpredictability of PUFs Attackers might try to inject

9 information during the enrollment process to influence PUF responses and gain unauthorized access.

Implementing Physical Unclonable Functions (PUFs) can be costlier than traditional security methods due to the need for specialized hardware Moreover, the design and integration of PUFs into existing systems introduce additional complexity.

Limited Data Output: PUFs typically generate a small amount of data (often just a few bits) per response This can limit their applicability in certain cryptographic applications that require larger keys.

Wireless channel reciprocity is a key generation technique used in wireless network security It leverages the symmetry of wireless transmission channels to create encryption or secret keys between devices within a network This method enhances the security of communications by ensuring that both devices can independently generate the same key, facilitating secure data exchange.

When device A transmits a signal to device B, the signal travels through the same transmission channel that device B uses to send a signal back to device A This indicates that the variations in the signals passing through the channel are symmetrical.

Asymmetric Key Cryptography

1 Channel State Information (CSI) a Definition

Channel State Information (CSI) is essential in wireless communication, offering critical insights into the signal transmission environment between transmitters, such as base stations, and receivers, like mobile devices It encompasses the effects of signal propagation, including delays, fluctuations, and noise CSI is gathered through measurements or estimations from antennas or sensors on both transmitting and receiving devices, with key parameters that characterize the channel's conditions.

Path gain refers to the difference in strength between the received signal and the originally transmitted signal It measures the extent of signal attenuation that occurs as the signal travels through the environment Factors such as attenuation, multipath effects, and noise can contribute to a decrease in path gain, ultimately impacting the quality of the received signal.

CSI offers insights into the transmission delay of signals from the transmitter to the receiver This delay can fluctuate based on various factors, including multipath effects and reflections caused by surrounding objects.

Signal fading refers to the random variations in amplitude and phase that occur as a signal travels through its environment This phenomenon can lead to significant signal loss and negatively impact connection quality.

CSI offers insights into the noise levels present on the transmission channel, which can stem from multiple sources This noise may include background disturbances, interference from other signals, and intermodulation noise, all of which can impact signal quality.

Channel State Information (CSI) is essential for enhancing transmission performance and maintaining connection quality in wireless communication systems By utilizing CSI, key transmission parameters like transmit power, antenna orientation, and transmission protocols can be fine-tuned, leading to improved stability and reliability in connections between wireless devices.

Channel State Information (CSI) classification is divided into two main categories: Single-Time-Instant CSI and Multi-Time-Instant CSI Single-Time-Instant CSI focuses on capturing the channel state at a specific moment, making it suitable for real-time applications such as audio and video streaming, as well as mobile systems that must quickly adapt to changing conditions In contrast, Multi-Time-Instant CSI collects data from multiple time points, offering a comprehensive view of channel variations over time, which is essential for systems that require continuous adaptation and for performance analysis and modeling.

CSI classification can be divided into two main categories: Simple Statistical CSI and Complex Statistical CSI Simple Statistical CSI utilizes basic metrics such as averages and variability, making it ideal for simpler systems or scenarios with limited computational capabilities However, it offers less detail compared to its more complex counterpart In contrast, Complex Statistical CSI provides a comprehensive analysis of the channel's distribution across spatial and frequency dimensions, delivering the high accuracy required for intricate system models, albeit at the expense of increased computational resources.

The speed of channel change is crucial in determining the viability of acquiring Channel State Information (CSI) In fast-fading environments, where channel conditions fluctuate rapidly, relying on instantaneous CSI is impractical, as significant changes can occur before the information is utilized for adaptation In these cases, statistical CSI, which offers a broader perspective on channel behavior, is a more effective approach Conversely, in slow fading environments, where changes occur gradually, instantaneous CSI can be estimated accurately and used for adaptation until it becomes outdated Ultimately, the decision between using instantaneous or statistical CSI depends on the dynamics of the channel.

