Physical Layer Secret-Key Generation Scheme for Transportation Security Sensor Network

Wireless Sensor Networks (WSNs) are widely used in different disciplines, including transportation systems, agriculture field environment monitoring, healthcare systems, and industrial monitoring. The security challenge of the wireless communication link between sensor nodes is critical in WSNs. In this paper, we propose a new physical layer secret-key generation scheme for transportation security sensor network. The scheme is based on the cooperation of all the sensor nodes, thus avoiding the key distribution process, which increases the security of the system. Different passive and active attack models are analyzed in this paper. We also prove that when the cooperative node number is large enough, even when the eavesdropper is equipped with multiple antennas, the secret-key is still secure. Numerical results are performed to show the efficiency of the proposed scheme.

[1]  Stark C. Draper,et al.  Exploiting Channel Diversity in Secret Key Generation From Multipath Fading Randomness , 2011, IEEE Transactions on Information Forensics and Security.

[2]  Matthieu R. Bloch,et al.  Physical-Layer Security: From Information Theory to Security Engineering , 2011 .

[3]  Vinod M. Prabhakaran,et al.  Secrecy via Sources and Channels , 2008, IEEE Transactions on Information Theory.

[4]  Sneha Kumar Kasera,et al.  High-Rate Uncorrelated Bit Extraction for Shared Secret Key Generation from Channel Measurements , 2010, IEEE Transactions on Mobile Computing.

[5]  Sirin Nitinawarat Secret key generation for correlated Gaussian sources , 2008, 2008 IEEE International Symposium on Information Theory.

[6]  Dongho Won,et al.  An Anonymous User Authentication and Key Agreement Scheme Based on a Symmetric Cryptosystem in Wireless Sensor Networks , 2016, Sensors.

[7]  Can Emre Koksal,et al.  Secret Key Generation Via Localization and Mobility , 2015, IEEE Transactions on Vehicular Technology.

[8]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[9]  Shun Watanabe,et al.  Secret key agreement from vector Gaussian sources by rate limited public communication , 2010, 2010 IEEE International Symposium on Information Theory.

[10]  Abdellah El Moudni,et al.  A Cooperative Traffic Control of Vehicle–Intersection (CTCVI) for the Reduction of Traffic Delays and Fuel Consumption , 2016, Sensors.

[11]  Ivan Martinovic,et al.  Key Generation in Wireless Sensor Networks Based on Frequency-selective Channels - Design, Implementation, and Analysis , 2010, ArXiv.

[12]  U. Maurer,et al.  Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.

[13]  Qinye Yin,et al.  Secret key generation from multiple cooperative helpers by rate unlimited public communication , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[14]  David Tse,et al.  Channel Identification: Secret Sharing Using Reciprocity in Ultrawideband Channels , 2007, IEEE Transactions on Information Forensics and Security.

[15]  Vinod M. Prabhakaran,et al.  Secrecy via sources and channels — A secret key - Secret message rate tradeoff region , 2008, 2008 IEEE International Symposium on Information Theory.

[16]  Xianbin Wang,et al.  Secret Key Generation Using Physical Channels with Imperfect CSI , 2014, 2014 IEEE 80th Vehicular Technology Conference (VTC2014-Fall).

[17]  Michael A. Jensen,et al.  Key generation exploiting MIMO channel evolution: Algorithms and theoretical limits , 2009, 2009 3rd European Conference on Antennas and Propagation.

[18]  Heng Zhou,et al.  Secret Key Generation in the Two-Way Relay Channel With Active Attackers , 2014, IEEE Transactions on Information Forensics and Security.

[19]  Rudolf Ahlswede,et al.  Common randomness in information theory and cryptography - I: Secret sharing , 1993, IEEE Trans. Inf. Theory.

[20]  Suhas N. Diggavi,et al.  Secret-Key Agreement With Channel State Information at the Transmitter , 2010, IEEE Transactions on Information Forensics and Security.

[21]  Hisato Iwai,et al.  Physical-Layer Secret Key Agreement in Two-Way Wireless Relaying Systems , 2011, IEEE Transactions on Information Forensics and Security.

[22]  Joseph B. Evans,et al.  An Open-System Transportation Security Sensor Network: Field-Trial Experiences , 2010, IEEE Transactions on Vehicular Technology.

[23]  Yongwha Chung,et al.  Replacement Condition Detection of Railway Point Machines Using an Electric Current Sensor , 2017, Sensors.

[24]  Ivan Martinovic,et al.  A Practical Man-In-The-Middle Attack on Signal-Based Key Generation Protocols , 2012, ESORICS.

[25]  Stark C. Draper,et al.  Key Generation Using External Source Excitation: Capacity, Reliability, and Secrecy Exponent , 2012, IEEE Transactions on Information Theory.

[26]  Kui Ren,et al.  Cooperative Secret Key Generation from Phase Estimation in Narrowband Fading Channels , 2011, IEEE Journal on Selected Areas in Communications.

[27]  Suhas N. Diggavi,et al.  Secret key agreement using asymmetry in channel state knowledge , 2009, 2009 IEEE International Symposium on Information Theory.

[28]  Stark C. Draper,et al.  Secret Key Generation from Sparse Wireless Channels: Ergodic Capacity and Secrecy Outage , 2013, IEEE Journal on Selected Areas in Communications.

[29]  Wade Trappe,et al.  Information-Theoretically Secret Key Generation for Fading Wireless Channels , 2009, IEEE Transactions on Information Forensics and Security.

[30]  Marco Gruteser,et al.  This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY 1 Key Agreement Algorithms for Vehicular Communicatio , 2022 .

[31]  Kai Zeng,et al.  Physical layer key generation in wireless networks: challenges and opportunities , 2015, IEEE Communications Magazine.

[32]  Wenliang Du,et al.  Cooperative Key Generation in Wireless Networks , 2012, IEEE Journal on Selected Areas in Communications.

[33]  T. Aono,et al.  Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels , 2005, IEEE Transactions on Antennas and Propagation.

[34]  Thomas Newe,et al.  Secure and Efficient Key Coordination Algorithm for Line Topology Network Maintenance for Use in Maritime Wireless Sensor Networks , 2016, Sensors.

[35]  Akbar M. Sayeed,et al.  Secure wireless communications: Secret keys through multipath , 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing.

[36]  Shun Watanabe,et al.  Secret Key Agreement from Correlated Gaussian Sources by Rate Limited Public Communication , 2010, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..