A Hybrid Key Generation and a Verification Scheme

作者: Gunes Karabulut Kurt , Yalda Khosroshahi , Enver Ozdemir , Nasim Tavakkoli , Ozan Alp Topal

DOI: 10.1109/TII.2019.2950465

关键词:

摘要: By introducing high randomness with reduced computational cost, physical layer (PHY) key generation is one of the candidate tools that can be used for the security of the Internet of …

参考文章(31)
Victor Boyko, Philip MacKenzie, Sarvar Patel, Provably secure password-authenticated key exchange using Diffie-Hellman theory and application of cryptographic techniques. pp. 156- 171 ,(2000) , 10.1007/3-540-45539-6_12
Gilles Brassard, Louis Salvail, Secret-key reconciliation by public discussion theory and application of cryptographic techniques. pp. 410- 423 ,(1994) , 10.1007/3-540-48285-7_35
Wu He, Gongjun Yan, Li Da Xu, Developing Vehicular Data Cloud Services in the IoT Environment IEEE Transactions on Industrial Informatics. ,vol. 10, pp. 1587- 1595 ,(2014) , 10.1109/TII.2014.2299233
Hongbo Liu, Jie Yang, Yan Wang, Yingying Chen, Can Emre Koksal, Group Secret Key Generation via Received Signal Strength: Protocols, Achievable Rates, and Implementation IEEE Transactions on Mobile Computing. ,vol. 13, pp. 2820- 2835 ,(2014) , 10.1109/TMC.2014.2310747
J. M. Pollard, Monte Carlo methods for index computation () Mathematics of Computation. ,vol. 32, pp. 918- 924 ,(1978) , 10.1090/S0025-5718-1978-0491431-9
H.-J. Stoss, The complexity of evaluating interpolation polynomials Theoretical Computer Science. ,vol. 41, pp. 319- 323 ,(1985) , 10.1016/0304-3975(85)90078-7
Babak Azimi-Sadjadi, Aggelos Kiayias, Alejandra Mercado, Bulent Yener, Robust key generation from signal envelopes in wireless networks computer and communications security. pp. 401- 410 ,(2007) , 10.1145/1315245.1315295
Geng Yang, Li Xie, Matti Mantysalo, Xiaolin Zhou, Zhibo Pang, Li Da Xu, Sharon Kao-Walter, Qiang Chen, Li-Rong Zheng, A Health-IoT Platform Based on the Integration of Intelligent Packaging, Unobtrusive Bio-Sensor, and Intelligent Medicine Box IEEE Transactions on Industrial Informatics. ,vol. 10, pp. 2180- 2191 ,(2014) , 10.1109/TII.2014.2307795
Murtaza Zafer, Dakshi Agrawal, Mudhakar Srivatsa, Limitations of generating a secret key using wireless fading under active adversary IEEE ACM Transactions on Networking. ,vol. 20, pp. 1440- 1451 ,(2012) , 10.1109/TNET.2012.2183146
Hongming Cai, Li Da Xu, Boyi Xu, Cheng Xie, Shaojun Qin, Lihong Jiang, IoT-Based Configurable Information Service Platform for Product Lifecycle Management IEEE Transactions on Industrial Informatics. ,vol. 10, pp. 1558- 1567 ,(2014) , 10.1109/TII.2014.2306391