A Physical Encryption Scheme for Low-Power Wireless M2M Devices: a Dynamic Key Approach

Physical Layer Security (PLS) has emerged as a promising solution for small and resource-limited wireless communications devices, to reduce the overhead associated with the required security resources and latency. In contrast to traditional security schemes, PLS relies on and benefits from the random nature of physical channels. However, the majority of PLS schemes in the literature lack the notion of secrecy and dynamicity, and employ static keys to generate fixed cipher primitives. In this paper, a dynamic key generation scheme that combines a pre-shared/stored secret key with a dynamic nonce extracted from channel information (for each new session) is proposed. The main advantage of this approach is that it achieves a high-security level with minimal overhead. Moreover, the obtained dynamic key can be changed frequently upon any change in channel parameters. Using the produced dynamic keys, cipher primitives are generated (permutation operations), which get updated for each frame symbol. This process ensures different and unique encryption layers for each new input frame and for each symbol in the input frame. Equally important, the proposed encryption algorithm operates at the modulation symbol level in order to attain performance by limiting the effect of error propagation and by realizing parallel encryption/decryption for each frame symbol. In addition, a preamble encryption scheme is also proposed to prevent unauthorized synchronization or channel estimation by illegitimate users. The security level of the proposed cipher scheme mainly depends on a secret key and the dynamicity of the channel to update the cipher primitives used for each frame symbol. Finally, security and performance analyses validate the efficiency and the robustness of the proposed approach.

[1]  Zhen Yang,et al.  Artificial-Noise-Aided Physical Layer Phase Challenge-Response Authentication for Practical OFDM Transmission , 2016, IEEE Transactions on Wireless Communications.

[2]  Junqing Zhang,et al.  On the Key Generation From Correlated Wireless Channels , 2017, IEEE Communications Letters.

[3]  Jun Fang,et al.  Compressive Sensing-Based Multiuser Detection via Iterative Reweighed Approach in M2M Communications , 2018, IEEE Wireless Communications Letters.

[4]  Marwan Krunz,et al.  Exploiting Frame Preamble Waveforms to Support New Physical-Layer Functions in OFDM-Based 802.11 Systems , 2017, IEEE Transactions on Wireless Communications.

[5]  Jehad M. Hamamreh,et al.  Secure Orthogonal Transform Division Multiplexing (OTDM) Waveform for 5G and Beyond , 2017, IEEE Communications Letters.

[6]  Tao Jiang,et al.  A Survey of Emerging M2M Systems: Context, Task, and Objective , 2016, IEEE Internet of Things Journal.

[7]  Takahiko Saba,et al.  Energy Efficient Artificial Fast Fading for MISO-OFDM Systems , 2014, GLOBECOM 2014.

[8]  Guang Gong,et al.  A new efficient physical layer OFDM encryption scheme , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[9]  Yuh-Ren Tsai,et al.  Effective channel perturbation based on cyclic delay for physical layer security in OFDM systems , 2014, 2014 International Conference on Information Science, Electronics and Electrical Engineering.

[10]  Takahiko Saba,et al.  Time-domain artificial noise generation technique using time-domain and frequency-domain processing for physical layer security in MIMO-OFDM systems , 2014, 2014 IEEE International Conference on Communications Workshops (ICC).

[11]  Jaume Barceló,et al.  IEEE 802.11AH: the WiFi approach for M2M communications , 2014, IEEE Wireless Communications.

[12]  Mohsen Guizani,et al.  Unleashing the secure potential of the wireless physical layer: Secret key generation methods , 2016, Phys. Commun..

[13]  Li Zhao,et al.  Vehicle-to-Everything (v2x) Services Supported by LTE-Based Systems and 5G , 2017, IEEE Communications Standards Magazine.

[14]  Hassan N. Noura,et al.  ERCA: efficient and robust cipher algorithm for LTE data confidentiality , 2013, MSWiM.

[15]  Elaine B. Barker,et al.  A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .

[16]  Antonio Iera,et al.  The Internet of Things: A survey , 2010, Comput. Networks.

[17]  Christophe De Vleeschouwer,et al.  Overview on Selective Encryption of Image and Video: Challenges and Perspectives , 2008, EURASIP J. Inf. Secur..

[18]  Ali Chehab,et al.  One round cipher algorithm for multimedia IoT devices , 2018, Multimedia Tools and Applications.

[19]  Junqing Zhang,et al.  Key Generation From Wireless Channels: A Review , 2016, IEEE Access.

[20]  Junqing Zhang,et al.  Design of an OFDM Physical Layer Encryption Scheme , 2017, IEEE Transactions on Vehicular Technology.

[21]  Qing Wang,et al.  A Survey on Device-to-Device Communication in Cellular Networks , 2013, IEEE Communications Surveys & Tutorials.

[22]  J. Rodgers,et al.  Thirteen ways to look at the correlation coefficient , 1988 .

[23]  Hassan N. Noura,et al.  ERDIA: An efficient and robust data integrity algorithm for mobile and wireless networks , 2015, 2015 IEEE Wireless Communications and Networking Conference (WCNC).

[24]  Yeh-Ching Chung,et al.  A Dynamic Module Deployment Framework for M2M Platforms , 2017, 2017 IEEE 7th International Symposium on Cloud and Service Computing (SC2).

[25]  Ali Chehab,et al.  Efficient and Secure Physical Encryption Scheme for Low-Power Wireless M2M Devices , 2018, 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC).

[26]  Junqing Zhang,et al.  Efficient Key Generation by Exploiting Randomness From Channel Responses of Individual OFDM Subcarriers , 2016, IEEE Transactions on Communications.