2023
DOI: 10.1109/ojcoms.2023.3234338
|View full text |Cite
|
Sign up to set email alerts
|

High-Rate Secret Key Generation Using Physical Layer Security and Physical Unclonable Functions

Abstract: Physical layer security (PLS) can be adopted for efficient key sharing in secured wireless systems. The random nature of the wireless channel and channel reciprocity (CR) are the main pillars for realizing PLS techniques. However, for applications that involve air-to-air (A2A) transmission, such as unmanned aerial vehicle (UAV) applications, the channel does not generally have sufficient randomness to enable reliable key generation. Therefore, this work proposes a novel system design to mitigate the channel ra… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 13 publications
(15 citation statements)
references
References 57 publications
0
15
0
Order By: Relevance
“…In a study by T. Assaf et al [15], A fundamental aspect of this approach is utilizing physical unclonable functions (PUFs). PUFs are physical structures that produce random and unpredictable responses when exposed to specific stimuli.…”
Section: Literature Workmentioning
confidence: 99%
“…In a study by T. Assaf et al [15], A fundamental aspect of this approach is utilizing physical unclonable functions (PUFs). PUFs are physical structures that produce random and unpredictable responses when exposed to specific stimuli.…”
Section: Literature Workmentioning
confidence: 99%
“…Nevertheless, the air-to-air (A2A) channel entropy for UAV communications can be low, which can lead to a low key generation rate. To overcome such problems, Assaf et al [18] proposed using physically unclonable functions (PUFs) where the channel coefficients are used as the challenge for the PUF and PUF emulator (PUFe). Although the reliability of PUFs can deteriorate when experiencing a wide variation in temperature or supply voltage variations, new research results show promising results.…”
Section: A Overviewmentioning
confidence: 99%
“…Based on the extensive literature search and to the best of the authors' knowledge, there is very little work that proposes GSK generation using PUFs, which are used to generate the pairwise keys between certain UAV pairs efficiently and securely. The main advantage of PUFs is their capability to operate efficiently in nearflat fading channels, which is not the case for most other existing algorithms [18]. However, configuring all UAVs with all PUFes can be prohibitively complex.…”
Section: B Motivation and Contributionmentioning
confidence: 99%
See 1 more Smart Citation
“…It gives designers the ability to raise the security of their creations while retaining the adaptability and effectiveness needed for various applications. The generation of secret keys [11][12][13], the generation of random numbers [14][15][16][17], the protection of FPGA intellectual property [18,19], the identification of devices [20], chip authentication [8,17], key exchange/agreement protocols [8,[21][22][23], the prevention of counterfeiting [24], and IoT security [8,[22][23][24][25][26][27] are a few intriguing applications of FPGA-based PUFs.…”
Section: Introductionmentioning
confidence: 99%