• Channel secondary random process for robust secret key generation 

      Badawy A.; Khattab T.; Elfouly T.; Chiasserini C.-F.; Mohamed A.; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)
      The broadcast nature of wireless communications imposes the risk of information leakage to adversarial users or unauthorized receivers. Therefore, information security between intended users remains a challenging issue. ...
    • Comparative simulation for physical layer key generation methods 

      Saad A.; Mohamed A.; Elfouly T.M.; Khattab T.; Guizani M. ( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)
      The paper cogitates about a comparative simulation for various distillation, reconciliation, and privacy amplification techniques that are used to generate secure symmetric physical layer keys. Elementary wireless model ...
    • Impact of location heterogeneity on random walk mobility models 

      Zhang, Jinbei; Luoyi Fu; Wang, Xinbing; Guizani, Mohsen ( Institute of Electrical and Electronics Engineers Inc. , 2013 , Conference Paper)
      This paper investigates random walk mobility models with location heterogeneity, where different locations may have different neighboring regions.With the assumption of totally n locations, we consider two cases, i.e., ...
    • Robust secret key extraction from channel secondary random process 

      Badawy A.; Elfouly T.; Khattab T.; Chiasserini C.-F.; Mohamed A.; ... more authors ( John Wiley and Sons Ltd , 2016 , Conference Paper)
      The vast majority of existing secret key generation protocols exploit the inherent randomness of the wireless channel as a common source of randomness. However, independent noise added at the receivers of the legitimate ...
    • Secret key generation based on AoA estimation for low SNR conditions 

      Badawy A.; Khattab T.; El-Fouly T.; Mohamed A.; Trinchero D.; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)
      In the context of physical layer security, a physical layer characteristic is used as a common source of randomness to generate the secret key. Therefore an accurate estimation of this characteristic is the core for reliable ...
    • Unleashing the secure potential of the wireless physical layer: Secret key generation methods 

      Badawy, Ahmed; Elfouly, Tarek; Khattab, Tamer; Mohamed, Amr; Guizani, Mohsen ( Elsevier B.V. , 2016 , Report)
      Within the paradigm of physical layer security, a physical layer characteristic is used as a common source of randomness to generate the secret key. This key is then used to encrypt the data to hide information from ...