What Physical Layer Security Can Do for 6G Security

被引:77
作者
Mitev, Miroslav [1 ]
Chorti, Arsenia [1 ,2 ]
Poor, H. Vincent [3 ]
Fettweis, Gerhard P. [4 ]
机构
[1] Barkhausen Inst, D-01187 Dresden, Germany
[2] CY Cergy Paris Univ, ETIS, ENSEA, CNRS,UMR 8051, F-95000 Cergy, France
[3] Princeton Univ, Sch Engn & Appl Sci, Princeton, NJ 08544 USA
[4] Tech Univ Dresden, Vodafone Chair Mobile Commun Syst, D-01062 Dresden, Germany
来源
IEEE OPEN JOURNAL OF VEHICULAR TECHNOLOGY | 2023年 / 4卷
基金
美国国家科学基金会;
关键词
Security; 6G mobile communication; Authentication; Ciphers; Semantics; Physical layer security; 5G mobile communication; 5G; 6G; physical layer security; wiretap coding; secret key generation; physical unclonable functions; SMART METER PRIVACY; COMMUNICATION; SYSTEMS;
D O I
10.1109/OJVT.2023.3245071
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
While existing security protocols were designed with a focus on the core network, the enhancement of the security of the B5G access network becomes of critical importance. Despite the strengthening of 5G security protocols with respect to LTE, there are still open issues that have not been fully addressed. This work is articulated around the premise that rethinking the security design bottom up, starting at the physical layer, is not only viable in 6G but importantly, arises as an efficient way to overcome security hurdles in novel use cases, notably massive machine type communications (mMTC), ultra reliable low latency communications (URLLC) and autonomous cyberphysical systems. Unlike existing review papers that treat physical layer security orthogonally to cryptography, we will try to provide a few insights of underlying connections. Discussing many practical issues, we will present a comprehensive review of the state-of the-art in i) secret key generation from shared randomness, ii) the wiretap channels and fundamental limits, iii) authentication of devices using physical unclonable functions (PUFs), localization and multi-factor authentication, and, iv) jamming attacks at the physical layer. We finally conclude with the proposers' aspirations for the 6G security landscape, in the hyper-connectivity and semantic communications era.
引用
收藏
页码:375 / 388
页数:14
相关论文
共 33 条
[1]  
3rd Gener. Partnership Project (3GPP), 33825 3GPP
[2]  
3rd Generation Partnership Project (3GPP), 2018, Tech. Rep. Tech. Report 33.809
[3]  
Aazhang B., 2019, White Paper
[4]  
[Anonymous], 2022, IEEE INT NETWORK GEN, P30
[5]   Protecting Secret Key Generation Systems Against Jamming: Energy Harvesting and Channel Hopping Approaches [J].
Belmega, E. Veronica ;
Chorti, Arsenia .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (11) :2611-2626
[6]   Enabling Data Exchange in Two-Agent Interactive Systems Under Privacy Constraints [J].
Belmega, E. Veronica ;
Sankar, Lalitha ;
Poor, H. Vincent .
IEEE JOURNAL OF SELECTED TOPICS IN SIGNAL PROCESSING, 2015, 9 (07) :1285-1297
[7]   Generalized privacy amplification [J].
Bennett, CH ;
Brassard, G ;
Crepeau, C ;
Maurer, UM .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1995, 41 (06) :1915-1923
[8]  
Bloch M., 2011, Physical Layer Security: From Information Theory to Security Engineering
[9]  
Chorti Arsenia, 2022, IEEE Communications Standards Magazine, V6, P102, DOI [10.1109/mcomstd.0001.2000082, 10.1109/MCOMSTD.0001.2000082]
[10]   Privacy-cost trade-offs in smart electricity metering systems [J].
Giaconi, Giulio ;
Gunduz, Deniz ;
Poor, H. Vincent .
IET SMART GRID, 2020, 3 (05) :596-604