2018
DOI: 10.1016/j.cose.2018.08.001
|View full text |Cite
|
Sign up to set email alerts
|

Physical characteristics of wireless communication channels for secret key establishment: A survey of the research

Abstract: Physical layer security protocols have recently been deployed in the context of Wireless communications. These are derived from the intrinsic characteristics of the communication media for key generation, sharing and randomness extraction. These protocols always seek to exhibit both low computational complexity and energy efficiency, whilst also maintain unconditionally secure communications. We present herein, a comprehensive literature review of existing "state-of-the-art" quantisation schemes for physical l… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
16
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 28 publications
(16 citation statements)
references
References 92 publications
(181 reference statements)
0
16
0
Order By: Relevance
“…Through the results, we verify that an identical sequence can be restored with the same initial and control values. Therefore, we can simplify the sequence sharing process and mitigate the key distribution problem of the conventional cryptography methods [52], [53].…”
Section: ) Chaotic Random Sequencementioning
confidence: 99%
“…Through the results, we verify that an identical sequence can be restored with the same initial and control values. Therefore, we can simplify the sequence sharing process and mitigate the key distribution problem of the conventional cryptography methods [52], [53].…”
Section: ) Chaotic Random Sequencementioning
confidence: 99%
“…Despite the ability of these cross-layer methodologies in increasing the authentication rate, they cannot be effectively used for V2X applications due to the high dynamic behaviour of the moving vehicles, which can cause fluctuations in channel fading between high and low levels in urban and rural areas, posing a challenging scenario [18,29]. Therefore, further research is needed to address this limitation.…”
Section: Introductionmentioning
confidence: 99%
“…Both parties of legal communication, Alice and Bob, can apply the same PA algorithm to map the negotiated key into a shorter unconditional secure secret key in order to delete the information leaked to the eavesdropper Eve. At this time, the key information generated by Eve is almost zero; therefore, Alice and Bob can obtain the same secure unconditional key [1][2][3][4][5].…”
Section: Introductionmentioning
confidence: 99%