Cooperative secret key generation for multi-hop relaying systems in Internet of things
Special Issue on Internet of Things and Its Security|更新时间:2024-06-05
|
Cooperative secret key generation for multi-hop relaying systems in Internet of things
Journal on CommunicationsVol. 39, Issue 3, Pages: 86-94(2018)
作者机构:
国家数字交换系统工程技术研究中心,河南 郑州 450002
作者简介:
基金信息:
The National Natural Science Foundation of China(61379006);The National Natural Science Foundation of China(61501516);The Innovation Group Program Project of National Natural Science Foundation of China(61521003);The National High Technology Research and Development Program of China (863 Program)(2015AA01A708)
Shuaifang XIAO, Yunfei GUO, Kaizhi HUANG, et al. Cooperative secret key generation for multi-hop relaying systems in Internet of things[J]. Journal on Communications, 2018, 39(3): 86-94.
DOI:
Shuaifang XIAO, Yunfei GUO, Kaizhi HUANG, et al. Cooperative secret key generation for multi-hop relaying systems in Internet of things[J]. Journal on Communications, 2018, 39(3): 86-94. DOI: 10.11959/j.issn.1000-436x.2018036.
Cooperative secret key generation for multi-hop relaying systems in Internet of things
The achievable key rate of secret key generation method in multi-hop relaying systems was relative low in Internet of things.A cooperative secret key generation algorithm based on network coding was proposed to improve the achievable key rate.Firstly
all the nodes send training sequences in turn to estimate the channels.After that the relays employ secure network coding technique to assist the two legitimate users to obtain the correlative observations of the same wireless channel
with nothing leakage about the channel information to the eavesdropper.Finally
the two legitimate users agreed on a common secret key directly over the public channel.Theoretical and simulation results validate the performance of the proposed secret key generation algorithm
and obtain that increasing the wireless transmission paths
selecting the transmission path with less hops and larger variance channels can further improve the achievable secret key rate.
关键词
Keywords
references
LINDQVIST U , NEUMANN P G . The future of the Internet of things [J ] . Communications of the ACM , 2017 , 60 ( 2 ): 26 - 30 .
SAMAILA M G , NETO M , FERNANDES D A B , et al . Security challenges of the Internet of things [M ] . Berlin:Springer International Publishing . 2017 : 53 - 82 .
MUKHERJEE A , FAKOORIAN S A , HUANG J , et al . Principles of physical layer security in multiuser wireless networks:a survey [J ] . IEEE Communications Surveys & Tutorials , 2014 , 16 ( 3 ): 1550 - 1573 .
ZENG K . Physical layer key generation in wireless networks:challenges and opportunities [J ] . IEEE Communications Magazine , 2015 , 53 ( 6 ): 33 - 39 .
XU P , CUMANAN K , DING Z , et al . Group secret key generation in wireless networks:algorithms and rate optimization [J ] . IEEE Transactions on Information and Security , 2016 , 11 ( 8 ): 1831 - 1846 .
YANG E , WU X . Information-theoretically secure key generation and management [C ] // IEEE International Symposium on Information Theory . 2017 : 1529 - 1533 .
ZHANG H , LIANG Y , LAI L , et al . Multi-key generation over a cellular model with a helper [J ] . IEEE Transactions on Information and Security , 2017 , 63 ( 6 ): 3804 - 3822 .
MAURER U M . Secret key agreement by public discussion from common information [J ] . IEEE Transactions on Information and Security , 1993 , 39 ( 3 ): 733 - 742 .
AHLSWEDE R , CSISZAR I . Common randomness in information theory and cryptography—part I:secret sharing [J ] . IEEE Transactions on Information and Security , 1993 , 39 ( 4 ): 1121 - 1132 .
YE C , MATHUR S , REZNIK A , et al . Information-theoretically secret key generation for fading wireless channel [J ] . IEEE Transactions on Information and Security , 2010 , 5 ( 2 ): 240 - 254 .
ZHANG J , DUONG T Q , MARSHALL A , et al . Key generation from wireless channels:a review [J ] . IEEE Access , 2016 , 4 : 614 - 626 .
PENG Y , WANG P , XIANG W , et al . Secret key generation based on estimated channel state information for TDD-OFDM systems over fading channels [J ] . IEEE Transactions on Wireless Communications , 2017 , 16 ( 8 ): 5176 - 5186 .
ZHANG J , HE B , DUONG T Q , et al . On the key generation from correlated wireless channels [J ] . IEEE Communications Letters , 2017 , 21 ( 4 ): 961 - 964 .
CASTEL T , TORRE P V , ROGIER H . RSS-based secret key generation for indoor and outdoor WBANs using on-body sensor nodes [C ] // International Conference on Military Communications and Information Systems . 2016 : 1 - 5 .
ZHU X , XU F , NOVAK E , et al . Using wireless link dynamics to extract a secret key in vehicular scenarios [J ] . IEEE Transactions on Mobile Computing , 2016 , 16 ( 7 ): 2065 - 2078 .
MARGELIS G , FAFOUTIS X , OIKONOMOU G , et al . Physical layer secret-key generation with discreet cosine transform for the Internet of things [C ] // IEEE International Conference on Communications . 2017 : 1 - 6 .
CSISZAR I , NARAYAN P . Common randomness and secret key generation with a helper [J ] . IEEE Transactions on Information and Security , 2000 , 46 ( 2 ): 344 - 366 .
SHIMIZU T , IWAI H , SASAOKA H . Physical-layer secret key agreement in two-way wireless relaying systems [J ] . IEEE Transactions on Information and Security , 2011 , 6 ( 3 ): 650 - 660 .
LAI L , LIANG Y , DU W . Cooperative key generation in wireless networks [J ] . IEEE Journal on Selected Areas in Communications , 2012 , 30 ( 8 ): 1578 - 1588 .
ZHOU H , HUIE L M , LAI L . Secret key generation in the two-way relay channel with active attackers [J ] . IEEE Transactions on Information and Security , 2014 , 9 ( 3 ): 476 - 488 .
THAI C D T , LEE J , QUEK T Q S . Physical-layer secret key generation with colluding untrusted relays [J ] . IEEE Transactions on Wireless Communications , 2016 , 15 ( 2 ): 1517 - 1530 .