A Novel Physical Layer Secure Key Generation and Refreshment Scheme for Wireless Sensor Networks

被引:51
|
作者
Moara-Nkwe, Kemedi [1 ]
Shi, Qi [1 ]
Lee, Gyu Myoung [1 ]
Eiza, Mahmoud Hasem [2 ]
机构
[1] Liverpool John Moores Univ, Dept Comp Sci, Liverpool L3 3AF, Merseyside, England
[2] Univ Cent Lancashire, Sch Phys Sci & Comp, Preston PR1 2HE, Lancs, England
来源
IEEE ACCESS | 2018年 / 6卷
关键词
Key refreshment; physical layer security; secure key generation; wireless sensor networks;
D O I
10.1109/ACCESS.2018.2806423
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Physical layer secure key generation (PL-SKG) schemes have received a lot of attention from the wireless security community in recent years because of the potential benefits that they could bring to the security landscape. These schemes aim to strengthen current security protocols by reducing the amount of key material that devices need for deployment. They do this by harnessing the common source of randomness provided by the wireless channel that the physical layer is communicating over. This is of particular importance in wireless sensor networks (WSNs) where resources are particularly scarce and where issues, such as key revocation and recovery make the design of efficient key management schemes extremely difficult. This paper discusses the issues and challenges encountered in the design and implementation of PL-SKG schemes on off-the-shelf WSNs. It then proposes a novel key generation scheme that takes advantage of both the power and simplicity of classic error correcting codes and also the diversity of frequency channels available on 802.15.4 compliant nodes to generate keys from received signal strength readings. This paper shows that our key generation and refreshment scheme can achieve a near 100% key reconciliation rate whilst also providing perfect forward and backward security.
引用
收藏
页码:11374 / 11387
页数:14
相关论文
共 50 条
  • [31] A Novel Secure Authenticated Key Exchange Protocol for Wireless Sensor Networks
    Barakat, Tamer
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2012, 12 (12): : 136 - 140
  • [32] Unleashing the secure potential of the wireless physical layer: Secret key generation methods
    Badawy, Ahmed
    Elfouly, Tarek
    Khattab, Tamer
    Mohamed, Amr
    Guizani, Mohsen
    PHYSICAL COMMUNICATION, 2016, 19 : 1 - 10
  • [33] A Secure Multicast Scheme for Wireless Sensor Networks
    Yu, Qian
    Zhang, Chang N.
    2012 THIRD FTRA INTERNATIONAL CONFERENCE ON MOBILE, UBIQUITOUS, AND INTELLIGENT COMPUTING (MUSIC), 2012, : 158 - 163
  • [34] An Efficient Secure scheme for Wireless Sensor Networks
    Elleuchi, Manel
    Cheikhrouhou, Omar
    Obeid, Abdulfattah M.
    Abid, Mohamed
    SECURITY OF INFORMATION AND NETWORKS (SIN'16), 2016, : 128 - 131
  • [35] Secure Key Distribution in Wireless Sensor Networks
    Umadevi, K. S.
    Ghosh, Arijit
    Menon, Anurag
    Nanaware, Mandar
    ADVANCED SCIENCE LETTERS, 2018, 24 (08) : 6013 - 6016
  • [36] Secure Localization for Wireless Sensor Networks Using Decentralized Dynamic Key Generation
    Merhi, Zaher
    Haj-Ali, Amin
    Abdul-Nabi, Samih
    Bayoumi, Magdy
    2012 8TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2012, : 543 - 548
  • [37] An attack model based highly secure key management scheme for wireless sensor networks
    Ahlawat, Priyanka
    Dave, Mayank
    6TH INTERNATIONAL CONFERENCE ON SMART COMPUTING AND COMMUNICATIONS, 2018, 125 : 201 - 207
  • [38] Hybrid secure random key pre-distribution scheme for wireless sensor networks
    Barakat, Tamer M.
    Gody, Amr M.
    2007 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS: ICCES '07, 2007, : 151 - +
  • [39] A survey on secret key generation mechanisms on the physical layer in wireless networks
    Shehadeh, Youssef El Hajj
    Hogrefe, Dieter
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (02) : 332 - 341
  • [40] Designing secure and reliable wireless sensor networks under a pairwise key predistribution scheme
    Yavuz, Faruk
    Zhao, Jun
    Yagan, Osman
    Gligor, Virgil
    2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2015, : 6277 - 6283