How physicality enables trust: A new era of trust-centered cyberphysical systems

S Gil, M Yemini, A Chorti, A Nedić, HV Poor… - ar** Channel
M Frey, I Bjelaković, J Nötzel… - IEEE Transactions on …, 2025‏ - ieeexplore.ieee.org
We propose a new proof method for direct coding theorems for wiretap channels where the
eavesdropper has access to a quantum version of the transmitted signal on an infinite …

Advancements in UWB: Paving the Way for Sovereign Data Networks in Healthcare Facilities

K Reaz, T Ardoin, L Muth, M Margraf… - Proceedings of the 2nd …, 2024‏ - dl.acm.org
Ultra-Wideband (UWB) technology re-emerges as a groundbreaking ranging technology
with its precise micro-location capabilities and robustness. This paper highlights the security …

AI/ML‐Aided Processing for Physical‐Layer Security

M Srinivasan, S Skaperas… - … ‐Layer Security for …, 2024‏ - Wiley Online Library
This chapter introduces methodologies for preprocessing channel state information (CSI)
data in the context of authentication and secret key generation (SKG) for wireless …

Smart channel state information pre-processing for joint authentication and symmetric key distillation

M Srinivasan, S Skaperas, A Chorti… - Authorea …, 2023‏ - techrxiv.org
While the literature on RF fingerprinting-based authentication and key distillation is vast, the
two topics have customarily been studied separately. In this paper, starting from the …

Smart Channel State Information Pre-processing for Joint Authentication and Secret Key Distillation

M Srinivasan, S Skaperas, A Chorti, MS Herfeh… - arxiv preprint arxiv …, 2022‏ - arxiv.org
While the literature on RF fingerprinting-based authentication and key distillation is vast, the
two topics have customarily been studied separately. In this paper, starting from the …

Robust secret key generation from stochastic fading in the presence of passive and active attackers

A Chorti - 2024‏ - IET
Sixth generations (6G) systems will be required to meet diverse constraints in an integrated
ground-air-space global network. In particular, meeting overly aggressive latency constraints …

UWB Security and Enhancements

K Reaz, L Muth, T Ardoin, G Wunder, M Margraf… - Authorea …, 2024‏ - techrxiv.org
Ultra-Wideband (UWB) technology re-emerges as a groundbreaking ranging technology
with its precise microlocation capabilities and robustness. However, the security aspects of …