In cryptography, it is common practice to issue public challenges as a way to involve the wider community in the testing of cryptographic schemes. With these challenges, the ROBUST-6G project aims to bring this practice to the physical layer security community. We provide adversarial observations for various security scenarios, and ask researchers to break the security of the proposed schemes, according to specific, measurable target outcomes. By including measured experimental data in some of these challenges, we aim to determine whether practical imperfections due to wireless propagation or hardware impairments can be exploited to break theoretical guarantees.
Challenge 1: Contrastive Representation Learning for CSI-Based Secret Key Generation
View the challenge details and submission information.
Challenge 2: Angle-of-Arrival-Based Physical Layer Authentication in Digital Massive MIMO Systems
View the challenge details and submission information.
Challenge 3: Secret Key Generation in Massive MIMO OFDM Under One-Wavelength Eavesdropping
View the challenge details and submission information.
Challenge 4: Receiver-Invariant Device Identification Under Single Receiver Replacement
View the challenge details and submission information.
Challenge 5: Robust Device Identification Under Sequential Receiver Replacement
View the challenge details and submission information.
Challenge 6: Device Identification Under Temporal Drift in RF Fingerprinting
View the challenge details and submission information.
Challenge 7: Secret Key Generation on BRISC Dataset
View the challenge details and submission information.
Challenge 8: Physical Layer Authentication With Reconfigurable Intelligent Surfaces
View the challenge details and submission information.
Challenge 9: Device Classification Under Hardware Impairments
View the challenge details and submission information.
Please select the relevant challenge and upload your solution file below.