Practical limits of the secret key-capacity for IoT physical layer security.
George MargelisXenofon FafoutisRobert J. PiechockiGeorge C. OikonomouTheo TryfonasPaul ThomasPublished in: WF-IoT (2016)
Keyphrases
- physical layer
- secret key
- key management
- wireless communication
- smart card
- network layer
- application layer
- encryption scheme
- authentication protocol
- key distribution
- smart grid
- communication protocol
- public key
- resource utilization
- diffie hellman
- bit error rate
- management system
- communication systems
- multipath
- hash functions
- mac protocol
- multi hop
- security issues
- wireless ad hoc networks
- ciphertext
- channel coding
- information security
- load balancing
- cloud computing
- sensor networks