You are on page 1of 6

Towards the Sixth Generation (6G) Wireless

Systems: Thoughts on Physical Layer Security


Christoph Lipps† , Shaden Baradie† , Marjan Noushinfar† ,
Jan Herbst† , Andreas Weinand∗ and Hans Dieter Schotten∗†
† Intelligent Networks Research Group, German Research Center for Artificial Intelligence
D-67663 Kaiserslautern, Email: {firstname.lastname}@dfki.de
∗ Institute for Wireless Communication and Navigation, University of Kaiserslautern

D-67663 Kaiserslautern, mail: {lastname}@eit.uni-kl.de

Abstract
Wireless communication has already had a transformative impact on lifestyles, as well as the way of interacting and
communicating, throughout many years. This transformation is accelerated by technological drivers such as Artificial Intelligence
(AI) as well as the ever-increasing demand for bandwidth and throughput. However, it is already foreseeable that the Fifth
Generation (5G) cellular networks will not be sufficient to cope with the volume of mobile communication in 2030 and beyond.
This paper considers Beyond 5G (B5G) and Sixth Generation (6G) mobile communications and outlines challenges for them.
Alongside the technical requirements, the security, confidentiality and trustworthiness are of major importance. Therefore, the
paper discusses the various 6G research areas such as Visible Light Communication (VLC), Reconfigurable Intelligent Surfaces
(RISs) and (sub)Terahertz (THz) communication and highlights how the research areas contribute to Physical Layer Security
(PhySec) and how the development of 6G will act as catalyst for PhySec.

Please note: This work is a preprint.


Index Terms
Physical Layer Security, Next Generation Mobile Networks, Channel-PUFs, Network Security, B5G, 6G

I. D RIVING THE COMMUNICATION OVERLOAD applications, arise.


Confidentiality and integrity have always been the prereq- A starting point to meet these requirements in the future
uisites for trustworthy and secure communication. But it is is represented by Beyond 5G (B5G) and the Sixth Gen-
becoming increasingly challenging to achieve this objective. eration (6G) wireless systems, suggesting a massive switch
Among others, the vast amount of communication participants to automation and a deployment of the so-called intelligent
and exchanged information is what turns the task into such wireless communications through the Industrial Internet of
a comprehensive one. For instance, it is expected by the Things (IIoT). This requires a very high level of reliability
International Telecommunication Union (ITU) that the total and as few power limitations as possible in order to ensure
number of Mobile Broadband (MBB) subscribers worldwide a secure and reliable environment which is able to hold real-
will reach 17.1 billion by 2030 [1]. In addition the prediction time communications without any outages [3][4]. The aspired
of Machine-to-Machine (M2M) terminals will reach about future of communications describes the network to be fully
100 billion -this is 14 times over that of 2020- by the and globally connected [2]. With this high level of connectivity
same period of time [1]. This quantity not only poses high between various types of end devices and the lack of human
demands on security, but more fundamentally, the current interaction in some cases due to automation and dynamic
communication infrastructure (backbone) is not capable of reconfiguration, more opportunities for malicious attacks and
handling this amount of data. As the 5G cellular networks actions of interfering are opened, which stresses the necessity
is in its global realization, Jiang et al. forecast that this is not of new more reliable security measures.
enough to accommodate the volume of mobile traffic in 2030 In terms of Next Generation Mobile Networks (NGMNs)
and beyond [2]. security, Physical Layer Security (PhySec) [5] may become
This trend is emphasised by the development of a wide a promising alternative: As traditionally security has been
range of new use cases such as Hologaphic-Type Com- implemented in higher layers of communication networks and
munication (HTC), Extended Reality (ER), Digital Twins, thereby have been addressed separately from the wireless
Visible Light Communication (VLC) and Distributed Ledger transmission, information theory offers a solution to simul-
Technology (DLT) which require high data rates, bandwidths taneously use the characteristics of the channel for security in
and comprehensive coverage. Alongside that, applications and addition to pure data transmission. PhySec is considered as a
devices with extremely low-resources, for instance, Body promising approach to improve the network’s security and reli-
Area Networks (BANs) with implantable sensors for medical ability levels while continuing to benefit from the features that
wireless networks have to offer, like for example, their high effectiveness, and some metrics that offer an alternative in
flexibility, scalability and their low costs of maintenance and the case of secrecy not being achieved or having failures in
manufacturing. But, by using inherently available information. recovery at the targeted destination like the alternative secrecy
It provides security measures and precautions at the lowest outage formulation [7].
