Design and Management of Group Key Generation Based on Wireless Channel Phase

Document Type : Original Article

Authors

1 Assistant Professor of ICT Research Institute, Iran Telecommunication Research Center (ITRC), Tehran, Iran, Email: mrkeshavarzi@itrc.ac.ir

2 Assistant Professor of Telecommunication Engineering at Qom University of Technology, Email: kuhestani@qut.ac.ir

3 Ph.D. Student of Telecommunication Engineering at Imam Hussain University. Email: ieee.madadi@gmail.com

Abstract

In this paper, a secret key generation scheme for a group of users based on wireless channel is presented in which legal nodes are connected under star topology. Instead of using the characteristics of the channel domain such as received signal strength (RSS), the channel phase is used in the proposed scheme; Because in channels with low mobility or channels with low dispersion that do not have a large entropy channel range, the channel phase can show significant changes. Based on this, in this article, a group key generation scheme based on channel phase is proposed. The proposed key generation scheme, compared to the similar scheme, needs less time intervals for execution and therefore has a high speed of the algorithm. As a result, the key production rate will be higher, which is very desirable. In the following, we will analyze and examine the proposed protocol in terms of some criteria such as the probability of generating the correct group key, scalability and vulnerable areas.

Keywords

Main Subjects


  • D. Wyner, “The Wiretap Channel,” J. Bell System Tech., vol. 54, pp. 1355–1387, 1975.

 

  • Mitev, A. Chorti, H. V. Poor and G. P. Fettweis, “What physical layer security can do for 6G security,” IEEE Open J. Veh. Technol., vol. 4, pp. 375-388, 2023.
  • Chen et al., “Covert communications: a comprehensive survey," IEEE Commun. Surveys Tuts., vol. 25, no. 2, pp. 1173-1198, 3rd Quart 2023.

 

  • Chen, D. W. K. Ng, W. H. Gerstacker, and H.-H. Chen, “A survey on multiple-antenna techniques for physical layer security,” IEEE Commun. Surveys Tuts., vol. 19, no. 2, pp. 1027–1053, 2nd Quart., 2017.

 

  • Zhang, G. Li, A. Marshall, A. Hu and L. Hanzo, “A new frontier for IoT security emerging from three decades of key generation relying on wireless channels,” IEEE Access, vol. 8, pp. 138406–138446, Jul. 2020.

 

  • Li, L. Hu and A. Hu, “Lightweight group secret key generation leveraging non-reconciled received signal strength in mobile wireless networks,” in IEEE Int. Conf. Commun. (ICC Workshops), Shanghai, China, 2019.

 

  • Xu, K. Cumanan, Z. Ding, X. Dai, and K. K. Leung, “Group secret key generation in wireless networks: algorithms and rate optimization,” IEEE Trans. Inf. Foren. Sec., vol. 11, no. 8, pp. 1831–1846, Apr. 2016.

 

  • D. T. Thai, J. Lee, J. Prakash and T. Q. S. Quek, “Secret group-key generation at physical layer for multi-antenna mesh topology,” IEEE Trans. Inf. Foren. Sec., vol. 14, no. 1, pp. 18-33, Jan. 2019.

 

  • Wang, K. Xu and K. Ren, “Cooperative secret key generation from phase estimation in narrowband fading channels,” IEEE J. Selected Areas in Commun., vol. 30, no. 9, pp. 1666-1674, Oct. 2012.

 

  • K. Tirandaz and A. Kuhestani, “Security analysis of a mutual random phase injection scheme to generate a secret key in static point-to-point communications,” Journal of Electronic & Cyber Defense, Sept. 2022. (In Persian).

 

[11] M. Ragheb, A. Kuhestani, M. Kazemi, H. Ahmadi and L. Hanzo, “RIS-aided secure millimeter-wave communication under RF-chain impairments,” IEEE Trans. Veh. Technol., doi: 10.1109/TVT.2023.330745.

 

[12] M. Letafati, A. Kuhestani, and H. Behroozi, “Three-hop untrusted relay networks with hardware imperfections and channel estimation errors for Internet of Things,” IEEE Trans. Inf. Forensics Security, vol. 15, pp. 2856–2868, Mar. 2020.

 

[13] M. Ragheb, S. M. S. Hemami, A. Kuhestani, D. W. K. Ng and L. Hanzo, “On the physical layer security of untrusted millimeter wave relaying networks: A stochastic geometry Approach,” IEEE Trans. Inf. Foren. Sec., vol. 17, pp. 53-68, Feb. 2022.

 

[14] M. Letafati, A. Kuhestani, K. -K. Wong and M. J. Piran, “A lightweight secure and resilient transmission scheme for the Internet of Things in the presence of a hostile jammer,” IEEE Internet of Things Journal, vol. 8, no. 6, pp. 4373-4388, 15 Mar. 2021.

[15] X. Yuan, Y. Jiang, G. Li and A. Hu, "Wireless Channel Key Generation Based on Multi-subcarrier Phase Difference," IEEE Internet of Things Journal, vol. 11, no. 20, pp. 32939-32955, Oct. 2024.

CAPTCHA Image