A new frontier for IoT security emerging from three decades of key generation relying on wireless channels

J Zhang, G Li, A Marshall, A Hu, L Hanzo - IEEE Access, 2020 - ieeexplore.ieee.org
The Internet of Things (IoT) is a transformative technology, which is revolutionizing our
everyday life by connecting everyone and everything together. The massive number of …

Secure key generation in sensor networks based on frequency-selective channels

M Wilhelm, I Martinovic… - IEEE Journal on Selected …, 2013 - ieeexplore.ieee.org
Key management in wireless sensor networks faces several unique challenges. The scale,
resource limitations, and new threats such as node capture suggest the use of in-network …

Life cycle of wireless sensor nodes in industrial environments

HP Bernhard, A Springer, A Berger… - 2017 IEEE 13th …, 2017 - ieeexplore.ieee.org
We present the design of a suite of protocols for wireless sensor networks (WSNs) with
respect to a complete life cycle of a WSN node from warehouse to the end of operation …

Resilient against spoofing in 6LoWPAN networks by temporary-private IPv6 addresses

M Mavani, K Asawa - Peer-to-Peer Networking and Applications, 2020 - Springer
An attacker can disrupt the network operations in the 6LoWPANs by spoofing the IPv6
address while evading the detection. Despite many existing spoofing prevention techniques …

Combinatorial Cryptography and Latin Squares

B Zolfaghari, K Bibak - Perfect Secrecy in IoT: A Hybrid Combinatorial …, 2022 - Springer
In this chapter, we first overview the applications of combinatorics in cryptography. Then, we
take look at some historical applications of non-combinatorial squares and cubes in …

[KSIĄŻKA][B] Perfect Secrecy in IoT: A Hybrid Combinatorial-Boolean Approach

B Zolfaghari, K Bibak - 2022 - books.google.com
Perfectly-secure cryptography is a branch of information-theoretic cryptography. A perfectly-
secure cryptosystem guarantees that the malicious third party cannot guess anything …

6doku: Towards secure over-the-air preloading of 6lowpan nodes using phy key generation

KF Krentz, G Wunder - Smart SysTech 2015; European …, 2015 - ieeexplore.ieee.org
Currently, adding a new node to an existing 6Lo-WPAN network is tedious. The user has to
plug a cable into each new node so as to preload it with cryptographic material, as well as …

Initial key distribution for industrial wireless sensor networks

A Ray, J Åkerberg, M Gidlund… - 2013 IEEE International …, 2013 - ieeexplore.ieee.org
In any security design, the initial secret distribution for further key management solution is a
major step. In industrial wireless sensor networks also, initial bootstrap** of the trust in the …

[PDF][PDF] AdhocPairing: Spontaneous audio based secure device pairing for Android mobile devices

S Sigg, Y Ji, N Nguyen, A Huynh - Proceedings of the 4th …, 2012 - academia.edu
We present an implementation of AdhocPairing, an audiobased secure pairing application
for Android mobile devices. The application implements recent advances in audio-based …

Employee trust based industrial device deployment and initial key establishment

A Ray, J Akerberg, M Bjorkman, M Gidlund - arxiv preprint arxiv …, 2016 - arxiv.org
An efficient key management system is required to support cryptography. Most key
management systems use either pre-installed shared keys or install initial security …