Channel Phase Based Secret Key Generation: Untrusted Relaying or Not?

Document Type : Research Article

Authors

1 Iran Telecommunication Research Center (ITRC), Tehran, Iran

2 Faculty of Electrical and Computer Engineering, Qom University of Technology, Qom, Iran

3 Department of Electronic and Telecommunications, Polytechnic University of Turin, Italy.

Abstract

Compared to traditional cryptography methods, physical layer secret key generation (PLSKG) can be more efficient and well-suited for Internet-of-Things (IoT) owing to its lightweight nature and scalability. In PLSKG, schemes utilizing local random generators are employed to achieve a high key generation rate. In this study, it is proposed a high-rate PLSKG in the presence of an untrusted relay. This untrusted relay assists the PLSKG process but cannot determine the secret key. We select channel probe signals from PSK signals and adopt a multi-bit quantizer at the receiver to enhance practicality. Additionally, we utilize quantization with guard bands (GB) to decrease the key error rate. We calculate the performance and security of the proposed PLSKG scheme under these conditions. Our results indicate that the relay, receiving superimposed signals from Alice and Bob, cannot ascertain the secret key. Finally, we compare the proposed PLSKG with a direct scenario where the relay is omitted during key generation.

Keywords

Main Subjects


[1]        W. Saad, M. Bennis, and M. Chen, "A vision of 6G wireless systems: Applications, trends, technologies, and open research problems," IEEE network, vol. 34, no. 3, pp. 134-142, 2019.
[2]        A. Chorti et al., "Context-aware security for 6G wireless: The role of physical layer security," IEEE Communications Standards Magazine, vol. 6, no. 1, pp. 102-108, 2022.
[3]        J. Zhang, G. Li, A. Marshall, A. Hu, and L. Hanzo, "A new frontier for IoT security emerging from three decades of key generation relying on wireless channels," IEEE Access, vol. 8, pp. 138406-138446, 2020.
[4]        J. Zhang, S. Rajendran, Z. Sun, R. Woods, and L. Hanzo, "Physical layer security for the Internet of Things: Authentication and key generation," IEEE Wireless Communications, vol. 26, no. 5, pp. 92-98, 2019.
[5]        G. Li, C. Sun, J. Zhang, E. Jorswieck, B. Xiao, and A. Hu, "Physical layer key generation in 5G and beyond wireless communications: Challenges and opportunities," Entropy, vol. 21, no. 5, p. 497, 2019.
[6]        J. Zhang, A. Marshall, and L. Hanzo, "Channel-envelope differencing eliminates secret key correlation: LoRa-based key generation in low power wide area networks," IEEE Transactions on Vehicular Technology, vol. 67, no. 12, pp. 12462-12466, 2018.
[7]        C. Zenger, H. Vogt, J. Zimmer, A. Sezgin, and C. Paar, "The passive eavesdropper affects my channel: Secret-key rates under real-world conditions," in 2016 IEEE Globecom Workshops (GC Wkshps), 2016: IEEE, pp. 1-6.
[8]        M. Letafati, A. Kuhestani, K.-K. Wong, and M. J. Piran, "A lightweight secure and resilient transmission scheme for the Internet of Things in the presence of a hostile jammer," IEEE Internet of Things Journal, vol. 8, no. 6, pp. 4373-4388, 2020.
[9]        M. Letafati, H. Behroozi, B. H. Khalaj, and E. A. Jorswieck, "Hardware-impaired PHY secret key generation with man-in-the-middle adversaries," IEEE Wireless Communications Letters, vol. 11, no. 4, pp. 856-860, 2022.
[10]      G. Epiphaniou, P. Karadimas, D. K. B. Ismail, H. Al-Khateeb, A. Dehghantanha, and K.-K. R. Choo, "Nonreciprocity compensation combined with turbo codes for secret key generation in vehicular ad hoc social IoT networks," IEEE Internet of Things Journal, vol. 5, no. 4, pp. 2496-2505, 2017.
[11]      M. Edman, A. Kiayias, and B. Yener, "On passive inference attacks against physical-layer key extraction?," in Proceedings of the Fourth European Workshop on System Security, 2011, pp. 1-6.
[12]      S. Eberz, M. Strohmeier, M. Wilhelm, and I. Martinovic, "A practical man-in-the-middle attack on signal-based key generation protocols," in Computer Security–ESORICS 2012: 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings 17, 2012: Springer, pp. 235-252.
[13]      N. Patwari, J. Croft, S. Jana, and S. K. Kasera, "High-rate uncorrelated bit extraction for shared secret key generation from channel measurements," IEEE Transactions on Mobile Computing, vol. 9, no. 1, pp. 17-30, 2009.
[14]      O. A. Topal, G. K. Kurt, and H. Yanikomeroglu, "Securing the inter-spacecraft links: Physical layer key generation from Doppler frequency shift," IEEE Journal of Radio Frequency Identification, vol. 5, no. 3, pp. 232-243, 2021.
[15]      M. Letafati, A. Kuhestani, H. Behroozi, and D. W. K. Ng, "Jamming-resilient frequency hopping-aided secure communication for Internet-of-Things in the presence of an untrusted relay," IEEE Transactions on Wireless Communications, vol. 19, no. 10, pp. 6771-6785, 2020.
[16]      C. Feng and L. Sun, "Physical Layer Key Generation from Wireless Channels with Non-ideal Channel Reciprocity: A Deep Learning Based Approach," in 2022 IEEE 95th Vehicular Technology Conference:(VTC2022-Spring), 2022: IEEE, pp. 1-6.
[17]      X. Guan, N. Ding, Y. Cai, and W. Yang, "Wireless key generation from imperfect channel state information: Performance analysis and improvements," in 2019 IEEE International Conference on Communications Workshops (ICC Workshops), 2019: IEEE, pp. 1-6.