I have developed a strong research potential in innovative physical layer security solutions for future wireless technologies with ultra-low energy requirements but high security standards. My research aims to bridge the gap between the theoretical modelling and practical exploitation of physical layer security using state-of-the-art testbeds and equipment.
My research aims to exploit the wireless channel for security and sensing.
Secure communication will be achieved by using key generation and device authentication.
Key Generation from Wireless Channels
Key generation is an emerging technique to establish cryptographic keys between legitimate users by extracting randomness from their common channels.
- Key Generation Overview
- Key Generation Publication at University of Liverpool
- Key Generation Applications
- Key Generation Projects
- Key Generation References
- Key Generation Demonstration using WARP
Radio Frequency Fingerprint Identification (RFFI)
All the components of wireless devices will have slightly different features, e.g., carrier frequency of the oscillators, from the manufacturing processing. Similar to biometric fingerprint, these characteristics are unique and permanent, which can act as the fingerprint of the devices. This technique first requires collecting the device fingerprint and storing them in a database, and then classifies devices by comparing with the stored database whenever a device wishes to join the network.
We are always keen to apply our knowledge to practical applications. Hence we have created several demonstration videos to present our applied research.
- WiFi Key Generation Demonstration using WARP
- WiFi Key Generation Demonstration using Raspberry Pi
- Heartbeat Key Generation Demonstration Using PPG Sensors
- Deep Learning-Powered Radio Frequency Fingerprint Identification for LoRa
- LoRaWAN Demonstration using Pycom FiPy
Resources and Facilities
We are equipped with abundant wireless devices including software defined radios, wireless kits, GPU platform etc. Please visit Resources and Facilities for detailed information.
Research and Technical Blogs
Please visit Research and Technical Blogs for detailed information.