Physical Layer Security and ML
Theoretical approaches to securing radio communication with mechanisms of physical layer security (PLS) are now well known in research. In particular, the method of generating cryptographic keys for two communicating parties using radio channel reciprocity (and variability) represents a promising approach in order to be able to efficiently secure devices in the Internet of Things (IoT) in the future. These methods are also of particular interest because, in contrast to classical cryptography, they are not based on assumptions of complexity of mathematical problems, but are considered safe from an information theory point of view. In this way, these techniques (potentially) solve the impending threat from quantum computers and reduce the scalability of attacks on complexity-based cryptographic techniques by implicitly excluding the physical proximity of the communicating parties as the basis of key establishment attacks from the remote. A feasibility in principle has already been shown in the successful project "PROPHYLAXE", and "SecureFog (see Past Project tab).
In this project, we propose the extension of reciprocity-based key generation to end-to-end (E2E) communication. One method that is supposed to make key generation usable in E2E communication is called so-called Extended Channel-Reciprocity Based Key Establishment (ECRKE). It uses untrusted relays (e.B. WiFi routers) and a so-called trust broker or authenticator (e.B.g. smartphone) to mask the channel.