Exploring Encryption Algorithms and Network Protocols: A Comprehensive Survey of Threats and Vulnerabilities

J Ahn, R Hussain, K Kang, J Son - … Communications Surveys & …, 2025 - ieeexplore.ieee.org
Cryptographic network protocols play a crucial role in enabling secure data exchange over
insecure media in modern network environments. However, even minor vulnerabilities can …

FPGA-Based PUF Designs: A Comprehensive Review and Comparative Analysis

K Lata, LR Cenkeramaddi - Cryptography, 2023 - mdpi.com
Field-programmable gate arrays (FPGAs) have firmly established themselves as dynamic
platforms for the implementation of physical unclonable functions (PUFs). Their intrinsic …

Key Agreement Using Physical Identifiers for Degraded and Less Noisy Authentication Channels

V Yachongka, H Yagi, H Ochiai - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Secret-key agreement using physical identifiers is a promising security protocol for the
authentication of users and devices with small chips, owing to its lightweight security. In the …

On Pre-Processing of Generalized Gamma Fading Channel Samples for Secret Key Generation

G Hussain, SJ Nawaz, S Wyne, E Cianca… - IEEE …, 2024 - ieeexplore.ieee.org
With the advent of innovative wireless technologies and the rapid growth of diverse
connected devices, ensuring communication security has become a critical challenge for the …

Experimental evaluation of a lightweight RSS-based PLA scheme in multi-node multi-cell mesh networks

HB Eldeeb, A Pandey, M Andreoni… - 2023 IEEE …, 2023 - ieeexplore.ieee.org
In infrastructure-less Internet of Things (IoT) mesh networks, node authentication is a critical
challenge. The situation becomes even more complex when considering the utilization of …

Securing NextG networks with physical-layer key generation: A survey

Q **ao, J Zhao, S Feng, G Li, A Hu - Security and Safety, 2024 - sands.edpsciences.org
As the development of next-generation (NextG) communication networks continues,
tremendous devices are accessing the network and the amount of information is exploding …

Hybrid KuFaI: A novel secure key generation algorithm using fast independent component analysis for physical layer security techniques

T Sarsodia, UR Bhatt, R Upadhyay… - Security and …, 2024 - Wiley Online Library
Many real‐world applications, such as smart cities, industrial automation, health care, and
so forth, utilize IoT‐enabled devices as a part of wireless networks. IoT devices must have …

Physical-Layer Key Generation Efficient Beamspace Adaptations in 5G New Radio

D Li, W Ma, F Zhou, Q Wu… - IEEE Transactions on …, 2025 - ieeexplore.ieee.org
The fifth-generation new radio (NR) cellular communication is featured with numerous
advancements over Long Term Evolution (LTE) and earlier technologies. It enables more …

Adversarial Defense Embedded Waveform Design for Reliable Communication in the Physical Layer

P Qi, Y Meng, S Zheng, X Zhou… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
Due to the openness of wireless channels, wireless communication is vulnerable to be
eavesdropped, which results in confidential information leakage. Physical-layer security …

Joint Secrecy Rate Achieving and Authentication Enhancement via Tag-based Encoding in Chaotic UAV Communication Environment

J Wang, F Fang, G Han, N Wang… - IEEE Internet of Things …, 2025 - ieeexplore.ieee.org
Secure communication is crucial in many emerging systems enabled by unmanned aerial
vehicle (UAV) communication networks. To protect legitimate communication in a chaotic …