2019
DOI: 10.1109/mwc.001.1900061
|View full text |Cite
|
Sign up to set email alerts
|

Physical Layer Key Generation in 5G Wireless Networks

Abstract: The bloom of the fifth generation (5G) communication and beyond serves as a catalyst for physical layer key generation techniques. In 5G communications systems, many challenges in traditional physical layer key generation schemes, such as co-located eavesdroppers, the high bit disagreement ratio, and high temporal correlation, could be overcome. This paper lists the key-enabler techniques in 5G wireless networks, which offer opportunities to address existing issues in physical layer key generation. We survey t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
46
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 87 publications
(46 citation statements)
references
References 15 publications
0
46
0
Order By: Relevance
“…Fig. 10(a) shows the channel differences between the clone node and the legitimate node after normalization ranging from 0 to 1 according to (8). This figure shows that the channel difference of the clone node is greater than that of the legitimate node.…”
Section: A Experimental Setup For Verificationmentioning
confidence: 99%
See 1 more Smart Citation
“…Fig. 10(a) shows the channel differences between the clone node and the legitimate node after normalization ranging from 0 to 1 according to (8). This figure shows that the channel difference of the clone node is greater than that of the legitimate node.…”
Section: A Experimental Setup For Verificationmentioning
confidence: 99%
“…Especially for clone attacks, as attackers are able to obtain all sensitive information from a compromised legitimate node, it is difficult to detect and deter these attacks by relying on cryptographic algorithms. In [2]- [8], physical layer authentication based on generalized channel responses with spatial variability was put forward, which is based on generalized channel response with spatial variability and considers the correlation of time, frequency, and spatial domains. On account of this, we propose an attack detection method based on channel differences.…”
Section: Introductionmentioning
confidence: 99%
“…Jiao, Long, Ning Wang Et al. [21] The blossom of the 5G correspondence and past fills in as an impetus for actual layer key age strategies. In 5G interchanges frameworks, numerous difficulties in conventional actual layer key age plans, for example, co-found busybodies, the high piece contradiction proportion, and high worldly relationship, could be survived.…”
Section: Related Workmentioning
confidence: 99%
“…Instead of asymmetric cryptography is also called public cryptography, this method applied two different keys for the process of encryption of description. Some other cryptography algorithms is based on the combination of public and private key cryptography [21,22].…”
Section: Cryptography and Key Generation Approachmentioning
confidence: 99%
“…Key generation based on the channel reciprocity [11] can effectively alleviate the problems of key distribution and management. Unfortunately, channel-based key generation is susceptible to channel noise, which will result in a high bit disagreement ratio under low signal-to-noise ratio (SNR) [12], [13]. The inability to obtain a consistent shared secret key is intolerable to the authentication mechanisms, which utilize the hash functions to generate authentication codes.…”
Section: Introductionmentioning
confidence: 99%