scholarly journals On Wireless Channel Parameters for Key Generation in Industrial Environments

IEEE Access ◽  
2018 ◽  
Vol 6 ◽  
pp. 79010-79025 ◽  
Author(s):  
Dan Kreiser ◽  
Zoya Dyka ◽  
Stephan Kornemann ◽  
Christian Wittke ◽  
Ievgen Kabin ◽  
...  
Energies ◽  
2021 ◽  
Vol 14 (8) ◽  
pp. 2143
Author(s):  
Chunzhi Hou ◽  
Zhensen Wu ◽  
Jiaji Wu ◽  
Yunhua Cao ◽  
Leke Lin ◽  
...  

Deterministic channel models, such as the three-dimensional (3D) ray launching method, can yield wireless channel parameters. In the non-line-of-sight (NLOS) propagation, the outdoor 3D ray launching method that considers diffraction effects is more accurate than the one that does not. While considering the diffraction effect, obtaining the diffraction point is challenging. This paper proposed a method for determining diffracted rays using the receiving sphere method in 3D ray launching. The diffraction point is determined using the shortest distance method between two straight lines, and the signal loss from the transmitting to receiving antennas is obtained. Furthermore, experiments on a millimeter wave in a microcell scenario were performed. The test results of the wireless channel parameters were compared with theoretical calculations. The results obtained via the 3D ray launching method that only considers the specular reflection and direct rays agree with the experimental results in the line-of-sight (LOS); furthermore, they generate larger errors compared with the experimental results in the NLOS. The results obtained via the 3D ray launching method that considers the direct ray, reflected rays, and diffracted rays agree with the experimental results both in the LOS and NLOS. Therefore, the 3D ray launching method that considers the diffraction effect can improve the prediction accuracy of the millimeter wave channel parameters in a microcell.


2020 ◽  
Vol 16 (6) ◽  
pp. 155014772092577 ◽  
Author(s):  
Shahwar Ali ◽  
A Humaria ◽  
M Sher Ramzan ◽  
Imran Khan ◽  
Syed M Saqlain ◽  
...  

In wireless sensor networks, the sensors transfer data through radio signals to a remote base station. Sensor nodes are used to sense environmental conditions such as temperature, strain, humidity, sound, vibration, and position. Data security is a major issue in wireless sensor networks since data travel over the naturally exposed wireless channel where malicious attackers may get access to critical information. The sensors in wireless sensor networks are resource-constrained devices whereas the existing data security approaches have complex security mechanisms with high computational and response times affecting the network lifetime. Furthermore, existing systems, such as secure efficient encryption algorithm, use the Diffie–Hellman approach for key generation and exchange; however, Diffie–Hellman is highly vulnerable to the man-in-the-middle attack. This article introduces a data security approach with less computational and response times based on a modified version of Diffie–Hellman. The Diffie–Hellman has been modified to secure it against attacks by generating a hash of each value that is transmitted over the network. The proposed approach has been analyzed for security against various attacks. Furthermore, it has also been analyzed in terms of encryption/decryption time, computation time, and key generation time for different sizes of data. The comparative analysis with the existing approaches shows that the proposed approach performs better in most of the cases.


Author(s):  
Konstantinos Pelekanakis ◽  
Camila M. G. Gussen ◽  
Roberto Petroccia ◽  
Joao Alves

Author(s):  
Mohammad Razzaghpour ◽  
Ramoni Adeogun ◽  
Ignacio Rodriguez ◽  
Gilberto Berardinelli ◽  
Rasmus S. Mogensen ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document