Security concepts in emerging 6G communication: Threats, countermeasures, authentication techniques and research directions

SHA Kazmi, R Hassan, F Qamar, K Nisar, AAA Ibrahim - Symmetry, 2023 - mdpi.com
Challenges faced in network security have significantly steered the deployment timeline of
Fifth Generation (5G) communication at a global level; therefore, research in Sixth …

Physical layer security-from theory to practice

M Mitev, TM Pham, A Chorti… - IEEE BITS the …, 2023 - ieeexplore.ieee.org
In this article we present the evolutionary journey of physical layer security (PLS), starting
from its theoretical foundations in wiretap coding and secret key generation followed by to …

A physical layer, zero-round-trip-time, multifactor authentication protocol

M Mitev, M Shakiba-Herfeh, A Chorti, M Reed… - IEEE …, 2022 - ieeexplore.ieee.org
Lightweight physical layer security schemes that have recently attracted a lot of attention
include physical unclonable functions (PUFs), RF fingerprinting/proximity based …

Joint localization-based node authentication and secret key generation

M Srinivasan, S Skaperas, MS Herfeh… - ICC 2022-IEEE …, 2022 - ieeexplore.ieee.org
In this paper, we devise preprocessing schemes to disentangle channel state information
(CSI) into predictable and unpredictable components to simultaneously provide two …

How physicality enables trust: A new era of trust-centered cyberphysical systems

S Gil, M Yemini, A Chorti, A Nedić, HV Poor… - arXiv preprint arXiv …, 2023 - arxiv.org
Multi-agent cyberphysical systems enable new capabilities in efficiency, resilience, and
security. The unique characteristics of these systems prompt a reevaluation of their security …

Smart Channel State Information Pre-Processing for Authentication and Symmetric Key Distillation

M Srinivasan, S Skaperas, M Mitev… - … Machine Learning in …, 2023 - ieeexplore.ieee.org
While the literature on channel state information (CSI)-based authentication and key
distillation is vast, the two topics have customarily been studied separately. This paper …

A SKG security challenge: Indoor SKG under an on-the-shoulder eavesdropping attack

A Mayya, M Mitev, A Chorti… - GLOBECOM 2023-2023 …, 2023 - ieeexplore.ieee.org
Physical layer security (PLS) is seen as the means to enhance physical layer trustworthiness
in 6G. This work provides a proof-of-concept for one of the most mature PLS technologies …

Privacy-Preserving Randomized-MAC WiFi Client Counting with Short-Term-Coherent Waveform Features and a Bayesian Information Criterion

F Yang, X Zuo, B Denby - 2024 International Conference on …, 2024 - ieeexplore.ieee.org
The randomization of WiFi MAC addresses mandated by recent data privacy legislation has
created an urgent need for audience estimation techniques that can function without unique …

Smart channel state information pre-processing for joint authentication and symmetric key distillation

M Srinivasan, S Skaperas, A Chorti… - Authorea …, 2023 - techrxiv.org
While the literature on RF fingerprinting-based authentication and key distillation is vast, the
two topics have customarily been studied separately. In this paper, starting from the …

[PDF][PDF] MACHINE LEARNING BASED PHYSICAL LAYER KEY GENERATION APPROACH FOR INTERNET OF THINGS.

R Shahabade, M Zuber - MACHINE LEARNING, 2023 - machineintelligenceresearchs.com
The communication device on the internet of things has limited resources such as bandwidth
and memory. The limitation of resources cannot afford the computational cost of classical …