Native Security Scheme Based on Physical Layer Chain Key for Encryption and Authentication.
Liang JinXiaoyan HuXiaoli SunYangming LouKaizhi HuangZhou ZhongXiaoming XuPublished in: WCNC Workshops (2021)
Keyphrases
- private key
- physical layer
- high security
- public key
- security analysis
- elliptic curve cryptography
- secure communication
- key distribution
- image encryption
- secret key
- public key cryptography
- encryption decryption
- authentication scheme
- mutual authentication
- digital signature
- signature scheme
- authentication protocol
- encryption scheme
- key management
- application layer
- wireless communication
- ciphertext
- diffie hellman
- integrity verification
- security requirements
- elliptic curve
- data encryption
- virtual private network
- network layer
- security properties
- user authentication
- resource utilization
- provably secure
- security protocols
- security mechanisms
- communication systems
- information security
- smart card
- encryption algorithm
- communication protocol
- smart grid
- rfid tags