Skip to main content

Communications

By introducing high randomness with reduced computational cost, physical layer (PHY) key generation is one of the candidate tools which can be used for the security of the Internet of Things (IoT) applications. Non-identical secret keys are one of the main problems of the physical layer (PHY) key generation schemes. In order to address this problem, key verification schemes which are based on information reconciliation are used. In the current key verification techniques, the legitimate nodes reveal some information related to their secret keys in order to eliminate non-identical bits.

Categories:

Bitcoin is a decentralized digital currency that has gained significant attention and growth in recent years. Unlike traditional currencies, Bitcoin does not rely on a centralized authority to control the supply, distribution, and verification of the validity of transactions. Instead, Bitcoin relies on a peer-to- peer network of volunteers to distribute pending transactions and confirmed blocks, verify transactions, and to collectively implement a replicated ledger that everyone agrees on. This peer-to-peer (P2P) network is at the heart of Bitcoin and many other blockchain technologies.

Categories:

A spectrally encapsulated orthogonal frequency division multiplexing (SE-OFDM) precoding scheme for short packet transmission that is able to suppress the out-of-band emission (OoBE) while maintaining the advantage of thecyclic prefix (CP)-OFDM is proposed. The SE-OFDM symbol consists of a prefix, an information (I)-symboland a suffix that are generated by head, center and tail matrices, respectively.

Categories: