
تعداد نشریات | 34 |
تعداد شمارهها | 1,306 |
تعداد مقالات | 9,427 |
تعداد مشاهده مقاله | 9,188,646 |
تعداد دریافت فایل اصل مقاله | 5,620,932 |
یک طرح نوین تولید کلید مخفی در حضور رلۀ غیرقابل اعتماد | ||
پدافند الکترونیکی و سایبری | ||
مقاله 7، دوره 12، شماره 3 - شماره پیاپی 47، آبان 1403، صفحه 73-84 اصل مقاله (1.1 M) | ||
نوع مقاله: مقاله پژوهشی | ||
نویسندگان | ||
علی کوهستانی* 1؛ محمدرضا کشاورزی2 | ||
1استادیار ، دانشگاه صنعتی قم ،قم ، ایران | ||
2استادیار، پژوهشگاه ارتباطات و فناوری اطلاعات، تهران ، ایران | ||
تاریخ دریافت: 07 مرداد 1403، تاریخ بازنگری: 24 شهریور 1403، تاریخ پذیرش: 23 مهر 1403 | ||
چکیده | ||
در مقایسه با روشهای مرسوم رمزنگاری، تولید کلید مخفی (SKG) لایه فیزیکی بهدلیل ویژگیهایی از قبیل سبک وزن بودن و مقیاس پذیری برای شبکههای نسل ششم (6G) کارآمدتر و مناسبتر است. در حوزۀ SKG، طرحهای مبتنی بر مولدهای تصادفی محلّی برای تولید کلید با نرخ بالا، استفاده میشوند. یکی از این طرحها، تزریق فاز تصادفی است که در آن سیگنالهای کاوش کانال با فاز تصادفی بین طرفین ارتباط (آلیس و باب) مبادله میشود. در این کار تحقیقاتی، یک طرح SKG در حضور یک رلۀ غیرقابل اعتماد ارائه میشود که در آن، رله نمیتواند به کلید دست یابد. به منظور عملیاتی بودن طرح، برای اولین بار، سیگنالهای کاوش کانال از جنس فاز تصادفی گسسته در نظر گرفته شده و در گیرندگی نیز از کوانتیزه کننده تک بیتی استفاده میشود. به علاوه، به منظور کاهش نرخ خطای کلید، از کوانتیزاسیون با نواحی محافظ (GB) برای استخراج کلید استفاده میگردد. برای چنین سناریویی، روابطی برای نرخ تطبیق کلید، نرخ عدم تطبیق کلید (KMR) و نیز نرخ دور ریزی کلیدها (KDR) به ازای هر کاوش کانال ارائه میدهیم. اگرچه افزایش محدوده GB، معیار KMR را کاهش میدهد، اما طول دنباله کلید نیز کوتاه میگردد. به منظور ارزیابی تأثیر GB بر روی کارایی طرح تولید کلید پیشنهادی، نرخ تولید کلید خام تعریف شده و محاسبه میگردد. در بخش شبیهسازی، بینشهای مهندسی مفیدی در خصوص تعیین توان سیگنال کاوش، محدود GB و نیز قدرت تصحیح کدینگ مورد نیاز، ارائه میدهیم. همچنین در این مقاله، به ارزیابی امنیتی طرح پیشنهادی میپردازیم. ضمن محاسبۀ ظرفیت کلید مخفی، خواهیم دید که رلۀ غیرقابل اعتماد و شنودگر خارجی با رهگیری مراحل کاوش کانال نمیتوانند کلید را کشف کند. | ||
کلیدواژهها | ||
تولید کلید مخفی لایه فیزیکی؛ رله غیرقابل اعتماد؛ تزریق فاز تصادفی گسسته؛ نواحی محافظ | ||
موضوعات | ||
امنیت اطلاعات، رمزنگاری، پنهان نگاری، پروتکل ها و استانداردها | ||
عنوان مقاله [English] | ||
A Novel Secret Key Generation Scheme in the Presence of an Untrusted Relay | ||
نویسندگان [English] | ||
Ali Kuhestani1؛ Mohammadreza Keshavarzi2 | ||
1Assistant Professor, Qom University of Technology, Qom, Iran | ||
2Assistant Professor, Communication and Information Technology Research Institute, Tehran, Iran | ||
چکیده [English] | ||
Compared to conventional cryptography methods, physical layer secret key generation (SKG) is more efficient and suitable for sixth-generation (6G) networks due to features such as lightweight and scalability. In the field of SKG, schemes based on local random generators are used for high-rate key generation. One of these schemes is random phase injection, where the channel probing signals with random phase are exchanged between communication parties (Alice and Bob). In this research work, an SKG scheme is presented in the presence of an untrusted relay, where the relay cannot obtain the key. In order to make the scheme practical, for the first time, the channel probing signals are considered discrete random phase, and a single-bit quantizer is used in reception. In addition, in order to reduce the key error rate, quantization with guard bands (GB) is used for key extraction. For such a scenario, we provide expressions for the key matching rate, key mismatch rate (KMR), and key discarding rate (KDR) per channel probe. Although increasing the GB range decreases the KMR metric, the key length also shortens. In order to evaluate the effect of GB on the efficiency of the proposed key generation scheme, the raw key generation rate is defined and calculated. In the simulation section, we provide useful engineering insights into determining the probing signal power, the GB size as well as the required coding correction capability. We also discuss the security evaluation of the proposed scheme in this article. While calculating the secret key capacity, we will see that the untrusted relay and external eavesdropper cannot discover the key by intercepting the channel probing steps. | ||
