2019
DOI: 10.1109/mwc.2019.1800455
|View full text |Cite
|
Sign up to set email alerts
|

Physical Layer Security for the Internet of Things: Authentication and Key Generation

Abstract: A low-complexity, yet secure framework is proposed for protecting the Internet of Things (IoT) and for achieving both authentication and secure communication. In particular, the slight random difference among transceivers is extracted for creating a unique radio frequency fingerprint and for ascertaining the unique user identity. The wireless channel between any two users is a perfect source of randomness and can be exploited as cryptographic keys. This can be applied to the physical layer of the communication… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
48
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
3
1

Relationship

2
8

Authors

Journals

citations
Cited by 142 publications
(60 citation statements)
references
References 14 publications
0
48
0
Order By: Relevance
“…There have been several key generation surveys and tutorials published in [81]- [87]. A summary and comparison are given in Table 2.…”
Section: Key Generationmentioning
confidence: 99%
“…There have been several key generation surveys and tutorials published in [81]- [87]. A summary and comparison are given in Table 2.…”
Section: Key Generationmentioning
confidence: 99%
“…Step 6: In case of mild impairments, Alice and Bob may be able to correct the errors inflicted by the channel/device imperfections using error correction. In order to ensure that Eve has only negligible information about the final secret key, the so-called privacy amplification process [15], [84], [85] is invoked. To elaborate a little further, Alice randomly chooses a hash function from the universal hash function family of [86] and forwards the description of the selected hash function to Bob over the authenticated public channel.…”
Section: Quantum Key Distributionmentioning
confidence: 99%
“…Zhang et al proposed a low-complexity framework for protecting IoT identity authentication and implementing secure communication, extracting small random differences between transceivers to create unique Radio Frequency (RF) fingerprints and determine user identity. The randomness of the wireless channel between the two users is used as the encryption key, but how to resist an attack is still an issue to be considered in Radio Frequency Fingerprinting (RFF) identification and key generation [24]. Amin et al proposed an architecture suitable for distributed cloud environments and proposed an authentication protocol that allows registered users to securely access all private information from all private cloud servers.…”
Section: Related Workmentioning
confidence: 99%