Exploiting Malicious RIS for Secret Key Acquisition in Physical-Layer Key Generation

被引:2
作者
Hu, Lei [1 ]
Li, Guyue [1 ,2 ]
Hu, Aiqun [2 ,3 ]
Ng, Derrick Wing Kwan [4 ]
机构
[1] Southeast Univ, Sch Cyber Sci & Engn, Nanjing 210096, Peoples R China
[2] Purple Mt Labs, Nanjing 211111, Peoples R China
[3] Southeast Univ, Natl Mobile Commun Res Lab, Nanjing 210096, Peoples R China
[4] Univ New South Wales, Sch Elect Engn & Telecommun, Sydney, NSW 2052, Australia
关键词
Wireless communication; Communication system security; Fading channels; Laboratories; Resists; Channel models; Wireless sensor networks; Physical layer security; secret key generation; reconfigurable intelligent surface (RIS); active attack; INTELLIGENT REFLECTING SURFACE;
D O I
10.1109/LWC.2023.3330809
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the capability of controlling wireless environments, reconfigurable intelligent surface (RIS) can be exploited to assist radio channel-based physical-layer key generation (PKG). However, this may also pose great security threats to PKG when it is controlled by an attacker. To this end, this letter studies a RIS leakage (RISL) attack that assists the attacker to manipulate the generated keys between the legitimate ends in PKG systems. Specifically, in block fading environments, by alternatingly adapting the RIS reflection coefficients to all 0s and 1s in each block, the received signal strength (RSS) at the legitimate ends is likely to be boosted and attenuated regularly across time, causing predictable 0s and 1s in the quantized bits. To resist this attack, we propose a countermeasure based on dynamic private pilots (CDPP) and prove that the RISL success probability can be significantly reduced by CDPP. Simulation results verify the effectiveness of the proposed attack and countermeasure, highlighting the importance of introducing artificial randomness for secret key security in block fading channels.
引用
收藏
页码:417 / 421
页数:5
相关论文
共 17 条
  • [1] Covert Communications: A Comprehensive Survey
    Chen, Xinying
    An, Jianping
    Xiong, Zehui
    Xing, Chengwen
    Zhao, Nan
    Yu, F. Richard
    Nallanathan, Arumugam
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2023, 25 (02): : 1173 - 1198
  • [2] Hu G. Li, 2021, P IEEE VEH TECHN C V, P1
  • [3] Robust and Secure Sum-Rate Maximization for Multiuser MISO Downlink Systems With Self-Sustainable IRS
    Hu, Shaokang
    Wei, Zhiqiang
    Cai, Yuanxin
    Liu, Chang
    Ng, Derrick Wing Kwan
    Yuan, Jinhong
    [J]. IEEE TRANSACTIONS ON COMMUNICATIONS, 2021, 69 (10) : 7032 - 7049
  • [4] Intelligent Reflecting Surface-Assisted Secret Key Generation With Discrete Phase Shifts in Static Environment
    Hu, Xiaoyan
    Jin, Liang
    Huang, Kaizhi
    Sun, Xiaoli
    Zhou, You
    Qu, Jinghua
    [J]. IEEE WIRELESS COMMUNICATIONS LETTERS, 2021, 10 (09) : 1867 - 1870
  • [5] On the Effectiveness of Secret Key Extraction from Wireless Signal Strength in Real Environments
    Jana, Suman
    Premnath, Sriram Nandha
    Clark, Mike
    Kasera, Sneha K.
    Patwari, Neal
    Krishnamurthy, Srikanth V.
    [J]. FIFTEENTH ACM INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND NETWORKING (MOBICOM 2009), 2009, : 321 - 332
  • [6] Random Shifting Intelligent Reflecting Surface for OTP Encrypted Data Transmission
    Ji, Zijie
    Yeoh, Phee Lep
    Chen, Gaojie
    Pan, Cunhua
    Zhang, Yan
    He, Zunwen
    Yin, Hao
    Li, Yonghui
    [J]. IEEE WIRELESS COMMUNICATIONS LETTERS, 2021, 10 (06) : 1192 - 1196
  • [7] Secret Key Generation for Intelligent Reflecting Surface Assisted Wireless Communication Networks
    Ji, Zijie
    Yeoh, Phee Lep
    Zhang, Deyou
    Chen, Gaojie
    Zhang, Yan
    He, Zunwen
    Yin, Hao
    Li, Yonghui
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2021, 70 (01) : 1030 - 1034
  • [8] RECONFIGURABLE INTELLIGENT SURFACE FOR PHYSICAL LAYER KEY GENERATION: CONSTRUCTIVE OR DESTRUCTIVE?
    Li, Guyue
    Hu, Lei
    Staat, Paul
    Elders-Boll, Harald
    Zenger, Christian
    Paar, Christof
    Hu, Aiqun
    [J]. IEEE WIRELESS COMMUNICATIONS, 2022, 29 (04) : 146 - 153
  • [9] Li GY, 2017, IEEE GLOB COMM CONF
  • [10] Long Jiao, 2021, WiseML '21: Proceedings of the 3rd ACM Workshop on Wireless Security and Machine Learning, P61, DOI 10.1145/3468218.3469042