• Title/Summary/Keyword: physical-layer key generation

Search Result 15, Processing Time 0.022 seconds

A New Low-BMR Quantization Method for Wireless Channel Characteristics-based Secret Key Generation

  • Wang, Qiuhua;Lyu, Qiuyun;Wang, Xiaojun;BAO, Jianrong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.10
    • /
    • pp.5080-5097
    • /
    • 2017
  • Channel characteristics-based secret key generation is an effective physical-layer security method. The issues of how to remove the effect of random noise and to balance the key generation rate (KGR) and the bit mismatch rate (BMR) are needed to be addressed. In this paper, to reduce the effect of random noise and extract more secret bits, a new quantization scheme with high key generation rate and low bit mismatch rate is proposed. In our proposed scheme, we try to use all measurements and correct the differences caused by noise at the boundary regions instead of simply dropping them. We evaluate and discuss the improvements of our proposed scheme. The results show that our proposed scheme achieves lower bit mismatch rate as well as remaining high key generation rate.

Enhanced Message Authentication Encryption Scheme Based on Physical-Layer Key Generation in Resource-Limited Internet of Things

  • Zeng Xing;Bo Zhao;Bo Xu;Guangliang Ren;Zhiqiang Liu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.9
    • /
    • pp.2546-2563
    • /
    • 2024
  • The Internet of Things (IoT) is facing growing security challenges due to its vulnerability. It is imperative to address the security issues using lightweight and efficient encryption schemes in resource-limited IoT. In this paper, we propose an enhanced message authentication encryption (MAE) scheme based on physical-layer key generation (PKG), which uses the random nature of wireless channels to generate and negotiate keys, and simultaneously encrypts the messages and authenticates the source. The proposed enhanced MAE scheme can greatly improve the security performance via dynamic keyed primitives construction while consuming very few resources. The enhanced MAE scheme is an efficient and lightweight secure communication solution, which is very suitable for resource-limited IoT. Theoretical analysis and simulations are carried out to confirm the security of the enhanced MAE scheme and evaluate its performance. A one-bit flipping in the session key or plain texts will result in a 50%-bit change in the ciphertext or message authentication code. The numerical results demonstrate the good performance of the proposed scheme in terms of diffusion and confusion. With respect to the typical advanced encryption standard (AES)-based scheme, the performance of the proposed scheme improves by 80.5% in terms of algorithm execution efficiency.

A New Fuzzy Key Generation Method Based on PHY-Layer Fingerprints in Mobile Cognitive Radio Networks

  • Gao, Ning;Jing, Xiaojun;Sun, Songlin;Mu, Junsheng;Lu, Xiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.7
    • /
    • pp.3414-3434
    • /
    • 2016
  • Classical key generation is complicated to update and key distribution generally requires fixed infrastructures. In order to eliminate these restrictions researchers have focused much attention on physical-layer (PHY-layer) based key generation methods. In this paper, we present a PHY-layer fingerprints based fuzzy key generation scheme, which works to prevent primary user emulation (PUE) attacks and spectrum sensing data falsification (SSDF) attacks, with multi-node collaborative defense strategies. We also propose two algorithms, the EA algorithm and the TA algorithm, to defend against eavesdropping attacks and tampering attacks in mobile cognitive radio networks (CRNs). We give security analyses of these algorithms in both the spatial and temporal domains, and prove the upper bound of the entropy loss in theory. We present a simulation result based on a MIMO-OFDM communication system which shows that the channel response characteristics received by legitimates tend to be consistent and phase characteristics are much more robust for key generation in mobile CRNs. In addition, NIST statistical tests show that the generated key in our proposed approach is secure and reliable.

Towards Robust Key Extraction from Multipath Wireless Channels

  • Shehadeh, Youssef El Hajj;Alfandi, Omar;Hogrefe, Dieter
    • Journal of Communications and Networks
    • /
    • v.14 no.4
    • /
    • pp.385-395
    • /
    • 2012
  • This paper tackles the problem of generating shared secret keys based on the physical characteristics of the wireless channel. We propose intelligent quantization mechanisms for key generation, achieving high secret bits generation rate. Moreover, some practical issues affecting the performance of the key generation mechanism are deeply investigated. Mainly, we investigate the effects of delay and mobility on the performance and we enhance the key generation mechanism accordingly. As a result, this paper presents a framework towards robust key generation from multipath wireless channels.

GROUP SECRET KEY GENERATION FOR 5G Networks

  • Allam, Ali M.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.8
    • /
    • pp.4041-4059
    • /
    • 2019
  • Key establishment method based on channel reciprocity for time division duplex (TDD) system has earned a vital consideration in the majority of recent research. While most of the cellular systems rely on frequency division duplex (FDD) systems, especially the 5G network, which is not characterized by the channel reciprocity feature. This paper realizes the generation of a group secret key for multi-terminals communicated through a wireless network in FDD mode, by utilizing the nature of the physical layer for the wireless links between them. I consider a new group key generation approach, which using bitwise XOR with a modified pairwise secret key generation approach not based on the channel reciprocity feature. Precisely, this multi-node secret key agreement technique designed for three wireless network topologies: 1) the triangle topology, 2) the multi-terminal star topology, and 3) the multi-node chain topology. Three multi-node secret key agreement protocols suggest for these wireless communication topologies in FDD mode, respectively. I determine the upper bound for the generation rate of the secret key shared among multi-node, for the three multi-terminals topologies, and give numerical cases to expose the achievement of my offered technique.

