Next Article in Journal
ABCDP: Approximate Bayesian Computation with Differential Privacy
Next Article in Special Issue
Qubit-Based Clock Synchronization for QKD Systems Using a Bayesian Approach
Previous Article in Journal
Topological Quantum Codes from Lattices Partition on the n-Dimensional Flat Tori
Previous Article in Special Issue
Geometrical Optics Restricted Eavesdropping Analysis of Satellite-to-Satellite Secret Key Distillation
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Protecting Physical Layer Secret Key Generation from Active Attacks

1
Barkhausen Institut gGmbH, Würzburger Str. 46, 01187 Dresden, Germany
2
ETIS, UMR 8051 CY Cergy Paris Université, ENSEA, CNRS, 95000 Cergy, France
3
School of Engineering and Applied Science, Princeton University, Princeton, NJ 08544, USA
*
Author to whom correspondence should be addressed.
Submission received: 15 June 2021 / Revised: 23 July 2021 / Accepted: 23 July 2021 / Published: 27 July 2021

Abstract

:
Lightweight session key agreement schemes are expected to play a central role in building Internet of things (IoT) security in sixth-generation (6G) networks. A well-established approach deriving from the physical layer is a secret key generation (SKG) from shared randomness (in the form of wireless fading coefficients). However, although practical, SKG schemes have been shown to be vulnerable to active attacks over the initial “advantage distillation” phase, throughout which estimates of the fading coefficients are obtained at the legitimate users. In fact, by injecting carefully designed signals during this phase, a man-in-the-middle (MiM) attack could manipulate and control part of the reconciled bits and thus render SKG vulnerable to brute force attacks. Alternatively, a denial of service attack can be mounted by a reactive jammer. In this paper, we investigate the impact of injection and jamming attacks during the advantage distillation in a multiple-input–multiple-output (MIMO) system. First, we show that a MiM attack can be mounted as long as the attacker has one extra antenna with respect to the legitimate users, and we propose a pilot randomization scheme that allows the legitimate users to successfully reduce the injection attack to a less harmful jamming attack. Secondly, by taking a game-theoretic approach we evaluate the optimal strategies available to the legitimate users in the presence of reactive jammers.

1. Introduction

The increasing interest in physical layer security (PLS) has been stimulated by many practical needs, particularly in the context of Internet of things (IoT) applications [1]. For example, in [2,3], secret key generation (SKG) from wireless fading coefficients was analyzed, showing its potential as a lightweight alternative to standard security schemes. In fact, the SKG scheme allows two legitimate parties (Alice and Bob) to extract on-the-fly secret keys, without the need for significant infrastructure. Furthermore, it has been information-theoretically proven that by following the SKG process, Alice and Bob can extract a shared secret over unauthenticated channels [4,5,6]. Building on that, numerous practical experiments have demonstrated the feasibility of the scheme [7,8]. Moreover, it has been shown that SKG can be combined with authenticated encryption (AE) schemes [9,10] in order to overcome trivial man-in-the-middle (MiM) attacks, similarly to known MiM attacks on unauthenticated Diffie–Hellman schemes.
The success of the SKG scheme relies on the reciprocity and variability of wireless channels. On the one hand, the reciprocity property allows both Alice and Bob to measure an identical channel impulse response during the coherence time of the channel [11,12,13], while on the other hand, the variability property of the wireless channel directly affects the key generation rates [14,15,16,17].
However, the exchange of pilots during the channel estimation phase between Alice and Bob could allow an adversary (Mallory) to estimate the channels Alice–Mallory and Bob–Mallory. Having this information, Mallory could inject suitably precoded signals during the SKG process and could potentially control a significant part of the reconciled sequence while remaining undetected. To overcome this, instead of transmitting publicly known pilot signals, we propose a two-way randomized pilot transmission between Alice and Bob. An earlier work studied this problem for an orthogonal frequency-division multiplexing (OFDM) system [18]. Here, we investigate the scenario of a multiple-input–multiple-output (MIMO) system. We prove that if Mallory has one extra antenna with respect to Alice and Bob, she could always launch an injection attack. Next, through theoretical analysis, we show that the proposed pilot randomization scheme successfully reduces an injection attack to a less harmful uncorrelated jamming attack, ensuring that the extracted key bits are secret from both active and passive adversaries.
In the second part of this paper, we delve deeper into jamming attacks over MIMO systems. In particular, we focus on denial of service (DoS) in the form of reactive jamming. We derive the optimal strategies for both the attacker and the legitimate users. Through numerical evaluation, we demonstrate that, depending on their capabilities, reactive jammers could provoke legitimate users to transmit at full power in order to achieve a positive SKG rate.