level of communication, which in turn helps in overcoming
bandwidth, reliability and transmission rates limitations [3]. B. Cellular-PhySec: an ongoing field of research
This work outlines the beneficial and promising application For several years, especially since the rise of inter-
of PhySec in the upcoming wireless network generations and connectivity and the connection of low-resource (end)devices,
their future developments in terms of security and reliability. PhySec has been a very active field of research. Starting
By highlighting the 6G enabling technological developments with Secret Key Generation (SKG) and Channel-Reciprocity
and challenges from the perspective of 6G-PhySec, the addi- Based Key Extraction (CRKE) in IEEE802.11 WLAN net-
tional value in terms of security and applicability is clarified. works, there are many approaches to use the algorithms
Therefore, in Section II, a short introduction to the field of in legacy radio networks such as Long Range Wide Area
PhySec is given and current research activities are highlighted. Network (LoRaWAN) [8] and Long Term Evolution (LTE)
The challenges for B5G and 6G networks are discussed in [3]. For instance Lipps et al. propose to apply Machine
Section III and PhySec solutions to meet these challenges Learning (ML) in form of the linear regression algorithm
are identified. Section IV gives an insight into 6G research to enhance the channel prediction -as basic building block
topics and highlights how they are beneficial to the PhySec of SKG- and thus achieve a significant improvement in the
deployment. Section V summarises the paper. Bit Disagreement Rate (BDR) [3]. Yang et al. suggest to use
PhySec to safeguard 5G wireless communication [9], whereas
II. P HYSICAL L AYER S ECURITY Sánches et al. provide a comprehensive survey about PhySec
Especially since the proliferation of use-cases, PhySec is in 5G networks [7]. Thereby they take into account different
becoming increasingly popular in the scientific community. 5G enabling technologies, such as mmWave communication,
Not just for the IIoT and the multitude of resource-limited heterogeneous networks and massive Multiple Input Multiple
devices, it represents alternatives in terms of scalability and Output (mMIMO) systems. Security aspects regarding cellular
efficiency, moreover it provides security aspects in respect to Internet of Things (IoT) networks and how to design a secure
entropy H and Perfect Forward Secrecy (PFS). Due to the access, enabled by PhySec is given by Qi et al. [10]. The
inherently available and exploitable nature of cryptographic paradigm shift in enabling technology to 6G is done, for
primitive, combinations of different PhySec derivatives are of instance, by Chorti et al. [11]. They are dealing with context-
increasing relevance. aware security in 6G networks and outline the benefits of
PhySec in 6G. Li et al. address the edge caching in 6G
A. Physical Layer Security in a Nutshell networks and propose a two-hop edge caching scheme secured
Alongside the well-known hardware-based Physically Un- by PhySec [12].
clonable Functions (PUFs) -also known as silicon/electrical In contrast to this, six different 6G research areas are ad-
-Physically Unclonable Functions (PUFs) [6]-, the wire- dressed in this paper, with an explicit focus on the applicability
less Physical Layer Security -also refered to as Channel- to Physical Layer Security methods: Reconfigurable Intelli-
PUFs [3]-, are gaining popularity. For both, the working gent Surfaces, Visible Light Communication, Ultra-Massive
principle, the utilization of inherent characteristics to derive MIMO, (sub)THz communication, localization & Sensing, as
crpytographic primitives, is quite similar. Channel-PUFs are well as Link Integrity monitoring.
based on the propagation of electromagnetic waves and the
influences of various (environmental) factors on these. They III. B EYOND 5G AND 6G C OMMUNICATIONS
are exploiting the randomness of (noisy) channels to provide As indicated in Section I, the current 5G networks are not
an additional level of security. capable to fulfill the upcoming requirements of the exponential
These variations are observed and analyzed by performance growth of traffic and continuous need for improvement in the
metrics that highlight the possibility of having an eaves- network efficiencies with respect to cost, energy, spectrum
dropper intruding on the monitored channel. The most used and operational efficiency. The emergence of new fields of
performance metric in the PhySec’s evaluation of a certain applications such as HTC, ER, Tactile internet, Digital Twins,
connection is the secrecy capacity, which is the difference pervasive intelligence and global ubiquitous connectability
in capacity between the legitimate channel and the channel underlines this development [2].
