A Channel State Information-Based Key Generation Scheme for Internet of Things

نویسندگان

چکیده

Internet-of-Things (IoT) networks generally contain resource-constrained devices that require an energy-efficient key generation procedure to producing secure keys at a faster rate. The physical characteristics of the wireless channel can be exploited communication within IoT networks. In particular, secret generated by leveraging on randomness between two communicating parties. conventional mechanism generating layer, i.e., using probing, quantization, information reconciliation, and privacy amplification, may not preferable for devices. addition, in some cases deployed static environments, wherein coherence time is too high generate rate with desired randomness. This study proposes mapping table-based distribution scheme multiple random are combined improve only (KGR) but also agreement (KAR) bit error (BER). proposed scheme, both magnitude phase process. immune estimation errors while providing sufficient environment. Additionally, thoroughly investigated different scenarios including case smarter eavesdropper, which attempts estimate legitimate nodes. verifies robustness settings attack models.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An elliptic curve Key Management Scheme for Internet of Things

The Internet of Things (IOT) is the network of physical entities, such as wireless sensors, and radio frequency identification (RFID). Due to the rapid progress of the hardware and software in the last decade, Internet of Things is an emerging area of research. However, protecting the privacy in IoT networks is very challenging due to the heterogeneous nature of the IoT entities. Due to the low...

متن کامل

Modeling a Smart Hospital Information Architecture Based on Internet of Things and Recommender Agent

Introduction: Today, healthcare organizations worldwide are aware of the significance of technology and its impact on the quality of care. Hospitals are one of the most crucial systems in which the utilization of information is particularly important for several reasons. Using discrete-event simulation and developing a recommender agent, this study aimed to allocate IoT devices to patients in s...

متن کامل

Modeling a Smart Hospital Information Architecture Based on Internet of Things and Recommender Agent

Introduction: Today, healthcare organizations worldwide are aware of the significance of technology and its impact on the quality of care. Hospitals are one of the most crucial systems in which the utilization of information is particularly important for several reasons. Using discrete-event simulation and developing a recommender agent, this study aimed to allocate IoT devices to patients in s...

متن کامل

A Mutual Authentication Method for Internet of Things

Today, we are witnessing the expansion of various Internet of Things (IoT) applications and services such as surveillance and health. These services are delivered to users via smart devices anywhere and anytime. Forecasts show that the IoT, which is controlled online in the user environment, will reach 25 billion devices worldwide by 2020. Data security is one of the main concerns in the IoT. ...

متن کامل

IOT: Using Channel State Information for Tamper Detection in the Internet of Things

The Internet of Things (IoT) is increasingly used for critical applications and securing the IoT has become a major concern. Among other issues it is important to ensure that tampering with IoT devices is detected. Many IoT devices use WiFi for communication and Channel State Information (CSI) based tamper detection is a valid option. Each 802.11n WiFi frame contains a preamble which allows a r...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Security and Communication Networks

سال: 2022

ISSN: ['1939-0122', '1939-0114']

DOI: https://doi.org/10.1155/2022/7976319