A Physical-Layer Key Distribution Mechanism for IoT Networks

Physical layer security has gained an increasing attention due to its efficiency and simplicity as compared to other conventional security protocols. Thus, it has been recently nominated for Internet of Things (IoT) applications. In this paper, a novel key distribution mechanism is proposed for IoT networks. The proposed mechanism exploits the channel diversity to distribute encryption keys among nodes within the network. A main novelty aspect of the proposed mechanism is that it guarantees distributing different keys with different lengths to all nodes at the same time. In addition, an intelligent eavesdropper model has been considered. Simulation results prove the high performance of the proposed scheme and its robustness against channel estimation errors, and immunity against eavesdroppers.

[1]  Sneha Kumar Kasera,et al.  Secret Key Extraction from Wireless Signal Strength in Real Environments , 2013, IEEE Trans. Mob. Comput..

[2]  Wayne E. Stark,et al.  Cryptographic Key Agreement for Mobile Radio , 1996, Digit. Signal Process..

[3]  Georgios Mantas,et al.  Physical-layer entity authentication scheme for mobile MIMO systems , 2018, IET Commun..

[4]  Antonio Iera,et al.  The Internet of Things: A survey , 2010, Comput. Networks.

[5]  Dieter Hogrefe,et al.  On improving the robustness of physical-layer key extraction mechanisms against delay and mobility , 2012, 2012 8th International Wireless Communications and Mobile Computing Conference (IWCMC).

[6]  H. Vincent Poor,et al.  Multiple-Access Channels With Confidential Messages , 2008, IEEE Transactions on Information Theory.

[7]  Larry J. Greenstein,et al.  Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication , 2007, 2007 IEEE International Conference on Communications.

[8]  Zhu Han,et al.  Data Collection and Wireless Communication in Internet of Things (IoT) Using Economic Analysis and Pricing Models: A Survey , 2016, IEEE Communications Surveys & Tutorials.

[9]  Dieter Hogrefe,et al.  An Optimal Guard-Intervals Based Mechanism for Key Generation from Multipath Wireless Channels , 2011, 2011 4th IFIP International Conference on New Technologies, Mobility and Security.

[10]  Kai Zeng,et al.  Physical layer key generation in wireless networks: challenges and opportunities , 2015, IEEE Communications Magazine.

[11]  Xianbin Wang,et al.  Physical Layer Authentication for Mobile Systems with Time-Varying Carrier Frequency Offsets , 2014, IEEE Transactions on Communications.

[12]  Hai Su,et al.  Fast and scalable secret key generation exploiting channel phase randomness in wireless networks , 2011, 2011 Proceedings IEEE INFOCOM.

[13]  Mohammad Iftekhar Husain,et al.  CD-PHY: Physical layer security in wireless networks through constellation diversity , 2011, MILCOM 2012 - 2012 IEEE Military Communications Conference.

[14]  Jorge Sá Silva,et al.  Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues , 2015, IEEE Communications Surveys & Tutorials.

[15]  Akbar M. Sayeed,et al.  Secure wireless communications: Secret keys through multipath , 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing.

[16]  Stark C. Draper,et al.  Exploiting Channel Diversity in Secret Key Generation From Multipath Fading Randomness , 2011, IEEE Transactions on Information Forensics and Security.

[17]  Athanasios V. Vasilakos,et al.  Survey on channel reciprocity based key establishment techniques for wireless systems , 2015, Wirel. Networks.

[18]  Aggelos Kiayias,et al.  Robust key generation from signal envelopes in wireless networks , 2007, CCS '07.

[19]  Amitav Mukherjee,et al.  Physical-Layer Security in the Internet of Things: Sensing and Communication Confidentiality Under Resource Constraints , 2015, Proceedings of the IEEE.

[20]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas—Part II: The MIMOME Wiretap Channel , 2007, IEEE Transactions on Information Theory.

[21]  Aggelos Kiayias,et al.  On the Security of Key Extraction From Measuring Physical Quantities , 2013, IEEE Transactions on Information Forensics and Security.

[22]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.

[23]  Junqing Zhang,et al.  Key Generation From Wireless Channels: A Review , 2016, IEEE Access.

[24]  Jonathan Rodriguez,et al.  A Physical-Layer Security Scheme by Phase-Based Adaptive Modulation , 2017, IEEE Transactions on Vehicular Technology.

[25]  Marco Gruteser,et al.  Improving robustness of key extraction from wireless channels with differential techniques , 2012, 2012 International Conference on Computing, Networking and Communications (ICNC).

[26]  Felix Wortmann,et al.  Internet of Things , 2015, Business & Information Systems Engineering.

[27]  Hsiao-Chun Wu,et al.  Physical layer security in wireless networks: a tutorial , 2011, IEEE Wireless Communications.

[28]  Wade Trappe,et al.  ProxiMate: proximity-based secure pairing using ambient wireless signals , 2011, MobiSys '11.