Graber Porter 3 Bike Trunk Rack - bike rack graber
Li, G., Hu, A., Zhang, J., Peng, L., Sun, C., & Cao, D. (2018). High-agreement uncorrelated secret key generation based on principal component analysis preprocessing. IEEE Transactions on Communications, 66(7), 3022–3034. https://doi.org/10.1109/TCOMM.2018.2814607
Srivastva, R., & Singh, Y. N. (2019). ECG analysis for human recognition using non-fiducial methods. IET Biometrics, 8(5), 295–305. https://doi.org/10.1049/iet-bmt.2018.5093
Bottarelli, M., Karadimas, P., Epiphaniou, G., Ismail, D. K. B., & Maple, C. (2021). Adaptive and optimum secret key establishment for secure vehicular communications. IEEE Transactions on Vehicular Technology, 70(3), 2310–2321. https://doi.org/10.1109/TVT.2021.3056638
Soni, A., Upadhyay, R., & Kumar, A. (2019). Wireless physical layer key generation with improved bit disagreement for the internet of things using moving window averaging. Physical Communication, 33, 249–258.
Patwari, N., Croft, J., Jana, S., & Kasera, S. K. (2010). High-rate uncorrelated bit extraction for shared secret key generation from channel measurements. IEEE Transactions on Mobile Computing, 9(1), 17–30. https://doi.org/10.1109/TMC.2009.88
Zhang, J., Duong, T. Q., Marshall, A., & Woods, R. (2016). Key generation from wireless channels: A review. IEEE Access, 4, 614–626. https://doi.org/10.1109/ACCESS.2016.2521718
Epiduralkey
Margelis, G., Fafoutis, X., Oikonomou, G., Piechocki, R., Tryfonas, T., & Thomas, P. (2017). Physical layer secret-key generation with discreet cosine transform for the Internet of Things. In 2017 IEEE International Conference on Communications (ICC), Paris (pp. 1–)6. https://doi.org/10.1109/ICC.2017.7997419
Bakşi, S., & Popescu, D. C. (2019). Secret key generation with precoding and role reversal in MIMO wireless systems. IEEE Transactions on Wireless Communications, 18(6), 3104–3112. https://doi.org/10.1109/TWC.2019.2910103
Achieving communication security, along with high computational efficiency, is one of the challenging issues in the advancement of modern resource constraint wireless networks. Wireless physical layer secure key extraction in conjunction with suitable preprocessing techniques may be a possible way out. Principal component analysis (PCA) is one of the dimensionality reduction techniques employed commonly in various domains for different applications. However, the physical layer secure key extraction employing PCA as dimensionality reduction is untouched so far. This paper presents a comprehensive study on PCA based wireless secret key extraction with real-time experimentation. In this work, we propose to apply PCA as a preprocessing technique to reduce the total number of numerical computations required in the key generation process, by cutting down the dimension of the input data set. We propose to select the extracted principal components to be processed further for key generation, based on their information content and cross-correlation. We analyzed the performance of the proposed in terms of bit disagreement rate, key randomness and pass ratio. The computational complexity of the proposed approach is derived and the effect of dimensionality reduction factor (\({\mathbf{R}}_{\mathbf{f}}\)) on the required numerical computations is analyzed. It is found that substantial improvement in bit disagreement performance is achieved along with a significant reduction in the required numerical computations. Remarkably, these outcomes are achieved by slightly modifying one of the blocks of the traditional key generation system. Furthermore, the practicability of the proposed technique is verified through real-time experimentation in different physical scenarios.
Lin, R., Xu, L., Fang, H., et al. (2020). Efficient physical layer key generation technique in wireless communications. Journal of Wireless Communication Network, 2020, 13. https://doi.org/10.1186/s13638-019-1634-7
Room No D106, D-Block, Department of Electronics & Telecommunication, Institute of Engineering & Technology (IET-DAVV), Devi Ahilya Vishwavidyalaya, Khandwa Road, Indore, 452012, India
Rukhin, A., Soto, J., Nechvatal, J., Smid, M., Barker, E., Leigh, S., Levenson, M., Vangel, M., Banks, D., Heckert, A., Dray, J., & Vo, S. (2010). A statistical test suite for random and pseudorandom number generators for cryptographic applications. National Institute of Standards and Technology, Tech. Rep. Special Publication 800-22 Revision 1a.
