DroneKey: A Drone-Aided Group-Key Generation Scheme for Large-Scale IoT Networks

The Internet of Things (IoT) networks are finding massive applications in mission-critical contexts. A group key is needed to encrypt and authenticate broadcast/multicast messages commonly seen in large-scale wireless networks. In this paper, we propose DroneKey, a novel drone-aided PHY-based Group-Key Generation (GKG) scheme for large-scale IoT networks. In DroneKey, a drone is dispatched to fly along random 3D trajectories and keep broadcasting standard wireless signals to refresh the group keys in the whole network. Every IoT device receives the broadcast signals from which to extract the Channel State Information (CSI) stream which captures the dynamic variations of the individual wireless channel between the IoT device and the drone. DroneKey explores a deep-learning approach to extract the hidden correlation among the CSI streams to establish a common group key. We thoroughly evaluate DroneKey with a prototype in both indoor and outdoor environments. We show that DroneKey can achieve a high key-generation rate of 89.5 bit/sec for 10 devices in contrast to 40 bit/sec in the state-of-art prior work. In addition, DroneKey is much more scalable and can support 100 devices in contrast to 10 nodes in the state-of-art prior work with comparable key-generate rates.

[1]  Jie Yang,et al.  Group Secret Key Generation via Received Signal Strength: Protocols, Achievable Rates, and Implementation , 2014, IEEE Transactions on Mobile Computing.

[2]  Tony Q. S. Quek,et al.  Secret Group Key Generation in Physical Layer for Mesh Topology , 2014, 2015 IEEE Global Communications Conference (GLOBECOM).

[3]  Aiqun Hu,et al.  Lightweight Group Secret Key Generation Leveraging Non-Reconciled Received Signal Strength in Mobile Wireless Networks , 2019, 2019 IEEE International Conference on Communications Workshops (ICC Workshops).

[4]  Sinem Coleri Ergen,et al.  Channel estimation techniques based on pilot arrangement in OFDM systems , 2002, IEEE Trans. Broadcast..

[5]  Falko Dressler,et al.  Performance Assessment of IEEE 802.11p with an Open Source SDR-Based Prototype , 2018, IEEE Transactions on Mobile Computing.

[6]  Rao Yarlagadda,et al.  Unconventional cryptographic keying variable management , 1995, IEEE Trans. Commun..

[7]  Wade Trappe,et al.  Radio-telepathy: extracting a secret key from an unauthenticated wireless channel , 2008, MobiCom '08.

[8]  Yang Wang,et al.  Fast and practical secret key extraction by exploiting channel response , 2013, 2013 Proceedings IEEE INFOCOM.

[9]  J. H. Zar,et al.  Spearman Rank Correlation , 2005 .

[10]  Dwijendra K. Ray-Chaudhuri,et al.  Binary mixture flow with free energy lattice Boltzmann methods , 2022, arXiv.org.

[11]  Kefei Chen,et al.  A key management protocol with robust continuity for sensor networks , 2009, Comput. Stand. Interfaces.

[12]  Akbar M. Sayeed,et al.  Secure wireless communications: Secret keys through multipath , 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing.

[13]  Elaine B. Barker,et al.  A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .

[14]  Alex Reznik,et al.  Extracting Secrecy from Jointly Gaussian Random Variables , 2006, 2006 IEEE International Symposium on Information Theory.

[15]  Wu Yuezhong,et al.  Auto-Key , 2020, Proc. ACM Interact. Mob. Wearable Ubiquitous Technol..

[16]  Junqing Zhang,et al.  Efficient Key Generation by Exploiting Randomness From Channel Responses of Individual OFDM Subcarriers , 2016, IEEE Transactions on Communications.

[17]  Hung-Min Sun,et al.  A Pair-wise Key Establishment Scheme for Wireless Sensor Networks , 2009 .

[18]  Umberto Mengali,et al.  A comparison of pilot-aided channel estimation methods for OFDM systems , 2001, IEEE Trans. Signal Process..

[19]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[20]  Hairong Qi,et al.  Self-certified group key generation for ad hoc clusters in wireless sensor networks , 2005, Proceedings. 14th International Conference on Computer Communications and Networks, 2005. ICCCN 2005..

[21]  Jun Ni,et al.  Group Secret Key Generation Algorithm from Wireless Signal Strength , 2012, 2012 Sixth International Conference on Internet Computing for Science and Engineering.

[22]  Chik How Tan,et al.  Energy-efficient and scalable group key agreement for large ad hoc networks , 2005, PE-WASUN '05.

[23]  Kin K. Leung,et al.  Group Secret Key Generation in Wireless Networks: Algorithms and Rate Optimization , 2016, IEEE Transactions on Information Forensics and Security.

[24]  Sang Joon Kim,et al.  A Mathematical Theory of Communication , 2006 .

[25]  J. Harshan,et al.  Group Secret-Key Generation using Algebraic Rings in Wireless Networks , 2018 .

[26]  H. Abdi The Kendall Rank Correlation Coefficient , 2007 .

[27]  Sneha Kumar Kasera,et al.  Secret Key Extraction from Wireless Signal Strength in Real Environments , 2009, IEEE Transactions on Mobile Computing.

[28]  Sanjay Kumar Madria,et al.  A secure hierarchical model for sensor network , 2004, SGMD.

[29]  Tianyu Tang,et al.  Group secret key generation in physical layer, protocols and achievable rates , 2017, 2017 17th International Symposium on Communications and Information Technologies (ISCIT).

[30]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[31]  Thinh Nguyen,et al.  Distance Based Thresholds for Cluster Head Selection in Wireless Sensor Networks , 2012, IEEE Communications Letters.

[32]  Sushil Jajodia,et al.  LEAP+: Efficient security mechanisms for large-scale distributed sensor networks , 2006, TOSN.

[33]  John McEachen,et al.  Unconditionally secure communications over fading channels , 2001, 2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277).

[34]  Elisa Bertino,et al.  Effective Key Management in Dynamic Wireless Sensor Networks , 2015, IEEE Transactions on Information Forensics and Security.

[35]  Jin Liu,et al.  A key management scheme based on grouping within cluster , 2014, Proceeding of the 11th World Congress on Intelligent Control and Automation.

[36]  Chirag Prajapati,et al.  Energy Efficient Cluster Head Selection in Wireless Sensor Networks , 2014 .

[37]  Yunghsiang Sam Han,et al.  A pairwise key predistribution scheme for wireless sensor networks , 2005, TSEC.