Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3640912.3640943acmotherconferencesArticle/Chapter ViewAbstractPublication PagescnmlConference Proceedingsconference-collections
research-article

A Physical Layer Key Generation Using a Hybrid Quantization Scheme

Published: 22 February 2024 Publication History

Abstract

The traditional wireless communication security technology is based on cryptography at the network layer, which exploits computational complexity to make it difficult to crack to achieve encryption. With the ongoing advancement of computing power, computational security may be difficult to maintain. From the viewpoint of information theory, physical layer security technology is an essential instrument for integrating security and communication. This paper mainly studies the quantization steps in the key generation technology of wireless communication physical layer. In this paper, a quantization scheme with extremely low implementation complexity is proposed for key generation. Firstly, utilizing the reciprocity and randomness of the wireless channel, the communication parties conduct channel measurements to collect channel state information (CSI) and study the improvement of CSI extraction by incorporating intelligent reflection surfaces. Then, the proposed hybrid quantization scheme makes full use of CSI and quantizes the CSI and its phase information to obtain key bits. Numerical results show that the proposed scheme improves the quality of key generation and avoids information leakage during transmission, and passes the NIST randomness test.

References

[1]
T. Aono, K. Higuchi, T. Ohira, B. Komiyama, and H. Sasaoka. 2005. Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels. IEEE Transactions on Antennas and Propagation 53, 11 (November 2005), 3776–3784. https://doi.org/10.1109/TAP.2005.858853
[2]
Tasneem Assaf, Arafat Al-Dweik, Youssef Iraqi, Sobia Jangsher, Anshul Pandey, Jean-Pierre Giacalone, Enas E. Abulibdeh, Hani Saleh, and Baker Mohammad. 2023. High-Rate Secret Key Generation Using Physical Layer Security and Physical Unclonable Functions. IEEE Open Journal of the Communications Society 4, (2023), 209–225. https://doi.org/10.1109/OJCOMS.2023.3234338
[3]
Dengke Guo, Kuo Cao, Jun Xiong, Dongtang Ma, and Haitao Zhao. 2021. A Lightweight Key Generation Scheme for the Internet of Things. IEEE Internet Things J. 8, 15 (August 2021), 12137–12149. https://doi.org/10.1109/JIOT.2021.3060438
[4]
Biao Han, Sirui Peng, Celimuge Wu, Xiaoyan Wang, and Baosheng Wang. 2020. LoRa-Based Physical Layer Key Generation for Secure V2V/V2I Communications. Sensors 20, 3 (January 2020), 682. https://doi.org/10.3390/s20030682
[5]
J.E. Hershey, A.A. Hassan, and R. Yarlagadda. 1995. Unconventional cryptographic keying variable management. IEEE Transactions on Communications 43, 1 (January 1995), 3–6. https://doi.org/10.1109/26.385951
[6]
Wenxiu Hu, Zhuangkun Wei, Mark Leeson, and Tianhua Xu. 2022. Eavesdropping Against Bidirectional Physical Layer Secret Key Generation in Fiber Communications. In 2022 IEEE Photonics Conference (IPC), November 2022. 1–2. . https://doi.org/10.1109/IPC53466.2022.9975754
[7]
Jiajun Li, Pu Wang, Long Jiao, Zheng Yan, Kai Zeng, and Yishan Yang. 2023. Security Analysis of Triangle Channel-Based Physical Layer Key Generation in Wireless Backscatter Communications. IEEE Transactions on Information Forensics and Security 18, (2023), 948–964. https://doi.org/10.1109/TIFS.2022.3224852
[8]
Miroslav Mitev, Arsenia Chorti, H. Vincent Poor, and Gerhard P. Fettweis. 2023. What Physical Layer Security Can Do for 6G Security. IEEE Open Journal of Vehicular Technology 4, (2023), 375–388. https://doi.org/10.1109/OJVT.2023.3245071
[9]
Jie Tang, Hong Wen, Huan-Huan Song, Long Jiao, and Kai Zeng. 2022. Sharing Secrets via Wireless Broadcasting: A New Efficient Physical Layer Group Secret Key Generation for Multiple IoT Devices. IEEE Internet Things J. 9, 16 (August 2022), 15228–15239. https://doi.org/10.1109/JIOT.2022.3147598
[10]
Furui Zhan, Nianmin Yao, Zhenguo Gao, and Haitao Yu. 2018. Efficient key generation leveraging wireless channel reciprocity for MANETs. Journal of Network and Computer Applications 103, (February 2018), 18–28. https://doi.org/10.1016/j.jnca.2017.11.014

Index Terms

  1. A Physical Layer Key Generation Using a Hybrid Quantization Scheme

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    CNML '23: Proceedings of the 2023 International Conference on Communication Network and Machine Learning
    October 2023
    446 pages
    ISBN:9798400716683
    DOI:10.1145/3640912
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 22 February 2024

    Permissions

    Request permissions for this article.

    Check for updates

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    CNML 2023

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 19
      Total Downloads
    • Downloads (Last 12 months)19
    • Downloads (Last 6 weeks)3
    Reflects downloads up to 17 Nov 2024

    Other Metrics

    Citations

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format.

    HTML Format

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media