Papers
Topics
Authors
Recent
Search
2000 character limit reached

On the Use of CSI for the Generation of RF Fingerprints and Secret Keys

Published 28 Oct 2021 in cs.IT, cs.AI, cs.CR, and math.IT | (2110.15415v1)

Abstract: This paper presents a systematic approach to use channel state information for authentication and secret key distillation for physical layer security (PLS). We use popular ML methods and signal processing-based approaches to disentangle the large scale fading and be used as a source of uniqueness, from the small scale fading, to be treated as a source of shared entropy secret key generation (SKG). The ML-based approaches are completely unsupervised and hence avoid exhaustive measurement campaigns. We also propose using the Hilbert Schmidt independence criterion (HSIC); our simulation results demonstrate that the extracted stochastic part of the channel state information (CSI) vectors are statistically independent.

Citations (9)

Summary

Paper to Video (Beta)

Whiteboard

No one has generated a whiteboard explanation for this paper yet.

Open Problems

We haven't generated a list of open problems mentioned in this paper yet.

Continue Learning

We haven't generated follow-up questions for this paper yet.

Collections

Sign up for free to add this paper to one or more collections.