LoRa-Based Physical Layer Key Generation for Secure V2V/V2I Communications

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Multi-layer key management for secure multimedia multicast communications

An important application of multicasting is group-oriented multimedia communication, such as video-on-demand and video conferencing. Before these services can be successfully deployed, security infrastructures must be developed to ensure access control to multicast content. In this paper, we present a multi-group key management scheme tailored to multimedia multicast services that distribute da...

متن کامل

Generation of Secret Key for Physical Layer to Evaluate Channel Characteristics in Wireless Communications

This manuscript aims to generate a secret key for a PHY layer to evaluate the channel characteristics in wireless communications. An algorithmic approach is adopted for multimedia encryption to generate a secret key between two entities communicating with each other in a real time simulation environment such as MATLAB. Two classes of PHY key generation schemes are analyzed for designing the alg...

متن کامل

Physical layer secret key generation for fiber-optical networks.

We propose and experimentally demonstrate a method for generating and sharing a secret key using phase fluctuations in fiber optical links. The obtained key can be readily used to support secure communication between the parties. The security of our approach is based on a fundamental asymmetry associated with the optical physical layer: the sophistication of tools needed by an eavesdropping adv...

متن کامل

A Physical Layer Key Negotiation Mechanism to Secure Wireless Networks

The rapid technological developments in computing technology and the proliferation of wireless network nodes with light infrastructure, have emerged large quantities of security requirements of informational privacy in cyberspace. Due to the inherent nature of open medium, diversity and variability of network topology, wireless networks are greatly difficult to secure by traditional methods. A ...

متن کامل

Secure key agreement for group communications

-Many key establishment protocols have been proposed for secure group communications. However, these protocols share the limitations that group members are not mutually authenticated, dynamic group membership is not considered, and the cost of key establishment is substantial. A secure key agreement protocol for group communications is proposed in this paper, which ensures the authenticity of g...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Sensors

سال: 2020

ISSN: 1424-8220

DOI: 10.3390/s20030682