A DWT-Based PHY Key Generation Scheme for the Cross-Layer Security in IoT Networks

被引:0
|
作者
Liu, Fangfang [1 ]
Liu, Yueyi [1 ]
An, Wei [1 ]
Li, Xiaona [2 ]
机构
[1] Beijing Univ Posts & Telecommun, Sch Informat & Commun Engn, Beijing 100876, Peoples R China
[2] Chinese Acad Sci, Inst Informat Engn, Beijing 100093, Peoples R China
基金
中国国家自然科学基金;
关键词
Security; Discrete wavelet transforms; Channel estimation; Privacy; Law; Delays; Base stations; Cross PHY/MAC layer security; key generation; access security; random access procedure; HANDOVER AUTHENTICATION; PRIVACY; ACCESS;
D O I
10.1109/LCOMM.2024.3381179
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
In this letter, a novel cross physical layer (PHY)/medium access control (MAC) layer security scheme is proposed, where PHY key generated based on channel information is introduced into the random access procedure to protect the security of wireless communications from the very outset. To ensure the accessing rate of legal user, high key generation rate (KGR) and low key disagreement rate (KDR) are critical. We first utilize instantaneous channel information of demodulation reference signal to rapidly generate key without frequently information exchanging in PHY. Then, to reduce the inconsistency of the generated PHY key caused by high-frequency noise, discrete wavelet transform is used to decrease the KDR. Furthermore, the theoretical KGR upper bound of the proposed scheme is derived from the aspect of information theory. Finally, the proposed scheme is verified in OpenAirInterface platform. Simulation results show that the proposed scheme has the high accessing rate of legal user and low-delay, which effectively protects the random access procedure from unauthorized user.
引用
收藏
页码:1258 / 1262
页数:5
相关论文
共 43 条
  • [1] A Key Generation Scheme from Sensing Data for IoT Security
    Ye, Xiaokai
    Lv, Tao
    Sun, Xiaohan
    2023 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY, CNS, 2023,
  • [2] A Cross-Layer Survey on Secure and Low-Latency Communications in Next-Generation IoT
    Martalo, Marco
    Pettorru, Giovanni
    Atzori, Luigi
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2024, 21 (04): : 4669 - 4685
  • [3] Cross-layer design for the security of wireless sensor networks
    Xiao, Mingbo
    Wang, Xudong
    Yang, Guangsong
    WCICA 2006: SIXTH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION, VOLS 1-12, CONFERENCE PROCEEDINGS, 2006, : 104 - +
  • [4] A cross-layer mobility handover scheme for IPv6-based vehicular networks
    Wang Xiaonan
    Le Deguang
    Yao Yufeng
    AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS, 2015, 69 (10) : 1514 - 1524
  • [5] Enabling Accurate Cross-Layer PHY/MAC/NET Simulation Studies of Vehicular Communication Networks
    Mittag, Jens
    Papanastasiou, Stylianos
    Hartenstein, Hannes
    Stroem, Erik G.
    PROCEEDINGS OF THE IEEE, 2011, 99 (07) : 1311 - 1326
  • [6] A cross-layer approach for integrating security mechanisms in sensor networks architectures
    Roman, Rodrigo
    Lopez, Javier
    Najera, Pablo
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2011, 11 (02): : 267 - 276
  • [7] Cross-Layer Security Based on Optical CDMA and Algorithmic Cryptography
    Li, Wenjun
    Ji, Jianhua
    Zhang, Guirong
    Zhang, Wenlin
    2016 IEEE OPTOELECTRONICS GLOBAL CONFERENCE (OGC), 2016, : 17 - 18
  • [8] A Tag-Based PHY-Layer Authentication Scheme Without Key Distribution
    An, Yongli
    Zhang, Shikang
    Ji, Zhanlin
    IEEE ACCESS, 2021, 9 : 85947 - 85955
  • [9] Security-Aware Cross-Layer Resource Allocation for Heterogeneous Wireless Networks
    Xu, Lei
    Xing, Hong
    Nallanathan, Arumugam
    Yang, Yuwang
    Chai, Tianyou
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2019, 67 (02) : 1388 - 1399
  • [10] Matrix-based key management scheme for IoT networks
    Nafi, Mohammed
    Bouzefrane, Samia
    Omar, Mawloud
    AD HOC NETWORKS, 2020, 97 (97)