Hardware-Impaired PHY Secret Key Generation With Man-in-the-Middle Adversaries

被引:23
作者
Letafati, Mehdi [1 ]
Behroozi, Hamid [1 ]
Khalaj, Babak Hossein [2 ]
Jorswieck, Eduard A. [3 ]
机构
[1] Sharif Univ Technol, EE Dept, Tehran 136511155, Iran
[2] Inst Res Fundamental Sci, Sch Comp Sci, Tehran 193955746, Iran
[3] TU Braunschweig, Dept Informat Theory & Commun Syst, D-38106 Braunschweig, Germany
关键词
Wireless communication; Protocols; Hardware; Transceivers; Radio frequency; Jamming; Communication system security; Wireless secret key generation; hardware impairments; man-in-the-middle attack;
D O I
10.1109/LWC.2022.3147952
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this letter, we examine the PHY layer secret key generation (PHY-SKG) scheme in the presence of man-in-the-middle (MiM) adversary, while legitimate parties suffer from hardware impairments (HIs). Different from previous works on PHY-SKG that consider adversaries who simply try to make an interference in the communication link, the MiM aims to deceive legitimate entities about the source of common randomness. To conquer the MiM attack, legitimate parties utilize randomized pilots (RPs) in our proposed scheme. We analyze the effect of HIs on the performance of system by deriving the achievable secret key rate (SKR). Our results highlight a fundamental limit, as a ceiling phenomena, on the SKR when having practical imperfections. Top-level guidelines for selecting impairment levels along the transceiver chains is also provided to maximize the performance of the PHY-SKG protocol. Our numerical results verify the analytic expressions derived, while providing insights on system design. We show that by properly considering the HIs, about 25% improvement in the SKR is achievable.
引用
收藏
页码:856 / 860
页数:5
相关论文
共 17 条
[1]  
[Anonymous], 2008, RF imperfections in high-rate wireless systems: Impact and digital compensation
[2]   Shannon Entropy and Mutual Information for Multivariate Skew-Elliptical Distributions [J].
Arellano-Valle, Reinaldo B. ;
Contreras-Reyes, Javier E. ;
Genton, Marc G. .
SCANDINAVIAN JOURNAL OF STATISTICS, 2013, 40 (01) :42-62
[3]   A New Look at Dual-Hop Relaying: Performance Limits with Hardware Impairments [J].
Bjoernson, Emil ;
Matthaiou, Michail ;
Debbah, Merouane .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2013, 61 (11) :4512-4525
[4]   Majorization and Matrix-Monotone Functions in Wireless Communications [J].
Jorswieck, Eduard ;
Boche, Holger .
FOUNDATIONS AND TRENDS IN COMMUNICATIONS AND INFORMATION THEORY, 2006, 3 (06) :553-701
[5]   A New Frequency Hopping-Aided Secure Communication in the Presence of an Adversary Jammer and an Untrusted Relay [J].
Letafati, Mehdi ;
Kuhestani, Ali ;
Ng, Derrick Wing Kwan ;
Behroozi, Hamid .
2020 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC WORKSHOPS), 2020,
[6]   Deep Learning for Hardware-Impaired Wireless Secret Key Generation with Man-in-the-Middle Attacks [J].
Letafati, Mehdi ;
Behroozi, Hamid ;
Khalaj, Babak Hossein ;
Jorswieck, Eduard A. .
2021 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2021,
[7]   On Learning-Assisted Content-Based Secure Image Transmission for Delay-Aware Systems With Randomly-Distributed Eavesdroppers [J].
Letafati, Mehdi ;
Behroozi, Hamid ;
Khalaj, Babak Hossein ;
Jorswieck, Eduard A. .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2022, 70 (02) :1125-1139
[8]   A Lightweight Secure and Resilient Transmission Scheme for the Internet of Things in the Presence of a Hostile Jammer [J].
Letafati, Mehdi ;
Kuhestani, Ali ;
Wong, Kai-Kit ;
Piran, Md Jalil .
IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (06) :4373-4388
[9]   Jamming-Resilient Frequency Hopping-Aided Secure Communication for Internet-of-Things in the Presence of an Untrusted Relay [J].
Letafati, Mehdi ;
Kuhestani, Ali ;
Behroozi, Hamid ;
Ng, Derrick Wing Kwan .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2020, 19 (10) :6771-6785
[10]   Physical Layer Key Generation in 5G and Beyond Wireless Communications: Challenges and Opportunities [J].
Li, Guyue ;
Sun, Chen ;
Zhang, Junqing ;
Jorswieck, Eduard ;
Xiao, Bin ;
Hu, Aiqun .
ENTROPY, 2019, 21 (05)