Affiliation:
1. School of Electronic and Information Engineering, South China University of Technology, Guangzhou 510641, China
Abstract
As wireless communication scenarios grow more complicated, security issues are becoming increasingly prominent and severe. In the Internet of Things and vehicle-to-everything scenarios, conventional cryptographic technology faces numerous challenges. These include difficulties in secret key distribution and management, low update rates of secret keys, and vulnerability to quantum attacks. Physical layer secret key generation is considered a promising solution to security issues. The perfect secrecy proposed by Shannon can be achieved by combining secret key generation and the one-time pad when the length of secret keys is equal to that of plaintext. Hence, it is important to increase secret key generation rates. Intelligent reflecting surfaces demonstrate great advantages in improving the secret key generation performance. This paper provides a comprehensive review of current research efforts related to secret key generation assisted by intelligent reflecting surfaces, which is divided into three main categories: introducing the randomness of intelligent reflecting surfaces, optimizing the reflecting coefficients, and designing probing protocols. Comparative results of existing optimization approaches are provided and discussed. Furthermore, we emphasize the significance of selecting a random source of secret key generation from the perspective of information theory. Finally, two significant application scenarios, the Industrial Internet of Things and vehicle-to-everything, are discussed, and some challenges and opportunities are presented.
Funder
National Natural Science Foundation of China
R&D Program of key science and technology fields in Guangdong province
Guangzhou Key Field R&D Program
Reference55 articles.
1. The Roadmap to 6G Security and Privacy;Porambage;IEEE Open J. Commun. Soc.,2021
2. Security and Privacy for 6G: A Survey on Prospective Technologies and Challenges;Nguyen;IEEE Commun. Surv. Tutorials,2021
3. Katz, J., and Lindell, Y. (2007). Introduction to Modern Cryptography: Principles and Protocols, Chapman and Hall/CRC. [1st ed.].
4. 5G Vehicle-to-Everything Services: Gearing Up for Security and Privacy;Lu;Proc. IEEE,2020
5. A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends;Zou;Proc. IEEE,2016