2022
DOI: 10.36227/techrxiv.21388338
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Physical Layer Security - from Theory to Practice

Abstract: <p>A large spectrum of technologies are collectively dubbed as physical layer security (PLS), ranging from wiretap coding, secret key generation (SKG), authentication using physical unclonable functions (PUFs), localization / RF fingerprinting, anomaly detection monitoring the physical layer (PHY) and hardware. Despite the fact that the fundamental limits of PLS have long been characterized, incorporating PLS in future wireless security standards requires further steps in terms of channel engineering and… Show more

Help me understand this report
View published versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 43 publications
0
1
0
Order By: Relevance
“…Overall, SKG is a promising PLS technology and could help solving the key distribution issue for emerging 6G applications, e.g., addressing scalability for massive IoT [32].…”
Section: Secret Key Generation Under Active Attacksmentioning
confidence: 99%
“…Overall, SKG is a promising PLS technology and could help solving the key distribution issue for emerging 6G applications, e.g., addressing scalability for massive IoT [32].…”
Section: Secret Key Generation Under Active Attacksmentioning
confidence: 99%