2. System Model

In this work, we consider a time-division duplex MIMO (TDD–MIMO) system consisting of two legitimate nodes and an active adversary, namely, Alice, Bob, and Mallory, respectively. On the one hand, Alice and Bob are generating secret keys using the wireless SKG procedure, while on the other hand, Mallory performs an injection attack on the MIMO links Mallory–Alice and Mallory–Bob. The number of antennas at Alice N A and Bob N B are assumed to be equal, i.e., N A = N B = N . To better illustrate the considered scenario, we give a brief overview of the SKG procedure, and show how an injection attack could affect the process.

2.1. Secret Key Generation from Fading Coefficients

As illustrated in Figure 1, the standard SKG procedure consists of three phases [19]: (1) advantage distillation: the legitimate nodes exchange pilot signals, each using N transmit and N receive antenna elements, in order to estimate their reciprocal channel state information (CSI).
z A = H x + n A
z B = H T x + n B ,
where H represents the channel matrix of size N r × N t = N × N such that its ( i , j ) entry represents the channel linking the i-th receive antenna, and the j-th transmit antenna, z represents the received vector of length N r , x denotes the transmitted vector consisting of N t = N r = N elements, n A and n B are the received noise vectors at Alice and Bob, each of length N r , respectively. Note that, due to the reciprocity of the wireless channel, Alice and Bob observe H and H T , respectively. To conclude this step, z A and z B are passed through suitable quantizers [20], generating binary vectors r A and r B , respectively; (2) information reconciliation: discrepancies, due to imperfect channel estimation in the quantizer local outputs, are reconciled through a public exchange of helper data s A (see Figure 1), e.g., by using Slepian–Wolf reconciliation techniques [10,21]; (3) privacy amplification: the legitimate nodes apply universal hash functions to the reconciled information r A and obtain key k . This step ensures that the generated key k is uniformly distributed and completely unpredictable by an adversary.
During the process above, an eavesdropping adversary could obtain channel observations, given as follows:
z A M = H A M x + n A M ,
z B M = H B M x + n B M ,
where the channel matrices in the links Alice–Mallory and Bob–Mallory are denoted by H A M and by H B M , respectively, while the received noise vectors are demoted by n A M and n B M . Afterward, the SKG capacity between Alice and Bob is expressed as the conditional mutual information between the observations of Alice, Bob, and Mallory.
I ( z A ; z B | z A M , z B M ) .

2.2. Injection Attacks during SKG

One of the most critical threats to the SKG model, given in Figure 1, is MiM in the form of an injection attack [11,22,23]. The main components of the injection attack are captured in Figure 2. While, the legitimate nodes Alice and Bob exchange pilot signals during the advantage distillation phase, Mallory injects signals p . Based on the results in [22], we assume that Mallory has perfect knowledge of the channel vectors in the MIMO links Mallory–Alice, H M A = H A M T and Mallory–Bob, H M B = H B M T . This is a reasonable assumption since Mallory can estimate the channel vectors while Alice and Bob exchange pilot signals, as long as the channel’s coherence time is respected (a plausible scenario in slow-fading, low-mobility environments). Finally, Mallory chooses the vector p such that the same signal is “injected“ at both Alice and Bob, i.e., H M A p = H M B p .

