Physical Layer Security – from Theory to Practice

10/24/2022
by   Miroslav Mitev, et al.
0

A large spectrum of technologies are collectively dubbed as physical layer security (PLS), ranging from wiretap coding, secret key generation (SKG), authentication using physical unclonable functions (PUFs), localization / RF fingerprinting, anomaly detection monitoring the physical layer (PHY) and hardware. Despite the fact that the fundamental limits of PLS have long been characterized, incorporating PLS in future wireless security standards requires further steps in terms of channel engineering and pre-processing. Reflecting upon the growing discussion in our community, in this critical review paper, we ask some important questions with respect to the key hurdles in the practical deployment of PLS in 6G, but also present some research directions and possible solutions, in particular our vision for context-aware 6G security that incorporates PLS.

READ FULL TEXT

page 3

page 10

research
12/01/2022

What Physical Layer Security Can Do for 6G Security

While existing security protocols were designed with a focus on the core...
research
01/05/2021

Context-Aware Security for 6G Wireless The Role of Physical Layer Security

Sixth generation systems are expected to face new security challenges, w...
research
01/20/2020

Physical Layer Security: Authentication, Integrity and Confidentiality

The goal of physical layer security (PLS) is to make use of the properti...
research
11/14/2020

Brief Report on QoSec, Context Aware Security and the Role of Physical Layer Security in 6G Wireless

While the security literature predominantly focuses on the core network,...
research
11/15/2018

Physical-Layer Security: Does it Work in a Real Environment?

This paper applies channel sounding measurements to enable physical-laye...
research
05/16/2023

A SKG Security Challenge: Indoor SKG Under an On-The-Shoulder Eavesdropping Attack

Physical layer security (PLS) is seen as the means to enhance physical l...
research
06/01/2022

Smart Channel State Information Pre-processing for Joint Authentication and Secret Key Distillation

While the literature on RF fingerprinting-based authentication and key d...

Please sign up or login with your details

Forgot password? Click here to reset