Channel State Information (CSI) is a valuable resource for optimizing wireless communication systems, but acquiring it can be achieved through various methods Hardware support from certain WiFi chipsets (e.g., Intel,

Qualcomm and Software Defined Radios (SDR) enable direct collection of Channel State Information (CSI) through APIs or user interfaces, while custom software can be developed to extract CSI from devices like WiFi or Bluetooth using specific protocols Network analysis tools such as Wireshark and MATLAB also facilitate CSI acquisition In cases where direct collection is not feasible, machine learning or AI models can predict CSI using environmental data or simulations Additionally, specialized signal measurement devices, like oscilloscopes or spectrum analyzers, can accurately measure signals to infer CSI but require technical expertise and resources The choice of method should align with the application needs, available resources, and the required balance between accuracy and flexibility.

Channel State Information (CSI) is essential for understanding wireless channels and plays a crucial role in enhancing communication systems It enables applications like beamforming and MIMO, which optimize signal direction to achieve higher data transfer rates while reducing interference.

Channel State Information (CSI) enhances communication protocols by assessing real-time variations in wireless channels It is essential for device localization and optimizing network performance Utilizing CSI leads to significant improvements in link efficiency and reduces network power consumption Overall, CSI serves as a fundamental element for boosting performance, reliability, and efficiency in diverse wireless communication applications.

Channel State Information (CSI) plays a significant role in physical layer security, enabling various techniques to enhance the security of wireless communication systems

In MIMO systems, channel reciprocity plays a crucial role in key generation by allowing both the transmitter and receiver to utilize a shared pilot signal for channel estimation This mutual estimation enables both parties to derive valuable channel information, enhancing the overall efficiency and security of the communication process.

15 to create a symmetric key Beamforming can further enhance the security of this process by focusing the signal energy in a specific direction.

Channel Estimation and Frequency Division Control (SCD) plays a crucial role in MIMO systems by leveraging Channel State Information (CSI) for effective channel estimation In environments with multipath propagation, SCD can harness the channel information from various paths to enhance the generation of secure keys.

Channel diversity and frequency hopping techniques can be utilized for key generation by transmitting signals across various paths, leveraging the inherent randomness of these pathways to create secure keys.

DISCUSSION

Security Analysis

After giving the characteristics of the two main types of keys, Symmetric Key Cryptography and asymmetric Key Cryptography, below are some differences between these two types of keys.

Method Use the same key for encryption and decryption

Utilize a key pair - a public key and a private key

Security Low as the key must be shared

More security with public and private keys

Efficient for encrypting and decrypting large data

Demand careful key management and might face challenges in key distribution

Eliminate the need for key distribution but requires robust key management

Flexible in deployment and integration into various systems

Can provide flexibility in key management but may impact performance

Suitable for encrypting login information and authentication between devices

Suitable for authentication and identity management through digital signatures and authentication protocols Balance of Good balance if used in Balance between performance

Security conjunction with AKC and security in certain scenarios

Symmetric key cryptography and asymmetric key cryptography are two prevalent methods for generating wireless channel keys The choice between these encryption techniques hinges on various factors, including security needs and data transfer speed Asymmetric key cryptography is ideal for scenarios where high security is paramount, while symmetric key cryptography is suitable for applications requiring faster data transfer with moderate security.

Applications and Future Directions

1 Potential applications of key generation from wireless channels a Security

- Create wireless network keys: Wi-Fi and other wireless networks can be secured using keys created from wireless channels, assisting in the prevention of unwanted access.

- Two-factor authentication: To further strengthen user account security, wireless channel keys may be utilized as a second authentication step when logging in.

- Data encryption: To assist shield information from loss or unwanted access, keys produced by wireless channels can be used to encrypt data. b Identification

- Device Identification: Tracking and controlling devices in wireless networks is made easier by the use of keys produced from wireless channels to identify certain devices.

- User authentication: To assist make sure that only authorized users may access systems and resources, keys produced via wireless channels can be used to authenticate users. c Track and monitor

- Location monitoring: To assist with asset tracking and personnel management, mobile devices' whereabouts may be monitored using keys produced via wireless channels.

- Monitoring of the environment: Keys produced by wireless channels may be used to keep an eye on factors like humidity, temperature, and pollution levels.