Hu, L., Zhang, F., Hu, A., Jiang, Y., & Li, G. (2018). A key generation scheme for wireless physical layer based on frequency hopping. In 8th International Congress of Information and Communication Technology (ICICT-2018) (Vol. 131, pp. 1104–1112).
Jia, W., Sun, M., Lian, J., et al. (2022). Feature dimensionality reduction: A review. Complex Intell. Syst. https://doi.org/10.1007/s40747-021-00637-x
Park, K.-M., Hyun, S.-H., Lee, S., & Kim, S.-C. (2021). Fine-resolution ranging scheme based on signal strength in indoor hallway with rough-surface slab waveguide. IEEE Transactions on Instrumentation and Measurement, 70, 1–10. https://doi.org/10.1109/TIM.2021.3073324
Lou, C., Cao, M., Wu, R., Chen, D., & Xu, H. (2021). A lightweight key generation scheme for secure device-to-device (D2D) communication. Wireless Communications and Mobile Computing. https://doi.org/10.1155/2021/6642605
CADDKey
Room No D108, D-Block, Department of Electronics & Telecommunication, Institute of Engineering & Technology (IET-DAVV), Devi Ahilya Vishwavidyalaya India, Khandwa Road, Indore, 452012, India
This research work was supported under the Visvesvaraya Ph.D. Scheme for Electronics and IT by the Ministry of Electronics and Information Technology (MeitY), Government of India, sanctioned to Devi Ahilya Vishwavidyalaya under grant number PhD-MLA-4(37)/2015–16, Dated 11–09-2015. Ankit Soni has received research support from Ministry of Electronics and Information Technology (MeitY), Government of India to carry out this work.
Wang, L., An, H., Zhu, H., & Liu, W. (2020). MobiKey: Mobility-based secret key generation in smart home. IEEE Internet of Things Journal, 7(8), 7590–7600. https://doi.org/10.1109/JIOT.2020.2986399
All authors contributed to the study conception and design. Material preparation, data collection and analysis were performed by Ankit Soni. The first draft of the manuscript was written by Ankit Soni and all authors commented on previous versions of the manuscript. All authors read and approved the final manuscript.
Alkandari, A. A., Al-Shaikhli, I. F., & Alahmad, M. A. (2013). Cryptographic hash function: A high level view. International Conference on Informatics and Creative Multimedia, 2013, 128–134. https://doi.org/10.1109/ICICM.2013.29
Gupta, V., & De, S. (2018). SBL-based adaptive sensing framework for WSN-assisted IoT applications. IEEE Internet of Things Journal, 5(6), 4598–4612. https://doi.org/10.1109/JIOT.2018.2870970
Huth, C., Guillaume, R., Strohm, T., Duplys, P., Samuel, I. A., & Güneysu, T. (2016). Information reconciliation schemes in physical-layer security: A survey. Computer Networks, 109, 84–104. https://doi.org/10.1016/j.comnet.2016.06.014
Almohamad, T. A., Mohd Salleh, M. F., Mahmud, M. N., & Sa’D, A. H. Y. (2018). Simultaneous determination of modulation types and signal-to-noise ratios using feature-based approach. In IEEE Access (Vol. 6, pp. 9262–9271). https://doi.org/10.1109/ACCESS.2018.2809448
Mucchi, L., Nizzi, F., Pecorella, T., Fantacci, R., & Esposito, F. (2019). Benefits of physical layer security to cryptography: Tradeoff and applications. In 2019 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom), Sochi, Russia, 2019 (pp. 1–3). https://doi.org/10.1109/BlackSeaCom.2019.8812778
Soni, A., Upadhyay, R. & Kumar, A. Low Complexity Preprocessing Approach for Wireless Physical Layer Secret Key Extraction Based on PCA. Wireless Pers Commun 125, 2865–2888 (2022). https://doi.org/10.1007/s11277-022-09689-9
AlarisPCAPump
Fang, S., & Wang, C. (2015). A novel fused positioning feature for handling heterogeneous hardware problem. IEEE Transactions on Communications, 63(7), 2713–2723. https://doi.org/10.1109/TCOMM.2015.2442989
Salo, F., Nassif, A. B., & Essex, A. (2019). Dimensionality reduction with IG-PCA and ensemble classifier for network intrusion detection. Computer Networks, 148, 164–175.
