scispace - formally typeset
Search or ask a question
Topic

Keying

About: Keying is a research topic. Over the lifetime, 6598 publications have been published within this topic receiving 82943 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: SBK is proposed, an in-situ self-configuring framework to bootstrap keys in large-scale sensor networks that requires no keying information pre-deployment and iSBK, an improved scheme to speed up the bootstrapping procedure.
Abstract: Key pre-distribution has been claimed to be the only viable approach for establishing shared keys between neighboring sensors after deployment for a typical sensor network. However, none of the proposed key pre-distribution schemes simultaneously achieves good performance in terms of scalability in network size, key-sharing probability between neighboring sensors, memory overhead for keying information storage, and resilience against node capture attacks. In this paper, we propose SBK, an in-situ self-configuring framework to bootstrap keys in large-scale sensor networks. SBK is fundamentally different compared to all key pre-distribution schemes. It requires no keying information pre-deployment. In SBK, sensors differentiate their roles as either service nodes or worker nodes after deployment. Service sensors construct key spaces, and distribute keying information in order for worker sensors to bootstrap pairwise keys. An improved scheme, iSBK, is also proposed to speed up the bootstrapping procedure. We conduct both theoretical analysis and simulation study to evaluate the performances of SBK and iSBK. To the best of our knowledge, SBK and iSBK are the only key establishment protocols that simultaneously achieve good performance in scalability, key-sharing probability, storage overhead, and resilience against node capture attacks.

43 citations

01 Mar 2010
TL;DR: This document describes a general mechanism for allowing a number of protocols to leverage Transport Layer Security to perform key establishment but then use some of the keying material for their own purposes.
Abstract: A number of protocols wish to leverage Transport Layer Security (TLS) to perform key establishment but then use some of the keying material for their own purposes. This document describes a general mechanism for allowing that.

43 citations

Proceedings ArticleDOI
01 Oct 2009
TL;DR: An algorithm for automatic modulation recognition has been developed and presented and the suggested algorithm is verified using higher order statistical moments of wavelet transform as a features set.
Abstract: Modulation type is one of the most important characteristics used in signal waveform identification An algorithm for automatic modulation recognition has been developed and presented in this study The suggested algorithm is verified using higher order statistical moments of wavelet transform as a features set A multi-layer neural network with resilient backpropagation learning algorithm is proposed as a classifier The purpose is to discriminate different M-ary shift keying modulation types and modulation order without any priori signal information Pre-processing and features subset selection using principal component analysis will reduce the network complexity and increase the recognizer performance

43 citations

Proceedings ArticleDOI
01 Oct 2018
TL;DR: A new signaling scheme for Dual-Function Radar Communications (DFRC) that enables frequency-hopped multiple-input-multiple-output (MIMO) orthogonal radar wave-forms to carry communication symbols is proposed and is shown to have better spectral efficiency.
Abstract: Intensifying competition over the frequency spectrum has driven the research effort into strategies for coexistence between radar and communications. Strategies for achieving this range from spectrum sharing using cognitive radio techniques to co-design where the radar and communications systems are re-imagined to ensure they do not interfere with each other. In this paper we propose a new signaling scheme for Dual-Function Radar Communications (DFRC) that enables frequency-hopped multiple-input-multiple-output (MIMO) orthogonal radar wave-forms to carry communication symbols. The Frequency-hopping (FH) code is changed from subpulse to another such that the index of the selected code carries the desired symbol. Contrary to recent phase-shift keying (PSK)-based schemes which embed one PSK symbol within each subpulse, the proposed scheme does not suffer from phase-discontinuity and is shown to have better spectral efficiency. We show that the data rate that can be achieved using the proposed scheme is proportional to the size of the FH code, the number of transmit antennas, number of subpulses within a pulse repetition interval, and pulse repetition frequency. Simulations examples are provided to evaluate the performance of the proposed method and demonstrate the effectiveness of this information embedding scheme.

43 citations

Journal ArticleDOI
TL;DR: A new expression is derived for the exact bit-error probability for the detection of a coherent binary phase-shift keying signal experiencing a number of asynchronous interferers having unequal power levels in Rayleigh fading channels in terms of the coefficients of a Hermite polynomial.
Abstract: We derive a new expression for the exact bit-error probability for the detection of a coherent binary phase-shift keying signal experiencing a number of asynchronous interferers having unequal power levels in Rayleigh fading channels. The new expression is readily computed in terms of the coefficients of a Hermite polynomial.

42 citations


Network Information
Related Topics (5)
Transmission (telecommunications)
171.3K papers, 1.2M citations
85% related
Optical fiber
167K papers, 1.8M citations
84% related
Wireless
133.4K papers, 1.9M citations
84% related
Network packet
159.7K papers, 2.2M citations
84% related
Wireless network
122.5K papers, 2.1M citations
83% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
2023137
2022286
2021170
2020238
2019301
2018291