Login / Signup
On the Use of CSI for the Generation of RF Fingerprints and Secret Keys.
Muralikrishnan Srinivasan
Sotiris Skaperas
Arsenia Chorti
Published in:
WSA (2021)
Keyphrases
</>
secret key
pseudorandom
smart card
authentication scheme
secure communication
security level
key distribution
relevance feedback
public key
authentication protocol
forward secure
key agreement
radio frequency
data sets
key management
knn
wireless sensor networks