Numerical Simulation of the Characteristics of Electrons in Bar-plate DC Negative Corona Discharge Based on a Plasma Chemical Model

  • Liu, Kang-Lin;Liao, Rui-Jin;Zhao, Xue-Tong
    • Journal of Electrical Engineering and Technology
    • /
    • v.10 no.4
    • /
    • pp.1804-1814
    • /
    • 2015
  • In order to explore the characteristics of electrons in DC negative corona discharge, an improved plasma chemical model is presented for the simulation of bar-plate DC corona discharge in dry air. The model is based on plasma hydrodynamics and chemical models in which 12 species are considered. In addition, the photoionization and secondary electron emission effect are also incorporated within the model as well. Based on this model, electron mean energy distribution (EMED), electron density distribution (EDD), generation and dissipation rates of electron at 6 typical time points during a pulse are discussed emphatically. The obtained results show that, the maximum of electron mean energy (EME) appears in field ionization layer which moves towards the anode as time progresses, and its value decreases gradually. Within a pulse process, the electron density (ED) in cathode sheath almost keeps 0, and the maximum of ED appears in the outer layer of the cathode sheath. Among all reactions, R1 and R2 are regarded as the main process of electron proliferation, and R22 plays a dominant role in the dissipation process of electron. The obtained results will provide valuable insights to the physical mechanism of negative corona discharge in air.

Technical Trends of Ultra-Reliable Low-Latency Communication for 5G (5G URLLC 기술 동향)

  • Park, O.S.;Kim, S.K.;Park, G.Y.;Shin, W.R.;Shin, J.S.
    • Electronics and Telecommunications Trends
    • /
    • v.34 no.6
    • /
    • pp.42-50
    • /
    • 2019
  • The fifth generation (5G) wireless technology is expected to be the trigger for the fourth industrial revolution. In particular, 5G ultra reliable low latency communication (URLLC) is expected to lead the wireless automation in vertical domains. In this paper, we analyze use cases, key metrics, and physical layer technologies for 5G URLLC standardized in $3^{rd}$ Generation Partnership Project Radio Access Network (3GPP RAN). Additionally, we discuss enabling RAN technologies towards beyond 5G to support high reliability and low latency.

Secure Physical Layer Key Generation in Untrusted Wireless Relay Communications and Networks (비신뢰 무선 릴레이 통신 네트워크의 안전한 물리계층 키 생성 기법)

  • So-Hyun Park;Il-Gu Lee
    • Annual Conference of KIPS
    • /
    • 2024.05a
    • /
    • pp.158-161
    • /
    • 2024
  • 물리계층 키 생성 기법은 두 단말 간의 채널 상태 정보를 이용해 일시적인 대칭키를 생성하는 경량 키 생성 기술이다. 하지만, 두 단말 사이에 다이렉트 링크가 없는 릴레이 기반 통신 네트워크 환경에서는 물리계층 키 생성이 어렵고, 비신뢰 릴레이에 의한 키 유출 가능성이 존재한다. 본 연구는 비신뢰 릴레이 통신 네트워크 환경에서 비밀키 정보를 노출하지 않고 안전하게 키를 생성하고 공유하는 방법을 제안하고 보안성을 평가한다. 실험 결과에 따르면 종래 방식보다 제안하는 방식의 키 유출률(key leakage rate, KLR)이 87.5% 감소하였고, 릴레이 수가 증가할수록 KLR이 감소하여 제안하는 방식이 비신뢰 릴레이 환경에서 높은 보안성을 보장함을 확인하였다.

Finite Element Method (FEM) Study on Space Charge Effects in Organic Light Emitting Diodes (OLED)

  • Kim, Kwang-Sik;Hwang, Young-Wook;Won, Tae-Young
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.12 no.4
    • /
    • pp.467-472
    • /
    • 2012
  • In this paper, we present a finite element method (FEM) study on the space charge effects in organic light emitting diodes. The physical model covers all the key physical processes in OLEDs, namely charge injection, transport and recombination, exciton diffusion, transfer and decay as well as light coupling, and thin-film-optics. The exciton model includes generation, diffusion, and energy transfer as well as annihilation. We assumed that the light emission originates from oscillation which thus is embodied as exciton in a stack of multilayer. We discuss the accumulation of charges at internal interfaces and their signature in the transient response as well as the electric field distribution. We also report our investigation on the influence of the insertion of the emission layer (EML) in the bilayer structure.

Medium Access Control Protocols for Full-Duplex Communications in WLAN Systems: Approaches and Challenges (무선랜 시스템에서 전이중 통신을 위한 MAC 프로토콜 분석)

  • Kim, Wonjung;Song, Taewon;Kim, Taeyoon;Pack, Sangheon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.7
    • /
    • pp.1276-1285
    • /
    • 2015
  • Full-duplex communications have emerged as a key technology for next-generation wireless local area networks (WLANs). Although the key enabling technology for full-duplex communications is the self-interference cancellation (SIC) technique in the physical layer, the employment of full-duplex communications has huge potentials to substantially increase the throughput at the medium access control (MAC) layer. At the same time, full-duplex communications pose non-trivial challenges to the MAC protocol design. In this article, we first identify salient problems in supporting full-duplex communications in WLAN MAC protocols. After that, we survey the state-of-the art to address those problems and analyze their pros and cons. Finally, we present open research challenges to improve the effectiveness of full-duplex communications in WLANs.