+

Chen et al., 2022 - Google Patents

Audio-based security techniques for secure device-to-device communications

Chen et al., 2022

Document ID
7078373344302918608
Author
Chen D
Zhang N
Wu H
Zhang K
Lu R
Guizani M
Publication year
Publication venue
IEEE Network

External Links

Snippet

In this article, we investigate audio-based security techniques to secure Device-to-Device (D2D) communications. First, the key distribution techniques for secure D2D communication are discussed, which generate the key by using the estimated response of the audio …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04RLOUDSPEAKERS, MICROPHONES, GRAMOPHONE PICK-UPS OR LIKE ACOUSTIC ELECTROMECHANICAL TRANSDUCERS; DEAF-AID SETS; PUBLIC ADDRESS SYSTEMS
    • H04R1/00Details of transducers, loudspeakers or microphones
    • H04R1/10Earpieces; Attachments therefor; Earphones; Monophonic headphones
    • H04R1/1016Earpieces of the intra-aural type
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04RLOUDSPEAKERS, MICROPHONES, GRAMOPHONE PICK-UPS OR LIKE ACOUSTIC ELECTROMECHANICAL TRANSDUCERS; DEAF-AID SETS; PUBLIC ADDRESS SYSTEMS
    • H04R1/00Details of transducers, loudspeakers or microphones
    • H04R1/10Earpieces; Attachments therefor; Earphones; Monophonic headphones
    • H04R1/1091Details not provided for in groups H04R1/1008 - H04R1/1083
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K1/00Secret communication
    • H04K1/04Secret communication by frequency scrambling, i.e. by transposing or inverting parts of the frequency band or by inverting the whole band
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/12Transmitting and receiving encryption devices synchronised or initially set up in a particular manner
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B1/00Details of transmission systems, not covered by a single one of groups H04B3/00 - H04B13/00; Details of transmission systems not characterised by the medium used for transmission
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B13/00Transmission systems characterised by the medium used for transmission, not provided for in groups H04B3/00 - H04B11/00
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B7/00Radio transmission systems, i.e. using radiation field
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B11/00Transmission systems employing sonic, ultrasonic or infrasonic waves
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B14/00Transmission systems not characterised by the medium used for transmission

Similar Documents

Publication Publication Date Title
Liu et al. Covert wireless communications in IoT systems: Hiding information in interference
Liu et al. Physical layer authentication enhancement using two-dimensional channel quantization
Jorswieck et al. Broadcasting into the uncertainty: Authentication and confidentiality by physical-layer processing
Shan et al. PHY-CRAM: Physical layer challenge-response authentication mechanism for wireless networks
Li et al. Securing wireless systems via lower layer enforcements
Paul et al. Physical-layer authentication
Xie et al. GeneWave: Fast authentication and key agreement on commodity mobile devices
Mukherjee et al. Principles of physical layer security in multiuser wireless networks: A survey
Cheng et al. Efficient physical‐layer secret key generation and authentication schemes based on wireless channel‐phase
Badawy et al. Unleashing the secure potential of the wireless physical layer: Secret key generation methods
Zhao et al. Physical layer node authentication in underwater acoustic sensor networks using time-reversal
Chen et al. Audio-based security techniques for secure device-to-device communications
Wang et al. Cooperative key agreement for wireless networking: Key rates and practical protocol design
CN109600222B (en) Key generation method based on channel characteristics
Lu et al. Free: A fast and robust key extraction mechanism via inaudible acoustic signal
Wei et al. Physical layer anonymous precoding: The path to privacy-preserving communications
Hou et al. Chorus: Scalable in-band trust establishment for multiple constrained devices over the insecure wireless channel
Li et al. Privacy-preserving physical-layer authentication under cooperative attacks
Xie et al. Physical layer authentication with high compatibility using an encoding approach
He et al. EPSON: Enhanced physical security in OFDM networks
Yu et al. AuthCTC: Defending against waveform emulation attack in heterogeneous IoT environments
Bala et al. PHY-based key agreement scheme using audio networking
Badawy et al. Robust secret key extraction from channel secondary random process
Cai et al. Multiple cooperative attackers for tag-based physical layer authentication
Soltani et al. Achieving secure communication through pilot manipulation
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载