of the eavesdropper. This metric defines the maximum secret To meet these growing demands, for instance, Jiang et
rate, which indicates to what extent the sent information is al. propose to complement the existing 5G scenarios -Ultra-
correctly decoded and recovered on the targeted destination Reliable Low-Latency Communication (URLLC), massive
while being kept a secret from the eavesdropper. Besides the Machine Type Communication (MMTC), enhanced Mobile
secrecy capacity there are other performance metrics either broad-Band (eMBB)- to be extended by ’interim’ scenarios ac-
related to the evaluation of the secrecy capacity like the cording to the assigned application areas: Ultra-Reliable Low-
secrecy outage probability, for instance, which measures its Latency Broadband Communication (ULBC), massive Ultra-
Reliable Low-Latency Communication (mULC), ubiquious Among the advantages of (sub)terahertz applications is that
Mobile Broadband (uMBB) [2]. they easily absorb moisture in the air and are therefore suitable
These represent a proposal to meet the emerging require- for high-speed wireless communication over short distances.
ments. In addition, this offers the opportunity to address the Terahertz communication provides a narrow beam -up to
requirements not yet solved by 5G, such as latency, mobility, pencil-sharp beamforming- and superior beam directivity, re-
energy efficiency and peak data rate. Furthermore, with signal sulting in secure communication achieved through strong anti-
bandwidth, positioning accuracy, coverage, as well as security interference capability.
and privacy aspects, additional requirements arise which can The involvement of VLC hardens the system, as VLC i) uses
be realized by the development of 6G. electromagnetic radiation in a different wavelength domain,
and is hence not susceptible to external electromagnetic in-
A. 6G technological enablers terference and ii) enables targeted communication. Moreover,
For the development of the new 6G mobile standard, there since VLC does not penetrate walls, it is not subject to the
are a whole series of technological enablers, enhancements same attack vectors as broadcast radio communication.
of existing technologies. Thus, for instance, new spectrum is Besides that, the virtualization of additional components,
available for the next generation of mobile communications. such as the PHY- and the MAC layer, will decrease the costs of
This features sufficient capacity for heterogeneous Radio Ac- network equipment and thereby supports the massively dense
cess Technology (RAT), whereas long-established RATs can deployment of the technology.
co-exist with lower radio frequencies and Line of Sight (LoS)-
dependent RATs as well. This available spectrum includes: C. Challenges for 6G networks
mmWave- Terahertz-, Visible Light- and Optical Wireless Despite all the promises and visions, there are a number of
Communication in general, as well as the overall dynamic challenges that need to be addressed during design. This is
management of this spectrum. nothing novel, as each new generation of wireless networks
In addition, there are enablers with respect to the networking tries to overcome the limitations of the previous generation
and routing itself. The main drivers are the softwarization and and further enhance its capabilities. Since 5G still lacks the
virtualization of networks, the Radio Access Networks (RAN) high requirements in order to support the Internet of Every-
slicing and the Open-RAN approach. thing (IoE), 6G is focusing its development in the following
A significant change will be necessary in order to directions: pushing the communication further to the mm-wave
achieve widespread coverage, also beyond the mainland area and (sub)THz frequency bands, considering reconfigurable
-especially for maritime and oceanic applications-, but also in surfaces that transform the radio environment into a smart
wild terrestrial areas. Therefore Integrated Space and Terres- one and reevaluating the cell structure by considering cell-free
trial Networks (ISTNs) are an emerging topic. massive MIMO. However, in practice each of these improve-
A critical role in the development of 6G is expected to be ments comes with its challenges. For instance, the suggested
given by AI. It will be particularly interesting to see how edge expansion into higher frequency bands requires new measures
AI, intelligent edge computing and learning in the wireless and considerations in terms of packaging, transceiver design
edge will impact mobile networks. As centralized machine and measurement, as well as standardization techniques, due
learning can suffer from critical security [11], decentralized to the signal and performance parameters degradation at high
solutions can serve as enabling technologies for 6G. frequencies. Second, in order to avoid the power consuming
Based on these enablers, 6G opens up a wide range of and complex hardware architecture of the phased arrays,
advantages over current networks. Reconfigurable Intelligent Surfaces (RISs) are being examined
for 6G and they can be challenging in their design and dy-
B. Benefits of 6G namic reconfiguration. Also, it is challenging enough that the
The benefits of 6G are highlighted in the suggested usage applicability of cell-free MIMO in practice is still unclear. The
scenarios, in which the ubiquitousness of the 6G network high multiplexing and array gain, the huge energy efficiency,
–in the sense that the network has global availability and the high connectivity and the low-cost low-power components
connectivity– can be translated into stronger features of mobil- of the access points, all of these game-changing benefits stress
ity, coverage and positioning, which leads to better support for the need for cell-free MIMO. Let alone its own challenges,
disruptive services. Besides providing URLLC, 6G networks the structure of cell-free MIMO also adds new challenges in
also provide communication with extremely high throughput the area of signal processing, as it encourages the generation
which will be beneficial for services like, HTC, ER, the Tactile of high-dimensional and increasingly complex signals adding
Internet, multi-sense experience and pervasive intelligence more impairments to the signals such as interference [14].
