Browsing by Subject "Random processes"
Now showing items 1-6 of 6
-
Channel secondary random process for robust secret key generation
( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)The broadcast nature of wireless communications imposes the risk of information leakage to adversarial users or unauthorized receivers. Therefore, information security between intended users remains a challenging issue. ... -
Comparative simulation for physical layer key generation methods
( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)The paper cogitates about a comparative simulation for various distillation, reconciliation, and privacy amplification techniques that are used to generate secure symmetric physical layer keys. Elementary wireless model ... -
Impact of location heterogeneity on random walk mobility models
( Institute of Electrical and Electronics Engineers Inc. , 2013 , Conference Paper)This paper investigates random walk mobility models with location heterogeneity, where different locations may have different neighboring regions.With the assumption of totally n locations, we consider two cases, i.e., ... -
Robust secret key extraction from channel secondary random process
( John Wiley and Sons Ltd , 2016 , Conference Paper)The vast majority of existing secret key generation protocols exploit the inherent randomness of the wireless channel as a common source of randomness. However, independent noise added at the receivers of the legitimate ... -
Secret key generation based on AoA estimation for low SNR conditions
( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)In the context of physical layer security, a physical layer characteristic is used as a common source of randomness to generate the secret key. Therefore an accurate estimation of this characteristic is the core for reliable ... -
Unleashing the secure potential of the wireless physical layer: Secret key generation methods
( Elsevier B.V. , 2016 , Report)Within the paradigm of physical layer security, a physical layer characteristic is used as a common source of randomness to generate the secret key. This key is then used to encrypt the data to hide information from ...