3. Analysis of Injection Attacks in MIMO SKG

In this section, we first prove that if Mallory has one extra antenna, with respect to Alice and Bob, she could always launch an injection attack. Next, we propose a pilot randomization scheme and show that when employed, legitimate users could successfully reduce the attack to a jamming attack.
Lemma 1.
While Alice and Bob perform advantage distillation using N antennas, Mallory could always launch an injection attack, as long as she has at least N + 1 antennas.
Proof. 
The precoding vector of Mallory p of size ( N + 1 ) × 1 is represented as
p = p 1 p N + 1 .
The channel matrices H M A and H M B have size N × ( N + 1 ) , such that
H M A = H M A 1 , 1 H M A 1 , N + 1 H M A N , 1 H M A N , N + 1 ,
and
H M B = H M B 1 , 1 H M B 1 , N + 1 H M B N , 1 H M B N , N + 1 .
Next, we can represent the equation
H M A p = H M B p ,
as
( H M A H M B ) p = 0 ,
where H M = H M A H M B is equal to:
H M = H M A 1 , 1 H M B 1 , 1 H M A 1 , N + 1 H M B 1 , N + 1 H M A N , 1 H M B N , 1 H M A N , N + 1 H M B N , N + 1 .
Given the above, Equation (10) can be rewritten as H M p = 0 , where H M is given in Equation (11). The equality H M p = 0 is equivalent to solving the following linear system of equations:
H M 1 , 1 p 1 + H M 1 , 2 p 2 + + H M 1 , N + 1 p N + 1 = 0 H M N , 1 p 1 + H M N , 2 p 2 + + H M N , N + 1 p N + 1 = 0 .
Due to the fact that Mallory has an additional degree of freedom (one extra antenna), as compared to Alice and Bob, she can treat one of the elements in p as a constant and solve for the others in terms of it. Based on this, we let p N + 1 be a constant and rewrite the system in (12) as
H M 1 , 1 p 1 + H M 1 , 2 p 2 + + H M 1 , N p N = H M 1 , N + 1 p N + 1 H M N , 1 p 1 + H M N , 2 p 2 + + H M N , N p N = H M N , N + 1 p N + 1 .
The system of equations in (13) can be represented as A x = b , where the N × N matrix A is the N × N matrix containing the first N lines and N columns of H M , x = ( p 1 , p 2 , , p N ) T , and b contains the right-hand side of the system, i.e., b = ( H M 1 , N + 1 p N + 1 , , H M N , N + 1 p N + 1 ) T . Finally, since det ( A ) 0 almost surely, (i.e., under the assumptions in Section 2, det ( A ) is a continuous random variable, hence det ( A ) 0 with probability 1) and therefore the system’s solution is unique and given by
( p 1 , p 2 , , p N ) T = A 1 b .
Note that if Mallory has the same number of antennas as Alice and Bob, she will not have one extra degree of freedom and the transition from the system in Equation (12) to the system in Equation (13) would not be possible. However, as shown here, if Mallory has one extra antenna, with respect to Alice and Bob, she can treat one of the elements in p as constant, which allows her to find the rest of the elements as in Equation (14). This concludes the proof of Lemma 1. □
Based on Lemma 1, the observations of Alice and Bob are now given by
z A = H x + w + n A
z B = H T x + w + n B ,
where w = H M A p = H M B p denotes the observed injected signals at Alice and Bob, which are identical due to the precoding vector p . By injecting w , Mallory controls the secret key rate, which is now upper bounded by [18,24]
L I ( z A , z B ; w ) .

Pilot Randomization as a Countermeasure to Injection Attacks

It has been shown that a countermeasure to injection attacks can be built by randomizing the pilot sequence exchanged between Alice and Bob [18,23,24]. In this work, we propose a MIMO pilot randomization scheme in which pilots are drawn from a (scaled) QPSK modulation. Specifically, Alice and Bob do not transmit the same pilot signal x ; instead, they transmit independent, random pilot signals x and y drawn from i.i.d. zero-mean discrete uniform distributions in which the individual elements of the vectors have probability mass functions as U ( { ± r ± j r } , , { ± r ± j r } ) , where j = 1 , r = P / 2 , so that E x = E y = ( 0 , , 0 ) T , ( E | x 1 | 2 , , E | x N | 2 ) T = ( E | y 1 | 2 , , E | y N | 2 ) T = ( P , , P ) T and ( E x 1 y 1 , , E x N y N ) T = ( 0 , , 0 ) T , i.e., the pilots are randomly chosen QPSK signals. Given that Alice’s and Bob’s observation z A and z B are modified as
z A = H y + w + n A ,
z B = H T x + w + n B .
Finally, to generate shared randomness, Alice and Bob post-multiply z A and z B by their own randomized pilot signals, such as z ˜ A = x T z A and z ˜ B = y T z B (unobservable by Mallory). Given this, the modified observations are expressed as
z ˜ A = x T H y + x T w + x T n A ,
z ˜ B = y T H T x + y T w + y T n B ,
where the shared randomness between Alice and Bob is now represented by x T H y = x H T y T . Furthermore, the independence of x and y ensures the following:
L I z ˜ A , z ˜ B ; w = 0 .