Liu, T. (2007). Analysis of the principal component combining with weight estimation for DPSK signals. IEEE Transactions on Wireless Communications, 6(3), 822–826. https://doi.org/10.1109/TWC.2007.05483
CADD-Solis PumpKey
Prasad, K. N. R. S. V., & Bhargava, V. K. (2021). RSS localization under gaussian distributed path loss exponent model. IEEE Wireless Communications Letters, 10(1), 111–115. https://doi.org/10.1109/LWC.2020.3021991
The author would like to acknowledge and thanks Ministry of Electronics and Information Technology (MeitY), Government of India for supporting this research work under the Visvesvaraya Ph.D. Scheme for Electronics and IT by the Ministry of Electronics and Information Technology, sanctioned to Devi Ahilya Vishwavidyalaya under grant number PhD-MLA-4(37)/2015-16, Dated 11-09-2015.
Lei, W., Yizhou, G., Fucai, Z., & Yong, W. (2018). The method to recognize linear block code based on the distribution of code weight. In 2018 10th International Conference on Communication Software and Networks (ICCSN) (pp. 16–20). https://doi.org/10.1109/ICCSN.2018.8488259.
CADDkeyeBay
Zhuang, J., Wang, Y., Zhang, S., Wan, P., & Sun, C. (2019). A multi-antenna spectrum sensing scheme based on main information extraction and genetic algorithm clustering. IEEE Access, 7, 119620–119630. https://doi.org/10.1109/ACCESS.2019.2936511
PCApump
Soni, A., Upadhyay, R., & Kumar, A. (2019). Dimensionality reduction in wireless physical layer key generation. Proceeding of IEEE INDICON. https://doi.org/10.1109/INDICON47234.2019.9029059
Padilla, J. L., Padilla, P., Valenzuela-Valdés, J. F., Ramírez, J., & Górriz, J. M. (2014). RF fingerprint measurements for the identification of devices in wireless communication networks based on feature reduction and subspace transformation. Measurement, 58, 468–475.
Zhan, F., & Yao, N. (2017). On the using of discrete wavelet transform for physical layer key generation. Ad Hoc Networks, 64, 22–31. https://doi.org/10.1016/j.adhoc.2017.06.003
The datasets generated and/or analyzed during the current study are available from the corresponding author on reasonable request.
Soni, A., Upadhyay, R., & Jain, A. Internet of things & Wireless Physical Layer security : A survey. https://doi.org/10.1007/978-981-10-3226-4_11
Graur, O., Islam, N., Henkel, W., & “Quantization for Physical Layer Security”,. (2016). IEEE Globecom Workshops (GC Wkshps). Washington, DC, 2016, 1–7. https://doi.org/10.1109/GLOCOMW.2016.7849013
Wang, D., Bai, B., Lei, K., Zhao, W., Yang, Y., & Han, Z. (2019). Enhancing information security via physical layer approaches in heterogeneous IoT With multiple access mobile edge computing in smart city. IEEE Access, 7, 54508–54521. https://doi.org/10.1109/ACCESS.2019.2913438
Adil, M., Wyne, S., & Nawaz, S. J. (2021). On quantization for secret key generation from wireless channel samples. IEEE Access, 9, 21653–21668. https://doi.org/10.1109/ACCESS.2021.3055561