[2]. In their ”roadmap to 6G security” Porambage et al.
describe areas of application which benefit from the increased IV. P HYSICAL L AYER S ECURITY AND THE 6G W IRELESS
connectivity, ultra low-latency (sub ms) and level of capacity S YSTEMS
(Tbps) [13]. These include among others Unmanned Arial As already indicated, the development of 6G offers the
Vehicless (UAVs), Connected Autonomous Vehicless (CAVs), option of integrating a variety of new technologies each with
Smart Grid 2.0 and the Industry 5.0. certain benefits for the application of Physical Layer Security.
RISs, for example, open up a whole portfolio of approaches, electromagnetic field interference, and the inherent security
but VLC and the use of higher frequency ranges also create offers advantages over Radio-Frequency (RF) communication.
starting points for improving PhySec but are also suitable for In the simplest approach VLC uses Light Emitting Diodes
positioning and localization applications. (LEDs) as transmitter, air as transmission medium and a photo
diode as receiver. LEDs can change their intensity very fast
A. Reconfigurable Intelligent Surfaces which can be used for modulation and transmission.
During the realization of the 6G systems, RISs [15] are As illustrated in Figure 1b, advantages of VLC are the LoS
expected to take a significant part. These special -intelligent- communication on the one hand side and the limitation of the
man-made surfaces consists of sub-wavelength wide elements range on the other. Unlike RF signals, light is constrained
each of which can be controlled individually. By reflecting by simple walls, which gives the VLC systems a security
the incoming waves and steering them into desired directions, advantage. In addition to the indoor applications of VLC
they enable the manipulation and reconfiguration of the wire- systems as shown in Figure 1b, they can be used in outdoor
less propagation environment. Thereby they provide multiple applications considering their high transmission rate and ultra-
worthwhile security related applications: high bandwidth. High-speed VLC systems are being examined
1) RIS-enabled Channel-Profiles: By controlling the RIS as a possibly better solution for terrestrial, space, air, and
cells/meta-surfaces one can manipulate the radiation charac- underwater communications, providing both offline and real-
teristics. As the PhySec-SKG is based on individual channel time processing [17].
profiles, it can be actively influenced by RISs.
2) RIS-enabled Anti-Jamming: The broadcast characteris- C. (sub)Terahertz Communication
tics of the wireless systems render them vulnerable to jam- Pushing communication to higher frequencies is another
ming: (intentional) interference from other signals. RISs en- solution to meet the requirements of the 6G systems. The
able constructively and destructively superimposition whereby technological advances of (sub)teraherz communication will
the interference signals can be mitigated. Phase-shifting sig- enable 6G systems to support operations with a signal band-
nals ensure that just legitimate devices receive signals. width higher than 1 GHz [2] and thereby enable data rates in
3) RIS-based Beamforming and -splitting: As mentioned, a the range of terabit per second. In addition this will enable
fundamental attribute of wireless systems and the transmission advances in accurate positioning and sensing -that can reach
of electromagnetic waves is their broadcast characteristic, centimeter level-, (see Figure 1c) and is thus closely linked to
depending on the specific antenna setup. Tighter beams, up Section IV-E.
to pencil-sharp beamforming (as indicated in Figure 1a) fa- As PhySec-SKG does not rely on fixed parameters provided
cilitate the switch from a pure broadcast medium to targeted by a particular entity, but rather on entropy of the wireless
communication. Corresponding RIS configurations allow such channel, the shift to higher frequencies offers just that: higher
narrow beams, rendering eavesdropping and sniffing harder for entropy due to more randomness.
attackers.
