2021
DOI: 10.3390/e23080960
|View full text |Cite
|
Sign up to set email alerts
|

Protecting Physical Layer Secret Key Generation from Active Attacks

Abstract: Lightweight session key agreement schemes are expected to play a central role in building Internet of things (IoT) security in sixth-generation (6G) networks. A well-established approach deriving from the physical layer is a secret key generation (SKG) from shared randomness (in the form of wireless fading coefficients). However, although practical, SKG schemes have been shown to be vulnerable to active attacks over the initial “advantage distillation” phase, throughout which estimates of the fading coefficien… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 16 publications
(10 citation statements)
references
References 26 publications
0
10
0
Order By: Relevance
“…Fading is a complex physical process process, including both large scale fading (path loss and shadowing) and small scale fading components. With respect to their role in security applications, in [29] and [30] it has been noted that large scale fading is primarily useful for node authentication (e.g., through high precision localization), while small scale fading is a valuable source of entropy for SKG [59]. The separation of the two types of processes can in principle be performed in the time or in the power domain.…”
Section: State Of the Art And Beyondmentioning
confidence: 99%
“…Fading is a complex physical process process, including both large scale fading (path loss and shadowing) and small scale fading components. With respect to their role in security applications, in [29] and [30] it has been noted that large scale fading is primarily useful for node authentication (e.g., through high precision localization), while small scale fading is a valuable source of entropy for SKG [59]. The separation of the two types of processes can in principle be performed in the time or in the power domain.…”
Section: State Of the Art And Beyondmentioning
confidence: 99%
“…Furthermore, active attacks have been addressed in [9], [10] and hybrid designs of authenticated encryption leveraging SKG along with symmetric block ciphers have appeared in [32]. As a result, SKG emerges as one of the most mature and promising PLS technologies for 6G.…”
Section: B Secret Key Generation (Skg)mentioning
confidence: 99%
“…In communications, especially wireless, the propagation channel itself can be such a random source, allowing it to be used to distill secret keys, which can be used for pairing and encryption. The corresponding procedures are well studied and numerous practical demonstrators have been developed [8] along with and concrete countermeasures in the case of active attacks [9], [10].…”
Section: Introductionmentioning
confidence: 99%
“…For detailed introduction to the topic and its applications in different settings, we refer the interested reader to [30,211,237,19,154,326,236,93]. In this manner, channel state randomization can be used to effectively reduce an MITM attack to the less harmful jamming attack [221]. See [252] for a thorough introduction to jamming and anti-jamming techniques.…”
Section: Maximum Number Of Sskh Prfs and Defenses Against Various Att...mentioning
confidence: 99%