On the Use of CSI for the Generation of RF Fingerprints and Secret Keys
Srinivasan, Muralikrishnan, Skaperas, Sotiris, Chorti, Arsenia
–arXiv.org Artificial Intelligence
A secure key generation depends on three principles: channel The renewed interest in physical layer security (PLS) technologies reciprocity between Alice and Bob, spatial decorrelation for sixth-generation (6G) systems stems from the and temporal variations [7]. Spatial decorrelation is particularly emergence of massive-scale Internet of things (IoT) networks, important because a passive eavesdropper (Eve) present which have an extensive range of non-functional (security) close to the legitimate users can generate the duplicate keys constraints as well as computational, power and energy limitations, by exploiting the shared spatial correlation. Based on Jakes' delay and latency constraints, etc. [1], [2]. One of model, the channel will be uncorrelated when a third party is the most popular physical layer security (PLS) techniques is located half-wavelength away [5]. Under this assumption, to facilitate reconciliation, the authors for the transmitter (Alice) and the receiver (Bob) to extract of [8] carry out a theoretical study on pre-processing a key from the wireless channel realisations exploiting the algorithms such as principal component analysis (PCA) to common randomness of the wireless channels during the establish a high-agreement uncorrelated secret key by retaining channel coherence time [3], [4].
arXiv.org Artificial Intelligence
Oct-28-2021
- Country:
- Europe > United Kingdom > England > Cambridgeshire > Cambridge (0.04)
- Genre:
- Research Report (0.64)
- Industry:
- Information Technology > Security & Privacy (1.00)
- Technology: