2022
DOI: 10.1109/mwc.007.2100545
|View full text |Cite
|
Sign up to set email alerts
|

Reconfigurable Intelligent Surface for Physical Layer Key Generation: Constructive or Destructive?

Abstract: Channel Reciprocity-based Key Generation (CRKG) exploits reciprocal channel randomness to establish shared secret keys between wireless terminals. This new security technique is expected to complement existing cryptographic techniques for secret key distribution of future wireless networks. In this paper, we present a new attack, reconfigurable intelligent surface (RIS) jamming, and show that an attacker can prevent legitimate users from agreeing on the same key by deploying a malicious RIS to break channel re… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
15
0

Year Published

2022
2022
2025
2025

Publication Types

Select...
7
3

Relationship

1
9

Authors

Journals

citations
Cited by 42 publications
(15 citation statements)
references
References 32 publications
0
15
0
Order By: Relevance
“…Several solutions can be used to facilitate the practical usage of CRKG in slowly varying environments. One solution is to introduce helper devices, e.g., relays and reconfigurable intelligent surface (RIS) to boost the key generation rate and randomness [14]. However, this solution encounters some practical problems, such as the unavailability of trust relays and additional hardware overheads of RIS devices.…”
Section: Security Enhancementmentioning
confidence: 99%
“…Several solutions can be used to facilitate the practical usage of CRKG in slowly varying environments. One solution is to introduce helper devices, e.g., relays and reconfigurable intelligent surface (RIS) to boost the key generation rate and randomness [14]. However, this solution encounters some practical problems, such as the unavailability of trust relays and additional hardware overheads of RIS devices.…”
Section: Security Enhancementmentioning
confidence: 99%
“…Consequently, Alice's combined channel gain, ĥa , and Bob's channel gains, ĥb , are highly correlated. After the following procedures of the PKG, i.e., quantization, information reconcilation, and privacy amplification, the channel gains are finally converted into secret keys [7]. Since these steps are similar to those used in existing PKG methods, in this paper, we focus on the channel probing step, where the transmit and reflective beamforming are optimized to maximize the KGR.…”
Section: B Pkg Framework Based On Transmit and Reflective Beamformingmentioning
confidence: 99%
“…A relaying SKG scheme was proposed in [8], although this did not consider frequency-selective channels but focussed on a more general approach. An alternative or supplement to relays is reconfigurable intelligent surfaces, which have been considered for SKG [9]. However, they have limited processing abilities and function more as an RF signal reflector which precludes more advanced precoding schemes.…”
Section: Introductionmentioning
confidence: 99%