Authenticated secret key generation in delay-constrained wireless systems

被引:0
作者
Miroslav Mitev
Arsenia Chorti
Martin Reed
Leila Musavian
机构
[1] School of CSEE,
[2] University of Essex,undefined
[3] ETIS UMR8051,undefined
[4] CY University,undefined
[5] ENSEA,undefined
[6] CNRS,undefined
来源
EURASIP Journal on Wireless Communications and Networking | / 2020卷
关键词
Physical layer security; Secret key generation; Physical unclonable functions; Resumption protocols; Effective capacity; QoS; Wireless communications; 5G applications;
D O I
暂无
中图分类号
学科分类号
摘要
With the emergence of 5G low-latency applications, such as haptics and V2X, low-complexity and low-latency security mechanisms are needed. Promising lightweight mechanisms include physical unclonable functions (PUF) and secret key generation (SKG) at the physical layer, as considered in this paper. In this framework, we propose (i) a zero round trip time (0-RTT) resumption authentication protocol combining PUF and SKG processes, (ii) a novel authenticated encryption (AE) using SKG, and (iii) pipelining of the AE SKG and the encrypted data transfer in order to reduce latency. Implementing the pipelining at PHY, we investigate a parallel SKG approach for multi-carrier systems, where a subset of the subcarriers are used for SKG and the rest for data transmission. The optimal solution to this PHY resource allocation problem is identified under security, power, and delay constraints, by formulating the subcarrier scheduling as a subset-sum 0−1 knapsack optimization. A heuristic algorithm of linear complexity is proposed and shown to incur negligible loss with respect to the optimal dynamic programming solution. All of the proposed mechanisms have the potential to pave the way for a new breed of latency aware security protocols.
引用
收藏
相关论文
共 146 条
  • [1] Mukherjee A(2015)Physical-layer security in the Internet of Things: sensing and communication confidentiality under resource constraints Proc. IEEE 103 1747-1761
  • [2] Yener A.(2015)Wireless physical-layer security: lessons learned from information theory Proc. IEEE 103 1814-1825
  • [3] Ulukus S.(2007)Teaching old sensors new tricks: archetypes of intelligence IEEE Sensors J. 7 868-881
  • [4] Karatzas D.(2015)Optimal power allocation in block fading channels with confidential messages IEEE Trans. Wirel. Commun. 14 4708-4719
  • [5] Chorti A.(2013)On the resilience of wireless multiuser networks to passive and active eavesdroppers IEEE J. Sel. Areas Commun. 31 1850-1863
  • [6] White N. M.(1993)Secret key agreement by public discussion from common information IEEE Trans. Inf. Theory 39 733-742
  • [7] Harris C. J.(1993)Common randomness in information theory and cryptography. i. secret sharing IEEE Trans. Inf. Theory 39 1121-1132
  • [8] Chorti A.(2002)Physical one-way functions Science 297 2026-2030
  • [9] Papadaki K.(2018)Security solutions for local wireless networks in control applications based on physical layer security IFAC-PapersOnLine 51 32-39
  • [10] Poor H. V.(2014)Principles of physical layer security in multiuser wireless networks: a survey IEEE Commun. Surv. Tutor. 16 1550-1573