Exploring Encryption Algorithms and Network Protocols: A Comprehensive Survey of Threats and Vulnerabilities
Cryptographic network protocols play a crucial role in enabling secure data exchange over
insecure media in modern network environments. However, even minor vulnerabilities can …
insecure media in modern network environments. However, even minor vulnerabilities can …
FPGA-Based PUF Designs: A Comprehensive Review and Comparative Analysis
Field-programmable gate arrays (FPGAs) have firmly established themselves as dynamic
platforms for the implementation of physical unclonable functions (PUFs). Their intrinsic …
platforms for the implementation of physical unclonable functions (PUFs). Their intrinsic …
Key Agreement Using Physical Identifiers for Degraded and Less Noisy Authentication Channels
Secret-key agreement using physical identifiers is a promising security protocol for the
authentication of users and devices with small chips, owing to its lightweight security. In the …
authentication of users and devices with small chips, owing to its lightweight security. In the …
On Pre-Processing of Generalized Gamma Fading Channel Samples for Secret Key Generation
With the advent of innovative wireless technologies and the rapid growth of diverse
connected devices, ensuring communication security has become a critical challenge for the …
connected devices, ensuring communication security has become a critical challenge for the …
Experimental evaluation of a lightweight RSS-based PLA scheme in multi-node multi-cell mesh networks
In infrastructure-less Internet of Things (IoT) mesh networks, node authentication is a critical
challenge. The situation becomes even more complex when considering the utilization of …
challenge. The situation becomes even more complex when considering the utilization of …
Securing NextG networks with physical-layer key generation: A survey
Q **ao, J Zhao, S Feng, G Li, A Hu - Security and Safety, 2024 - sands.edpsciences.org
As the development of next-generation (NextG) communication networks continues,
tremendous devices are accessing the network and the amount of information is exploding …
tremendous devices are accessing the network and the amount of information is exploding …
Hybrid KuFaI: A novel secure key generation algorithm using fast independent component analysis for physical layer security techniques
Many real‐world applications, such as smart cities, industrial automation, health care, and
so forth, utilize IoT‐enabled devices as a part of wireless networks. IoT devices must have …
so forth, utilize IoT‐enabled devices as a part of wireless networks. IoT devices must have …
Physical-Layer Key Generation Efficient Beamspace Adaptations in 5G New Radio
The fifth-generation new radio (NR) cellular communication is featured with numerous
advancements over Long Term Evolution (LTE) and earlier technologies. It enables more …
advancements over Long Term Evolution (LTE) and earlier technologies. It enables more …
Adversarial Defense Embedded Waveform Design for Reliable Communication in the Physical Layer
P Qi, Y Meng, S Zheng, X Zhou… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
Due to the openness of wireless channels, wireless communication is vulnerable to be
eavesdropped, which results in confidential information leakage. Physical-layer security …
eavesdropped, which results in confidential information leakage. Physical-layer security …
Joint Secrecy Rate Achieving and Authentication Enhancement via Tag-based Encoding in Chaotic UAV Communication Environment
J Wang, F Fang, G Han, N Wang… - IEEE Internet of Things …, 2025 - ieeexplore.ieee.org
Secure communication is crucial in many emerging systems enabled by unmanned aerial
vehicle (UAV) communication networks. To protect legitimate communication in a chaotic …
vehicle (UAV) communication networks. To protect legitimate communication in a chaotic …