2023
DOI: 10.1109/tifs.2022.3224852
|View full text |Cite
|
Sign up to set email alerts
|

Security Analysis of Triangle Channel-Based Physical Layer Key Generation in Wireless Backscatter Communications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 14 publications
(2 citation statements)
references
References 58 publications
0
2
0
Order By: Relevance
“…More recently, advances in generating cipher keys using radio channel properties have enabled more secure channels without relying on a common key pool such as cryptography methods [7]- [9]. However, as PLS derives its security from the very radio channel it is trying to protect, it remains sensitive to jamming, high noise, poor channel entropy or reciprocity, and poor channel estimation quality issues.…”
Section: A Review Of Cybersecuritymentioning
confidence: 99%
“…More recently, advances in generating cipher keys using radio channel properties have enabled more secure channels without relying on a common key pool such as cryptography methods [7]- [9]. However, as PLS derives its security from the very radio channel it is trying to protect, it remains sensitive to jamming, high noise, poor channel entropy or reciprocity, and poor channel estimation quality issues.…”
Section: A Review Of Cybersecuritymentioning
confidence: 99%
“…In this case, two legitimate parties (e.g., Alice and Bob) are required to send public pilot sequences to each other and pursue channel estimations to acquire this common channel state information (CSI) [22], [23], which will then be passed to the key quantization [24], [25], key reconciliation [26] and privacy amplification [27] modules for key generation. However, as PL-SKG derives its security from the very radio channel it is trying to protect, it remains sensitive to jamming [28], [29], secrecy leakage [30], high noise, poor channel entropy or reciprocity, and poor channel estimation quality.…”
Section: A Review Of Cybersecuritymentioning
confidence: 99%