Bottarelli, M., Epiphaniou, G., Ismail, D. K. B., Karadimas, P. and Al-Khateeb, H. (2018) Physical characteristics of wireless communication channels for secret key establishment: a survey of the research. Computers and Security, 78, pp. 454-476. (doi: 10.1016/j.cose.2018.08.001)
|
Text
167299.pdf - Accepted Version Available under License Creative Commons Attribution Non-commercial No Derivatives. 1MB |
Abstract
Physical layer security protocols have recently been deployed in the context of Wireless communications. These are derived from the intrinsic characteristics of the communication media for key generation, sharing and randomness extraction. These protocols always seek to exhibit both low computational complexity and energy efficiency, whilst also maintain unconditionally secure communications. We present herein, a comprehensive literature review of existing “state-of-the-art” quantisation schemes for physical layer security, with a strong emphasis upon key performance metrics and intrinsic channel characteristics. Our survey seeks not only to concentrate upon the most common quantisation methods, hence their efficiency during key generation; but also crucially, describes the inherent trade-offs as between these standardised metrics. The exact way(s) in which these metrics are duly influenced by quantisation schemes is also discussed, by means of a comprehensive critical narrative of both existing and future developments in the field.
Item Type: | Articles |
---|---|
Status: | Published |
Refereed: | Yes |
Glasgow Author(s) Enlighten ID: | Karadimas, Dr Petros |
Authors: | Bottarelli, M., Epiphaniou, G., Ismail, D. K. B., Karadimas, P., and Al-Khateeb, H. |
Subjects: | T Technology > T Technology (General) T Technology > TA Engineering (General). Civil engineering (General) |
College/School: | College of Science and Engineering > School of Engineering > Systems Power and Energy |
Journal Name: | Computers and Security |
Publisher: | Elsevier |
ISSN: | 0167-4048 |
ISSN (Online): | 1872-6208 |
Published Online: | 14 August 2018 |
Copyright Holders: | Copyright © 2018 Elsevier Ltd. |
First Published: | First published in Computers and Security 78: 454-476 |
Publisher Policy: | Reproduced in accordance with the publisher copyright policy |
University Staff: Request a correction | Enlighten Editors: Update this record