Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 1–8 of 8 results for author: Mitev, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2310.14624  [pdf, other

    cs.CR

    Joint secure communication and sensing in 6G networks

    Authors: Miroslav Mitev, Amitha Mayya, Arsenia Chorti

    Abstract: Joint communication and sensing is expected to be one of the features introduced by the sixth-generation (6G) wireless systems. This will enable a huge variety of new applications, hence, it is important to find suitable approaches to secure the exchanged information. Conventional security mechanisms may not be able to meet the stringent delay, power, and complexity requirements which opens the ch… ▽ More

    Submitted 23 October, 2023; originally announced October 2023.

  2. arXiv:2305.09251  [pdf, other

    cs.CR

    A SKG Security Challenge: Indoor SKG Under an On-The-Shoulder Eavesdropping Attack

    Authors: Amitha Mayya, Miroslav Mitev, Arsenia Chorti, Gerhard Fettweis

    Abstract: Physical layer security (PLS) is seen as the means to enhance physical layer trustworthiness in 6G. This work provides a proof-of-concept for one of the most mature PLS technologies, i.e., secret key generation (SKG) from wireless fading coefficients during the channel's coherence time. As opposed to other works, where only specific parts of the protocol are typically investigated, here, we implem… ▽ More

    Submitted 18 May, 2023; v1 submitted 16 May, 2023; originally announced May 2023.

  3. arXiv:2305.04540  [pdf, other

    cs.CR

    Physical Layer Secret Key Generation with Kalman Filter Detrending

    Authors: Miroslav Mitev, Arsenia Chorti, Gerhard Fettweis

    Abstract: The massive deployment of low-end wireless Internet of things (IoT) devices opens the challenge of finding de-centralized and lightweight alternatives for secret key distribution. A possible solution, coming from the physical layer, is the secret key generation (SKG) from channel state information (CSI) during the channel's coherence time. This work acknowledges the fact that the CSI consists of d… ▽ More

    Submitted 22 May, 2023; v1 submitted 8 May, 2023; originally announced May 2023.

  4. arXiv:2212.00427  [pdf, other

    cs.CR

    What Physical Layer Security Can Do for 6G Security

    Authors: Miroslav Mitev, Arsenia Chorti, H. V. Poor, Gerhard Fettweis

    Abstract: While existing security protocols were designed with a focus on the core network, the enhancement of the security of the B5G access network becomes of critical importance. Despite the strengthening of 5G security protocols with respect to LTE, there are still open issues that have not been fully addressed. This work is articulated around the premise that rethinking the security design bottom up, s… ▽ More

    Submitted 1 December, 2022; originally announced December 2022.

  5. arXiv:2210.13261  [pdf, other

    cs.CR

    Physical Layer Security -- from Theory to Practice

    Authors: Miroslav Mitev, Thuy M. Pham, Arsenia Chorti, Andre Noll Barreto, Gerhard Fettweis

    Abstract: A large spectrum of technologies are collectively dubbed as physical layer security (PLS), ranging from wiretap coding, secret key generation (SKG), authentication using physical unclonable functions (PUFs), localization / RF fingerprinting, anomaly detection monitoring the physical layer (PHY) and hardware. Despite the fact that the fundamental limits of PLS have long been characterized, incorpor… ▽ More

    Submitted 24 October, 2022; originally announced October 2022.

  6. Multi-factor Physical Layer Security Authentication in Short Blocklength Communication

    Authors: Miroslav Mitev, Mahdi Shekiba-Herfeh, Arsenia Chorti, Martin Reed

    Abstract: Lightweight and low latency security schemes at the physical layer that have recently attracted a lot of attention include: (i) physical unclonable functions (PUFs), (ii) localization based authentication, and, (iii) secret key generation (SKG) from wireless fading coefficients. In this paper, we focus on short blocklengths and propose a fast, privacy preserving, multi-factor authentication protoc… ▽ More

    Submitted 24 February, 2021; v1 submitted 27 October, 2020; originally announced October 2020.

  7. arXiv:2003.12034  [pdf, ps, other

    cs.CR cs.IT

    Man-in-the-Middle and Denial of Service Attacks in Wireless Secret Key Generation

    Authors: Miroslav Mitev, Arsenia Chorti, E. Veronica Belmega, Martin Reed

    Abstract: Wireless secret key generation (W-SKG) from shared randomness (e.g., from the wireless channel fading realizations), is a well established scheme that can be used for session key agreement. W-SKG approaches can be of particular interest in delay constrained wireless networks and notably in the context of ultra reliable low latency communications (URLLC) in beyond fifth generation (B5G) systems. Ho… ▽ More

    Submitted 26 March, 2020; originally announced March 2020.

  8. arXiv:2001.07162  [pdf, ps, other

    cs.CR

    Authenticated Secret Key Generation in Delay Constrained Wireless Systems

    Authors: Miroslav Mitev, Arsenia Chorti, Martin Reed, Leila Musavian

    Abstract: With the emergence of 5G low latency applications, such as haptics and V2X, low complexity and low latency security mechanisms are sought. Promising lightweight mechanisms include physical unclonable functions (PUF) and secret key generation (SKG) at the physical layer, as considered in this paper. In this framework we propose i) a novel authenticated encryption using SKG; ii) a combined PUF / SKG… ▽ More

    Submitted 26 March, 2020; v1 submitted 20 January, 2020; originally announced January 2020.