• 综合
  • 标题
  • 关键词
  • 摘要
  • 学者
  • 期刊-刊名
  • 期刊-ISSN
  • 会议名称
搜索

作者:

Wang, Xiaoping (Wang, Xiaoping.) | Waqas, Muhammad (Waqas, Muhammad.) | Tu, Shanshan (Tu, Shanshan.) | Rehman, Sadaqat Ur (Rehman, Sadaqat Ur.) | Soua, Ridha (Soua, Ridha.) | Rehman, Obaid Ur (Rehman, Obaid Ur.) | Anwar, Sajid (Anwar, Sajid.) | Zhao, Wei (Zhao, Wei.)

收录:

EI Scopus SCIE

摘要:

The intrinsic broadcast nature of wireless communication let the attackers to initiate several passive attacks such as eavesdropping. In this attack, the attackers do not disturb/stop or interrupt the communication channel, but it will silently steal the information between authentic users. For this purpose, physical layer security (PLS) is one of the promising methodologies to secure wireless transmissions from eavesdroppers. However, PLS is further divided into keyless security and secret key-based security. The keyless security is not practically implemented because it requires full/part of instantaneous/statistical channel state information (CSI) of the eavesdroppers. Alternatively, key-based security is exploiting the randomness and reciprocity of wireless channels that do not require any CSI from an eavesdropper. The secret key-based security is due to the unpredictability of wireless channels between two users. However, the secret key-based security mainly on two basic parameters, i.e. coherence time and transmission power. Nevertheless, the wireless channel between users has a short coherence time, and it will provide shorter keys' length due to which eavesdropper can easily extract keys between communicating parties. To overcome this limitation, we proposed the power allocation scheme to improve the secret key generation rate (SKGR) to strengthen the security between authentic users.

关键词:

communicating parties physical layer security wireless transmissions communication security resource allocation telecommunication security critical attacks wireless channels secret key based security secret key-based security secret key generation passive attacks wireless communication CSI private key cryptography wireless channel secret keys keyless security communication channel

作者机构:

  • [ 1 ] [Wang, Xiaoping]Beijing Univ Technol, Fac Informat Technol, Beijing Key Lab Trusted Comp, Beijing 100124, Peoples R China
  • [ 2 ] [Waqas, Muhammad]Beijing Univ Technol, Fac Informat Technol, Beijing Key Lab Trusted Comp, Beijing 100124, Peoples R China
  • [ 3 ] [Tu, Shanshan]Beijing Univ Technol, Fac Informat Technol, Beijing Key Lab Trusted Comp, Beijing 100124, Peoples R China
  • [ 4 ] [Waqas, Muhammad]Ghulam Ishaq Khan Inst GIKI Engn Sci & Technol, Dept Comp Sci & Engn, Kpk, Pakistan
  • [ 5 ] [Rehman, Sadaqat Ur]Hamad Bin Khalifa Univ, Div ICT, Coll Sci & Engn, Doha, Qatar
  • [ 6 ] [Soua, Ridha]Univ Luxembourg, Interdisciplinary Ctr Secur Reliabil & Trust, Luxembourg, Luxembourg
  • [ 7 ] [Rehman, Obaid Ur]Sarhad Univ Sci & Informat Technol, Dept Elect Engn, Peshawar, Pakistan
  • [ 8 ] [Anwar, Sajid]Ghulam Ishaq Khan Inst GIKI Engn Sci & Technol, Dept Comp Sci & Engn, Kpk, Pakistan
  • [ 9 ] [Zhao, Wei]Beijing Electromech Engn Inst, Beijing, Peoples R China

通讯作者信息:

  • [Waqas, Muhammad]Beijing Univ Technol, Fac Informat Technol, Beijing Key Lab Trusted Comp, Beijing 100124, Peoples R China;;[Waqas, Muhammad]Ghulam Ishaq Khan Inst GIKI Engn Sci & Technol, Dept Comp Sci & Engn, Kpk, Pakistan

电子邮件地址:

查看成果更多字段

相关关键词:

相关文章:

来源 :

IET COMMUNICATIONS

ISSN: 1751-8628

年份: 2020

期: 5

卷: 14

页码: 872-879

1 . 6 0 0

JCR@2022

ESI学科: ENGINEERING;

ESI高被引阀值:115

被引次数:

WoS核心集被引频次: 6

SCOPUS被引频次: 8

ESI高被引论文在榜: 0 展开所有

万方被引频次:

中文被引频次:

近30日浏览量: 1

归属院系:

在线人数/总访问数:3261/3883338
地址:北京工业大学图书馆(北京市朝阳区平乐园100号 邮编:100124) 联系我们:010-67392185
版权所有:北京工业大学图书馆 站点建设与维护:北京爱琴海乐之技术有限公司