scholarly journals Radio Identity Verification-based IoT Security Using RF-DNA Fingerprints and SVM

Author(s):  
Donald Reising ◽  
Joseph Cancelleri ◽  
T. Daniel Loveless ◽  
Farah Kandah ◽  
Anthony Skjellum
2014 ◽  
Vol 1 (3) ◽  
pp. 8-17
Author(s):  
Shefali Sharma ◽  
◽  
Ashutosh Kumar Singh ◽  
Rajiv Saxena ◽  
◽  
...  

2019 ◽  
Vol 18 (3) ◽  
pp. 1-21 ◽  
Author(s):  
Weiqiang Liu ◽  
Lei Zhang ◽  
Zhengran Zhang ◽  
Chongyan Gu ◽  
Chenghua Wang ◽  
...  
Keyword(s):  
Low Cost ◽  

Author(s):  
Tobias Mitterer ◽  
Leander B. Hormann ◽  
Hans-Peter Bernhard ◽  
Peter Priller ◽  
Hubert Zangl
Keyword(s):  

Author(s):  
Ali Al Mousa ◽  
Mohammad Al Qomri ◽  
Salman Al Hajri ◽  
Rachid Zagrouba ◽  
Sghaier Chaabani
Keyword(s):  

Symmetry ◽  
2021 ◽  
Vol 13 (5) ◽  
pp. 855
Author(s):  
Tzung-Her Chen ◽  
Wei-Bin Lee ◽  
Hsing-Bai Chen ◽  
Chien-Lung Wang

Although digital signature has been a fundamental technology for cryptosystems, it still draws considerable attention from both academia and industry due to the recent raising interest in blockchains. This article revisits the subliminal channel existing digital signature and reviews its abuse risk of the constructor’s private key. From a different perspective on the subliminal channel, we find the new concept named the chamber of secrets in blockchains. The found concept, whereby the secret is hidden and later recovered by the constructor from the common transactions in a blockchain, highlights a new way to encourage implementing various applications to benefit efficiency and security. Thus, the proposed scheme benefits from the following advantages: (1) avoiding the high maintenance cost of certificate chain of certificate authority, or public key infrastructure, and (2) seamlessly integrating with blockchains using the property of chamber of secrets. In order to easily understand the superiority of this new concept, a remote authentication scenario is taken as a paradigm of IoT to demonstrate that the further advantages are achieved: (1) avoiding high demand for storage space in IoT devices, and (2) avoiding maintaining a sensitive table in IoT server.


Author(s):  
P. Velmurugan ◽  
K. Senthil kumar ◽  
S.S. Sridhar ◽  
E. Gotham
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document