Search
Now showing items 1-10 of 10
Robust secret key extraction from channel secondary random process
(
John Wiley and Sons Ltd
, 2016 , Conference Paper)
The vast majority of existing secret key generation protocols exploit the inherent randomness of the wireless channel as a common source of randomness. However, independent noise added at the receivers of the legitimate ...
Secret key generation based on channel and distance measurements
(
IEEE Computer Society
, 2014 , Conference Paper)
Within the paradigm of physical layer secrecy, typically a physical layer specific characteristic is used as key generator to guarantee information hiding from eavesdroppers. In this paper, we propose a novel secret key ...
Channel secondary random process for robust secret key generation
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
The broadcast nature of wireless communications imposes the risk of information leakage to adversarial users or unauthorized receivers. Therefore, information security between intended users remains a challenging issue. ...
Secret key generation based on AoA estimation for low SNR conditions
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
In the context of physical layer security, a physical layer characteristic is used as a common source of randomness to generate the secret key. Therefore an accurate estimation of this characteristic is the core for reliable ...
Exposure assessment to WiFi access points by simulations and measurements
(
IEEE
, 2011 , Conference Paper)
This paper discusses two different approaches to assess exposure to indoor WiFi access points at two different frequency bands: 2.4GHz and 5GHz. The first analyzes the electromagnetic propagation in almost empty environments ...
Advanced experimental setup for the reliability characterization of radio-acoustic sensors in water pipes
(
IEEE
, 2011 , Conference Paper)
The paper presents the design and construction of a test bench for the analysis and certification of radio-acoustic sensors inside conduits filled with liquids. It is a brand new test-set that integrates the capability to ...
Innovative ad-hoc wireless sensor networks to significantly reduce leakages in underground water infrastructures
(
IEEE
, 2010 , Conference Paper)
This paper presents an ICT solution to overcome the problem of water dispersion in water distribution networks. Leakage prevention and breaks identification in water distribution networks are fundamental for an adequate ...
Enabling ICT development with low cost high capacity wireless networks in remote and underdeveloped locations an application to public finance management in Comoros Islands
(
Institute of Electrical and Electronics Engineers Inc.
, 2014 , Conference Paper)
The 'Union of the Comoros' is a volcanic archipelago nation in the Indian Ocean, consisting of three islands. About half the population lives below the international poverty line of US$1.25 a day. The interiors of the ...
Mobile wireless sensor networks applied to the survey of water infrastructures
(
IEEE
, 2010 , Conference Paper)
The paper reports our last advances in the realization of mobile wireless sensor networks (WSNs), able to reveal unknown tracks and leakages within underground pipelines used to distribute water. This WSN technology is ...
A simple cross correlation switched beam system (XSBS) for angle of arrival estimation
(
Institute of Electrical and Electronics Engineers Inc.
, 2017 , Article)
We propose a practical, simple and hardware friendly, yet novel and efficient, angle of arrival (AoA) estimation system. Our intuitive, two-phases cross-correlation-based system requires a switched beam antenna array with ...