Please use this identifier to cite or link to this item: http://hdl.handle.net/10397/81225
PIRA download icon_1.1View/Download Full Text
DC FieldValueLanguage
dc.contributorDepartment of Computing-
dc.creatorLi, G-
dc.creatorSun, C-
dc.creatorZhang, J-
dc.creatorJorswieck, E-
dc.creatorXiao, B-
dc.creatorHu, A-
dc.date.accessioned2019-08-23T08:29:49Z-
dc.date.available2019-08-23T08:29:49Z-
dc.identifier.urihttp://hdl.handle.net/10397/81225-
dc.language.isoenen_US
dc.publisherMolecular Diversity Preservation International (MDPI)en_US
dc.rights© 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).en_US
dc.rightsThe following publication Li G, Sun C, Zhang J, Jorswieck E, Xiao B, Hu A. Physical Layer Key Generation in 5G and Beyond Wireless Communications: Challenges and Opportunities. Entropy. 2019; 21(5):497 is available at https://doi.org/10.3390/e21050497en_US
dc.subjectIn-band full-duplexen_US
dc.subjectIoT prototypesen_US
dc.subjectMassive MIMOen_US
dc.subjectMmWave communicationsen_US
dc.subjectPhysical layer securityen_US
dc.subjectSecret key generationen_US
dc.titlePhysical layer key generation in 5G and beyond wireless communications : challenges and opportunitiesen_US
dc.typeJournal/Magazine Articleen_US
dc.identifier.volume21en_US
dc.identifier.issue5en_US
dc.identifier.doi10.3390/e21050497en_US
dcterms.abstractThe fifth generation (5G) and beyond wireless communications will transform many exciting applications and trigger massive data connections with private, confidential, and sensitive information. The security of wireless communications is conventionally established by cryptographic schemes and protocols in which the secret key distribution is one of the essential primitives. However, traditional cryptography-based key distribution protocols might be challenged in the 5G and beyond communications because of special features such as device-to-device and heterogeneous communications, and ultra-low latency requirements. Channel reciprocity-based key generation (CRKG) is an emerging physical layer-based technique to establish secret keys between devices. This article reviews CRKG when the 5G and beyond networks employ three candidate technologies: duplex modes, massive multiple-input multiple-output (MIMO) and mmWave communications. We identify the opportunities and challenges for CRKG and provide corresponding solutions. To further demonstrate the feasibility of CRKG in practical communication systems, we overview existing prototypes with different IoT protocols and examine their performance in real-world environments. This article shows the feasibility and promising performances of CRKG with the potential to be commercialized.-
dcterms.accessRightsopen accessen_US
dcterms.bibliographicCitationEntropy, 2019, v. 21, no. 5, 497-
dcterms.isPartOfEntropy-
dcterms.issued2019-
dc.identifier.isiWOS:000472675900061-
dc.identifier.scopus2-s2.0-85066632849-
dc.identifier.eissn1099-4300en_US
dc.identifier.artn497en_US
dc.description.validate201908 bcma-
dc.description.oaVersion of Recorden_US
dc.identifier.FolderNumberOA_Scopus/WOSen_US
dc.description.pubStatusPublisheden_US
Appears in Collections:Journal/Magazine Article
Files in This Item:
File Description SizeFormat 
Li_Physical_layer_key.pdf795.78 kBAdobe PDFView/Open
Open Access Information
Status open access
File Version Version of Record
Access
View full-text via PolyU eLinks SFX Query
Show simple item record

Page views

120
Last Week
2
Last month
Citations as of Apr 28, 2024

Downloads

116
Citations as of Apr 28, 2024

SCOPUSTM   
Citations

62
Citations as of Apr 26, 2024

WEB OF SCIENCETM
Citations

46
Citations as of May 2, 2024

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.