• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
搜索

Author:

Wang, Xiaoping (Wang, Xiaoping.) | Waqas, Muhammad (Waqas, Muhammad.) | Tu, Shanshan (Tu, Shanshan.) | Rehman, Sadaqat Ur (Rehman, Sadaqat Ur.) | Soua, Ridha (Soua, Ridha.) | Rehman, Obaid Ur (Rehman, Obaid Ur.) | Anwar, Sajid (Anwar, Sajid.) | Zhao, Wei (Zhao, Wei.)

Indexed by:

EI Scopus SCIE

Abstract:

The intrinsic broadcast nature of wireless communication let the attackers to initiate several passive attacks such as eavesdropping. In this attack, the attackers do not disturb/stop or interrupt the communication channel, but it will silently steal the information between authentic users. For this purpose, physical layer security (PLS) is one of the promising methodologies to secure wireless transmissions from eavesdroppers. However, PLS is further divided into keyless security and secret key-based security. The keyless security is not practically implemented because it requires full/part of instantaneous/statistical channel state information (CSI) of the eavesdroppers. Alternatively, key-based security is exploiting the randomness and reciprocity of wireless channels that do not require any CSI from an eavesdropper. The secret key-based security is due to the unpredictability of wireless channels between two users. However, the secret key-based security mainly on two basic parameters, i.e. coherence time and transmission power. Nevertheless, the wireless channel between users has a short coherence time, and it will provide shorter keys' length due to which eavesdropper can easily extract keys between communicating parties. To overcome this limitation, we proposed the power allocation scheme to improve the secret key generation rate (SKGR) to strengthen the security between authentic users.

Keyword:

communicating parties physical layer security wireless transmissions communication security resource allocation telecommunication security critical attacks wireless channels secret key based security secret key-based security secret key generation passive attacks wireless communication CSI private key cryptography wireless channel secret keys keyless security communication channel

Author Community:

  • [ 1 ] [Wang, Xiaoping]Beijing Univ Technol, Fac Informat Technol, Beijing Key Lab Trusted Comp, Beijing 100124, Peoples R China
  • [ 2 ] [Waqas, Muhammad]Beijing Univ Technol, Fac Informat Technol, Beijing Key Lab Trusted Comp, Beijing 100124, Peoples R China
  • [ 3 ] [Tu, Shanshan]Beijing Univ Technol, Fac Informat Technol, Beijing Key Lab Trusted Comp, Beijing 100124, Peoples R China
  • [ 4 ] [Waqas, Muhammad]Ghulam Ishaq Khan Inst GIKI Engn Sci & Technol, Dept Comp Sci & Engn, Kpk, Pakistan
  • [ 5 ] [Rehman, Sadaqat Ur]Hamad Bin Khalifa Univ, Div ICT, Coll Sci & Engn, Doha, Qatar
  • [ 6 ] [Soua, Ridha]Univ Luxembourg, Interdisciplinary Ctr Secur Reliabil & Trust, Luxembourg, Luxembourg
  • [ 7 ] [Rehman, Obaid Ur]Sarhad Univ Sci & Informat Technol, Dept Elect Engn, Peshawar, Pakistan
  • [ 8 ] [Anwar, Sajid]Ghulam Ishaq Khan Inst GIKI Engn Sci & Technol, Dept Comp Sci & Engn, Kpk, Pakistan
  • [ 9 ] [Zhao, Wei]Beijing Electromech Engn Inst, Beijing, Peoples R China

Reprint Author's Address:

  • [Waqas, Muhammad]Beijing Univ Technol, Fac Informat Technol, Beijing Key Lab Trusted Comp, Beijing 100124, Peoples R China;;[Waqas, Muhammad]Ghulam Ishaq Khan Inst GIKI Engn Sci & Technol, Dept Comp Sci & Engn, Kpk, Pakistan

Show more details

Related Keywords:

Source :

IET COMMUNICATIONS

ISSN: 1751-8628

Year: 2020

Issue: 5

Volume: 14

Page: 872-879

1 . 6 0 0

JCR@2022

ESI Discipline: ENGINEERING;

ESI HC Threshold:115

Cited Count:

WoS CC Cited Count: 6

SCOPUS Cited Count: 9

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 9

Online/Total:784/10838936
Address:BJUT Library(100 Pingleyuan,Chaoyang District,Beijing 100124, China Post Code:100124) Contact Us:010-67392185
Copyright:BJUT Library Technical Support:Beijing Aegean Software Co., Ltd.