What physical layer security can do for 6G security

M Mitev, A Chorti, HV Poor… - IEEE Open Journal of …, 2023 - ieeexplore.ieee.org
While existing security protocols were designed with a focus on the core network, the
enhancement of the security of the B5G access network becomes of critical importance …

A physical layer, zero-round-trip-time, multifactor authentication protocol

M Mitev, M Shakiba-Herfeh, A Chorti, M Reed… - IEEE …, 2022 - ieeexplore.ieee.org
Lightweight physical layer security schemes that have recently attracted a lot of attention
include physical unclonable functions (PUFs), RF fingerprinting/proximity based …

Joint localization-based node authentication and secret key generation

M Srinivasan, S Skaperas, MS Herfeh… - ICC 2022-IEEE …, 2022 - ieeexplore.ieee.org
In this paper, we devise preprocessing schemes to disentangle channel state information
(CSI) into predictable and unpredictable components to simultaneously provide two …

Joint secure communication and sensing in 6G networks

M Mitev, A Mayya, A Chorti - Physical‐Layer Security for 6G, 2024 - Wiley Online Library
The integration of joint communication and sensing stands out as a key feature anticipated
for the next‐generation wireless communication networks that can unlock a plethora of new …

Smart Channel State Information Pre-Processing for Authentication and Symmetric Key Distillation

M Srinivasan, S Skaperas, M Mitev… - … Machine Learning in …, 2023 - ieeexplore.ieee.org
While the literature on channel state information (CSI)-based authentication and key
distillation is vast, the two topics have customarily been studied separately. This paper …

A SKG security challenge: Indoor SKG under an on-the-shoulder eavesdropping attack

A Mayya, M Mitev, A Chorti… - GLOBECOM 2023-2023 …, 2023 - ieeexplore.ieee.org
Physical layer security (PLS) is seen as the means to enhance physical layer trustworthiness
in 6G. This work provides a proof-of-concept for one of the most mature PLS technologies …

Enhanced Multiuser CSI-Based Physical Layer Authentication Based on Information Reconciliation

AKA Passah, A Chorti… - IEEE Wireless …, 2024 - ieeexplore.ieee.org
This paper presents a physical layer authentication (PLA) technique using information
reconciliation in multiuser communication systems. A cost-effective solution for low-end …

Physical Layer Secret Key Generation with Kalman Filter Detrending

M Mitev, A Chorti, G Fettweis - GLOBECOM 2023-2023 IEEE …, 2023 - ieeexplore.ieee.org
The massive deployment of low-end wireless Internet of things (IoT) devices opens the
challenge of finding de-centralized and lightweight alternatives for secret key distribution. A …

Physical Layer Authentication Using Information Reconciliation

AKA Passah, RC de Lamare, A Chorti - arXiv preprint arXiv:2404.12874, 2024 - arxiv.org
User authentication in future wireless communication networks is expected to become more
complicated due to their large scale and heterogeneity. Furthermore, the computational …

AI/ML‐Aided Processing for Physical‐Layer Security

M Srinivasan, S Skaperas… - … ‐Layer Security for …, 2024 - Wiley Online Library
This chapter introduces methodologies for preprocessing channel state information (CSI)
data in the context of authentication and secret key generation (SKG) for wireless …