کلیدواژهها [English] | ||
Physical layer secret key generation, Untrusted relay, Discrete random phase injection, Guard band | ||
مراجع | ||
[1] W. Saad, M. Bennis and M. Chen, "A vision of 6G wireless systems: Applications, trends, technologies, and open research problems," IEEE Network, vol. 34, no. 3, pp. 134–142, May/Jun. 2020. [2] A. Chorti, A. N. Barreto, S. Kopsell, M. Zoli, M. Chafii, P. Sehier, G. Fettweis, and H. V. Poor, “Context-aware security for 6G wireless The role of physical layer security,” 2021, arXiv:2101.01536. [Online]. Available: https://arxiv.org/abs/2101.01536. [3] J. Zhang, G. Li, A. Marshall, A. Hu and L. Hanzo, “A new frontier for IoT security emerging from three decades of key generation relying on wireless channels,” IEEE Access, vol. 8, pp. 138406–138446, Jul. 2020. [4] J. Zhang, S. Rajendran, Z. Sun, R. Woods and L. Hanzo, “Physical layer security for the Internet of Things: Authentication and key generation,” IEEE Wireless Commun., vol. 26, no. 5, pp. 92–98, Oct. 2019. [5] G. Li, C. Sun, J. Zhang, E. Jorswieck, B. Xiao, A. Hu, “Physical layer key generation in 5G and beyond wireless communications: Challenges and opportunities,” Entropy, vol. 21, no. 5, pp. 1–16, May. 2019. [6] J. Zhang, A. Marshall and L. Hanzo, “Channel-envelope differencing eliminates secret key correlation: LoRa-based key generation in low power wide area networks,” IEEE Trans. Veh. Technol., vol. 67, no. 12, pp. 12462–12466, Dec. 2018. [7] C. Zenger, H. Vogt, J. Zimmer, A. Sezgin and C. Paar, “The passive eavesdropper affects my channel: Secret-key rates under real-world conditions,” in 2016 IEEE GLOBECOM Workshops (GC Wkshps), Washington, DC, USA, Dec. 2016, pp. 1–6. [8] M. Letafati, A. Kuhestani, K. -K. Wong, and M. J. Piran, “A lightweight secure and resilient transmission scheme for the Internet-of-Things in the presence of a hostile jammer,” IEEE Internet of Things Journal, vol. 8, no. 6, pp. 4373–4388, Mar. 2021. [9] M. Mitev, A. Chorti, M. Reed, and L. Musavian, “Authenticated secret key generation in delay-constrained wireless systems”, EURASIP J. Wireless Commun. Netw., pp. 1–29, Jun. 2020. [10] M. Mitev, A. Chorti, E. V. Belmega and M. Reed, “Man-in-the-middle and denial of service attacks in wireless secret key generation,” in 2019 IEEE Global Communications Conference (GLOBECOM), 2019, pp. 1-6. [11] M. Letafati, H. Behroozi, B. H. Khalaj and E. A. Jorswieck, “Hardware-impaired PHY secret key generation with man-in-the-middle adversaries,” IEEE Wireless Communications Letters, vol. 11, no. 4, pp. 856-860, Apr. 2022. [12] M. Letafati, H. Behroozi, B. H. Khalaj and E. A. Jorswieck, “Deep learning for hardware-impaired wireless secret key generation with man-in-the-middle attacks,” in 2021 IEEE Global Communications Conference (GLOBECOM), 2021, pp. 1-6. [13] G. Epiphaniou, P. Karadimas, D. Kbaier Ben Ismail, H. Al-Khateeb, A. Dehghantanha and K. -K. R. Choo, “Non-reciprocity compensation combined with turbo codes for secret key generation in vehicular ad-hoc social IoT networks,” IEEE Internet of Things Journal, vol. 5, no. 4, pp. 2496-2505, Aug. 2018. [14] Z. Li, Q. Pei, I. Markwood, Y. Liu, and H. Zhu, “Secret key establishment via RSS trajectory matching between wearable