What Physical Layer Security Can Do for 6G Security
نویسندگان
چکیده
While existing security protocols were designed with a focus on the core network, enhancement of B5G access network becomes critical importance. Despite strengthening 5G respect to LTE, there are still open issues that have not been fully addressed. This work is articulated around premise rethinking design bottom up, starting at physical layer, only viable in 6G but importantly, arises as an efficient way overcome hurdles novel use cases, notably massive machine type communications (mMTC), ultra reliable low latency (URLLC) and autonomous cyberphysical systems. Unlike review papers treat layer orthogonally cryptography, we will try provide few insights underlying connections. Discussing many practical issues, present comprehensive state-of the-art i) secret key generation from shared randomness, ii) wiretap channels fundamental limits, iii) authentication devices using unclonable functions (PUFs), localization multi-factor authentication, and, iv) jamming attacks layer. We finally conclude proposers' aspirations for landscape, hyper-connectivity semantic era.
منابع مشابه
Physical Layer Security Issues
Conventional wired networks are subject to being tapped by a variety of means, whether copper or fiber connections are used. In addition, methods of network snooping exist that make such eavesdropping minimally invasive, but no less significant. Wireless networking has additional characteristics that also decrease physical network security. As new technologies emerge, the potential for loss of ...
متن کاملWireless Physical Layer Security
Security in wireless networks has traditionally been considered to be an issue to be addressed separately from the physical radio transmission aspects of wireless systems. However, with the emergence of new networking architectures that are not amenable to traditional methods of secure communication such as data encryption, there has been an increase in interest in the potential of the physical...
متن کاملBoundaries can Enhance Physical Layer Security at High Data Rates
In this paper, we study the receiver performance with physical layer security in a Poisson field of interferers. We compare the performance in two deployment scenarios: (i) the receiver is located at the corner of a quadrant, (ii) the receiver is located in the infinite plane. When the channel state information (CSI) of the eavesdropper is not available at the transmitter, we calculate the prob...
متن کاملLDPC Codes for Physical Layer Security
This paper presents a coding scheme for the Gaussian wiretap channel based on low-density parity-check (LDPC) codes. The messages are transmitted over punctured bits to hide data from eavesdroppers. It is shown that this method is asymptotically effective in the sense that it yields a BER very close to 0.5 for an eavesdropper whose SNR is lower than the threshold SNRE , even if the eavesdropper...
متن کاملPhysical Layer Security for Multiuser MIMO Communications
Wireless multi-user MIMO communications are used more and more often to exchange sensitive data. Because of the broadcast nature of the physical medium, unauthorized receivers located within the transmission range can observe the signals sent by the transmitter to a legitimate receiver and eavesdrop them. Therefore, security has become an extremely important issue to deal with. Multiuser MIMO c...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE open journal of vehicular technology
سال: 2023
ISSN: ['2644-1330']
DOI: https://doi.org/10.1109/ojvt.2023.3245071