4) RIS-individual ”Fingerprints”: RISs are man-made sur- D. Ultra-Massive MIMO
faces composed of multiple semiconductors, each equipped In conjunction with the use of higher frequencies up to
with intrinsic, manufacturing related physical/electrical char- (sub)THz communication, the wavelengths are becoming cor-
acteristics. According to the same principle as PUFs [6], respondingly smaller. However, this also offers the possibility
the combination of characteristic semiconductors results in of fitting more antenna elements onto the same physical
an individual component again. Based on this, each RIS space, which in turn leads to tighter beams. As indicated in
possesses an intrinsically individual characteristic, comparable Figure 1d, more antenna elements allow more users to be
to a device’s ”fingerprint”. served, but on the other hand, the narrower beams (again)
5) RIS-supported adding of Context Information: In net- limit the opportunities for attackers to eavesdrop and sniff
work security, the addition of contextual information [16] is communication.
becoming increasingly attractive. For instance, the plausibility
of access from a certain device at a certain time is taken into E. Localisation and Sensing
account, which allows conclusions to be drawn about possible Due to the usage of higher frequency band including
attacks. In addition to the aforementioned RIS fingerprints, it mmWave and (sub)THz bands new possibilities arise with
is conceivable to insert selective meta-materials, which in turn regard to localization and sensing (see Figure 1e). These
add specific properties. Thus, for instance, only signals that allow very fine resolutions in all physical dimensions: angle,
have been reflected by a specific RIS can be allowed. range and doppler positioning. In this context, applications of
purely passive sensing (exploiting the emissivity and natural
B. Visible Light Communications reflections of surfaces), active sensing (coherent echoes with
Visible Light Communication as part of the optical wireless distance-, Doppler- and angle information), but also the com-
communication, is considering the large unlicensed spectrum bination with radar is conceivable (whereby the challenge is
of the visible light in the range between 400-800 THz, and the use of different waveforms). These location information
375-780 nm, respectively. It’s high capacity, robustness to will be able to be used as a security parameter for multiple
(a) RISs enable several beneficial use cases: (b) VLC uses ranges of visible light for (c) (sub)THz communications will offer
e.g. beamforming and -splitting enable target- communication. Apart from higher data rates higher bandwidth and enable data rates in
oriented communication. In addition, there and larger bandwidth, there are advantages the terabit per second range. This benefits
are approaches for anti-jamming, but also for in security: harder to intercept and easier to more accurate positioning and sensing (down
fingerprinting and for Secret Key Generation. restrict to certain areas (unlike RF). to centimeter level).

(d) By pushing communication to higher fre- (e) The use of higher frequencies allows (f) Link Integrity Monitoring and the use
quency ranges, the wavelengths will become accurate localization and sensing. In combi- of context-based information ensure the in-
smaller as well. Ultra-Massive MIMO will nation with radar it will allow localization in tegrity of the radio nodes. Counterfeiting can
allow tighter beams. (sub)centimeter range. thus be mitigated.
Fig. 1: 6G research areas which are capable of affecting PhySec methods beneficially

use-cases such as health monitoring, surveillance and auto- techniques provide better efficiency compared to conventional
mated/autonomous driving. techniques such as certificates or MACs, due to reduced
transmission overheads, while the detection probability of
F. Link Integrity Monitoring
potential attacks is nearly as good (e.g. > 99%). Further, it
PhySec based security functionalities in order to provide is still tolerable to allow a small amount of false alarm or
message authenticity and integrity have been widely stud- misdetections, since the respective applications are typically
ied recently. Compared to conventional techniques for such designed in an error tolerable way, such as e.g. robust control.
