An anti-collusion attack defense method for physical layer key generation scheme based on transmission delay

被引:0
作者
Wang X. [1 ]
Huang J. [1 ,2 ]
Qi C. [1 ]
Peng Y. [1 ]
Zhang S. [1 ]
机构
[1] Southeast University, Nanjing
[2] Purple Mountain Laboratories, Nanjing
关键词
Attack-defense game; Collusive attack; Key generation; Physical layer security; Secret apportionment strategy; Security strategy; Transmission delay;
D O I
10.7717/PEERJ-CS.1349
中图分类号
学科分类号
摘要
Physical layer security (PLS) is considered one of the most promising solutions to solve the security problems of massive Internet of Things (IoTs) devices because of its lightweight and high efficiency. Significantly, the recent physical layer key generation (PLKG) scheme based on transmission delay proposed by Huang et al. (2021) does not have any restrictions on communication methods and can extend the traditional physical layer security based on wireless channels to the whole Internet scene. However, the secret-sharing strategy adopted in this scheme has hidden dangers of collusion attack, which may lead to security problems such as information tampering and privacy disclosure. By establishing a probability model, this article quantitatively analyzes the relationship between the number of malicious collusion nodes and the probability of key exposure, which proves the existence of this security problem. In order to solve the problem of collusion attack in Huang et al.’s scheme, this article proposes an anti-collusion attack defense method, which minimizes the influence of collusion attack on key security by optimizing parameters including the number of the middle forwarding nodes, the random forwarding times, the time delay measurement times and the out-of-control rate of forwarding nodes. Finally, based on the game model, we prove that the defense method proposed in this article can reduce the risk of key leakage to zero under the scenario of the “Careless Defender” and “Cautious Defender” respectively © 2023 Wang et al
引用
收藏
相关论文
共 33 条
[1]  
Abbasi MAB, Fusco V, Naeem U, Malyuskin O., Physical layer secure communication using orbital angular momentum transmitter and a single-antenna receiver, IEEE Transactions on Antennas & Propagation, 68, 7, pp. 5583-5591, (2020)
[2]  
Aldaghri N, Mahdavifar H., Fast secret key generation in static environments using induced randomness, 2018 IEEE Global Communications Conference (GLOBECOM), (2018)
[3]  
Aldaghri N, Mahdavifar H., Physical layer secret key generation in static environments, IEEE Transactions on Information Forensics and Security, 15, pp. 2692-2705, (2020)
[4]  
Asghari P, Rahmani AM, Javadi HHS., Internet of things applications: a systematic review, Computer Networks, 148, 7, pp. 241-261, (2019)
[5]  
Bennett C, Brassard G, Crepeau C, Maurer U., Generalized privacy amplification, IEEE Transactions on Information Theory, 41, 6, pp. 1915-1923, (1995)
[6]  
Brownlee N, Claffy K., Internet measurement, IEEE Internet Computing, 8, 5, pp. 30-33, (2004)
[7]  
Harn L, Ren J., Generalized digital certificate for user authentication and key establishment for secure communications, IEEE Transactions on Wireless Communications, 10, 7, pp. 2372-2379, (2011)
[8]  
Huang J, Wang X, Wang W, Duan Z., A novel key distribution scheme based on transmission delays, Security and Communication Networks, 2021, 3, pp. 1-13, (2021)
[9]  
Jiao L, Tang J, Zeng K., Physical layer key generation using virtual AoA and AoD of mmWave massive MIMO channel, 2018 IEEE Conference on Communications and Network Security (CNS), pp. 1-9, (2018)
[10]  
Jiao L, Wang N, Wang P, Alipour-Fanid A, Tang J, Zeng K., Physical layer key generation in 5G wireless networks, IEEE Wireless Communications, 26, 5, pp. 48-54, (2019)