Title | Physical-Layer Cooperative Key Generation with Correlated Eavesdropping Channels in IoT |
Publication Type | Conference Paper |
Year of Publication | 2020 |
Authors | Xu, Peng, Hu, Dongyang, Chen, Gaojie |
Conference Name | 2020 International Conferences on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData) and IEEE Congress on Cybermatics (Cybermatics) |
Date Published | Nov. 2020 |
Publisher | IEEE |
ISBN Number | 978-1-7281-7647-5 |
Keywords | Channel estimation, composability, compositionality, correlated eavesdropping channels, Correlation, eavesdropping, Human Behavior, Internet of Things, key generation, key rate, Metrics, partially colluding eavesdroppers, physical layer security, pubcrawl, random key generation, Relays, resilience, Resiliency, Scalability, security, theoretical cryptography, Wireless sensor networks |
Abstract | With a massive amount of wireless sensor nodes in Internet of Things (IoT), it is difficult to establish key distribution and management mechanism for traditional encryption technology. Alternatively, the physical layer key generation technology is promising to implement in IoT, since it is based on the principle of information-theoretical security and has the advantage of low complexity. Most existing key generation schemes assume that eavesdropping channels are independent of legitimate channels, which may not be practical especially when eavesdropper nodes are near to legitimate nodes. However, this paper investigates key generation problems for a multi-relay wireless network in IoT, where the correlation between eavesdropping and legitimate channels are considered. Key generation schemes are proposed for both non-colluding and partially colluding eavesdroppers situations. The main idea is to divide the key agreement process into three phases: 1) we first generate a secret key by exploiting the difference between the random channels associated with each relay node and the eavesdropping channels; 2) another key is generated by integrating the residual common randomness associated with each relay pair; 3) the two keys generated in the first two phases are concatenated into the final key. The secrecy key performance of the proposed key generation schemes is also derived with closed-forms. |
URL | https://ieeexplore.ieee.org/document/9291543 |
DOI | 10.1109/iThings-GreenCom-CPSCom-SmartData-Cybermatics50389.2020.00025 |
Citation Key | xu_physical-layer_2020 |