A Novel Physical Layer Secret Key Generation Method for Wireless Sensor Networks

被引:0
作者
Aygul, Mehmet Ali [1 ,2 ]
Cirpan, Hakan Ali [1 ]
Arslan, Huseyin [3 ]
机构
[1] Istanbul Tech Univ, Dept Elect & Commun Engn, TR-34467 Istanbul, Turkiye
[2] Vestel, Dept Res & Dev, TR-45030 Manisa, Turkiye
[3] Istanbul Medipol Univ, Dept Elect & Elect Engn, TR-34810 Istanbul, Turkiye
来源
2024 IEEE INTERNATIONAL BLACK SEA CONFERENCE ON COMMUNICATIONS AND NETWORKING, BLACKSEACOM 2024 | 2024年
关键词
Eavesdropping; physical layer security; secret key generation; TDD; wireless sensor networks; AGREEMENT;
D O I
10.1109/BLACKSEACOM61746.2024.10646260
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Wireless sensor networks are indispensable across various applications, from environmental surveillance to industrial automation, owing to their ability to collect and transmit data autonomously. However, due to the broadcast nature of wireless systems, these systems are vulnerable to eavesdropping attacks. Recently, channel-based secret key generation methods have been widely used in the literature. In these methods, Alice and Bob generate random signals and share these signals with each other. Then, using the secret key paired multiplication with the channel between them, a secret key is shared between legitimate users, while illegitimate nodes cannot access the key. However, these methods consider only two users. This paper proposes a novel method for multiple users. Extensive simulation proves the effectiveness of the proposed method. However, when the number of users increases, the performance of the proposed method decreases.
引用
收藏
页码:231 / 235
页数:5
相关论文
共 22 条
[1]   Survey on the Characterization and Classification of Wireless Sensor Network Applications [J].
Borges, Luis M. ;
Velez, Fernando J. ;
Lebres, Antonio S. .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (04) :1860-1890
[2]   Classifications and Applications of Physical Layer Security Techniques for Confidentiality: A Comprehensive Survey [J].
Hamamreh, Jehad M. ;
Furqan, Haji M. ;
Arslan, Huseyin .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (02) :1773-1828
[3]   Secret Key Generation With Cross Multiplication of Two-Way Random Signals [J].
Jin, Liang ;
Zhang, Shengjun ;
Lou, Yangming ;
Xu, Xiaoming ;
Zhong, Zhou .
IEEE ACCESS, 2019, 7 :113065-113080
[4]   Secret-Key Agreement Over Non-Coherent Block-Fading Channels With Public Discussion [J].
Khisti, Ashish .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2016, 62 (12) :7164-7178
[5]  
Li GY, 2017, IEEE GLOB COMM CONF
[6]  
Liu HB, 2013, IEEE INFOCOM SER, P3048
[7]  
[楼洋明 Lou Yangming], 2017, [中国科学. 信息科学, Scientia Sinica Informationis], V47, P362
[8]  
Luo H., 2023, IEEE J. Sel. Areas Commun.
[9]   A Novel Physical Layer Secure Key Generation and Refreshment Scheme for Wireless Sensor Networks [J].
Moara-Nkwe, Kemedi ;
Shi, Qi ;
Lee, Gyu Myoung ;
Eiza, Mahmoud Hasem .
IEEE ACCESS, 2018, 6 :11374-11387
[10]   Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey [J].
Mukherjee, Amitav ;
Fakoorian, S. Ali A. ;
Huang, Jing ;
Swindlehurst, A. Lee .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (03) :1550-1573