Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
129 tokens/sec
GPT-4o
28 tokens/sec
Gemini 2.5 Pro Pro
42 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
38 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

On the Use of CSI for the Generation of RF Fingerprints and Secret Keys (2110.15415v1)

Published 28 Oct 2021 in cs.IT, cs.AI, cs.CR, and math.IT

Abstract: This paper presents a systematic approach to use channel state information for authentication and secret key distillation for physical layer security (PLS). We use popular ML methods and signal processing-based approaches to disentangle the large scale fading and be used as a source of uniqueness, from the small scale fading, to be treated as a source of shared entropy secret key generation (SKG). The ML-based approaches are completely unsupervised and hence avoid exhaustive measurement campaigns. We also propose using the Hilbert Schmidt independence criterion (HSIC); our simulation results demonstrate that the extracted stochastic part of the channel state information (CSI) vectors are statistically independent.

Citations (9)

Summary

We haven't generated a summary for this paper yet.