2018
DOI: 10.1016/j.ifacol.2018.06.232
|View full text |Cite
|
Sign up to set email alerts
|

Security Solutions for Local Wireless Networks in Control Applications based on Physical Layer Security

Abstract: The Design of new wireless communication systems for industrial applications, e.g. control applications, is currently a hot research topic, as they deal as a key enabler for more flexible solutions at a lower cost compared to systems based on wired communication. However, one of their main drawbacks is, that they provide a huge potential for miscellaneous cyber attacks due to the open nature of the wireless channel in combination with the huge economic potential they are able to provide. Therefore, security me… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
7
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(7 citation statements)
references
References 18 publications
(11 reference statements)
0
7
0
Order By: Relevance
“…This efficiency quantifies the expected back-off in terms of data rates when part of the resources (power and frequency) are used to enable the generation of secret keys at the physical layer. In future work, we will compare the efficiency achieved to that of actual approaches currently used in 5G by accounting for the actual delays incurred due to the PKE key agreement operations [20].…”
Section: Parallel Approachmentioning
confidence: 99%
See 1 more Smart Citation
“…This efficiency quantifies the expected back-off in terms of data rates when part of the resources (power and frequency) are used to enable the generation of secret keys at the physical layer. In future work, we will compare the efficiency achieved to that of actual approaches currently used in 5G by accounting for the actual delays incurred due to the PKE key agreement operations [20].…”
Section: Parallel Approachmentioning
confidence: 99%
“…With respect to authentication, physical unclonable functions (PUFs), firstly introduced in [17] (based on the idea of physical one-way functions [18]), [19] could also enhance authentication and key agreement in demanding scenarios, including (but not limited to) device to device and tactile Internet. We note that others also point to using physical layer security to reduce the resource overhead in URLLC [20].…”
Section: Introductionmentioning
confidence: 99%
“…end while 10: end procedure This efficiency quantifies the expected back-off in terms of data rates when part of the resources (power and frequency) are used to enable the generation of secret keys at the physical layer. In future work, we will compare the efficiency achieved to that of actual approaches currently used in 5G by accounting for the actual delays incurred due to the PKE key agreement operations [4].…”
Section: A Parallel Approachmentioning
confidence: 99%
“…For example, in ultra reliable low latency communication systems (URLLC) it is noted that "for a URLLC service with higher speed than 65kbps, the 3GGP Release 15 radio access network (RAN) cannot fulfill the quality of service (QoS) requirement while enforcing user plane integrity protection" [3]. Others also point to using physical layer security to reduce the resource overhead in URLLC [4].…”
Section: Introductionmentioning
confidence: 99%
“…With respect to authentication, physical unclonable functions (PUFs), firstly introduced in [17] (based on the idea of physical one-way functions [18]), [19] could also enhance authentication and key agreement in demanding scenarios, including (but not limited to) device to device and tactile Internet. We note that others also point to using physical layer security to reduce the resource overhead in URLLC [20].…”
Section: Introductionmentioning
confidence: 99%