purposes, such as cryptographic certificates or Message Au-
thentication Codes (MACs), the physical layer characteristics V. C ONCLUSION AND O UTLOOK
resulting from a message transmission are evaluated in order Actually we are on the verge of developing a new standard
to obtain whether authenticity and integrity are guaranteed in mobile communication: as the Fifth Generation mobile net-
(Figure 1f). works is currently being implemented worldwide, it is worth
Typical physical layer parameters considered here are for already considering Beyond 5G and the Sixth Generation
instance Received Signal Strength Indicator (RSSI), Channel wireless systems. This development is accompanied by the
Impulse Response (CIR), carrier frequency offset or the angle- use of new spectra -mmWave, Terahertz, Visible Light Com-
of-arrival. In order to evaluate the transmitter of a message or munication-, changes in the network infrastructure -slicing,
whether it was altered during transmission various schemes Open RAN, softwarization and virtualization-, as well as new
can be used: Starting from statistical methods for Physical network paradigms -Artificial Intelligence, Digital Twin and
Layer Authentication (PLA), for instance in [18], where an Intelligent Edge Computing. Therefore, in this paper, we have
approach based on hypothesis testing is presented for static elaborated on the challenges for the mobile communications
scenarios towards ML based methods such as [19], where network of the future, but we have also highlighted six promis-
two approaches based on Support Vector Machines (SVMs) ing 6G research areas that can provide suitable approaches
and Linear Fisher Discriminant Analysis are presented. Also to meet these challenges and to contribute to Physical Layer
other ML based solutions have been studied for PLA such Security.
as Gaussian Mixture Models based techniques in [20] or Reconfigurable Intelligent Surfaces will be a very interesting
supervised learning in [4]. Especially in highly challenging field of research, with many possibilities, if the requirements
scenarios such us URLLC, ULBC and mULC PhySec based for the meta-materials, the (intelligent) control and the timing
can be solved. There will be major developments in this area in [15] C. Pan, H. Ren, K. Wang, J. F. Kolb, M. Elkashlan, M. Chen, M.
the near future. The same applies to Visible Light Communica- Di Renzo, Y. Hao, J. Wang, A. L. Swindlehurst, X. You, and L. Hanzo,
“Reconfigurable Intelligent Surfaces for 6G Systems: Principles, Ap-
tion, and the shift to the higher frequencies including (sub)THz plications, and Research Directions,” IEEE Communications Magazine,
and applications such as Ultra-Massive MIMO: frequencies in vol. 59, no. 6, pp. 14–20, 2021. DOI: 10.1109/MCOM.001.2001076.
the Terahertz range promise higher entropy for Secret Key [16] S. Duque Anton, D. Fraunholz, C. Lipps, and H. D. Schotten, “Putting
Things in Context: Securing Industrial Authentication with Context
Generation and (pencil sharp) beamforming and VLC render Information,” International Journal On Cyber Situational Awareness
it harder for an eavesdropper to compromise communication. (IJCSA), 2019. DOI: 10.22619/IJCSA.2018.100122.
However, many of the approaches mentioned are still re- [17] N. Chi, Y. Zhou, Y. Wei, and F. Hu, “Visible light communication in
6G: Advances, challenges, and prospects,” IEEE Vehicular Technology
search focuses, and are theoretical concepts. It will be highly Magazine, vol. 15, no. 4, pp. 93–102, 2020.
interesting to implement them and see how they perform [18] L. Xiao, L. Greenstein, N. Mandayam, and W. Trappe, “APhysical-
in real world environments. But nevertheless, it is already Layer Technique to Enhance Authentication for Mobile Terminals,” in
2008 IEEE International Conference on Communications, May 2008,
important to deal with the issues and to specify the direction pp. 1520–1524. DOI: 10.1109/ICC.2008.294.
in which the development should proceed. [19] C. Pei, N. Zhang, X. S. Shen, and J. W. Mark, “Channel-based physical
layer authentication,” in IEEE Global Communications Conference
R EFERENCES (GLOBECOM), 2014. DOI: 10.1109/GLOCOM.2014.7037452.
[1] “IMT Traffic estimates for the years 2020 to 2030,” International [20] N. Gulati, R. Greenstadt, K. R. Dandekar, and J. M. Walsh, “GMM
Telecommunication Union, M Series Mobile, radiodetermination, am- Based Semi-Supervised Learning for Channel-Based Authentication
ateur and related satellite services Report ITU-R M.2370-0, 2015. Scheme,” in IEEE Vehicular Technology Conference (VTC Fall), 2013.
