A review and implementation of physical layer channel key generation in the Internet of Things

被引:0
作者
Zhao, Hong [1 ]
Guo, Enting [1 ]
Lian, Zhuotao [4 ]
Zhao, Yong [2 ]
Huang, Xinyi [3 ]
Su, Chunhua [1 ]
机构
[1] Univ Aizu, Aizu Wakamatsu, Fukushima, Japan
[2] Putian Univ, Fujian Key Lab Financial Informat Proc, Putian, Peoples R China
[3] Jinan Univ, Coll Cyber Secur, Guangzhou, Peoples R China
[4] Kyushu Univ, Fukuoka, Japan
关键词
Internet of Things; Physical Layer Security; Channel Key; Channel Key Generation System; SECRET KEY; WIRELESS NETWORKS; FUZZY EXTRACTORS; SECURITY; AUTHENTICATION; INFORMATION; MIMO; ESTABLISHMENT; RECIPROCITY; AGREEMENT;
D O I
10.1016/j.jisa.2024.103779
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Physical layer channel key generation is a promising technology for secure communication in wireless network security, which mainly establishes secure communication keys between any two legitimate users. This article reviews current techniques for physical layer channel key generation. The physical layer channel key generation principle, system model, attack model, key generation process, and experimental application are comprehensively reviewed. In addition, we introduce the experimental scenarios of key generation and the collection methods of channel measurements in wireless applications and simulation platforms and summarize the experimental equipment configuration and actual operation in the process of collecting different measurements. The article concludes with some suggestions for future research.
引用
收藏
页数:17
相关论文
共 105 条
  • [1] A Secret Key Extraction Technique Applied in Vehicular Networks
    Abdelgader, Abdeldime M. S.
    Wu, Lenan
    [J]. 2014 IEEE 17TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE), 2014, : 1396 - 1403
  • [2] Physical Layer Secret Key Generation in Static Environments
    Aldaghri, Nasser
    Mahdavifar, Hessam
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 : 2692 - 2705
  • [3] Eliminating Reconciliation Cost in Secret Key Generation for Body-Worn Health Monitoring Devices
    Ali, Syed Taha
    Sivaraman, Vijay
    Ostry, Diethelm
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2014, 13 (12) : 2763 - 2776
  • [4] Ambekar A, 2012, P IEEE INT S SIGN SY, P1
  • [5] Peer-to-peer overlay techniques for vehicular ad hoc networks: Survey and challenges
    Ameur, Abdelkader Ilyes
    Lakas, Abderrahmane
    Yagoubi, Mohamed Bachir
    Oubbati, Omar Sami
    [J]. VEHICULAR COMMUNICATIONS, 2022, 34
  • [6] Robust Key Generation from Signal Envelopes in Wireless Networks
    Azimi-Sadjadi, Babak
    Kiayias, Aggelos
    Mercado, Alejandra
    Yener, Bulent
    [J]. CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2007, : 401 - +
  • [7] Generalized privacy amplification
    Bennett, CH
    Brassard, G
    Crepeau, C
    Maurer, UM
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1995, 41 (06) : 1915 - 1923
  • [8] Wireless information-theoretic security
    Bloch, Matthieu
    Barros, Joao
    Rodrigues, Miguel R. D.
    McLaughlin, Steven W.
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (06) : 2515 - 2534
  • [9] Boeira F, 2017, IEEE VEHIC NETW CONF, P53, DOI 10.1109/VNC.2017.8275641
  • [10] Brassard G., 1993, WORKSHOP THEORY APPL, P410, DOI 10.1007/3-540-48285-7_35