8 research outputs found

    Securing NextG networks with physical-layer key generation: A survey

    Get PDF
    As the development of next-generation (NextG) communication networks continues, tremendous devices are accessing the network and the amount of information is exploding. However, with the increase of sensitive data that requires confidentiality to be transmitted and stored in the network, wireless network security risks are further amplified. Physical-layer key generation (PKG) has received extensive attention in security research due to its solid information-theoretic security proof, ease of implementation, and low cost. Nevertheless, the applications of PKG in the NextG networks are still in the preliminary exploration stage. Therefore, we survey existing research and discuss (1) the performance advantages of PKG compared to cryptography schemes, (2) the principles and processes of PKG, as well as research progresses in previous network environments, and (3) new application scenarios and development potential for PKG in NextG communication networks, particularly analyzing the effect and prospects of PKG in massive multiple-input multiple-output (MIMO), reconfigurable intelligent surfaces (RISs), artificial intelligence (AI) enabled networks, integrated space-air-ground network, and quantum communication. Moreover, we summarize open issues and provide new insights into the development trends of PKG in NextG networks

    Analyse et modélisation du canal radio pour la génération de clés secrÚtes

    Get PDF
    Nowadays, the security of ubiquitous wireless communications becomes more and more a crucial requirement. Even though data is widely protected via symmetric ciphering keys, a well-known difficulty is the generation and distribution of such keys. In the recent years therefore, a set of works have addressed the exploitation of inherent characteristics of the fading propagation channel for security. In particular, secret keys could be generated from the wireless channel, considered as a shared source of randomness, available merely to a pair of communicating entities. ln the present dissertation, we are interested in the approach of secret key generation (SKG) from wireless channels, especially in relating the radio channel properties to the generated keys quality. We first develop a stochastic channel model, focusing on the security with respect to the eavesdropper side, which shows a residual channel memory weil beyond a few wavelengths distance (spatially nonstationary scenarios). Then, we analyze the channel degrees of freedom (DoF) and their impact on the SKG performance in different channel conditions, especially by considering more realistic channels in both outdoor and indoor environments (respectively through simulated ray tracing data and through measurements). The results show that, even for moderately wide band (such as standardized in IEEE 802.11), the sole frequency DOF or its association with the spatial DOF is often enough for generating long keys, provided an efficient quantization method of the complex channel coefficients is used.La sĂ©curitĂ© des communications sans fil omniprĂ©sentes devient, ces derniĂšres annĂ©es, de plus en plus une exigence incontournable. Bien que la cryptographie symĂ©trique assure largement la confidentialitĂ© des donnĂ©es, la difficultĂ© concerne la gĂ©nĂ©ration et la distribution de clĂ©s secrĂštes. RĂ©cemment, des Ă©tudes indiquent que les caractĂ©ristiques inhĂ©rentes du canal de propagation peuvent ĂȘtre exploitĂ©es afin de consolider la sĂ©curitĂ©. En particulier, le canal radio fournit en effet une source d'alĂ©a commune Ă  deux utilisateurs Ă  partir de laquelle des clĂ©s secrĂštes peuvent ĂȘtre gĂ©nĂ©rĂ©es. Dans la prĂ©sente dissertation, nous nous intĂ©ressons au processus de gĂ©nĂ©ration de clĂ©s secrĂštes (SKG), tout en reliant les propriĂ©tĂ©s du canal radio Ă  la qualitĂ© des clĂ©s gĂ©nĂ©rĂ©es. D'abord nous dĂ©veloppons un modĂšle du canal stochastique, traitant la sĂ©curitĂ© du point de vue de l'espion, qui montre une mĂ©moire de canal rĂ©siduelle bien au-delĂ  d'une distance de quelques longueurs d'onde (scĂ©narios spatialement non-stationnaires). Ensuite, nous exploitons les degrĂ©s de libertĂ© (DOF) du canal et analysons leur impact sur la performance de SKG dans diffĂ©rentes conditions, tout en considĂ©rant des canaux plus rĂ©alistes en environnements extĂ©rieur et intĂ©rieur (respectivement grĂące Ă  des donnĂ©es dĂ©terministes simulĂ©es et Ă  des mesures). Les rĂ©sultats montrent que, mĂȘme pour des bandes modĂ©rĂ©es (comme standardisĂ©es dans la norme IEEE 802.11), le seul DoF de frĂ©quence ou de son association avec le DoF spatial est souvent suffisant pour gĂ©nĂ©rer des longues clĂ©s, Ă  condition d'utiliser une mĂ©thode efficace de quantification des coefficients complexes du canal

    Physical layer security for IoT applications

    Get PDF
    The increasing demands for Internet of things (IoT) applications and the tremendous increase in the volume of IoT generated data bring novel challenges for the fifth generation (5G) network. Verticals such as e-Health, vehicle to everything (V2X) and unmanned aerial vehicles (UAVs) require solutions that can guarantee low latency, energy efficiency,massive connectivity, and high reliability. In particular, finding strong security mechanisms that satisfy the above is of central importance for bringing the IoT to life. In this regards, employing physical layer security (PLS) methods could be greatly beneficial for IoT networks. While current security solutions rely on computational complexity, PLS is based on information theoretic proofs. By removing the need for computational power, PLS is ideally suited for resource constrained devices. In detail, PLS can ensure security using the inherit randomness already present in the physical channel. Promising schemes from the physical layer include physical unclonable functions (PUFs), which are seen as the hardware fingerprint of a device, and secret key generation (SKG) from wireless fading coefficients, which provide the wireless fingerprint of the communication channel between devices. The present thesis develops several PLS-based techniques that pave the way for a new breed of latency-aware, lightweight, security protocols. In particular, the work proposes: i) a fast multi-factor authentication solution with verified security properties based on PUFs, proximity detection and SKG; ii) an authenticated encryption SKG approach that interweaves data transmission and key generation; and, iii) a set of countermeasures to man-in-the-middle and jamming attacks. Overall, PLS solutions show promising performance, especially in the context of IoT applications, therefore, the advances in this thesis should be considered for beyond-5G networks

    On the Road to 6G: Visions, Requirements, Key Technologies and Testbeds

    Get PDF
    Fifth generation (5G) mobile communication systems have entered the stage of commercial development, providing users with new services and improved user experiences as well as offering a host of novel opportunities to various industries. However, 5G still faces many challenges. To address these challenges, international industrial, academic, and standards organizations have commenced research on sixth generation (6G) wireless communication systems. A series of white papers and survey papers have been published, which aim to define 6G in terms of requirements, application scenarios, key technologies, etc. Although ITU-R has been working on the 6G vision and it is expected to reach a consensus on what 6G will be by mid-2023, the related global discussions are still wide open and the existing literature has identified numerous open issues. This paper first provides a comprehensive portrayal of the 6G vision, technical requirements, and application scenarios, covering the current common understanding of 6G. Then, a critical appraisal of the 6G network architecture and key technologies is presented. Furthermore, existing testbeds and advanced 6G verification platforms are detailed for the first time. In addition, future research directions and open challenges are identified for stimulating the on-going global debate. Finally, lessons learned to date concerning 6G networks are discussed

    Maine State Government Administrative Report 1989-1990

    Get PDF
    https://digitalmaine.com/me_annual_reports/1016/thumbnail.jp
    corecore