Furthermore, the process of creating keys from wireless channels has further applications in other domains, like:

- Mobile payment systems: Mobile payment transactions can be secured with keys produced from wireless channels.

- Smart home system: Devices in a smart home system can be secured and access to them controlled with keys produced via wireless channels.

- Healthcare: Patient data can be secured and access to it controlled by using keys derived via wireless channels

Here are a few particular instances of how key generation from wireless channels is used:

Wi-Fi networks can be secured with keys derived from wireless channels, assisting in preventing unwanted access and safeguarding private information.

Wireless channel parameters including signal intensity, interference, and delay time can be used to produce keys.

When considering Wi-Fi network security, using keys generated from the wireless channel can be more secure than using more conventional security techniques like WPA2.

To guarantee that only authorized users may access systems and resources, user authentication can be performed using keys produced via wireless channels.

The user's location or the device they are using can be used to produce the key depending on the features of the wireless channel they are using.

By using a key produced from a wireless channel instead of more conventional techniques like passwords or PINs, user authentication security may be increased.

Mobile device location monitoring is made possible by keys obtained via wireless channels, which also aid in asset tracking and personnel management.

The wireless channel that the mobile device is utilizing, including its signal strength and delay time, may be used to produce the key.

When compared to more conventional techniques like GPS, using keys produced from a wireless channel can aid increase tracking and monitoring efficiency.

Mobile payment transactions can be secured with keys produced via wireless channels, assisting in the prevention of fraud and safeguarding financial information.

The location and kind of the mobile device, together with other wireless channel parameters, can be used to produce the key.

As an alternative to more conventional techniques like PINs or passwords, using keys produced via a wireless channel can assist improve the security of mobile payments.

Devices in a smart home system can be secured and access controlled with keys produced via wireless channels.

The location and kind of the device, together with other features of the wireless channel it is utilizing, can be used to create keys.

As an alternative to more conventional techniques like passwords or PIN codes, using a key produced from a wireless channel can assist improve the security of smart home systems.

Access to patient data can be restricted and secured with the use of keys derived via wireless channels.

The location and kind of the medical equipment, together with other wireless channel parameters, can be used to produce keys.

By using a key derived from a wireless channel instead of more conventional techniques like passwords or PINs, patient data security can be improved.

2 Emerging trends and future directions in wireless channel-based key generation

The increasing demand for security and privacy has spurred advancements in security methods, particularly in wireless channel-based key generation Furthermore, the rise of quantum computing presents challenges that could greatly affect this key generation process To ensure robust security against potential quantum attacks, researchers must innovate and create new algorithms tailored for this evolving landscape.

Machine learning is increasingly utilized for generating secure and efficient keys from wireless channels By analyzing wireless channel parameters, machine learning techniques can effectively create robust encryption keys, enhancing security in wireless communications.

Artificial Intelligence (AI) can enhance the wireless channel key generation process by automating it, leading to increased efficiency Additionally, AI can be leveraged to develop innovative algorithms for key generation that offer improved security and effectiveness.

- 5G network: This network makes key generation from wireless channels more effective by providing faster data rates and reduced latency.

As the Internet of Things (IoT) continues to gain traction, the demand for advanced security measures is on the rise Innovative techniques, such as utilizing wireless channels for key generation, can enhance the security of IoT devices Looking ahead, the focus will be on developing robust security solutions to safeguard the expanding network of interconnected devices.

Scientists are developing innovative algorithms for generating keys from wireless channels, focusing on enhanced security and effectiveness These algorithms aim to be versatile, ensuring they can be applied across various applications while maintaining high safety standards.

- Introduce wireless channel-based key generation into current applications and systems: For wider usage, wireless channel-based key generation must be incorporated into current applications and systems.

- Establish guidelines for key generation depending on wireless channels:

To guarantee the use and interoperability of keys generated from wireless channels, standards must be created.

Given the increasing security threats, "Key Generation Techniques from Wireless Channels" highlights the critical need to secure wireless communication networks The swift growth of these networks has amplified their vulnerability to attacks, putting user data at risk Consequently, it is essential to develop robust key generation methods for wireless channels to safeguard sensitive information in sectors such as banking, healthcare, government, and security.

