2021 IEEE 94th Vehicular Technology Conference (VTC2021-Fall) 2021
DOI: 10.1109/vtc2021-fall52928.2021.9625442
|View full text |Cite
|
Sign up to set email alerts
|

On the RIS Manipulating Attack and Its Countermeasures in Physical-layer Key Generation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2021
2021
2025
2025

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 16 publications
(8 citation statements)
references
References 9 publications
0
5
0
Order By: Relevance
“…In the context of disrupting wireless communications, Staat et al demonstrated how an RIS can disrupt Wi-Fi networks [21]. In the context of CRKG, we have partially investigated an example of the RIS jamming attack in our previous work [22]. However, its attack model is not general and no field verification has been provided.…”
Section: Related Workmentioning
confidence: 99%
“…In the context of disrupting wireless communications, Staat et al demonstrated how an RIS can disrupt Wi-Fi networks [21]. In the context of CRKG, we have partially investigated an example of the RIS jamming attack in our previous work [22]. However, its attack model is not general and no field verification has been provided.…”
Section: Related Workmentioning
confidence: 99%
“…This idea, referred to as countermeasure based on channel separation (CCS), can be implemented in PKG systems with high multipath resolution. For example, in a wideband OFDM system, these channels are separated through an inverse discrete Fourier transform (IDFT) and the RISinduced channel can be detected from its high variance [9]. Fig.…”
Section: ) Countermeasuresmentioning
confidence: 99%
“…In addition, RIS can take destructive as well as constructive roles, decided by who owns the control right. In [9], it has been shown that when a RIS is controlled by a malicious party, it could break the key agreement of legitimate parties. The potential destructive aspects of RIS are largely overlooked in existing works.…”
Section: Introductionmentioning
confidence: 99%
“…The authors have proposed an optimization algorithm to maximize KGR by designing the RIS passive beamforming. Additionally, [35] and [36] view the RIS as an attacker to the PLKG schemes. In [35], after studying the constructive aspects of deploying RIS in PLKG, i.e.…”
Section: Introductionmentioning
confidence: 99%
“…in quasistatic and wave-blockage environments, the authors argue that an attacker can utilize the IRS to perform jamming and leakage attacks. Furthermore, the authors in [36], proposed an attack model in which an RIS reduces the wireless channel reciprocity by rapidly changing the RIS reflection coefficients in the uplink and downlink channel probing steps. A method to detect and counteract this attack is also proposed.…”
Section: Introductionmentioning
confidence: 99%