4. Jamming Attacks on SKG

In this section, we focus on reactive jamming attacks in SKG systems and examine the scenario in which Mallory reactively jams Alice (note that the scenario in which Mallory jams Bob is identical). A reactive jamming attack is an intelligent approach in which the jammer initially senses the spectrum and jams only if a transmission is detected. Due to the difficulty to be detected, reactive jamming attacks are considered to be a great threat to legitimate transmission [25,26]. Next, we assume that Alice and Bob perform SKG in a TDD–MIMO system with a spatially uncorrelated channel. It has been proven that the optimal power strategy for Alice and Bob in this scenario is to employ equal power distribution [27], which is also assumed for this study, i.e.,
E | x 1 | 2 , , E | x N | 2 T = ( p , , p ) T with p [ 0 , P ] .
In the following, we assume that Mallory has N antennas, and as a reactive jammer, she senses the spectrum and jams in the link Mallory–Alice only if she detects a power greater than a certain threshold p th . Thus, instead of considering Mallory’s power allocation matrix, we work with the sum jamming power for all antennas, which can be represented as a power allocation vector γ ̲ = ( γ 1 , , γ N ) . By denoting the available jamming power by N Γ , the following short-term power constraint is considered:
γ ̲ R + N , i = 1 N γ i N Γ .
Assuming that H is uncorrelated with H A M , H B M and that all channel matrices have independent and identically distributed elements that are drawn from circularly symmetric zero-mean Gaussian distributions of variances σ 2 and σ J 2 , respectively, then the SKG capacity can be expressed as [27]
C K ( p , γ ̲ ) = N i = 1 N log 1 + p σ 2 2 ( 1 + γ i σ J 2 ) + ( 1 + γ i σ J 2 ) 2 p σ 2 .

4.1. Optimal Power Allocation Strategies

In the following, we take a game-theoretic approach in order to evaluate the optimal strategies of Alice, Bob and Mallory. Throughout the following Alice and Bob’s common objective is to maximize C K ( p , γ ̲ ) with respect to (w.r.t.) p, while Mallory wants to minimize C K ( p , γ ̲ ) w.r.t. γ ̲ . Due to the reversed objectives, we formulated a noncooperative zero-sum game, which studies the strategic interaction between the legitimate users and the jammer: G = ( { L , J } , { A L , A J ( p ) } , C K ( p , γ ̲ ) ) . The game G has three components: (i) there are two players, namely, L, denoting the legitimate users (Alice and Bob act as a single player), and J being the jammer (Mallory); (ii) player L has a set of possible actions A L = [ 0 , P ] , while player J’s set of actions is
A J ( p ) = { ( 0 , , 0 ) } , if p p th , γ ̲ R + N | i = 1 N γ i N Γ , if p > p th .
Lastly, C K ( p , γ ̲ ) denotes the payoff function of player L.
Given the fact that player J is a reactive jammer, i.e, first observes the transmit power of player L and subsequently chooses a strategy, we study a hierarchical game in which player L is the leader, and player J is the follower. In this game, the solution is the Stackelberg equilibrium (SE)—rather than Nash—and it is defined as a strategy profile ( p SE , γ ̲ SE ) where player L chooses their optimal strategy first, by anticipating the strategic reaction of player J (i.e., its best response). This is expressed as:
p SE arg max p A L C K ( p , γ ̲ * ( p ) ) , and γ ̲ SE γ ̲ * ( p SE ) ,
where γ ̲ * ( p ) defines the best response (BR) of player J to any strategy p A L chosen by player L, and it is defined as follows:
γ ̲ * ( p ) arg min γ ̲ A J ( p ) C K ( p , γ ̲ ) .
Finally, based on the detection capabilities at player L, two scenarios are considered: (i) when the detection threshold p th is fixed (defined by the sensing capability of Mallory’s receiver); (ii) when p th is part of player L’s strategy and could vary.

