A DWT-Based PHY Key Generation Scheme for the Cross-Layer Security in IoT Networks

被引:2
作者
Liu, Fangfang [1 ]
Liu, Yueyi [1 ]
An, Wei [1 ]
Li, Xiaona [2 ]
机构
[1] Beijing Univ Posts & Telecommun, Sch Informat & Commun Engn, Beijing 100876, Peoples R China
[2] Chinese Acad Sci, Inst Informat Engn, Beijing 100093, Peoples R China
基金
中国国家自然科学基金;
关键词
Security; Discrete wavelet transforms; Channel estimation; Privacy; Law; Delays; Base stations; Cross PHY/MAC layer security; key generation; access security; random access procedure; HANDOVER AUTHENTICATION; PRIVACY; ACCESS;
D O I
10.1109/LCOMM.2024.3381179
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
In this letter, a novel cross physical layer (PHY)/medium access control (MAC) layer security scheme is proposed, where PHY key generated based on channel information is introduced into the random access procedure to protect the security of wireless communications from the very outset. To ensure the accessing rate of legal user, high key generation rate (KGR) and low key disagreement rate (KDR) are critical. We first utilize instantaneous channel information of demodulation reference signal to rapidly generate key without frequently information exchanging in PHY. Then, to reduce the inconsistency of the generated PHY key caused by high-frequency noise, discrete wavelet transform is used to decrease the KDR. Furthermore, the theoretical KGR upper bound of the proposed scheme is derived from the aspect of information theory. Finally, the proposed scheme is verified in OpenAirInterface platform. Simulation results show that the proposed scheme has the high accessing rate of legal user and low-delay, which effectively protects the random access procedure from unauthorized user.
引用
收藏
页码:1258 / 1262
页数:5
相关论文
共 46 条
[31]   Performance and security assessment of a PKC based key management scheme for hierarchical sensor networks [J].
Naureen, Ayesha ;
Akram, Attiya ;
Maqsood, Tariq ;
Riaz, Rabia ;
Kim, Ki-Hyung ;
Ahmed, H. Farooq .
2008 IEEE 67TH VEHICULAR TECHNOLOGY CONFERENCE-SPRING, VOLS 1-7, 2008, :163-+
[32]   MIH-SPFP: MIH-based secure cross-layer handover protocol for Fast Proxy Mobile IPv6-IoT networks [J].
Sharma, Vishal ;
Guan, Jianfeng ;
Kim, Jiyoon ;
Kwon, Soonhyun ;
You, Ilsun ;
Palmieri, Francesco ;
Collotta, Mario .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2019, 125 :67-81
[33]   Learning-Based Flexible Cross-Layer Optimization for Ultrareliable and Low-Latency Applications in IoT Scenarios [J].
Zhang, Jingxuan ;
Xu, Xiaodong ;
Zhang, Kangjie ;
Han, Shujun ;
Tao, Xiaofeng ;
Zhang, Ping .
IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (16) :14629-14643
[34]   An anti-collusion attack defense method for physical layer key generation scheme based on transmission delay [J].
Wang, Xiaowen ;
Huang, Jie ;
Qi, Chunyang ;
Peng, Yang ;
Zhang, Shuaishuai .
PEERJ COMPUTER SCIENCE, 2023, 9
[35]   Minimal Delay Violation-Based Cross-Layer Scheduler and Resource Allocation for DSL Networks [J].
Van den Eynde, Jeremy ;
Verdyck, Jeroen ;
Blondia, Chris ;
Moonen, Marc .
IEEE ACCESS, 2021, 9 :75905-75922
[36]   A Reliable Physical Layer Key Generation Scheme Based on RSS and LSTM Network in VANET [J].
Wang, Zhihua ;
Liu, Yu ;
Wang, Jiarui ;
Li, Zeminghui ;
Li, Zhenyu ;
Yang, Xiaolong ;
Qi, Fazhi ;
Jia, Hongyong .
IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (01) :692-707
[37]   Security Technology of Unmanned Cluster Communication Network Based on Physical Layer Key Generation Technology [J].
Liu, Hongbo .
SECURITY AND PRIVACY, 2025, 8 (04)
[38]   Research on the Security System of Cooperation for Wireless Sensor Networks Based on Cross Layer Design [J].
Tian, Li-Wei ;
Sun, Yu .
INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND COMMUNICATION ENGINEERING (CSCE 2015), 2015, :1121-1126
[39]   Cross-Layer Management Framework for Enhancing XR-Based System Security in Zero-Trust Wireless Communications [J].
Ghourab, Esraa M. ;
Azab, Mohamed ;
Gracanin, Denis ;
Al-Qutayri, Mahmoud ;
Muhaidat, Sami .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2025, 43 (06) :2011-2024
[40]   Dynamic coefficient symmetric polynomial-based secure key management scheme for Internet of Things (IoT) networks [J].
Liu, Zhongya ;
Luo, Yunxiao .
PEERJ COMPUTER SCIENCE, 2023, 9