Protecting Secret Key Generation Systems Against Jamming: Energy Harvesting and Channel Hopping Approaches

被引:26
|
作者
Belmega, E. Veronica [1 ]
Chorti, Arsenia [2 ]
机构
[1] Univ Cergy Pointoise, CNRS, ENSEA, Univ Paris Seine,ETIS,UMR 8051, Cergy, France
[2] Univ Essex, Sch Comp Sci & Elect Engn, Colchester CO4 3SQ, Essex, England
关键词
Secret key generation; jamming; energy harvesting; channel hopping; zero-sum game; PHYSICAL LAYER SECURITY; PRIVACY AMPLIFICATION; INFORMATION-THEORY; COMMON RANDOMNESS; ACTIVE ADVERSARY; STACKELBERG GAME; CRYPTOGRAPHY; AGREEMENT; NETWORKS; CAPACITY;
D O I
10.1109/TIFS.2017.2713342
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Jamming attacks represent a critical vulnerability for wireless secret key generation (SKG) systems. In this paper, two counter-jamming approaches are investigated for SKG systems: first, the employment of energy harvesting (EH) at the legitimate nodes to turn part of the jamming power into useful communication power, and, second, the use of channel hopping or power spreading in block fading channels to reduce the impact of jamming. In both cases, the adversarial interaction between the pair of legitimate nodes and the jammer is formulated as a two-player zero-sum game and the Nash and Stackelberg equilibria are characterized analytically and in closed form. In particular, in the case of EH receivers, the existence of a critical transmission power for the legitimate nodes allows the full characterization of the game's equilibria and also enables the complete neutralization of the jammer. In the case of channel hopping versus power spreading techniques, it is shown that the jammer's optimal strategy is always power spreading while the legitimate nodes should only use power spreading in the high signal-to-interference ratio (SIR) regime. In the low SIR regime, when avoiding the jammer's interference becomes critical, channel hopping is optimal for the legitimate nodes. Numerical results demonstrate the efficiency of both counter-jamming measures.
引用
收藏
页码:2611 / 2626
页数:16
相关论文
共 50 条
  • [1] Energy Harvesting in Secret Key Generation Systems under Jamming Attacks
    Belmega, E. Veronica
    Chorti, Arsenia
    2017 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2017,
  • [2] Jamming-Resistant Frequency Hopping System with Secret Key Generation from Channel Observations
    Liu, Chia-Yu
    Hong, Y. -W. Peter
    Lin, Pim-Hsun
    Jorswieck, Eduard A.
    2016 IEEE INFORMATION THEORY WORKSHOP (ITW), 2016,
  • [3] Secret Key Generation Using Channel Quantization with SVD for Reciprocal MIMO Channels
    Furqan, Haji M.
    Hamamreh, Jehad M.
    Arslan, Huseyin
    2016 13TH INTERNATIONAL SYMPOSIUM ON WIRELESS COMMUNICATION SYSTEMS (ISWCS), 2016, : 597 - 602
  • [4] Secret-Key Generation with Arbitrarily Varying Eavesdropper's Channel
    Chou, Remi A.
    Bloch, Matthieu R.
    2013 IEEE GLOBAL CONFERENCE ON SIGNAL AND INFORMATION PROCESSING (GLOBALSIP), 2013, : 277 - 280
  • [5] An Investigation of Using Loop-Back Mechanism for Channel Reciprocity Enhancement in Secret Key Generation
    Peng, Linning
    Li, Guyue
    Zhang, Junqing
    Woods, Roger
    Liu, Ming
    Hu, Aiqun
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2019, 18 (03) : 507 - 519
  • [6] Protecting Physical Layer Secret Key Generation from Active Attacks
    Mitev, Miroslav
    Chorti, Arsenia
    Belmega, E. Veronica
    Poor, H. Vincent
    ENTROPY, 2021, 23 (08)
  • [7] Constructing Reciprocal Channel Coefficients for Secret Key Generation in FDD Systems
    Li, Guyue
    Hu, Aiqun
    Sun, Chen
    Zhang, Junqing
    IEEE COMMUNICATIONS LETTERS, 2018, 22 (12) : 2487 - 2490
  • [8] Channel Secondary Random Process for Robust Secret Key Generation
    Badawy, Ahmed
    Khattab, Tamer
    ElFouly, Tarek
    Chiasserini, Carla-Fabiana
    Mohamed, Amr
    Trinchero, Daniele
    2015 INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2015, : 114 - 119
  • [9] Secret Key Generation in MIMO Wireless Systems Using Precoded Channel Measurements
    Baksi, Saygin
    Popescu, Dimitrie C.
    2017 IEEE 28TH ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR, AND MOBILE RADIO COMMUNICATIONS (PIMRC), 2017,
  • [10] RIS-Jamming: Breaking Key Consistency in Channel Reciprocity-Based Key Generation
    Li, Guyue
    Staat, Paul
    Li, Haoyu
    Heinrichs, Markus
    Zenger, Christian
    Kronberger, Rainer
    Elders-Boll, Harald
    Paar, Christof
    Hu, Aiqun
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 5090 - 5105