To address the security challenges associated with wireless communication networks, this report examines a novel key generation strategy that leverages the randomness inherent in wireless channels By utilizing unique characteristics such as signal intensity, fading, multipath propagation, and Doppler effects, this method aims to create secret keys that enhance the security of cryptographic key exchange Ultimately, the proposed key generation techniques offer a more secure alternative to traditional public key cryptography by harnessing the intrinsic properties of wireless channels.

Symmetric key cryptography and asymmetric key cryptography are the two main types of key generation techniques Among these, Physical Unclonable Functions (PUFs) utilize intrinsic randomness from the manufacturing process to provide unique fingerprints for physical items, serving as trust anchors PUFs are essential for device authentication, identification, and the generation and storage of cryptographic keys The research emphasizes the advantages of PUFs, particularly their unique, fingerprint-like characteristics that render them extremely difficult, if not impossible, to replicate.

The article examines the challenges and potential vulnerabilities of quantum key distribution (QKD) as a key generation method, highlighting that while QKD is theoretically secure, real-world threats such as phase remapping and photon number splitting could compromise its effectiveness It also addresses practical issues related to QKD, including the time taken for photon transit, the integration of QKD systems into existing infrastructure, and the necessity for establishing a classically verified communication channel.

To enhance data security and ensure confidentiality in wireless networks, ongoing research and development in key generation techniques is essential This paper underscores the need for effective solutions that not only thwart malicious attacks but also address the vulnerabilities inherent in wireless communication systems.

Wireless channel key generation is essential for enhancing the security of wireless communications by creating unique keys that safeguard against eavesdropping and data theft These keys validate the authenticity of devices, restrict access to authorized users, and maintain data integrity, thereby ensuring reliable information transmission Additionally, they protect user privacy by securing sensitive data during transmission and preventing unauthorized tracking and surveillance With applications in IoT systems, mobile payments, Wi-Fi networks, and smart homes, this method significantly boosts security across various domains, effectively enhancing authentication, data integrity, and overall privacy in wireless communication systems.

[1] What is Key generation? (no date) What is Key generation? - The Role of Key Encryption.

[2] What are wireless communication channels? (no date) Quora.

[3] Gao, Y., Al-Sarawi, S F and Abbott, D (2020) Physical unclonable functions, Nature News Nature Publishing Group.

[4] Cao, Y., Xu, J., Wu, J., Wu, S., Huang, Z and Zhang, K (2023) Advances in Physical Unclonable Functions Based on New Technologies: A Comprehensive Review, MDPI Multidisciplinary Digital Publishing Institute.

D Chizhik, J Du and R A Valenzuela, "Universal Path Gain Laws for Common Wireless Communication Environments"

S Chen, S Wang, X Xu, L Jiao and H Wen, "Physical Layer Security Authentication Based Wireless Industrial Communication System for Spoofing Detection"

K Kraft, C Sudarshan, D M Mathew, C Weis, N Wehn and M Jung,

"Improving the error behavior of DRAM by exploiting its Z-channel property"

Enhancing Channel Reciprocity for Effective Key Management in Wireless Ad-Hoc Networks | IEEE Conference Publication | IEEE Xplore

(PDF) Key Generation Technique Based on Channel Characteristics for MIMO-OFDM Wireless Communication Systems (researchgate.net)

Lai, Lifeng & Liang, Yingbin & Poor, H Vincent & Du, Wenliang (2013). Key Generation from Wireless Channels 10.1201/b15496-5.

A Ambekar and H D Schotten, "Enhancing Channel Reciprocity for Effective Key Management in Wireless Ad-Hoc Networks"

Wang, T., Liu, Y & Vasilakos, A.V Survey on channel reciprocity based key establishment techniques for wireless systems Wireless Netw 21, 1835–

Ngày đăng: 13/01/2025, 14:09

TÀI LIỆU CÙNG NGƯỜI DÙNG

TÀI LIỆU LIÊN QUAN