Protecting Secret Key Generation Systems Against Jamming: Energy Harvesting and Channel Hopping Approaches

被引:26
|
作者
Belmega, E. Veronica [1 ]
Chorti, Arsenia [2 ]
机构
[1] Univ Cergy Pointoise, CNRS, ENSEA, Univ Paris Seine,ETIS,UMR 8051, Cergy, France
[2] Univ Essex, Sch Comp Sci & Elect Engn, Colchester CO4 3SQ, Essex, England
关键词
Secret key generation; jamming; energy harvesting; channel hopping; zero-sum game; PHYSICAL LAYER SECURITY; PRIVACY AMPLIFICATION; INFORMATION-THEORY; COMMON RANDOMNESS; ACTIVE ADVERSARY; STACKELBERG GAME; CRYPTOGRAPHY; AGREEMENT; NETWORKS; CAPACITY;
D O I
10.1109/TIFS.2017.2713342
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Jamming attacks represent a critical vulnerability for wireless secret key generation (SKG) systems. In this paper, two counter-jamming approaches are investigated for SKG systems: first, the employment of energy harvesting (EH) at the legitimate nodes to turn part of the jamming power into useful communication power, and, second, the use of channel hopping or power spreading in block fading channels to reduce the impact of jamming. In both cases, the adversarial interaction between the pair of legitimate nodes and the jammer is formulated as a two-player zero-sum game and the Nash and Stackelberg equilibria are characterized analytically and in closed form. In particular, in the case of EH receivers, the existence of a critical transmission power for the legitimate nodes allows the full characterization of the game's equilibria and also enables the complete neutralization of the jammer. In the case of channel hopping versus power spreading techniques, it is shown that the jammer's optimal strategy is always power spreading while the legitimate nodes should only use power spreading in the high signal-to-interference ratio (SIR) regime. In the low SIR regime, when avoiding the jammer's interference becomes critical, channel hopping is optimal for the legitimate nodes. Numerical results demonstrate the efficiency of both counter-jamming measures.
引用
收藏
页码:2611 / 2626
页数:16
相关论文
共 50 条
  • [21] On Pre-Processing of Generalized Gamma Fading Channel Samples for Secret Key Generation
    Hussain, Ghalib
    Nawaz, Syed Junaid
    Wyne, Shurjeel
    Cianca, Ernestina
    de Sanctis, Mauro
    IEEE ACCESS, 2024, 12 : 138857 - 138869
  • [22] Vector Quantization and Clustered Key Mapping for Channel-Based Secret Key Generation
    Hong, Y. -W. Peter
    Huang, Lin-Ming
    Li, Hou-Tung
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (05) : 1170 - 1181
  • [23] A Probing Model of Secret Key Generation Based on Channel Autocorrelation Function
    Xia, Enjun
    Hu, Binjie
    Shen, Qiaoqiao
    CHINA COMMUNICATIONS, 2024, 21 (06) : 163 - 175
  • [24] Online joint power control for cooperative jamming systems with energy harvesting
    Lei, Weijia
    Wang, Ziwei
    Lei, Hongjiang
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2019, 15 (11)
  • [25] Secret Key Generation Over Multi-Mode Fiber: Channel Measurements, Key Rate Analysis, and System Implementation
    Lin, Pin-Hsun
    Nowitzki, Paul
    Jorswieck, Eduard A.
    Pohle, Dennis
    Czarske, Juergen
    IEEE OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY, 2025, 6 : 3221 - 3235
  • [26] Secret Key Generation Scheme Based on the Channel Covariance Matrix Eigenvalues in FDD Systems
    Liu, Boqian
    Hu, Aiqun
    Li, Guyue
    IEEE COMMUNICATIONS LETTERS, 2019, 23 (09) : 1493 - 1496
  • [27] A Countermeasure Against RIS Jamming Attack in Physical-Layer Key Generation
    Wan, Zheng
    Hu, Xiaoyan
    Sun, Xiaoli
    Xu, Xiaoming
    Huang, Kaizhi
    Jin, Liang
    IEEE WIRELESS COMMUNICATIONS LETTERS, 2023, 12 (12) : 2193 - 2197
  • [28] Pilot Randomization to Protect MIMO Secret Key Generation Systems Against Injection Attacks
    Pham, Thuy M.
    Mitev, Miroslav
    Chorti, Arsenia
    Fettweis, Gerhard P.
    IEEE WIRELESS COMMUNICATIONS LETTERS, 2023, 12 (07) : 1234 - 1238
  • [29] Channel Reciprocity Improvement of Secret Key Generation with Loop-back Transmissions
    Peng, Linning
    Li, Guyue
    Hu, Aiqun
    2017 17TH IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT 2017), 2017, : 193 - 198
  • [30] The Optimal Preprocessing Approach for Secret Key Generation from OFDM Channel Measurements
    Li, Guyue
    Hu, Aiqun
    Peng, Linning
    Sun, Chen
    2016 IEEE GLOBECOM WORKSHOPS (GC WKSHPS), 2016,