A New Frontier for IoT Security Emerging From Three Decades of Key Generation Relying on Wireless Channels

被引:85
作者
Zhang, Junqing [1 ]
Li, Guyue [2 ,4 ]
Marshall, Alan [1 ]
Hu, Aiqun [3 ,4 ]
Hanzo, Lajos [5 ]
机构
[1] Univ Liverpool, Dept Elect Engn & Elect, Liverpool L69 3GJ, Merseyside, England
[2] Southeast Univ, Sch Cyber Sci & Engn, Nanjing 210096, Peoples R China
[3] Southeast Univ, Natl Mobile Commun Res Lab, Nanjing 210096, Peoples R China
[4] Purple Mt Labs Network & Commun Secur, Nanjing 210096, Peoples R China
[5] Univ Southampton, Sch Elect & Comp Sci, Southampton SO17 1BJ, Hants, England
基金
英国工程与自然科学研究理事会; 欧洲研究理事会; 中国国家自然科学基金;
关键词
Encryption; Communication system security; Wireless communication; Internet of Things; Protocols; wireless security; physical layer security; key generation; PHYSICAL-LAYER SECURITY; BODY AREA NETWORKS; SECRET-KEY; FULL-DUPLEX; INFORMATION RECONCILIATION; COMMON-RANDOMNESS; SENSOR NETWORKS; LOW-ENERGY; AGREEMENT; ESTABLISHMENT;
D O I
10.1109/ACCESS.2020.3012006
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) is a transformative technology, which is revolutionizing our everyday life by connecting everyone and everything together. The massive number of devices are preferably connected wirelessly because of the easy installment and flexible deployment. However, the broadcast nature of the wireless medium makes the information accessible to everyone including malicious users, which should hence be protected by encryption. Unfortunately, the secure and efficient provision of cryptographic keys for low-cost IoT devices is challenging; weak keys have resulted in severe security breaches, as evidenced by numerous notorious cyberattacks. This paper provides a comprehensive survey of lightweight security solutions conceived for IoT, relying on key generation from wireless channels. We first introduce the key generation fundamentals and protocols. We then examine how to apply this emerging technique to secure IoT and demonstrate that key generation relying on the randomness of wireless channels is eminently suitable for IoT. This paper reviews the extensive research efforts in the areas of theoretical modelling, simulation based validation and experimental exploration. We finally discuss the hurdles and challenges that key generation is facing and suggest future work to make key generation a reliable and secure solution to safeguard the IoT.
引用
收藏
页码:138406 / 138446
页数:41
相关论文
共 283 条
  • [61] Gast M., 2005, 802.11 Wireless Networks: the Definitive Guide
  • [62] Guaranteeing secrecy using artificial noise
    Goel, Satashu
    Negi, Rohit
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2008, 7 (06) : 2180 - 2189
  • [63] Goldberg S. J., 2013, U.S. Patent, Patent No. [8 401 196 B2, 8401196]
  • [64] Goldsmith A., 2005, WIRELESS COMMUN
  • [65] Gollakota S, 2011, IEEE INFOCOM SER, P1125, DOI 10.1109/INFCOM.2011.5934889
  • [66] Overview and Evaluation of Bluetooth Low Energy: An Emerging Low-Power Wireless Technology
    Gomez, Carles
    Oller, Joaquim
    Paradells, Josep
    [J]. SENSORS, 2012, 12 (09): : 11734 - 11753
  • [67] Gopinath S, 2014, IEEE GLOBE WORK, P1367, DOI 10.1109/GLOCOMW.2014.7063624
  • [68] Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues
    Granjal, Jorge
    Monteiro, Edmundo
    Silva, Jorge Sa
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (03): : 1294 - 1312
  • [69] Grau A., 2015, BUILD SAFER INTERNET
  • [70] Guillaume R., 2014, P 18 INT OFDM WORKSH, P1