DOI : 10.1109/VTCFall.2013.6692216.
[2] W. Jiang, B. Han, M. A. Habibi, and H. D. Schotten, “The Road
Towards 6G: A Comprehensive Survey,” IEEE Open Journal of the
Communications Society, vol. 2, pp. 334–366, 2021. DOI: 10 . 1109 /
OJCOMS.2021.3057679.
[3] C. Lipps, S. B. Mallikarjun, M. Strufe, C. Heinz, C. Grimm, and
H. D. Schotten, “Keep Private Networks Private: Secure Channel-
PUFs, and Physical Layer Security by Linear Regression Enhanced
Channel Profiles,” 3rd International Conference on Data Intelligence
and Security (ICDIS), 2020. DOI: 10.1109/ICDIS50059.2020.00019.
[4] A. Weinand, R. Sattiraju, M. Karrenbauer, and H. D. Schotten, “Su-
pervised Learning for Physical Layer Based Message Authentication
in URLLC Scenarios,” IEEE 90th Vehicular Technology Conference
(VTC2019-Fall), 2019. DOI: 10.1109/VTCFall.2019.8891424.
[5] C. Lipps, D. Krummacker, and H. D. Schotten, “Securing Industrial
Wireless Networks: Enhancing SDN with PhySec,” Conference on Next
Generation Computing Applications (NextComp), 2019. DOI: 10.1109/
NEXTCOMP.2019.8883600.
[6] C. Lipps, A. Weinand, D. Krummacker, C. Fischer, and H. D. Schotten,
“Proof of Concept for IoT Device Authentication Based on SRAM
PUFs Using ATMEGA 2560-MCU,” 1st International Conference on
Data Intelligence and Security (ICDIS), 2018. DOI: 10.1109/ICDIS.
2018.00013.
[7] J. D. V. Sánches, L. Urquiza-Aguiar, M. C. P. Paredes, and D. P. M.
Osorio, “Survey on physical layer security for 5G wireless networks,”
Annals of Telecommunications volume, no. 76, pp. 155–174, 2020.
DOI : 10.1007/s12243-020-00799-8.
[8] A. Weinand, A. de la Fuente, C. Lipps, and M. Karrenbauer, “Physical
Layer Security based Key Management for LoRaWAN,” Workshop on
Next Generation Networks and Applications, 2021. arXiv: 2101.02975.
[9] N. Yang, L. Wang, G. Geraci, M. Elkashlan, J. Yuan, and M. Di Renzo,
“Safeguarding 5G Wireless Communication Networks using Physical
Layer Security,” IEEE Communications Magazine, vol. 53, no. 4,
pp. 20–27, 2015. DOI: 10.1109/MCOM.2015.7081071.
[10] Q. Qi, X. Chen, C. Zhong, and Z. Zhang, “Physical layer security
for massive access in cellular Internet of Things,” Science China
Information Sciences volume, no. 63, 2020. DOI: 10 . 1007 / s11432 -
019-2650-4.
[11] A. Chorti, A. Barreto, S. Kopsell, M. Zoli, M. Chafii, P. Sehier, G.
Fettweis, and H. Poor, “Context-Aware Security for 6G Wireless The
Role of Physical Layer Security,” 2021. arXiv: 2011.07323.
[12] S. Li, W. Sun, H. Zhang, and Y. Zhang, “Physical Layer Security
for Edge Caching in 6G Networks,” GLOBECOM 2020 - 2020
IEEE Global Communications Conference, 2020. DOI: 10 . 1109 /
GLOBECOM42002.2020.9322524.
[13] P. Porambage, G. Gür, D. Osoria, M. Liyanage, A. Gurtov, and M.
Ylianttila, “The Roadmap to 6G Security and Privacy,” IEEE Open
Journal of the Communications Society, vol. 2, pp. 1094–1122, 2021.
DOI : 10.1109/OJCOMS.2021.3078081.
[14] M. Matthaiou, O. Yurduseven, H. Q. Ngo, D. Morales-Jimenez, S. L.
Cotton, and V. F. Fusco, “The Road to 6G: Ten Physical Layer
Challenges for Communications Engineers,” 2020. arXiv: 2004.07130.

You might also like