Robust Secret Sharing for End-to-End Key Establishment with Physical Layer Keys Under Active Attacks

Author(s):  
Stefan Pfennig ◽  
Sabrina Engelmann ◽  
Elke Franz ◽  
Anne Wolf
Author(s):  
Huihui Wu ◽  
Yitian Zhang ◽  
Xueqing Zhao ◽  
Ningbo Zhu ◽  
Mark Coates

2020 ◽  
Vol 7 (3) ◽  
pp. 2117-2128 ◽  
Author(s):  
Salvador Perez ◽  
Jose L. Hernandez-Ramos ◽  
Shahid Raza ◽  
Antonio Skarmeta

Author(s):  
Juan Moreno Garcia-Loygorri ◽  
Sofiane Kharbech ◽  
Laurent Clavier ◽  
Redha Kassi ◽  
Raul Torrego ◽  
...  

Ultra wideband (UWB) radio ascends as an attractive physical layer for extraordinarily chosen frame (MANET) adaptability. Guiding in MANET is a study that can be inferred from the vibrant thinking of the topology system and the impediments to resources. In this document, UWB is proposing a stable coordination structure concentrating on the flimsiness problem from the foggy area of communication. This tool is a cross-layer shift of tradition-controlled uncommonly delegated on-ask for vector (AODV), called CLS AODV. The managing exposure calculation is associated by showing source planning and extraordinarily chose on-request multipath remove vector (AOMDV) organizing. Rather than the open way in AODV, the got sign quality can be used to reveal shady territory wish affiliation state data, just as course state seeing. A preventive neighborhood fix course gauge dependent on HELLO knows about keeping the affiliation breakage event. Greetings notification is extended not only for neighborhood identification and exchange of neighborhood data, but also as an ON / OFF fee for controlling neighborhood location layout and HELLO design. The proliferation shows the progression of CLS AODV to the extent of the package incident and the typical end-to-end acknowledgement without exchanging the differentiated performance.


IEEE Access ◽  
2019 ◽  
Vol 7 ◽  
pp. 38322-38336 ◽  
Author(s):  
Pinchang Zhang ◽  
Jinxiao Zhu ◽  
Yin Chen ◽  
Xiaohong Jiang

Sensors ◽  
2019 ◽  
Vol 19 (10) ◽  
pp. 2310 ◽  
Author(s):  
Younchan Jung ◽  
Marnel Peradilla ◽  
Ronnel Agulto

The existing LTE mobile system uses the vertical model to handle the session-based security management. However, the goal of this paper is to propose a packet key-based security management scheme on the blockchain control plane to enhance the existing session key-based security scheme and overcome the limitation that the existing vertical model, as well as the Software-Defined Networking (SDN) based horizontal model, confronts within solving end-to-end security management. The proposed blockchain-based security management (BSM) scheme enables each peer to easily obtain the necessary parameters required to manage the packet key-based security system. The important features of the BSM scheme include the renewal process, which enables the different packet data streams to use completely different security parameters for the security management. In addition, because even blind values cannot be exposed to the possible attackers, our BSM scheme guarantees very secure end-to-end data transfer against active attacks such as falsification of data and transactions. Finally, this paper compares the BSM scheme with the existing vertical model to prove the advantageous effects on latency.


Sign in / Sign up

Export Citation Format

Share Document