A New Frontier for IoT Security Emerging From Three Decades of Key Generation Relying on Wireless Channels

被引:85
作者
Zhang, Junqing [1 ]
Li, Guyue [2 ,4 ]
Marshall, Alan [1 ]
Hu, Aiqun [3 ,4 ]
Hanzo, Lajos [5 ]
机构
[1] Univ Liverpool, Dept Elect Engn & Elect, Liverpool L69 3GJ, Merseyside, England
[2] Southeast Univ, Sch Cyber Sci & Engn, Nanjing 210096, Peoples R China
[3] Southeast Univ, Natl Mobile Commun Res Lab, Nanjing 210096, Peoples R China
[4] Purple Mt Labs Network & Commun Secur, Nanjing 210096, Peoples R China
[5] Univ Southampton, Sch Elect & Comp Sci, Southampton SO17 1BJ, Hants, England
基金
英国工程与自然科学研究理事会; 欧洲研究理事会; 中国国家自然科学基金;
关键词
Encryption; Communication system security; Wireless communication; Internet of Things; Protocols; wireless security; physical layer security; key generation; PHYSICAL-LAYER SECURITY; BODY AREA NETWORKS; SECRET-KEY; FULL-DUPLEX; INFORMATION RECONCILIATION; COMMON-RANDOMNESS; SENSOR NETWORKS; LOW-ENERGY; AGREEMENT; ESTABLISHMENT;
D O I
10.1109/ACCESS.2020.3012006
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) is a transformative technology, which is revolutionizing our everyday life by connecting everyone and everything together. The massive number of devices are preferably connected wirelessly because of the easy installment and flexible deployment. However, the broadcast nature of the wireless medium makes the information accessible to everyone including malicious users, which should hence be protected by encryption. Unfortunately, the secure and efficient provision of cryptographic keys for low-cost IoT devices is challenging; weak keys have resulted in severe security breaches, as evidenced by numerous notorious cyberattacks. This paper provides a comprehensive survey of lightweight security solutions conceived for IoT, relying on key generation from wireless channels. We first introduce the key generation fundamentals and protocols. We then examine how to apply this emerging technique to secure IoT and demonstrate that key generation relying on the randomness of wireless channels is eminently suitable for IoT. This paper reviews the extensive research efforts in the areas of theoretical modelling, simulation based validation and experimental exploration. We finally discuss the hurdles and challenges that key generation is facing and suggest future work to make key generation a reliable and secure solution to safeguard the IoT.
引用
收藏
页码:138406 / 138446
页数:41
相关论文
共 283 条
  • [41] SmokeGrenade: An Efficient Key Generation Protocol With Artificial Interference
    Chen, Dajiang
    Qin, Zhen
    Mao, Xufei
    Yang, Panlong
    Qin, Zhiguang
    Wang, Ruijin
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (11) : 1731 - 1745
  • [42] Secret Key Generation Rate With Power Allocation in Relay-Based LTE-A Networks
    Chen, Kan
    Natarajan, Balasubramaniam
    Shattil, Steve
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (11) : 2424 - 2434
  • [43] Detecting and Localizing Identity-Based Attacks in Wireless and Sensor Networks
    Chen, Yingying
    Yang, Jie
    Trappe, Wade
    Martin, Richard P.
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2010, 59 (05) : 2418 - 2434
  • [44] Securing the Internet of Things in a Quantum World
    Cheng, Chi
    Lu, Rongxing
    Petzoldt, Albrecht
    Takagi, Tsuyoshi
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2017, 55 (02) : 116 - 120
  • [45] Cho Y., 2010, MIMO OFDMWIRELESS CO
  • [46] On Physical-Layer Identification of Wireless Devices
    Danev, Boris
    Zanetti, Davide
    Capkun, Srdjan
    [J]. ACM COMPUTING SURVEYS, 2012, 45 (01)
  • [47] Das R, 2018, IEEE ICC
  • [48] Effects of Passive Negative Correlation Attack on Sensors Utilizing Physical Key Extraction in Indoor Wireless Body Area Networks
    Dautov, Ruslan
    Tsouri, Gill R.
    [J]. IEEE SENSORS LETTERS, 2019, 3 (07)
  • [49] NEW DIRECTIONS IN CRYPTOGRAPHY
    DIFFIE, W
    HELLMAN, ME
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) : 644 - 654
  • [50] Security-Reliability Tradeoff Analysis of Artificial Noise Aided Two-Way Opportunistic Relay Selection
    Ding, Xiaojin
    Song, Tiecheng
    Zou, Yulong
    Chen, Xiaoshu
    Hanzo, Lajos
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2017, 66 (05) : 3930 - 3941