Chen et al., 2022 - Google Patents
Audio-based security techniques for secure device-to-device communicationsChen et al., 2022
- Document ID
- 7078373344302918608
- Author
- Chen D
- Zhang N
- Wu H
- Zhang K
- Lu R
- Guizani M
- Publication year
- Publication venue
- IEEE Network
External Links
Snippet
In this article, we investigate audio-based security techniques to secure Device-to-Device (D2D) communications. First, the key distribution techniques for secure D2D communication are discussed, which generate the key by using the estimated response of the audio …
- 238000000034 method 0 title abstract description 20
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0852—Quantum cryptography
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04R—LOUDSPEAKERS, MICROPHONES, GRAMOPHONE PICK-UPS OR LIKE ACOUSTIC ELECTROMECHANICAL TRANSDUCERS; DEAF-AID SETS; PUBLIC ADDRESS SYSTEMS
- H04R1/00—Details of transducers, loudspeakers or microphones
- H04R1/10—Earpieces; Attachments therefor; Earphones; Monophonic headphones
- H04R1/1016—Earpieces of the intra-aural type
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04R—LOUDSPEAKERS, MICROPHONES, GRAMOPHONE PICK-UPS OR LIKE ACOUSTIC ELECTROMECHANICAL TRANSDUCERS; DEAF-AID SETS; PUBLIC ADDRESS SYSTEMS
- H04R1/00—Details of transducers, loudspeakers or microphones
- H04R1/10—Earpieces; Attachments therefor; Earphones; Monophonic headphones
- H04R1/1091—Details not provided for in groups H04R1/1008 - H04R1/1083
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04K—SECRET COMMUNICATION; JAMMING OF COMMUNICATION
- H04K1/00—Secret communication
- H04K1/04—Secret communication by frequency scrambling, i.e. by transposing or inverting parts of the frequency band or by inverting the whole band
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/12—Transmitting and receiving encryption devices synchronised or initially set up in a particular manner
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B1/00—Details of transmission systems, not covered by a single one of groups H04B3/00 - H04B13/00; Details of transmission systems not characterised by the medium used for transmission
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B13/00—Transmission systems characterised by the medium used for transmission, not provided for in groups H04B3/00 - H04B11/00
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B11/00—Transmission systems employing sonic, ultrasonic or infrasonic waves
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B14/00—Transmission systems not characterised by the medium used for transmission
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Liu et al. | Covert wireless communications in IoT systems: Hiding information in interference | |
| Liu et al. | Physical layer authentication enhancement using two-dimensional channel quantization | |
| Jorswieck et al. | Broadcasting into the uncertainty: Authentication and confidentiality by physical-layer processing | |
| Shan et al. | PHY-CRAM: Physical layer challenge-response authentication mechanism for wireless networks | |
| Li et al. | Securing wireless systems via lower layer enforcements | |
| Paul et al. | Physical-layer authentication | |
| Xie et al. | GeneWave: Fast authentication and key agreement on commodity mobile devices | |
| Mukherjee et al. | Principles of physical layer security in multiuser wireless networks: A survey | |
| Cheng et al. | Efficient physical‐layer secret key generation and authentication schemes based on wireless channel‐phase | |
| Badawy et al. | Unleashing the secure potential of the wireless physical layer: Secret key generation methods | |
| Zhao et al. | Physical layer node authentication in underwater acoustic sensor networks using time-reversal | |
| Chen et al. | Audio-based security techniques for secure device-to-device communications | |
| Wang et al. | Cooperative key agreement for wireless networking: Key rates and practical protocol design | |
| CN109600222B (en) | Key generation method based on channel characteristics | |
| Lu et al. | Free: A fast and robust key extraction mechanism via inaudible acoustic signal | |
| Wei et al. | Physical layer anonymous precoding: The path to privacy-preserving communications | |
| Hou et al. | Chorus: Scalable in-band trust establishment for multiple constrained devices over the insecure wireless channel | |
| Li et al. | Privacy-preserving physical-layer authentication under cooperative attacks | |
| Xie et al. | Physical layer authentication with high compatibility using an encoding approach | |
| He et al. | EPSON: Enhanced physical security in OFDM networks | |
| Yu et al. | AuthCTC: Defending against waveform emulation attack in heterogeneous IoT environments | |
| Bala et al. | PHY-based key agreement scheme using audio networking | |
| Badawy et al. | Robust secret key extraction from channel secondary random process | |
| Cai et al. | Multiple cooperative attackers for tag-based physical layer authentication | |
| Soltani et al. | Achieving secure communication through pilot manipulation |