Social-Aware Secret Key Generation for Secure Device-to-Device Communication via Trusted and Non-Trusted Relays

Physical layer security (PLS) is a promising technology in device-to-device (D2D) communications by exploiting reciprocity and randomness of wireless channels, which attracts considerable research attention in the D2D communications community. In this paper, we investigated PLS for secure key generation rate (SKGR) in D2D communications based on cooperative trusted and non-trusted relays. By leveraging social ties, we exploit three social phenomena for secure communications, i.e., trusted scenario (social trust), non-trusted scenario (social reciprocity), and partially trusted scenario (mixed social trust and social reciprocity). The coalition game theory is further utilized to select the optimal relay pairs for improving SKGR. On the basis of social ties, we develop an algorithm for SKGR that protects the keys secret from both eavesdropper and non-trusted selected relays. We incorporate secure relays selection and system wide security for D2D communications. The stability and convergence of the proposed algorithm are also proved in this paper. Both numerical and analytical results verify effectiveness and consistency of our proposed scheme, which ensures better SKGR performance in D2D communications.

[1]  Junqing Zhang,et al.  Key Generation From Wireless Channels: A Review , 2016, IEEE Access.

[2]  Klaus Doppler,et al.  Mode Selection for Device-To-Device Communication Underlaying an LTE-Advanced Network , 2010, 2010 IEEE Wireless Communication and Networking Conference.

[3]  Kaigui Bian,et al.  PHY-Layer Authentication Using Duobinary Signaling for Spectrum Enforcement , 2016, IEEE Transactions on Information Forensics and Security.

[4]  Zheng Yan,et al.  Security in D2D Communications: A Review , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.

[5]  Rudolf Ahlswede,et al.  Common randomness in information theory and cryptography - I: Secret sharing , 1993, IEEE Trans. Inf. Theory.

[6]  Alireza Sadeghi,et al.  Analysis of key generation rate from wireless channel in in-band full-duplex communications , 2016, 2016 IEEE International Conference on Communications Workshops (ICC).

[7]  Zhu Han,et al.  Coalitional game theory for communication networks , 2009, IEEE Signal Processing Magazine.

[8]  M. van Dijk Broadcast channels with confidential messages, with tampering : the binary symmetric case , 1994 .

[9]  Ming Zeng,et al.  Mobility-assisted device to device communications for Content Transmission , 2017, 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC).

[10]  Larry J. Greenstein,et al.  Using the physical layer for wireless authentication in time-variant channels , 2008, IEEE Transactions on Wireless Communications.

[11]  S H Strogatz,et al.  Random graph models of social networks , 2002, Proceedings of the National Academy of Sciences of the United States of America.

[12]  Stark C. Draper,et al.  Exploiting Channel Diversity in Secret Key Generation From Multipath Fading Randomness , 2011, IEEE Transactions on Information Forensics and Security.

[13]  Aggelos Kiayias,et al.  Robust key generation from signal envelopes in wireless networks , 2007, CCS '07.

[14]  Zhu Han,et al.  Mobility Assisted Content Transmission For Device-to-Device Communication Underlaying Cellular Networks , 2018, IEEE Transactions on Vehicular Technology.

[15]  Xu Chen,et al.  Social trust and social reciprocity based cooperative D2D communications , 2013, MobiHoc.

[16]  Jörg Ott,et al.  Security and Privacy in Device-to-Device (D2D) Communication: A Review , 2017, IEEE Communications Surveys & Tutorials.

[17]  Wenliang Du,et al.  Cooperative Key Generation in Wireless Networks , 2012, IEEE Journal on Selected Areas in Communications.

[18]  Qing Wang,et al.  A Survey on Device-to-Device Communication in Cellular Networks , 2013, IEEE Communications Surveys & Tutorials.

[19]  Xu Chen,et al.  Imitation-Based Social Spectrum Sharing , 2014, IEEE Transactions on Mobile Computing.

[20]  Xu Chen,et al.  SYNERGY: A game-theoretical approach for cooperative key generation in wireless networks , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[21]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[22]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[23]  Hai Su,et al.  Secret key generation exploiting channel characteristics in wireless communications , 2011, IEEE Wireless Communications.

[24]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[25]  Xuemin Shen,et al.  Operator controlled device-to-device communications in LTE-advanced networks , 2012, IEEE Wireless Communications.

[26]  Zaher Dawy,et al.  Social Network Aware Device-to-Device Communication in Wireless Networks , 2015, IEEE Transactions on Wireless Communications.

[27]  Stefan Parkvall,et al.  Design aspects of network assisted device-to-device communications , 2012, IEEE Communications Magazine.

[28]  Smriti Gopinath,et al.  Reciprocity enhancement and decorrelation schemes for PHY-based key generation , 2014, 2014 IEEE Globecom Workshops (GC Wkshps).

[29]  Zhu Han,et al.  Coalitional Games for Resource Allocation in the Device-to-Device Uplink Underlaying Cellular Networks , 2014, IEEE Transactions on Wireless Communications.

[30]  Hao Liang,et al.  Device-to-device communication underlaying converged heterogeneous networks , 2014, IEEE Wireless Communications.

[31]  Sheng Chen,et al.  Social-aware D2D communications: qualitative insights and quantitative analysis , 2014, IEEE Communications Magazine.

[32]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[33]  Zhu Han,et al.  Efficient resource allocation for mobile social networks in D2D communication underlaying cellular networks , 2014, 2014 IEEE International Conference on Communications (ICC).

[34]  Xu Chen,et al.  SoCast: Social ties based cooperative video multicast , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[35]  George K. Karagiannidis,et al.  Simultaneously Generating Secret and Private Keys in a Cooperative Pairwise-Independent Network , 2016, IEEE Transactions on Information Forensics and Security.

[36]  Xu Chen,et al.  Adaptive Channel Recommendation for Opportunistic Spectrum Access , 2011, IEEE Transactions on Mobile Computing.

[37]  H. Vincent Poor,et al.  From Technological Networks to Social Networks , 2013, IEEE Journal on Selected Areas in Communications.

[38]  Balasubramaniam Natarajan,et al.  Secret Key Generation Rate With Power Allocation in Relay-Based LTE-A Networks , 2015, IEEE Transactions on Information Forensics and Security.

[39]  Hsiao-Hwa Chen,et al.  Physical Layer Security for Next Generation Wireless Networks: Theories, Technologies, and Challenges , 2017, IEEE Communications Surveys & Tutorials.

[40]  Tony Q. S. Quek,et al.  Physical-Layer Secret Key Generation With Colluding Untrusted Relays , 2016, IEEE Transactions on Wireless Communications.

[41]  Olav Tirkkonen,et al.  Device-to-Device Communication Underlaying Cellular Communications Systems , 2009, Int. J. Commun. Netw. Syst. Sci..

[42]  Sneha Kumar Kasera,et al.  Secret Key Extraction from Wireless Signal Strength in Real Environments , 2009, IEEE Transactions on Mobile Computing.

[43]  H. Gintis Strong reciprocity and human sociality. , 2000, Journal of theoretical biology.

[44]  Kui Ren,et al.  Cooperative Secret Key Generation from Phase Estimation in Narrowband Fading Channels , 2011, IEEE Journal on Selected Areas in Communications.

[45]  Wenliang Du,et al.  PHY-based cooperative key generation in wireless networks , 2011, 2011 49th Annual Allerton Conference on Communication, Control, and Computing (Allerton).