Protecting Secret Key Generation Systems Against Jamming: Energy Harvesting and Channel Hopping Approaches

被引:26
|
作者
Belmega, E. Veronica [1 ]
Chorti, Arsenia [2 ]
机构
[1] Univ Cergy Pointoise, CNRS, ENSEA, Univ Paris Seine,ETIS,UMR 8051, Cergy, France
[2] Univ Essex, Sch Comp Sci & Elect Engn, Colchester CO4 3SQ, Essex, England
关键词
Secret key generation; jamming; energy harvesting; channel hopping; zero-sum game; PHYSICAL LAYER SECURITY; PRIVACY AMPLIFICATION; INFORMATION-THEORY; COMMON RANDOMNESS; ACTIVE ADVERSARY; STACKELBERG GAME; CRYPTOGRAPHY; AGREEMENT; NETWORKS; CAPACITY;
D O I
10.1109/TIFS.2017.2713342
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Jamming attacks represent a critical vulnerability for wireless secret key generation (SKG) systems. In this paper, two counter-jamming approaches are investigated for SKG systems: first, the employment of energy harvesting (EH) at the legitimate nodes to turn part of the jamming power into useful communication power, and, second, the use of channel hopping or power spreading in block fading channels to reduce the impact of jamming. In both cases, the adversarial interaction between the pair of legitimate nodes and the jammer is formulated as a two-player zero-sum game and the Nash and Stackelberg equilibria are characterized analytically and in closed form. In particular, in the case of EH receivers, the existence of a critical transmission power for the legitimate nodes allows the full characterization of the game's equilibria and also enables the complete neutralization of the jammer. In the case of channel hopping versus power spreading techniques, it is shown that the jammer's optimal strategy is always power spreading while the legitimate nodes should only use power spreading in the high signal-to-interference ratio (SIR) regime. In the low SIR regime, when avoiding the jammer's interference becomes critical, channel hopping is optimal for the legitimate nodes. Numerical results demonstrate the efficiency of both counter-jamming measures.
引用
收藏
页码:2611 / 2626
页数:16
相关论文
共 50 条
  • [41] AmpRmdr: Remainder-Based Secret Key Generation Using Wireless Channel Amplitude
    Sun, Chen
    Yang, Haiyu
    Li, Guyue
    IEEE ACCESS, 2020, 8 : 228178 - 228187
  • [42] On Channel Transforms to Enhance Reciprocity and Quantization in Physical-Layer Secret Key Generation
    Hussain, Ghalib
    Junaid Nawaz, Syed
    Wyne, Shurjeel
    Patwary, Mohammad N.
    IEEE ACCESS, 2025, 13 : 256 - 272
  • [43] Secret key generation for two-way amplify-and-forward relay channel
    Wei, Hao
    Zheng, Bao-Yu
    Hou, Xiao-Yun
    Ji, Xiao-Dong
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2013, 35 (06): : 1344 - 1350
  • [44] Experimental Channel-Based Secret Key Generation with Integrated Ultra Wideband Devices
    Bulenok, M.
    Tunaru, I.
    Biard, L.
    Denis, B.
    Uguen, B.
    2016 IEEE 27TH ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR, AND MOBILE RADIO COMMUNICATIONS (PIMRC), 2016, : 888 - 893
  • [45] A Channel Frequency Response-Based Secret Key Generation Scheme in In-band Full-duplex MIMO Systems
    Luo, Haifeng
    Garg, Navneet
    Ratnarajah, Tharmalingam
    ICC 2023-IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2023, : 5873 - 5878
  • [46] Secret Key Generation Scheme Based on Deep Learning in FDD MIMO Systems
    Wan, Zheng
    Huang, Kaizhi
    Chen, Lu
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2021, E104D (07) : 1058 - 1062
  • [47] Cooperative Jamming-Based Physical-Layer Group Secret and Private Key Generation
    Fu, Shiming
    Ling, Tong
    Yang, Jun
    Li, Yong
    ENTROPY, 2024, 26 (09)
  • [48] Energy-Efficient Channel Access and Data Offloading Against Dynamic Jamming Attacks
    Xu, Yifan
    Chen, Jin
    Xu, Yuhua
    Gu, Fanglin
    Yao, Kailing
    Jia, Luliang
    Liu, Dianxiong
    Wang, Ximing
    IEEE TRANSACTIONS ON GREEN COMMUNICATIONS AND NETWORKING, 2021, 5 (04): : 1734 - 1746
  • [49] Efficient Kalman Modeling of Multipath Wireless Channel for Secret Key Generation
    Aljerme, Abdelkader
    Liu, Huaping
    2019 15TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2019, : 586 - 590
  • [50] Deep Learning based Channel Reciprocity Technique for Secret Key Generation
    Wulandari, Dewi Cahyo
    Yuliana, Mike
    Sudarsono, Amang
    2024 INTERNATIONAL ELECTRONICS SYMPOSIUM, IES 2024, 2024, : 234 - 240