Pilot Randomization to Protect MIMO Secret Key Generation Systems Against Injection Attacks

被引:2
|
作者
Pham, Thuy M. [1 ]
Mitev, Miroslav [1 ]
Chorti, Arsenia [1 ,2 ]
Fettweis, Gerhard P. [1 ,3 ]
机构
[1] Barkhausen Inst gGmbH, Wireless Connect Grp, D-01187 Dresden, Germany
[2] CY Paris Cergy Univ, ETIS UMR 8051, ENSEA, CNRS, F-95011 Cergy, France
[3] Tech Univ, Vodafone Chair Mobile Commun Syst, D-01187 Dresden, Germany
关键词
Secret key generation; jamming attack; injection attack; randomization; MIMO;
D O I
10.1109/LWC.2023.3268714
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this letter, we investigate the problem of secret key generation under an injection attack, which refers to tampering of pilot signals over the air so that part of the shared randomness observed at the legitimate parties is controlled by the adversary. It has been shown that to launch such an attack, an adversary only needs one extra antenna, compared to the legitimate parties, in a single input single output (SISO) network. In this letter, we generalize this result for the multiple input multiple output (MIMO) case. Furthermore, we propose pilot randomization as a means to protect against injection attacks by reducing them to jamming attacks that constitute a less serious threat. Finally, we derive a closed-form expression for the secret key rate of the investigated MIMO setting.
引用
收藏
页码:1234 / 1238
页数:5
相关论文
共 50 条
  • [21] Secret Key Generation With Intelligent Reflecting Surface Under the Pilot Contamination Attack
    Xia, Enjun
    Hu, Bin-Jie
    Shen, Qiaoqiao
    IEEE WIRELESS COMMUNICATIONS LETTERS, 2024, 13 (01) : 213 - 217
  • [22] Pairwise Physical Layer Secret Key Generation for FDD Systems
    Olyaei Torshizi, Ehsan
    Henkel, Werner
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 9518 - 9533
  • [23] Secret Key Attaches in MIMO IoT Communications by Using Self-injection Artificial Noise
    Tang, Jie
    Xu, Aidong
    Jiang, Yixin
    Zhang, Yunan
    Wen, Hong
    Zhang, Tengyue
    PROCEEDINGS OF 2020 IEEE INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND INFORMATION SYSTEMS (ICAIIS), 2020, : 225 - 229
  • [24] Authenticated secret key generation in delay-constrained wireless systems
    Mitev, Miroslav
    Chorti, Arsenia
    Reed, Martin
    Musavian, Leila
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2020, 2020 (01)
  • [25] Constructing Reciprocal Channel Coefficients for Secret Key Generation in FDD Systems
    Li, Guyue
    Hu, Aiqun
    Sun, Chen
    Zhang, Junqing
    IEEE COMMUNICATIONS LETTERS, 2018, 22 (12) : 2487 - 2490
  • [26] A Novel Algorithm for Secret Key Generation in Passive Backscatter Communication Systems
    Chinaei, Mohammad Hossein
    Ostry, Diethelm
    Sivaraman, Vijay
    CRYPTOLOGY AND NETWORK SECURITY (CANS 2017), 2018, 11261 : 436 - 455
  • [27] Authenticated secret key generation in delay-constrained wireless systems
    Miroslav Mitev
    Arsenia Chorti
    Martin Reed
    Leila Musavian
    EURASIP Journal on Wireless Communications and Networking, 2020
  • [28] Secret key generation based on private pilot under man-in-the-middle attack
    Yu Huang
    Liang Jin
    Na Li
    Zhou Zhong
    Xiaoming Xu
    Science China Information Sciences, 2017, 60
  • [29] Secret key generation based on private pilot under man-in-the-middle attack
    Huang, Yu
    Jin, Liang
    Li, Na
    Zhong, Zhou
    Xu, Xiaoming
    SCIENCE CHINA-INFORMATION SCIENCES, 2017, 60 (10)
  • [30] Secret key generation based on private pilot under man-in-the-middle attack
    Yu HUANG
    Liang JIN
    Na LI
    Zhou ZHONG
    Xiaoming XU
    Science China(Information Sciences), 2017, 60 (10) : 93 - 106