4.2. Stackelberg Equilibrium with Fixed Detection Threshold

In this section, we evaluate SE, when player J’s detection threshold p th is predefined and constant. Note that the case P p th is trivial as γ ̲ SE = ( 0 , , 0 ) , and the legitimate users will optimally use their maximum available power, i.e., ( p SE = P ) . Indeed, due to the poorly chosen threshold p th or low sensing capabilities of Mallory, the legitimate transmission will not be detected and therefore will not be jammed. In the following, we assume that P > p th .
Lemma 2.
The BR of player J for any p A L chosen by player L defined in (28) is the uniform power allocation, given as
γ ̲ * ( p ) ( Γ , , Γ ) , i f p > p th , ( 0 , , 0 ) , i f p p th .
Proof. 
Note that C K ( p , γ i ) is a monotonically decreasing convex function w.r.t γ i , i = 1 , , N for any p > 0 . Based on the principles of convexity in order to minimize C K , Mallory has to transmit with full power from all antennas. The detailed proof can be found in [18]. □
Based on the result from Lemma 1, the SKG rate can have the following two forms:
C K ( p , γ ̲ * ( p ) ) = C K ( p , ( 0 , , 0 ) ) , if p p th , C K ( p , ( Γ , , Γ ) ) , if p > p th ,
which simplifies the players’ options.
Theorem 1.
Depending on their available power P for SKG, Alice and Bob will either transmit at P or p th . The SE point of the game is unique when P p th ( Γ σ J 2 + 1 ) and is given by
( p SE , γ ̲ SE ) = { ( p th , ( 0 , , 0 ) ) } , if P < p th ( σ J 2 Γ + 1 ) , { ( P , ( Γ , , Γ ) ) } , if P > p th ( σ J 2 Γ + 1 ) .
When P = p th ( σ J 2 Γ + 1 ) , the game G has two SEs: ( p SE , γ ̲ SE ) { ( p th , ( 0 , , 0 ) ) , ( P , ( Γ , , Γ ) ) } .
Proof. 
Given the BR of player J defined in (29), the legitimate users want to identify their optimal p A L that maximizes
C K ( p , γ ̲ * ( p ) ) = C K ( p , ( 0 , , 0 ) ) , if p p th , C K ( p , ( Γ , , Γ ) ) , if p > p th ,
Given the fact that C K ( p , γ ̲ ) is monotonically increasing with p for fixed γ ̲ , two cases are distinguished: (a) p [ 0 , p th ] , (b) p ( p th , P ] . The optimal p in each case is given by
(a) arg max p [ 0 , p th ] C K ( p , γ ̲ * ( p ) ) = arg max p [ 0 , p th ] C K ( p , ( 0 , , 0 ) = p th ,
(b) arg max p ( p th , P ] C K ( p , γ ̲ * ( p ) ) = arg max p ( p th , P ] C K ( p , ( Γ , , Γ ) = P .
From (a) and (b), it can be concluded that the overall solution is p SE =
arg max p A L C K ( p , γ ̲ * ( p ) ) = p th , if C K ( P , Γ ) < C K ( p th , 0 ) , P , if C K ( P , Γ ) > C K ( p th , 0 ) , { p th , P } , if C K ( P , Γ ) = C K ( p th , 0 ) .
To simplify the above possibilities, we focus on the case when the utility function C K ( P , Γ ) , i.e., being detected and jammed, equals the utility function when player L is transmitting at threshold p th (player J is silent), i.e., C K ( P , Γ ) = C K ( p th , 0 ) . Using this equality, by substituting appropriately into (25), we obtain a quadratic equation in P.
P 2 ( 2 σ 2 p th + 1 ) P ( 2 p th 2 σ 2 + 2 σ J 2 Γ p th 2 σ 2 ) ( 1 + σ J 2 Γ ) 2 p th 2 = 0 .
Note that Equation (33) has a unique positive root equal to p th ( σ J 2 Γ + 1 ) . Furthermore, due to the fact that the leading coefficient of (33): ( 2 σ 2 p th + 1 ) 0 and P > 0 , we can state that the inequalities C K ( P , Γ ) > C K ( p th , 0 ) and C K ( P , Γ ) < C K ( p th , 0 ) are equivalent to P > p th ( σ J 2 Γ + 1 ) and P < p th ( σ J 2 Γ + 1 ) , respectively. □
A numerical evaluation of the SKG rate is presented in Figure 3. The parameters used are N = 10 , p th = 2 , Γ = 3 , and σ 2 = σ J 2 = 1 . Figure 3 compares the achievable SKG rates of the SE strategy, i.e., p = p S E with the two alternative strategies, i.e., p = P or p = p th . It can be seen that if player L deviates from the SE point the achievable SKG rate can decrease by up to 40 % .

