A Novel Secret Key Generation Scheme in the Presence of an Untrusted Relay

Document Type : Original Article

Authors

1 Assistant Professor, Qom University of Technology, Qom, Iran

2 Assistant Professor, Communication and Information Technology Research Institute, Tehran, Iran

Abstract

Compared to conventional cryptography methods, physical layer secret key generation (SKG) is more efficient and suitable for sixth-generation (6G) networks due to features such as lightweight and scalability. In the field of SKG, schemes based on local random generators are used for high-rate key generation. One of these schemes is random phase injection, where the channel probing signals with random phase are exchanged between communication parties (Alice and Bob). In this research work, an SKG scheme is presented in the presence of an untrusted relay, where the relay cannot obtain the key. In order to make the scheme practical, for the first time, the channel probing signals are considered discrete random phase, and a single-bit quantizer is used in reception. In addition, in order to reduce the key error rate, quantization with guard bands (GB) is used for key extraction. For such a scenario, we provide expressions for the key matching rate, key mismatch rate (KMR), and key discarding rate (KDR) per channel probe. Although increasing the GB range decreases the KMR metric, the key length also shortens. In order to evaluate the effect of GB on the efficiency of the proposed key generation scheme, the raw key generation rate is defined and calculated. In the simulation section, we provide useful engineering insights into determining the probing signal power, the GB size as well as the required coding correction capability. We also discuss the security evaluation of the proposed scheme in this article. While calculating the secret key capacity, we will see that the untrusted relay and external eavesdropper cannot discover the key by intercepting the channel probing steps.

Keywords

Main Subjects


Smiley face

 

