Opinion: PHY-Layer Security is no Alternative to Cryptography

被引:5
|
作者
Robyns, Pieter [1 ]
Quax, Peter [1 ]
Lamotte, Wim [1 ]
机构
[1] UHasselt, tUL, IMEC, Wetenschapspk 2, B-3590 Diepenbeek, Belgium
关键词
PHY-layer security; cryptography; opinion; KEY GENERATION; WIRELESS;
D O I
10.1145/3098243.3098271
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent works, numerous physical-layer security systems have been proposed as alternatives to classic cryptography. Such systems aim to use the intrinsic properties of radio signals and the wireless medium to provide confidentiality and authentication to wireless devices. However, fundamental vulnerabilities are often discovered in these systems shortly after their inception. We therefore challenge the assumptions made by existing physical-layer security systems, and postulate that weaker assumptions are needed in order to adapt for practical scenarios. We also argue that if no computational advantage over an adversary can be ensured, secure communication cannot be realistically achieved.
引用
收藏
页码:160 / 162
页数:3
相关论文
共 50 条
  • [21] PHY-Layer Spoofing Detection With Reinforcement Learning in Wireless Networks
    Xiao, Liang
    Li, Yan
    Han, Guoan
    Liu, Guolong
    Zhuang, Weihua
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2016, 65 (12) : 10037 - 10047
  • [22] PHY-Layer Authentication Using Duobinary Signaling for Spectrum Enforcement
    Kumar, Vireshwar
    Park, Jung-Min
    Bian, Kaigui
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (05) : 1027 - 1038
  • [23] PHY-Layer Authentication with Multiple Landmarks with Reduced Communication Overhead
    Wan, Xiaoyue
    Xiao, Liang
    Li, Qiangda
    Han, Zhu
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2017,
  • [24] PHY-layer network coding for broadcast channel with side information
    Xue, Feng
    Sandhu, Sumeet
    [J]. 2007 IEEE INFORMATION THEORY WORKSHOP, VOLS 1 AND 2, 2007, : 108 - 113
  • [25] PHY-Layer Authentication Using Hierarchical Modulation and Duobinary Signaling
    Kumar, Vireshwar
    Park, Jung-Min Jerry
    Clancy, T. Charles
    Bian, Kaigui
    [J]. 2014 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2014, : 782 - 786
  • [26] Cross-Technology Communication via PHY-Layer Emulation
    Jiang, Wenchao
    Li, Zhijun
    Yin, Zhimeng
    Liu, Ruofeng
    Liu, Ling
    He, Tian
    [J]. PROCEEDINGS OF THE 15TH ACM CONFERENCE ON EMBEDDED NETWORKED SENSOR SYSTEMS (SENSYS'17), 2017,
  • [27] CodeRepair: PHY-layer Partial Packet Recovery Without the Pain
    Huang, Jun
    Xing, Guoliang
    Niu, Jianwei
    Lin, Shan
    [J]. 2015 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (INFOCOM), 2015,
  • [28] PHY-Layer Authentication by Introducing Controlled Inter Symbol Interference
    Kumar, Vireshwar
    Park, Jung-Min Jerry
    Clancy, T. Charles
    Bian, Kaigui
    [J]. 2013 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2013, : 10 - 18
  • [29] PHY-layer fairness in amplify and forward cooperative diversity systems
    Michalopoulos, Diomidis S.
    Karagiannidis, George K.
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2008, 7 (03) : 1073 - 1083
  • [30] Statistical inference attack against PHY-layer key extraction and countermeasures
    Zhu, Rui
    Shu, Tao
    Fu, Huirong
    [J]. WIRELESS NETWORKS, 2021, 27 (07) : 4853 - 4873