International Journal For Multidisciplinary Research
E-ISSN: 2582-2160
•
Impact Factor: 9.24
A Widely Indexed Open Access Peer Reviewed Multidisciplinary Bi-monthly Scholarly International Journal
Home
Research Paper
Submit Research Paper
Publication Guidelines
Publication Charges
Upload Documents
Track Status / Pay Fees / Download Publication Certi.
Editors & Reviewers
View All
Join as a Reviewer
Reviewer Referral Program
Get Membership Certificate
Current Issue
Publication Archive
Conference
Publishing Conf. with IJFMR
Upcoming Conference(s) ↓
WSMCDD-2025
GSMCDD-2025
Conferences Published ↓
RBS:RH-COVID-19 (2023)
ICMRS'23
PIPRDA-2023
Contact Us
Plagiarism is checked by the leading plagiarism checker
Call for Paper
Volume 6 Issue 6
November-December 2024
Indexing Partners
Proficient Secret Key Generation using Derivates of the Transform Function for the Internet of Things
Author(s) | Reeta Singh, Dr.Susheel Kumar Tiwari |
---|---|
Country | India |
Abstract | Secured data transfer over the internet of things enables communication devices is a very challenging task. Due to the limitation of computational resources, classical cryptography algorithms are vulnerable to cyber threats and loss of integrity and information. Recently, physical layer secret key generation has played a vital role in secured communication on the internet of things. The physical layer key generation approach provides an alternate means of information security using the signal reciprocity of wireless communication. This paper proposed proficient dynamic secret key generation using derivates of transform functions. The derivates of transform functions such as DCT, DWT, DWPT, and many more light transform functions the physical layer key generation employs RSSI channel parameters in conjunction with the discrete wavelet transform to generate low computational secret keys for the authentication of IoT-enabled communication devices. The proposed algorithm is very efficient and reduces the bit disagreement of the key. We use MATLAB software defined radios to conduct the experiment, and we then evaluate the effectiveness of our post-processing techniques. Our approach is helpful for safeguarding future IoT devices since it enhances the ability of targeted nodes to establish matching secret keys while reducing the risk of an eavesdropper. The experimental results of key generation methods suggest that the proposed algorithm is very efficient instead of DCT and DWT. |
Keywords | wireless Communication, IoTs, Transform Methods, Cryptography, Physical Layer, RSSI |
Field | Computer Applications |
Published In | Volume 6, Issue 1, January-February 2024 |
Published On | 2024-02-29 |
Cite This | Proficient Secret Key Generation using Derivates of the Transform Function for the Internet of Things - Reeta Singh, Dr.Susheel Kumar Tiwari - IJFMR Volume 6, Issue 1, January-February 2024. DOI 10.36948/ijfmr.2024.v06i01.14260 |
DOI | https://doi.org/10.36948/ijfmr.2024.v06i01.14260 |
Short DOI | https://doi.org/gtktc5 |
Share this
E-ISSN 2582-2160
doi
CrossRef DOI is assigned to each research paper published in our journal.
IJFMR DOI prefix is
10.36948/ijfmr
Downloads
All research papers published on this website are licensed under Creative Commons Attribution-ShareAlike 4.0 International License, and all rights belong to their respective authors/researchers.