devices,” IEEE Trans. Inf. Foren. Sec., vol. 13, no. 3, pp. 802–817, Mar. 2018. [15] M. Edman and A. Kiayias, “On passive inference attacks against physical-layer key extraction?” in Proc. 4th Eur. Workshop Syst. Security, 2011, p. 8. [16] S. Eberz, M. Strohmeier, M. Wilhelm, and I. Martinovic, “A practical man-in-the-middle attack on signal-based key generation protocols,” in Proc. Eur. Symp. Res. Comput. Security, 2012, pp. 235–252. [17] N. Patwari, J. Croft, S. Jana, and S. K. Kasera, “High-rate uncorrelated bit extraction for shared secret key generation from channel measurements,” IEEE Trans. Mobile Comput., vol. 9, no. 1, pp. 17–30, Jan. 2010. [18] S. Jana, S. Premnath, M. Clark, S. Kasera, and N. Patwari, “On the effectiveness of secret key extraction from wireless signal strength in real environments,” in Proc. ACM MOBICOM, 2009, pp. 321–332. [19] Y. Liu, S. C. Draper, and A. M. Sayeed, “Exploiting channel diversity in secret key generation from multipath fading randomness,” IEEE Trans. Inf. Foren. Sec., vol. 7, no. 5, pp. 1484–1497, Oct. 2012. [20] H. Liu, W. Yang, Y. Jie, and Y. Chen, “Fast and practical secret key extraction by exploiting channel response,” in Proc. IEEE INFOCOM, 2013, pp. 3048–3056. [21] X. Wei, X. Y. Li, Q. Chen, J. Han, and K. Zhao, “Keep: Fast secret key extraction protocol for D2D communication,” in Proc. IEEE Int. Workshop Qual. Service (IWQoS), 2014, pp. 350–359. [22] O. A. Topal and G. K. Kurt, “Physical layer authentication for LEO satellite constellations,” in 2022 IEEE Wireless Communications and Networking Conference (WCNC), pp. 1952-1957. [23] K. Lin, Z. Ji, Y. Zhang, G. Chen, P. L. Yeoh and Z. He, “Secret key generation based on 3D spatial angles for UAV communications,” in 2021 IEEE Wireless Communications and Networking Conference (WCNC), 2021, pp. 1-6. [24] O. A. Topal, G. K. Kurt and H. Yanikomeroglu, “Securing the inter-spacecraft links: Physical layer key generation from doppler frequency shift,” IEEE Journal of Radio Frequency Identification, vol. 5, no. 3, pp. 232-243, Sept. 2021. [26] G. Li, H. Yang, J. Zhang, H. Liu and A. Hu, “Fast and secure key generation with channel obfuscation in slowly varying environments,” in 2022 IEEE INFOCOM, IEEE Conference on Computer Communications, pp. 1-10. [27] C. D. T. Thai, J. Lee and T. Q. S. Quek, “Physical-layer secret key generation with colluding untrusted relays,” IEEE Trans. Wireless Commun., vol. 15, no. 2, pp. 1517-1530, Feb. 2016. [28] M. Letafati, A. Kuhestani, H. Behroozi, and D. W. K. Ng, “Jammingresilient frequency hopping-aided secure communication for Internet-of-Things in the presence of an untrusted relay,” IEEE Trans. Wireless Commun., vol. 19, no. 10, pp. 6771–6785, Oct. 2020. [29] Y. Peng, P. Wang, W. Xiang, and Y. Li, “Secret key generation based on estimated channel state information for TDD-OFDM systems over fading channels,” IEEE Trans. Wireless Commun., 2017. [30] Y. Shehadeh, O. Alfandi, and D. Hogrefe, “Towards robust key extraction from multipath wireless channels,” J. Commun. Net., vol. 14, no. 4, Aug. 2012. [31] C. Feng and L. Sun, “Physical layer key generation from wireless channels with non-ideal channel reciprocity: A deep learning based approach,” in IEEE 95th Vehicular Technology Conference: (VTC2022-Spring), Helsinki, Finland, 2022, pp. 1-6. [32] X. Guan, N. Ding, Y. Cai and W. Yang, “Wireless key generation from imperfect channel state information: Performance analysis and improvements,” in IEEE International Conference on Communications Workshops (ICC Workshops), Shanghai, China, 2019, pp. 1-6. [33] J. Zhang, B. He, T. Q. Duong, and R. Woods, On the Key Generation from Correlated Wireless Channels, IEEE Commun., Lett., 2007. | ||
آمار تعداد مشاهده مقاله: 194 تعداد دریافت فایل اصل مقاله: 41 |