Abstract

The fifth generation (5G) and beyond wireless communications will transform many exciting applications and trigger massive data connections with private, confidential, and sensitive information. The security of wireless communications is conventionally established by cryptographic schemes and protocols in which the secret key distribution is one of the essential primitives. However, traditional cryptography-based key distribution protocols might be challenged in the 5G and beyond communications because of special features such as device-to-device and heterogeneous communications, and ultra-low latency requirements. Channel reciprocity-based key generation (CRKG) is an emerging physical layer-based technique to establish secret keys between devices. This article reviews CRKG when the 5G and beyond networks employ three candidate technologies: duplex modes, massive multiple-input multiple-output (MIMO) and mmWave communications. We identify the opportunities and challenges for CRKG and provide corresponding solutions. To further demonstrate the feasibility of CRKG in practical communication systems, we overview existing prototypes with different IoT protocols and examine their performance in real-world environments. This article shows the feasibility and promising performances of CRKG with the potential to be commercialized.

Highlights

  • The 5G and beyond wireless communications will support massive transmission of important and private information, including personal data, financial information, military secrets and mission-critical industrial control messages [1,2]

  • It is built on the basis of channel reciprocity, which means that the channel responses of the forward and backward communication links are the same [14]

  • In contrast to existing surveys and and tutorials, our work aims to clarify the feasibility and scalability of Channel reciprocity-based key generation (CRKG) to support new air interface technologies, e.g., full duplex, massive multiple-input multiple-output (MIMO), mmWave, and heterogeneous Internet of Things (IoT) devices in the 5G and beyond

Read more

Summary

Introduction

The 5G and beyond wireless communications will support massive transmission of important and private information, including personal data, financial information, military secrets and mission-critical industrial control messages [1,2]. Communication security is one of the top priorities in future wireless network design [3]. To safeguard the data transmission, public key cryptography techniques and associated protocols are widely applied to distribute secret keys among users and devices. These solutions are facing new challenges in 5G and beyond wireless communications: they may be cracked by the emerging quantum computers in the future [4]; they require a public key infrastructure which may not be available in many 5G applications such as device-to-device communications [5]; Entropy 2019, 21, 497; doi:10.3390/e21050497 www.mdpi.com/journal/entropy.

Fundamentals of Physical Layer Key Generation
Our Contributions
CRKG in Three Typical Duplex Modes
CRKG in Massive MIMO and mmWave Systems
Massive MIMO
MmWave Communications
Bringing CRKG into the Field
Short-Range IoT Communication Solutions
Ultra-Wideband
Long-Range IoT Communication Solutions
Open Research Challenges
Findings
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call