A Channel State Information-Based Key Generation Scheme for Internet of Things
نویسندگان
چکیده
Internet-of-Things (IoT) networks generally contain resource-constrained devices that require an energy-efficient key generation procedure to producing secure keys at a faster rate. The physical characteristics of the wireless channel can be exploited communication within IoT networks. In particular, secret generated by leveraging on randomness between two communicating parties. conventional mechanism generating layer, i.e., using probing, quantization, information reconciliation, and privacy amplification, may not preferable for devices. addition, in some cases deployed static environments, wherein coherence time is too high generate rate with desired randomness. This study proposes mapping table-based distribution scheme multiple random are combined improve only (KGR) but also agreement (KAR) bit error (BER). proposed scheme, both magnitude phase process. immune estimation errors while providing sufficient environment. Additionally, thoroughly investigated different scenarios including case smarter eavesdropper, which attempts estimate legitimate nodes. verifies robustness settings attack models.
منابع مشابه
An elliptic curve Key Management Scheme for Internet of Things
The Internet of Things (IOT) is the network of physical entities, such as wireless sensors, and radio frequency identification (RFID). Due to the rapid progress of the hardware and software in the last decade, Internet of Things is an emerging area of research. However, protecting the privacy in IoT networks is very challenging due to the heterogeneous nature of the IoT entities. Due to the low...
متن کاملModeling a Smart Hospital Information Architecture Based on Internet of Things and Recommender Agent
Introduction: Today, healthcare organizations worldwide are aware of the significance of technology and its impact on the quality of care. Hospitals are one of the most crucial systems in which the utilization of information is particularly important for several reasons. Using discrete-event simulation and developing a recommender agent, this study aimed to allocate IoT devices to patients in s...
متن کاملModeling a Smart Hospital Information Architecture Based on Internet of Things and Recommender Agent
Introduction: Today, healthcare organizations worldwide are aware of the significance of technology and its impact on the quality of care. Hospitals are one of the most crucial systems in which the utilization of information is particularly important for several reasons. Using discrete-event simulation and developing a recommender agent, this study aimed to allocate IoT devices to patients in s...
متن کاملA Mutual Authentication Method for Internet of Things
Today, we are witnessing the expansion of various Internet of Things (IoT) applications and services such as surveillance and health. These services are delivered to users via smart devices anywhere and anytime. Forecasts show that the IoT, which is controlled online in the user environment, will reach 25 billion devices worldwide by 2020. Data security is one of the main concerns in the IoT. ...
متن کاملIOT: Using Channel State Information for Tamper Detection in the Internet of Things
The Internet of Things (IoT) is increasingly used for critical applications and securing the IoT has become a major concern. Among other issues it is important to ensure that tampering with IoT devices is detected. Many IoT devices use WiFi for communication and Channel State Information (CSI) based tamper detection is a valid option. Each 802.11n WiFi frame contains a preamble which allows a r...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Security and Communication Networks
سال: 2022
ISSN: ['1939-0122', '1939-0114']
DOI: https://doi.org/10.1155/2022/7976319