4.3. Stackelberg Equilibrium with Strategic p th

Finally, we investigate the case when Mallory could optimally adjust p th and show how her choice impacts Alice’s and Bob’s strategies. Allowing p th to vary modifies the game under study as follows G ^ = ( { L , J } , { A L , A ^ J ( p ) } , C K ( p , γ ̲ , p th ) ) , where
A ^ J ( p ) { ( ( 0 , , 0 ) , p th ) , p th 0 } , if p th p , ( γ ̲ , p th ) R + N | i = 1 N γ i N Γ , if p th < p .
The BR of the jammer can then be defined as
( γ ̲ ^ * ( p ) , p th ^ * ( p ) ) arg min ( γ ̲ , p th ) A ^ J ( p ) C K ( p , γ ̲ , p th ) .
Lemma 3.
Mallory’s BR in this scenario is a set of strategies as follows:
( γ ̲ ^ * ( p ) , p th ^ * ( p ) ) { ( ( Γ , , Γ ) ϵ ) , ϵ [ 0 , p ) } .
Proof. 
The problem that the jammer wants to solve is min ( γ ̲ , p th ) A ^ J ( p ) C K ( p , γ ̲ , p th ) , which can be split as follows:
min p th 0 min γ ̲ A ^ J ( p ) C K ( p , γ ̲ ( p ) , p th ) .
The solution of the inner minimization is known from (29). For the outer problem, we have to find the optimal p th 0 that minimizes C K ( p , γ ̲ ^ * ( p ) , p th ) . Given that
min p th 0 C K ( p , γ ̲ ^ * ( p ) , p th ) = C K ( p , Γ , p th ) , if p th < p , C K ( p , 0 , p th ) , if p th p ,
and that C K ( p , Γ , p th ) < C K ( p , 0 , p th ) , player J can optimally choose any p th such that p th = ϵ , ϵ < p . This allows the jammer to detect any ongoing transmission and to perform a jamming attack. □
Theorem 2.
The game G ^ has an infinite number of SEs as follows:
( p ^ SE , γ ̲ ^ SE , p th ^ SE ) { ( P , ( Γ , , Γ ) ϵ ) , ϵ < P } .
Proof. 
Given Mallory’s BR, we evaluate the SE of the game G ^ . The definition for p ^ SE is given as follows:
p ^ SE arg p A L max C K ( p , γ ̲ ^ * ( p ) , p th ^ ( p ) * ) .
Since Mallory will act as in (35), we have
C K ( p , γ ̲ ^ * ( p ) , p th ^ ( p ) * ) = C K ( p , Γ , ϵ ) , ϵ < p ,
and the fact that C K ( p , Γ , ϵ ) is monotonically increasing with p results in p ^ SE = P . □
Figure 4 illustrates the achievable SKG rate when p th is part of player J’s strategy. As in Figure 3, the parameters are chosen as Γ = 3 , N = 10 and σ J 2 = 1 . It can be seen that due to a strategically chosen threshold from player J the legitimate users have no other choice but to transmit at full power p = P = p SE . In fact, if the legitimate users deviate from the SE strategy and transmit with low power p = p th , player J could successfully disrupt their SKG process and decrease their achievable SKG rate by up to 97 % .

5. Conclusions

In this study, injection and reactive jamming attacks were analyzed in MIMO SKG systems. With respect to injection attacks, the study demonstrated that a trivial advantage in the form of one extra antenna allows a MiM to mount such an attack. As a countermeasure, we showed that a pilot randomization scheme can successfully reduce injection attacks to jamming attacks. With respect to jamming attacks, using a game-theoretic approach, we showed that an intelligent reactive jammer should optimally jam with full power when a transmission is sensed. Finally, by strategically choosing her jamming threshold, i.e., just below the power level used by the legitimate users, Mallory could perform a much more effective attack. In fact, our theoretical analysis suggests that in this case, Alice and Bob have no choice but to use their full power available for SKG. An important topic for further research in this area is an examination of these initial findings in practical scenarios.

Author Contributions

Conceptualization, M.M., A.C., E.V.B. and H.V.P.; Methodology, M.M., A.C., E.V.B. and H.V.P.; Software, M.M.; Validation, M.M., A.C., E.V.B. and H.V.P.; Supervision, A.C., E.V.B. and H.V.P.; Writing—review and editing, M.M., A.C., E.V.B. and H.V.P. All authors have read and agreed to the published version of the manuscript.

