Physical Layer Key Generation between Backscatter Devices over Ambient RF Signals

被引:8
作者
Wang, Pu [1 ]
Jiao, Long [2 ]
Zeng, Kai [2 ]
Yan, Zheng [1 ,3 ]
机构
[1] Xidian Univ, Sch Cyber Engn, Xian 710071, Peoples R China
[2] George Mason Univ, Dept Elect & Comp Engn, Fairfax, VA 22030 USA
[3] Aalto Univ, Dept Comnet, Espoo 02150, Finland
来源
IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2021) | 2021年
基金
中国国家自然科学基金; 芬兰科学院;
关键词
WIRELESS; CRYPTOGRAPHY; PROTOCOLS; SECURITY;
D O I
10.1109/INFOCOM42981.2021.9488885
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Ambient backscatter communication (AmBC), which enables energy harvesting and ultra-low-power communication by utilizing ambient radio frequency (RF) signals, has emerged as a cutting-edge technology to realize numerous Internet of Things (IoT) applications. However, the current literature lacks efficient secret key sharing solutions for resource-limited devices in AmBC systems to protect the backscatter communications, especially for private data transmission. Thus, we propose a novel physical layer key generation scheme between backscatter devices (BDs) by exploiting received superposed ambient signals. Based on the repeated patterns (i.e., cyclic prefix in OFDM symbols) in ambient RF signals, we present a joint transceiver design of BD backscatter waveform and BD receiver to extract the downlink signal and the backscatter signal from the superposed signals. By multiplying the downlink signal and the backscatter signal, we can actually obtain the triangle channel information as a shared random secret source for key generation. Besides, we study the trade-off between the rate of secret key generation and harvested energy by modeling it as a joint optimization problem. Finally, extensive numerical simulations are provided to evaluate the key generation performance, energy harvesting performance, and their trade-offs under various system settings.
引用
收藏
页数:10
相关论文
共 36 条
  • [1] COMMON RANDOMNESS IN INFORMATION-THEORY AND CRYPTOGRAPHY .1. SECRET SHARING
    AHLSWEDE, R
    CSISZAR, I
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1993, 39 (04) : 1121 - 1132
  • [2] Space Time Coding for Backscatter RFID
    Boyer, Colby
    Roy, Sumit
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2013, 12 (05) : 2272 - 2280
  • [3] Chae H.-J, 2013, MAXIMALIST CRYPTOGRA, P175
  • [4] Secret Group-Key Generation at Physical Layer for Multi-Antenna Mesh Topology
    Chan Dai Truyen Thai
    Lee, Jemin
    Prakash, Jay
    Quek, Tony Q. S.
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (01) : 18 - 33
  • [5] Lightweight Anonymous Authentication Protocols for RFID Systems
    Chen, Min
    Chen, Shigang
    Fang, Yuguang
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2017, 25 (03) : 1475 - 1488
  • [6] Cho Y., 2010, MIMO OFDMWIRELESS CO
  • [7] Secret Key Generation from Sparse Wireless Channels: Ergodic Capacity and Secrecy Outage
    Chou, Tzu-Han
    Draper, Stark C.
    Sayeed, Akbar M.
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2013, 31 (09) : 1751 - 1764
  • [8] Cryptanalysis of two lightweight RFID authentication schemes
    Defend, Benessa
    Fu, Kevin
    Juels, Ari
    [J]. FIFTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, 2007, : 211 - +
  • [9] Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    Dodis, Yevgeniy
    Ostrovsky, Rafail
    Reyzin, Leonid
    Smith, Adam
    [J]. SIAM JOURNAL ON COMPUTING, 2008, 38 (01) : 97 - 139
  • [10] A survey of lightweight-cryptography implementations
    Eisenbarth, Thomas
    Kumar, Sandeep
    Paar, Christof
    Poschmann, Axel
    Uhsadel, Leif
    [J]. IEEE DESIGN & TEST OF COMPUTERS, 2007, 24 (06): : 522 - 533