scholarly journals Efficient physical layer key generation technique in wireless communications

Author(s):  
Rushan Lin ◽  
Li Xu ◽  
He Fang ◽  
Chuan Huang

AbstractWireless communications between two devices can be protected by secret keys. However, existing key generation schemes suffer from the high bit disagreement rate and low bit generation rate. In this paper, we propose an efficient physical layer key generation scheme by exploring the Received Signal Strength (RSS) of signals. In order to reduce the high mismatch rate of the measurements and to increase the key generation rate, a pair of transmitter and receiver separately apply adaptive quantization algorithm for quantifying the measurements. Then, we implement a randomness extractor to further increase key generation rate and ensure randomness of generated of keys. Several real-world experiments are implemented to verify the effectiveness of the proposed scheme. The results show that compared with the other related schemes, our scheme performs better in bit generation rate, bit disagreement rate, and randomness.

Entropy ◽  
2019 ◽  
Vol 21 (5) ◽  
pp. 497 ◽  
Author(s):  
Guyue Li ◽  
Chen Sun ◽  
Junqing Zhang ◽  
Eduard Jorswieck ◽  
Bin Xiao ◽  
...  

The fifth generation (5G) and beyond wireless communications will transform many exciting applications and trigger massive data connections with private, confidential, and sensitive information. The security of wireless communications is conventionally established by cryptographic schemes and protocols in which the secret key distribution is one of the essential primitives. However, traditional cryptography-based key distribution protocols might be challenged in the 5G and beyond communications because of special features such as device-to-device and heterogeneous communications, and ultra-low latency requirements. Channel reciprocity-based key generation (CRKG) is an emerging physical layer-based technique to establish secret keys between devices. This article reviews CRKG when the 5G and beyond networks employ three candidate technologies: duplex modes, massive multiple-input multiple-output (MIMO) and mmWave communications. We identify the opportunities and challenges for CRKG and provide corresponding solutions. To further demonstrate the feasibility of CRKG in practical communication systems, we overview existing prototypes with different IoT protocols and examine their performance in real-world environments. This article shows the feasibility and promising performances of CRKG with the potential to be commercialized.


Sensors ◽  
2020 ◽  
Vol 20 (3) ◽  
pp. 682 ◽  
Author(s):  
Biao Han ◽  
Sirui Peng ◽  
Celimuge Wu ◽  
Xiaoyan Wang ◽  
Baosheng Wang

In recent years, Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) communication brings more and more attention from industry (e.g., Google and Uber) and government (e.g., United States Department of Transportation). These Vehicle-to-Everything (V2X) technologies are widely adopted in future autonomous vehicles. However, security issues have not been fully addressed in V2V and V2I systems, especially in key distribution and key management. The physical layer key generation, which exploits wireless channel reciprocity and randomness to generate secure keys, provides a feasible solution for secure V2V/V2I communication. It is lightweight, flexible, and dynamic. In this paper, the physical layer key generation is brought to the V2I and V2V scenarios. A LoRa-based physical key generation scheme is designed for securing V2V/V2I communications. The communication is based on Long Range (LoRa) protocol, which is able to measure Received Signal Strength Indicator (RSSI) in long-distance as consensus information to generate secure keys. The multi-bit quantization algorithm, with an improved Cascade key agreement protocol, generates secure binary bit keys. The proposed schemes improved the key generation rate, as well as to avoid information leakage during transmission. The proposed physical layer key generation scheme was implemented in a V2V/V2I network system prototype. The extensive experiments in V2I and V2V environments evaluate the efficiency of the proposed key generation scheme. The experiments in real outdoor environments have been conducted. Its key generation rate could exceed 10 bit/s on our V2V/V2I network system prototype and achieve 20 bit/s in some of our experiments. For binary key sequences, all of them pass the suite of statistical tests from National Institute of Standards and Technology (NIST).


