2019
DOI: 10.3390/e21050497
|View full text |Cite
|
Sign up to set email alerts
|

Physical Layer Key Generation in 5G and Beyond Wireless Communications: Challenges and Opportunities

Abstract: The fifth generation (5G) and beyond wireless communications will transform many exciting applications and trigger massive data connections with private, confidential, and sensitive information. The security of wireless communications is conventionally established by cryptographic schemes and protocols in which the secret key distribution is one of the essential primitives. However, traditional cryptography-based key distribution protocols might be challenged in the 5G and beyond communications because of spec… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
54
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
8
1

Relationship

2
7

Authors

Journals

citations
Cited by 78 publications
(54 citation statements)
references
References 52 publications
0
54
0
Order By: Relevance
“…Identity vulnerabilities in the IoT networks contain these main facets as follows. First, cryptographic keys or certificates cannot be efficiently distributed due to the limited computing power leading to weak authentication [1]. Second, default keys or credentials can be brute-forced by high-computing-power attackers, extracted from device firmware or mobile apps, or intercepted at login [2].…”
Section: Introductionmentioning
confidence: 99%
“…Identity vulnerabilities in the IoT networks contain these main facets as follows. First, cryptographic keys or certificates cannot be efficiently distributed due to the limited computing power leading to weak authentication [1]. Second, default keys or credentials can be brute-forced by high-computing-power attackers, extracted from device firmware or mobile apps, or intercepted at login [2].…”
Section: Introductionmentioning
confidence: 99%
“…Meanwhile, wireless transmission is vulnerable to eavesdropping attacks due to the broadcast nature of the wireless medium. Therefore, safeguarding data transmission is given the top priority in the development of next-generation wireless networks [1,2]. A paradigmatic problem of securing data transmission is the key distribution.…”
Section: Introductionmentioning
confidence: 99%
“…Besides, with the lowest time delay cost, HIRP reaches the highest reconciliation efficiency. Entropy 2019, 21, 688 2 of 17Recently, physical layer key generation (PKG) has been emerging as a supplement to the upper layer key distribution method [2]. The underlying idea of it lies in the use of channel reciprocity and the uncertainty of multipath characteristics to encrypt the transmitted information in order to solve the problem of symmetric secret key distribution [3,4].…”
mentioning
confidence: 99%
“…However, eavesdroppers can decode the encrypted signals if they are equipped with advanced equipment and have enough time for the decoding operation. In [ 1 , 2 , 3 , 4 , 5 , 6 ], the authors introduced a new security method, called physical-layer security (PLS), where characteristics of wireless channels, i.e., distances and channel state information (CSI), can be exploited to ensure confidentiality of the data transmission. To obtain the security in PLS, the secrecy capacity must be greater than zero or the channel capacity of the data link must be better than that of the eavesdropping link.…”
Section: Introductionmentioning
confidence: 99%