2020
DOI: 10.1186/s13638-020-01742-0
|View full text |Cite
|
Sign up to set email alerts
|

Authenticated secret key generation in delay-constrained wireless systems

Abstract: With the emergence of 5G low-latency applications, such as haptics and V2X, low-complexity and low-latency security mechanisms are needed. Promising lightweight mechanisms include physical unclonable functions (PUF) and secret key generation (SKG) at the physical layer, as considered in this paper. In this framework, we propose (i) a zero round trip time (0-RTT) resumption authentication protocol combining PUF and SKG processes, (ii) a novel authenticated encryption (AE) using SKG, and (iii) pipelining of the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
26
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 35 publications
(36 citation statements)
references
References 86 publications
0
26
0
Order By: Relevance
“…Building on that, numerous practical experiments have demonstrated the feasibility of the scheme [7,8]. Moreover, it has been shown that SKG can be combined with authenticated encryption (AE) schemes [9,10] in order to overcome trivial man-in-the-middle (MiM) attacks, similarly to known MiM attacks on unauthenticated Diffie-Hellman schemes.…”
Section: Introductionmentioning
confidence: 99%
“…Building on that, numerous practical experiments have demonstrated the feasibility of the scheme [7,8]. Moreover, it has been shown that SKG can be combined with authenticated encryption (AE) schemes [9,10] in order to overcome trivial man-in-the-middle (MiM) attacks, similarly to known MiM attacks on unauthenticated Diffie-Hellman schemes.…”
Section: Introductionmentioning
confidence: 99%
“…Moreover, authentication and key agreement is also needed [ 26 ]. In that respect, Mitev et al [ 27 ] had proposed a secret key generation method on wireless systems. Researchers are engaged in developing new set of secret keys with enriched functionalities [ 28 , 29 ].…”
Section: Introductionmentioning
confidence: 99%
“…Most of them are based on the temporal fading of the radio channel, using the RSSI [9], [10], [11] However, in this context the radio channel must be observed for a long time [12] and the communicating devices must move with significant speed [13]. Also, an RSSI-based approach is vulnerable to proximity and predictable-channel attacks [9], [14]. An alternative strategy proposed in the literature is based on the wideband characteristics of the radio channel, i.e., on the resolvable temporal dispersion, or, equivalently, on the frequency selectivity.…”
Section: Introductionmentioning
confidence: 99%