Search
Now showing items 1-7 of 7
Robust secret key extraction from channel secondary random process
(
John Wiley and Sons Ltd
, 2016 , Conference Paper)
The vast majority of existing secret key generation protocols exploit the inherent randomness of the wireless channel as a common source of randomness. However, independent noise added at the receivers of the legitimate ...
Distributed cross-layer optimization for healthcare monitoring applications
(
IEEE Computer Society
, 2014 , Conference Paper)
Mobile Health (mHealth) systems leverage wireless and mobile communication technologies to provide healthcare stakeholders with innovative tools and solutions that can revolutionize healthcare provisioning. Body Area Sensor ...
Secret key generation based on channel and distance measurements
(
IEEE Computer Society
, 2014 , Conference Paper)
Within the paradigm of physical layer secrecy, typically a physical layer specific characteristic is used as key generator to guarantee information hiding from eavesdroppers. In this paper, we propose a novel secret key ...
Channel secondary random process for robust secret key generation
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
The broadcast nature of wireless communications imposes the risk of information leakage to adversarial users or unauthorized receivers. Therefore, information security between intended users remains a challenging issue. ...
Energy-aware cross-layer optimization for EEG-based wireless monitoring applications
(
IEEE Computer Society
, 2013 , Conference Paper)
Body Area Sensor Networks (BASNs) for healthcare applications have gained significant research interests recently due to the growing number of patients with chronic diseases requiring constant monitoring. Because of the ...
Comparative simulation for physical layer key generation methods
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
The paper cogitates about a comparative simulation for various distillation, reconciliation, and privacy amplification techniques that are used to generate secure symmetric physical layer keys. Elementary wireless model ...
The impact of inter-layer network coding on the relative performance of MRC/MDC WiFi media delivery
(
ACM
, 2011 , Conference Paper)
A primary challenge in multicasting video in a wireless LAN is to deal with the client diversity - clients may have different channel characteristics and hence receive different numbers of transmissions from the AP. A ...