June 2, 2022, 1:20 a.m. | Muralikrishnan Srinivasan, Sotiris Skaperas, Arsenia Chorti, Mahdi Shakiba Herfeh, Muhammad K. Shehzad, Philippe Sehier

cs.CR updates on arXiv.org arxiv.org

While the literature on RF fingerprinting-based authentication and key
distillation is vast, the two topics have customarily been studied separately.
In this paper, starting from the observation that the wireless channel is a
composite, deterministic / stochastic process, we propose a power domain
decomposition that allows performing the two tasks simultaneously. We devise
intelligent pre-processing schemes to decompose channel state information (CSI)
observation vectors into "predictable" and "unpredictable" components. The
former, primarily due to large-scale fading, can be used for …

authentication channel information key secret secret key smart state

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Information Security Engineers

@ D. E. Shaw Research | New York City

Security Officer Level 1 (L1)

@ NTT DATA | Virginia, United States of America

Alternance - Analyste VOC - Cybersécurité - Île-De-France

@ Sopra Steria | Courbevoie, France

Senior Security Researcher, SIEM

@ Huntress | Remote US or Remote CAN

Cyber Security Engineer Lead

@ ASSYSTEM | Bridgwater, United Kingdom