A DWT-Based PHY Key Generation Scheme for the Cross-Layer Security in IoT Networks

被引:2
作者
Liu, Fangfang [1 ]
Liu, Yueyi [1 ]
An, Wei [1 ]
Li, Xiaona [2 ]
机构
[1] Beijing Univ Posts & Telecommun, Sch Informat & Commun Engn, Beijing 100876, Peoples R China
[2] Chinese Acad Sci, Inst Informat Engn, Beijing 100093, Peoples R China
基金
中国国家自然科学基金;
关键词
Security; Discrete wavelet transforms; Channel estimation; Privacy; Law; Delays; Base stations; Cross PHY/MAC layer security; key generation; access security; random access procedure; HANDOVER AUTHENTICATION; PRIVACY; ACCESS;
D O I
10.1109/LCOMM.2024.3381179
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
In this letter, a novel cross physical layer (PHY)/medium access control (MAC) layer security scheme is proposed, where PHY key generated based on channel information is introduced into the random access procedure to protect the security of wireless communications from the very outset. To ensure the accessing rate of legal user, high key generation rate (KGR) and low key disagreement rate (KDR) are critical. We first utilize instantaneous channel information of demodulation reference signal to rapidly generate key without frequently information exchanging in PHY. Then, to reduce the inconsistency of the generated PHY key caused by high-frequency noise, discrete wavelet transform is used to decrease the KDR. Furthermore, the theoretical KGR upper bound of the proposed scheme is derived from the aspect of information theory. Finally, the proposed scheme is verified in OpenAirInterface platform. Simulation results show that the proposed scheme has the high accessing rate of legal user and low-delay, which effectively protects the random access procedure from unauthorized user.
引用
收藏
页码:1258 / 1262
页数:5
相关论文
共 46 条
[41]   Dynamic coefficient symmetric polynomial-based secure key management scheme for Internet of Things (IoT) networks [J].
Liu Z. ;
Luo Y. .
PeerJ Computer Science, 2023, 9
[42]   Stochastic game-based cross-layer defense scheme for jamming-resistant virtual coupled train sets [J].
Ma, Shuomei ;
Qi, Xiaozhi ;
Lou, Zhijiang ;
Wang, Hongwei ;
Zhu, Li ;
Gong, Taiyuan ;
Li, Yang ;
Dong, Hairong .
TRANSPORTATION RESEARCH PART C-EMERGING TECHNOLOGIES, 2025, 174
[43]   Security-driven Cross-Layer Model & Description of a HW/SW Framework for AP MPSoC-based Computing Device [J].
Silitonga, Arthur ;
Becker, Juergen .
2020 14TH ANNUAL IEEE INTERNATIONAL SYSTEMS CONFERENCE (SYSCON2020), 2020,
[44]   A plaintext-related image encryption scheme based on key generation using generative adversarial networks [J].
Zhang R. ;
Kang X. ;
Lu Q. ;
Miao Y. ;
Chen Y. .
Multimedia Tools and Applications, 2025, 84 (10) :6873-6897
[45]   An anti-collusion attack defense method for physical layer key generation scheme based on transmission delay [J].
Wang X. ;
Huang J. ;
Qi C. ;
Peng Y. ;
Zhang S. .
PeerJ Computer Science, 2023, 9
[46]   Secret Key Generation Driven by Attention-Based Convolutional Autoencoder and Quantile Quantization for IoT Security in 5G and Beyond [J].
Alashqar, Anas ;
Torshizi, Ehsan Olyaei ;
Mesleh, Raed ;
Henkel, Werner .
IEEE ACCESS, 2025, 13 :131744-131756