Opinion: PHY-Layer Security is no Alternative to Cryptography

被引:5
|
作者
Robyns, Pieter [1 ]
Quax, Peter [1 ]
Lamotte, Wim [1 ]
机构
[1] UHasselt, tUL, IMEC, Wetenschapspk 2, B-3590 Diepenbeek, Belgium
关键词
PHY-layer security; cryptography; opinion; KEY GENERATION; WIRELESS;
D O I
10.1145/3098243.3098271
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent works, numerous physical-layer security systems have been proposed as alternatives to classic cryptography. Such systems aim to use the intrinsic properties of radio signals and the wireless medium to provide confidentiality and authentication to wireless devices. However, fundamental vulnerabilities are often discovered in these systems shortly after their inception. We therefore challenge the assumptions made by existing physical-layer security systems, and postulate that weaker assumptions are needed in order to adapt for practical scenarios. We also argue that if no computational advantage over an adversary can be ensured, secure communication cannot be realistically achieved.
引用
收藏
页码:160 / 162
页数:3
相关论文
共 50 条
  • [41] Sequence Detection Algorithms for PHY-Layer Sensing in Dynamic Spectrum Access Networks
    Sun, Zhanwei
    Bradford, Glenn J.
    Laneman, J. Nicholas
    [J]. IEEE JOURNAL OF SELECTED TOPICS IN SIGNAL PROCESSING, 2011, 5 (01) : 97 - 109
  • [42] A Tag-Based PHY-Layer Authentication Scheme Without Key Distribution
    An, Yongli
    Zhang, Shikang
    Ji, Zhanlin
    [J]. IEEE ACCESS, 2021, 9 : 85947 - 85955
  • [43] PHY-layer authentication exploiting CFO for smart healthcare systems with mmWave communication technology
    Teng, Yulin
    Shi, Huangwenqing
    Zhang, Pinchang
    Dong, Jiankuo
    Xiao, Fu
    [J]. AD HOC NETWORKS, 2023, 140
  • [44] PHY-Layer Cover-Free Coding for Wireless Pilot Authentication in IoV Communications: Protocol Design and Ultra-Security Proof
    Xu, Dongyang
    Ren, Pinyi
    Ritcey, James A.
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (01): : 171 - 187
  • [45] Tag-Based PHY-Layer Authentication for RIS-Assisted Communication Systems
    Zhang, Pinchang
    Teng, Yulin
    Shen, Yulong
    Jiang, Xiaohong
    Xiao, Fu
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (06) : 4778 - 4792
  • [46] Lightweight Tag-Based PHY-Layer Authentication for IoT Devices in Smart Cities
    Zhang, Pinchang
    Liu, Jun
    Shen, Yulong
    Li, Hewu
    Jiang, Xiaohong
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (05): : 3977 - 3990
  • [47] Empirical Statistical Inference Attack Against PHY-layer Key Extraction in Real Environments
    Zhu, Rui
    Shu, Tao
    Fu, Huirong
    [J]. MILCOM 2017 - 2017 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM), 2017, : 46 - 51
  • [48] Optimizing Energy-Efficiency of PHY-Layer Authentication in Machine-to-Machine Networks
    Bartoli, A.
    Hernandez-Serrano, J.
    Soriano, M.
    Dohler, M.
    Kountouris, A.
    Barthel, D.
    [J]. 2012 IEEE GLOBECOM WORKSHOPS (GC WKSHPS), 2012, : 1663 - 1668
  • [49] Rate Splitting for MIMO Wireless Networks: A Promising PHY-Layer Strategy for LTE Evolution
    Clerckx, Bruno
    Joudeh, Hamdi
    Hao, Chenxi
    Dai, Mingbo
    Rassouli, Borzoo
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2016, 54 (05) : 98 - 105
  • [50] AiFi: AI-Enabled WiFi Interference Cancellation with Commodity PHY-Layer Information
    Chen, Ruirong
    Huang, Kai
    Gao, Wei
    [J]. PROCEEDINGS OF THE TWENTIETH ACM CONFERENCE ON EMBEDDED NETWORKED SENSOR SYSTEMS, SENSYS 2022, 2022, : 134 - 148