2020
DOI: 10.48550/arxiv.2010.14457
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Multi-factor Physical Layer Security Authentication in Short Blocklength Communication

Miroslav Mitev,
Mahdi Shekiba-Herfeh,
Arsenia Chorti
et al.

Abstract: Lightweight and low latency security mechanisms are becoming increasingly important for a wide range of Internet of things (IoT) applications. Promising schemes from the physical layer include (i) physical unclonable functions (PUFs), (ii) localization based authentication, and, (iii) secret key generation (SKG) from wireless fading coefficients. In this paper, we focus on short blocklengths and propose a complete, fast, multi-factor authentication protocol that uniquely combines PUFs, proximity estimation and… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 48 publications
0
3
0
Order By: Relevance
“…The path loss is deterministic (i.e., location-based) and, therefore, useful for authentication purposes, e.g., using localization information in multi-factor authentication protocols [8], while shadowing exhibits high correlation in time/frequency/space. On the contrary, the small-scale fading is a valuable entropy source for secret key generation (SKG).…”
Section: Introductionmentioning
confidence: 99%
“…The path loss is deterministic (i.e., location-based) and, therefore, useful for authentication purposes, e.g., using localization information in multi-factor authentication protocols [8], while shadowing exhibits high correlation in time/frequency/space. On the contrary, the small-scale fading is a valuable entropy source for secret key generation (SKG).…”
Section: Introductionmentioning
confidence: 99%
“…The premise of the proposed pre-processing is that largescale fading (path-loss and shadowing) depends heavily on the location and can be helpful for authentication purposes [10]. On the other hand, small-scale fading can constitute an entropy source for SKG with early results presented in [11] and [12].…”
Section: Introductionmentioning
confidence: 99%
“…The premise of the proposed pre-processing is that largescale fading (path-loss and shadowing) depends heavily on the location and can be helpful for authentication purposes [10]. On the other hand, small-scale fading can constitute an entropy source for SKG with early results presented in [11] and [12].…”
Section: Introductionmentioning
confidence: 99%