Skip to content

In cryptography, it is common practice to issue public challenges as a way to involve the wider community in the testing of cryptographic schemes. With these challenges, the ROBUST-6G project aims to bring this practice to the physical layer security community. We provide adversarial observations for various security scenarios, and ask researchers to break the security of the proposed schemes, according to specific, measurable target outcomes. By including measured experimental data in some of these challenges, we aim to determine whether practical imperfections due to wireless propagation or hardware impairments can be exploited to break theoretical guarantees.

Challenge 1: Contrastive Representation Learning for CSI-Based Secret Key Generation

View the challenge details and submission information.

View Challenge

Challenge 2: Angle-of-Arrival-Based Physical Layer Authentication in Digital Massive MIMO Systems

View the challenge details and submission information.

View Challenge

Challenge 3: Secret Key Generation in Massive MIMO OFDM Under One-Wavelength Eavesdropping

View the challenge details and submission information.

View Challenge

Challenge 4: Receiver-Invariant Device Identification Under Single Receiver Replacement

View the challenge details and submission information.

View Challenge

Challenge 5: Robust Device Identification Under Sequential Receiver Replacement

View the challenge details and submission information.

View Challenge

Challenge 6: Device Identification Under Temporal Drift in RF Fingerprinting

View the challenge details and submission information.

View Challenge

Challenge 7: Secret Key Generation on BRISC Dataset

View the challenge details and submission information.

View Challenge

Challenge 8: Physical Layer Authentication With Reconfigurable Intelligent Surfaces

View the challenge details and submission information.

View Challenge

Challenge 9: Device Classification Under Hardware Impairments

View the challenge details and submission information.

View Challenge

Please select the relevant challenge and upload your solution file below.