Funding

H.V. Poor was supported in part by the U.S. National Science Foundation under Grant CCF-1908308. E.V. Belmega and A. Chorti were supported by the ELIOT ANR-18-CE40-0030 and FAPESP 2018/12579-7 project. A. Chorti was also supported by CYU Initiative of Excellence (INEX) funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Xu, W.; Jha, S.; Hu, W. LoRa-key: Secure Key Generation System for LoRa-based Network. IEEE Internet Things J. 2019, 6. [Google Scholar] [CrossRef]
  2. Mitev, M.; Chorti, A.; Reed, M. Subcarrier Scheduling for Joint Data Transfer and Key Generation Schemes in Multicarrier Systems. In Proceedings of the IEEE Global Communications Conference (GLOBECOM), Waikoloa, HI, USA, 9–13 December 2019; pp. 1–6. [Google Scholar]
  3. Mitev, M.; Chorti, A.; Reed, M. Optimal Resource Allocation in Joint Secret Key Generation and Data Transfer Schemes. In Proceedings of the 15th International Wireless Communications Mobile Computing Conference (IWCMC), Tangier, Morocco, 24–28 June 2019; pp. 360–365. [Google Scholar]
  4. Maurer, U.; Wolf, S. Secret-key Agreement Over Unauthenticated Public Channels-Part I: Definitions and a Completeness Result. IEEE Trans. Inf. Theory 2003, 49, 822–831. [Google Scholar] [CrossRef] [Green Version]
  5. Maurer, U.; Wolf, S. Secret-key Agreement Over Unauthenticated Public Channels-Part II: The Simulatability Condition. IEEE Trans. Inf. Theory 2003, 49, 832–838. [Google Scholar] [CrossRef] [Green Version]
  6. Maurer, U.; Wolf, S. Secret-key Agreement Over Unauthenticated Public Channels-Part III: Privacy Amplification. IEEE Trans. Inf. Theory 2003, 49, 839–851. [Google Scholar] [CrossRef] [Green Version]
  7. Premnath, S.N.; Jana, S.; Croft, J.; Gowda, P.L.; Clark, M.; Kasera, S.K.; Patwari, N.; Krishnamurthy, S. Secret Key Extraction from Wireless Signal Strength in Real Environments. IEEE Trans. Mob. Comput. 2013, 12, 917–930. [Google Scholar] [CrossRef]
  8. Pierrot, A.J.; Chou, R.A.; Bloch, M.R. Experimental Aspects of Secret Key Generation in Indoor Wireless Environments. In Proceedings of the IEEE 14th Workshop Signal Processing Advances in Wireless Communications (SPAWC), Darmstadt, Germany, 16–19 June 2013; pp. 669–673. [Google Scholar]
  9. Mitev, M.; Chorti, A.; Reed, M.; Musavian, L. Authenticated Secret Key Generation in Delay-Constrained Wireless Systems. EURASIP J. Wirel. Commun. Netw. 2020, 122. [Google Scholar] [CrossRef]
  10. Saiki, C.; Chorti, A. A Novel Physical Layer Authenticated Encryption Protocol Exploiting Shared Randomness. In Proceedings of the IEEE Conference on Communications and Network Security (CNS), Florence, Italy, 28–30 September 2015. [Google Scholar]
  11. Jana, S.; Premnath, S.N.; Clark, M.; Kasera, S.K.; Patwari, N.; Krishnamurthy, S. On the Effectiveness of Secret Key Extraction from Wireless Signal Strength in Real Environments. In Proceedings of the 15th Annual International Conference on Mobile Computing and Networking ACM, Beijing, China, 20–25 September 2009; pp. 321–332. [Google Scholar]
  12. Rappaport, T. Wireless Communications: Principles and Practice, 2nd ed.; Prentice Hall PTR: Upper Saddle River, NJ, USA, 2001. [Google Scholar]
  13. Wan, J.; Lopez, A.B.; Al Faruque, M.A. Exploiting Wireless Channel Randomness to Generate Keys for Automotive Cyber-Physical System Security. In Proceedings of the IEEE 7th nternational Conference on Cyber-Physical Systems (ICCPS), Vienna, Austria, 11–14 April 2016; pp. 1–10. [Google Scholar]
  14. Zoli, M.; Barreto, A.N.; Köpsell, S.; Sen, P.; Fettweis, G. Physical-Layer-Security Box: A Concept for Time-Frequency Channel-Reciprocity Key Generation. EURASIP J. Wirel. Commun. Netw. 2020, 114. [Google Scholar] [CrossRef]
  15. Xiao, L.; Greenstein, L.J.; Mandayam, N.B.; Trappe, W. Using the Physical Layer for Wireless Authentication in Time-Variant Channels. IEEE Trans. Wirel. Commun. 2008, 7, 2571–2579. [Google Scholar] [CrossRef] [Green Version]
