Physical Layer Secret-Key Generation Scheme for Transportation Security Sensor Network
نویسندگان
چکیده
منابع مشابه
Physical Layer Secret-Key Generation Scheme for Transportation Security Sensor Network
Wireless Sensor Networks (WSNs) are widely used in different disciplines, including transportation systems, agriculture field environment monitoring, healthcare systems, and industrial monitoring. The security challenge of the wireless communication link between sensor nodes is critical in WSNs. In this paper, we propose a new physical layer secret-key generation scheme for transportation secur...
متن کاملPhysical layer secret key generation for fiber-optical networks.
We propose and experimentally demonstrate a method for generating and sharing a secret key using phase fluctuations in fiber optical links. The obtained key can be readily used to support secure communication between the parties. The security of our approach is based on a fundamental asymmetry associated with the optical physical layer: the sophistication of tools needed by an eavesdropping adv...
متن کاملSecurity Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System
Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...
متن کاملNetwork Coding and Wireless Physical-layer Secret-key Generation: From Unequal Erasure Protection (UEP) to Unequal Security Protection (USP)
The general abstraction of this thesis is the relationships between two seemingly unrelated topics, which are network coding and wireless physical-layer secret-key generation (WPSG). As build-ups to such relationships, some specific aspects of each topic are discussed in detail at first. To begin with, network coding issues of unequal erasure protection (UEP) and degree distribution distortion ...
متن کاملPhysical-Layer-Enhanced Wireless Secret Key Exchange
We address the problem of efficiently establishing a shared secret key over an open wireless channel in the presence of an active (jamming) adversary. A commonly employed technique in practice for key sharing is the cryptographic ellipticcurve Diffie-Hellman (DH) protocol; however, its communication cost in a jammed environment is very high. Hence, we employ novel physical-layer techniques to e...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Sensors
سال: 2017
ISSN: 1424-8220
DOI: 10.3390/s17071524