2021 ◽  
Vol 5 (3) ◽  
pp. 1-22
Author(s):  
Kai Li ◽  
Ning Lu ◽  
Jingjing Zheng ◽  
Pei Zhang ◽  
Wei Ni ◽  
...  

Thanks to flexible deployment and excellent maneuverability, autonomous drones have been recently considered as an effective means to act as aerial data relays for wireless ground devices with limited or no cellular infrastructure, e.g., smart farming in a remote area. Due to the broadcast nature of wireless channels, data communications between the drones and the ground devices are vulnerable to eavesdropping attacks. This article develops BloothAir, which is a secure multi-hop aerial relay system based on Bluetooth Low Energy ( BLE ) connected autonomous drones. For encrypting the BLE communications in BloothAir, a channel-based secret key generation is proposed, where received signal strength at the drones and the ground devices is quantized to generate the secret keys. Moreover, a dynamic programming-based channel quantization scheme is studied to minimize the secret key bit mismatch rate of the drones and the ground devices by recursively adjusting the quantization intervals. To validate the design of BloothAir, we build a multi-hop aerial relay testbed by using the MX400 drone platform and the Gust radio transceiver, which is a new lightweight onboard BLE communicator specially developed for the drone. Extensive real-world experiments demonstrate that the BloothAir system achieves a significantly lower secret key bit mismatch rate than the key generation benchmarks, which use the static quantization intervals. In addition, the high randomness of the generated secret keys is verified by the standard NIST test, thereby effectively protecting the BLE communications in BloothAir from the eavesdropping attacks.


Author(s):  
Wang Dong ◽  
Hu Aiqun ◽  
Peng Linning

In this paper, a novel physical layer key generation method for extracting secret key from mutual channel information in orthogonal frequency division multiplexing (OFDM) systems has been proposed. Firstly, a well-designed data extraction process has been introduced to reduce the redundancy and inconsistency of channel state information (CSI). After that, a new quantization method using gray code is proposed. Furthermore, an associated method is designed to reduce key error rate (KER). With these improvements, higher key generation rate (KGR) can be obtained compared to existing methods. Finally, available secret keys have been generated after information reconciliation and privacy amplification. The proposed method has been analyzed and verified in long term evolution advanced (LTE-A) systems and the generated secret keys have passed randomness test.


IEEE Access ◽  
2016 ◽  
Vol 4 ◽  
pp. 4464-4477 ◽  
Author(s):  
Junqing Zhang ◽  
Roger Woods ◽  
Trung Q. Duong ◽  
Alan Marshall ◽  
Yuan Ding ◽  
...  

Electronics ◽  
2020 ◽  
Vol 9 (4) ◽  
pp. 605 ◽  
Author(s):  
Federico Passerini ◽  
Andrea M. Tonello

Leakage of information in power line communication (PLC) networks is a threat to privacy and security. A way to enhance security is to encode the transmitted information with the use of a secret key. If the communication channel exhibits common characteristics at both ends and these are unknown to a potential eavesdropper, then it is possible to locally generate a common secret key at the two communication ends without the need for sharing it through the broadcast channel. This is known as physical layer key generation. To this aim, known techniques have been developed exploiting the transfer function of symmetric channels. However, the PLC channel is in general not symmetric, but just reciprocal. Therefore, in this paper, we first analyze the characteristics of the channel to verify whether physical layer key generation can be implemented. Then, we propose two novel methods that exploit the reciprocity of the PLC channel to generate common information by the two intended users. This information is processed through different quantization techniques to generate secret keys locally. To assess the security of the generated keys, we analyze the spatial correlation of PLC channels. This allows verifying whether the eavesdropper’s channels are weakly correlated with the intended users’ channel. Consequently, it is found that the information leaked to a possible eavesdropper has very low correlation to the locally generated key. The analysis and proposed methods are validated on a measurement dataset.


Sign in / Sign up

Export Citation Format

Share Document