Benefits of Physical Layer Security to Cryptography: Tradeoff and Applications

被引:10
|
作者
Mucchi, Lorenzo
Nizzi, Francesca
Pecorella, Tommaso
Fantacci, Romano
Esposito, Flavin
机构
关键词
Physical Layer Security; Cryptography; IoT devices;
D O I
10.1109/blackseacom.2019.8812778
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Physical-layer security (PLS) has raised the attention of the research community in recent years, particularly for Internet of things (IoT) applications. Despite the use of classical cryptography, PLS provides security at physical layer, regardless of the computational power owned by the attacker. The investigations on PLS are numerous in the literature, but one main issue seems to be kept apart: how to measure the benefit that PLS can bring to cryptography? This paper tries to answer this question with an initial performance analysis of PLS in conjunction with typical cryptography of wireless communication protocols. Our results indicate that PLS can help cryptography to harden the attacker job in real operative scenario: PLS can increase the detection errors at the attacker's receiver, leading to inability to recover the cipher key, even if the plaintext is known.
引用
收藏
页数:3
相关论文
共 50 条
  • [1] Delay and Physical Layer Security Tradeoff in Large Wireless Networks
    Zhong, Yi
    Han, Tao
    Li, Qiang
    Ge, Xiaohu
    [J]. 2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2018,
  • [2] Tradeoff Between Delay and Physical Layer Security in Wireless Networks
    Zhong, Yi
    Ge, Xiaohu
    Han, Tao
    Li, Qiang
    Zhang, Jing
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2018, 36 (07) : 1635 - 1647
  • [3] Physical layer security: All-optical cryptography in access networks
    Cincotti, Gabriella
    Sacchieri, Valentina
    Manzacca, Gianluca
    Kataoka, Nobuyuki
    Wada, Naoya
    Nakagawa, Naoki
    Kitayama, Ken-ichi
    [J]. ICTON 2008: PROCEEDINGS OF 2008 10TH ANNIVERSARY INTERNATIONAL CONFERENCE ON TRANSPARENT OPTICAL NETWORKS, VOL 4, 2008, : 127 - +
  • [4] Physical-Layer Security: Combining Error Control Coding and Cryptography
    Harrison, Willie K.
    McLaughlin, Steven W.
    [J]. 2009 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-8, 2009, : 1833 - 1837
  • [5] A Survey of Secure Communications for Satellite Internet Based on Cryptography and Physical Layer Security
    Zhang, Yu
    Zhao, Shuangrui
    He, Ji
    Zhang, Yuanyu
    Shen, Yulong
    Jiang, Xiaohong
    [J]. IET INFORMATION SECURITY, 2023, 2023
  • [6] A Survey of Secure Communications for Satellite Internet Based on Cryptography and Physical Layer Security
    Zhang, Yu
    Zhao, Shuangrui
    He, Ji
    Zhang, Yuanyu
    Shen, Yulong
    Jiang, Xiaohong
    [J]. IET Information Security, 2023, 2023 (01):
  • [7] An encrypted multitone modulation method for physical layer security based on chaotic cryptography
    Guo, Shengnan
    Fu, Yongqing
    Yu, Lei
    [J]. PHYSICAL COMMUNICATION, 2021, 47
  • [8] Physical-Layer Security, Quantum Key Distribution, and Post-Quantum Cryptography
    Djordjevic, Ivan B.
    [J]. ENTROPY, 2022, 24 (07)
  • [9] Physical Layer Cryptography and Cognitive Networks
    Lorenzo Mucchi
    Luca Simone Ronga
    Enrico Del Re
    [J]. Wireless Personal Communications, 2011, 58
  • [10] Physical Layer Cryptography and Cognitive Networks
    Mucchi, Lorenzo
    Ronga, Luca Simone
    Del Re, Enrico
    [J]. TRUSTWORTHY INTERNET, 2011, : 75 - 91