[1]      W. Saad, M. Bennis and M. Chen, "A vision of 6G wireless systems: Applications, trends, technologies, and open research problems," IEEE Network, vol. 34, no. 3, pp. 134–142, May/Jun. 2020.
[2]      A. Chorti, A. N. Barreto, S. Kopsell, M. Zoli, M. Chafii, P. Sehier, G. Fettweis, and H. V. Poor, “Context-aware security for 6G wireless The role of physical layer security,” 2021, arXiv:2101.01536. [Online]. Available: https://arxiv.org/abs/2101.01536. 
[3]      J. Zhang, G. Li, A. Marshall, A. Hu and L. Hanzo, “A new frontier for IoT security emerging from three decades of key generation relying on wireless channels,” IEEE Access, vol. 8, pp. 138406–138446, Jul. 2020. 
[4]      J. Zhang, S. Rajendran, Z. Sun, R. Woods and L. Hanzo, “Physical layer security for the Internet of Things: Authentication and key generation,” IEEE Wireless Commun., vol. 26, no. 5, pp. 92–98, Oct. 2019. 
[5]      G. Li, C. Sun, J. Zhang, E. Jorswieck, B. Xiao, A. Hu, “Physical layer key generation in 5G and beyond wireless communications: Challenges and opportunities,” Entropy, vol. 21, no. 5, pp. 1–16, May. 2019. 
[6]      J. Zhang, A. Marshall and L. Hanzo, “Channel-envelope differencing eliminates secret key correlation: LoRa-based key generation in low power wide area networks,” IEEE Trans. Veh. Technol., vol. 67, no. 12, pp. 12462–12466, Dec. 2018. 
[7]      C. Zenger, H. Vogt, J. Zimmer, A. Sezgin and C. Paar, “The passive eavesdropper affects my channel: Secret-key rates under real-world conditions,” in 2016 IEEE GLOBECOM Workshops (GC Wkshps), Washington, DC, USA, Dec. 2016, pp. 1–6.
[8]      M. Letafati, A. Kuhestani, K. -K. Wong, and M. J. Piran, “A lightweight secure and resilient transmission scheme for the Internet-of-Things in the presence of a hostile jammer,” IEEE Internet of Things Journal, vol. 8, no. 6, pp. 4373–4388, Mar. 2021.
[9]      M. Mitev, A. Chorti, M. Reed, and L. Musavian, “Authenticated secret key generation in delay-constrained wireless systems”, EURASIP J. Wireless Commun. Netw., pp. 1–29, Jun. 2020.
[10]   M. Mitev, A. Chorti, E. V. Belmega and M. Reed, “Man-in-the-middle and denial of service attacks in wireless secret key generation,” in 2019 IEEE Global Communications Conference (GLOBECOM), 2019, pp. 1-6.
[11]   M. Letafati, H. Behroozi, B. H. Khalaj and E. A. Jorswieck, “Hardware-impaired PHY secret key generation with man-in-the-middle adversaries,” IEEE Wireless Communications Letters, vol. 11, no. 4, pp. 856-860, Apr. 2022.
[12]   M. Letafati, H. Behroozi, B. H. Khalaj and E. A. Jorswieck, “Deep learning for hardware-impaired wireless secret key generation with man-in-the-middle attacks,” in 2021 IEEE Global Communications Conference (GLOBECOM), 2021, pp. 1-6.
[13]   G. Epiphaniou, P. Karadimas, D. Kbaier Ben Ismail, H. Al-Khateeb, A. Dehghantanha and K. -K. R. Choo, “Non-reciprocity compensation combined with turbo codes for secret key generation in vehicular ad-hoc social IoT networks,” IEEE Internet of Things Journal, vol. 5, no. 4, pp. 2496-2505, Aug. 2018.
[14]   Z. Li, Q. Pei, I. Markwood, Y. Liu, and H. Zhu, “Secret key establishment via RSS trajectory matching between wearable devices,” IEEE Trans. Inf. Foren. Sec., vol. 13, no. 3, pp. 802–817, Mar. 2018.
[15]   M. Edman and A. Kiayias, “On passive inference attacks against physical-layer key extraction?” in Proc. 4th Eur. Workshop Syst. Security, 2011, p. 8. 
[16]   S. Eberz, M. Strohmeier, M. Wilhelm, and I. Martinovic, “A practical man-in-the-middle attack on signal-based key generation protocols,” in Proc. Eur. Symp. Res. Comput. Security, 2012, pp. 235–252.
[17]   N. Patwari, J. Croft, S. Jana, and S. K. Kasera, “High-rate uncorrelated bit extraction for shared secret key generation from channel measurements,” IEEE Trans. Mobile Comput., vol. 9, no. 1, pp. 17–30, Jan. 2010.
[18]   S. Jana, S. Premnath, M. Clark, S. Kasera, and N. Patwari, “On the effectiveness of secret key extraction from wireless signal strength in real environments,” in Proc. ACM MOBICOM, 2009, pp. 321–332.
[19]   Y. Liu, S. C. Draper, and A. M. Sayeed, “Exploiting channel diversity in secret key generation from multipath fading randomness,” IEEE Trans. Inf. Foren. Sec., vol. 7, no. 5, pp. 1484–1497, Oct. 2012.
[20]   H. Liu, W. Yang, Y. Jie, and Y. Chen, “Fast and practical secret key extraction by exploiting channel response,” in Proc. IEEE INFOCOM, 2013, pp. 3048–3056. 
[21]   X. Wei, X. Y. Li, Q. Chen, J. Han, and K. Zhao, “Keep: Fast secret key extraction protocol for D2D communication,” in Proc. IEEE Int. Workshop Qual. Service (IWQoS), 2014, pp. 350–359.
[22]   O. A. Topal and G. K. Kurt, “Physical layer authentication for LEO satellite constellations,” in 2022 IEEE Wireless Communications and Networking Conference (WCNC), pp. 1952-1957.
[23]   K. Lin, Z. Ji, Y. Zhang, G. Chen, P. L. Yeoh and Z. He, “Secret key generation based on 3D spatial angles for UAV communications,” in 2021 IEEE Wireless Communications and Networking Conference (WCNC), 2021, pp. 1-6.
[24]   O. A. Topal, G. K. Kurt and H. Yanikomeroglu, “Securing the inter-spacecraft links: Physical layer key generation from doppler frequency shift,” IEEE Journal of Radio Frequency Identification, vol. 5, no. 3, pp. 232-243, Sept. 2021.
[26]   G. Li, H. Yang, J. Zhang, H. Liu and A. Hu, “Fast and secure key generation with channel obfuscation in slowly varying environments,” in 2022 IEEE INFOCOM, IEEE Conference on Computer Communications, pp. 1-10.
[27]   C. D. T. Thai, J. Lee and T. Q. S. Quek, “Physical-layer secret key generation with colluding untrusted relays,” IEEE Trans. Wireless Commun., vol. 15, no. 2, pp. 1517-1530, Feb. 2016.
[28]   M. Letafati, A. Kuhestani, H. Behroozi, and D. W. K. Ng, “Jammingresilient frequency hopping-aided secure communication for Internet-of-Things in the presence of an untrusted relay,” IEEE Trans. Wireless Commun., vol. 19, no. 10, pp. 6771–6785, Oct. 2020.
[29]   Y. Peng, P. Wang, W. Xiang, and Y. Li, “Secret key generation based on estimated channel state information for TDD-OFDM systems over fading channels,” IEEE Trans. Wireless Commun., 2017.
[30]   Y. Shehadeh, O. Alfandi, and D. Hogrefe, “Towards robust key extraction from multipath wireless channels,” J. Commun. Net., vol. 14, no. 4, Aug. 2012.
[31]   C. Feng and L. Sun, “Physical layer key generation from wireless channels with non-ideal channel reciprocity: A deep learning based approach,” in IEEE 95th Vehicular Technology Conference: (VTC2022-Spring), Helsinki, Finland, 2022, pp. 1-6.
[32]   X. Guan, N. Ding, Y. Cai and W. Yang, “Wireless key generation from imperfect channel state information: Performance analysis and improvements,” in IEEE International Conference on Communications Workshops (ICC Workshops), Shanghai, China, 2019, pp. 1-6.
[33]   J. Zhang, B. He, T. Q. Duong, and R. Woods, On the Key Generation from Correlated Wireless Channels, IEEE Commun., Lett., 2007.
  • Receive Date: 28 July 2024
  • Revise Date: 14 September 2024
  • Accept Date: 14 October 2024
  • Publish Date: 22 October 2024