Wireless physical layer key generation with improved bit disagreement for the internet of things using moving window averaging

2019 ◽  
Vol 33 ◽  
pp. 249-258 ◽  
Author(s):  
Ankit Soni ◽  
Raksha Upadhyay ◽  
Abhay Kumar
2019 ◽  
Vol 26 (5) ◽  
pp. 92-98 ◽  
Author(s):  
Junqing Zhang ◽  
Sekhar Rajendran ◽  
Zhi Sun ◽  
Roger Woods ◽  
Lajos Hanzo

2019 ◽  
Vol 92 ◽  
pp. 101744 ◽  
Author(s):  
George Margelis ◽  
Xenofon Fafoutis ◽  
George Oikonomou ◽  
Robert Piechocki ◽  
Theo Tryfonas ◽  
...  

Author(s):  
Adam Henschke

The internet of things (IoT), where objects can communicate with each other in a way that affects the physical world, will likely have a great impact on people and society at large. Like a massively distributed set of robots, its effects will be felt on both physical and information realms. After describing key elements of the IoT, this chapter summarizes major ethical concerns. For the physical layer, the primary ethical concerns center on safety, while the informational layer’s primary concerns are about controlling information. Given the two layers’ distinct ethical concerns, we face a problem of moral pluralism—which of these layers should take priority? Recognizing this pluralism, the chapter argues that designers, policymakers, and users not only must not pay attention to both layers, but may also have to prioritize one layer over the other.


The Internet of Things (IoT) being a promising innovation of things to come and is required to associate billions of gadgets. Web of things (IoT) gadgets have been generally utilized, and Electronic correspondence is expanded quickly. The expanded number of correspondence is required to create piles of information and the security of information can be a danger. Information gathered by the IoT gadgets and the information which IoT gadget send might be the portal for an assailant to break client security. To guarantee secure correspondence between IoT centers and central point(server), a cryptographic plan for lightweight gadgets is proposed. In this plan, we make utilize pseudo stream cipher with key generation for rearranging key synchronization and improving security.. The common verification, secret key for meeting synchronization and refreshing secret key for session are finished by trading scrambled messages. Likewise, the key length and update cycle for mystery key for meeting are adaptable as indicated by application. Keys are created from mystery key for meeting for improving the security. We contrasted the plan's security and execution and some lightweight plans. As indicated by the investigation, the proposed plan can give greater security includes low overhead of correspondence which is correct for IoT Node with restricted resource and power. Encryption and decoding is finished utilizing trigonometric ideas and by utilizing the idea of stream figure. Trigonometric ideas are lightweight and improve the security up by an extraordinary degree by diminishing the odds of cryptanalysis. When contrasted with different calculations like Hill figure, RC4, RSA and Present(Lightweight square figure) and so forth, the proposed calculation gives better execution.


Sign in / Sign up

Export Citation Format

Share Document