  16. Chorti, A.; Hollanti, C.; Belfiore, J.-C.; Poor, H.V. Physical Layer Security: A Paradigm Shift in Data Confidentiality; Springer, Lect. Notes Electr. Eng.: Cham, Switzerland, 2015; pp. 1–15. [Google Scholar]
  17. Shakiba, M.; Chorti, A.; Poor, V. Physical Layer Security: Authentication, Integrity, and Confidentiality. In Physical Layer Security; Le, K., Ed.; Springer: Cham, Switzerland, 2021. [Google Scholar]
  18. Mitev, M.; Chorti, A.; Belmega, E.V.; Reed, M. Man-in-the-Middle and Denial of Service Attacks in Wireless Secret Key Generation. In Proceedings of the IEEE Global Communication Conference (GLOBECOM), Waikoloa, HI, USA, 9–13 December 2019; pp. 1–6. [Google Scholar]
  19. Maurer, U. Secret Key Agreement by Public Discussion from Common Information. IEEE Trans. Inf. Theory 1993, 39, 733–742. [Google Scholar] [CrossRef] [Green Version]
  20. Wang, Q.; Su, H.; Ren, K.; Kim, K. Fast and Scalable Secret Key Generation Exploiting Channel Phase Randomness in Wireless Networks. In Proceedings of the IEEE International Conference on Computer Communication (INFOCOM), Shanghai, China, 10–15 April 2011. [Google Scholar]
  21. Ye, C.; Reznik, A.; Shah, Y. Extracting Secrecy from Jointly Gaussian Random Variables. In Proceedings of the IEEE International Symposium on Information Theory (ISIT), Seattle, WA, USA, 9–14 July 2006. [Google Scholar]
  22. Eberz, S.; Strohmeier, M.; Wilhelm, M.; Martinovic, I. A Practical Man-in-the-Middle Attack on Signal-Based Key Generation Protocols; Springer, Lect. Notes Comput. Sci.: Berlin/Heidelberg, Germany, 2012; pp. 235–252. [Google Scholar]
  23. Rong, J.; Kai, Z. Physical Layer Key Agreement Under Signal Injection Attacks. In Proceedings of the IEEE Conference on Communications and Network Security (CNS), Florence, Italy, 28–30 September 2015; pp. 254–262. [Google Scholar]
  24. Chorti, A. A Study of Injection and Jamming Attacks in Wireless Secret Sharing Systems; Springer, Lect. Notes in Electr. Eng.: Cham, Switzerland, 2018; pp. 1–14. [Google Scholar]
  25. Fang, S.; Liu, Y.; Ning, P. Wireless Communications Under Broadband Reactive Jamming Attacks. IEEE Trans. Dependable Secur. Comput. 2016, 13, 394–408. [Google Scholar] [CrossRef]
  26. Spuhler, M.; Giustiniano, D.; Lenders, V.; Wilhelm, M.; Schmitt, J.B. Detection of Reactive Jamming in DSSS-based Wireless Communications. IEEE Trans. Wirel. Commun. 2014, 13, 1593–1603. [Google Scholar] [CrossRef]
  27. Jorswieck, E.; Wolf, A.; Engelmann, S. Secret Key Generation from Reciprocal Spatially Correlated MIMO Channels. In Proceedings of the IEEE Global Communication Workshops, (GLOBECOM Workshops), Atlanta, GA, USA, 9–13 December 2013; pp. 1245–1250. [Google Scholar]
Figure 1. Secret key generation process between Alice and Bob.
Figure 1. Secret key generation process between Alice and Bob.
Entropy 23 00960 g001
Figure 2. Injection attack performed by Mallory: While Alice and Bob exchange pilot signals x over a Rayleigh fading channel with realization H , Mallory injects a signal p such that the received signals at both Alice and Bob coincide w = H M A p = H M B p .
Figure 2. Injection attack performed by Mallory: While Alice and Bob exchange pilot signals x over a Rayleigh fading channel with realization H , Mallory injects a signal p such that the received signals at both Alice and Bob coincide w = H M A p = H M B p .
Entropy 23 00960 g002
Figure 3. SE policy, compared to always transmitting with either full power or with p th . Used parameters p th = 2 , Γ = 3 , N = 10 , σ 2 = σ J 2 = 1 .
Figure 3. SE policy, compared to always transmitting with either full power or with p th . Used parameters p th = 2 , Γ = 3 , N = 10 , σ 2 = σ J 2 = 1 .
Entropy 23 00960 g003
Figure 4. The effect to the SE policy when p th is part of player J strategy. Comparison of the achievable SKG rate when player L chooses p = p SE with the case when transmitting with power p th . Used parameters Γ = 3 , N = 10 , σ 2 = σ J 2 = 1 .
Figure 4. The effect to the SE policy when p th is part of player J strategy. Comparison of the achievable SKG rate when player L chooses p = p SE with the case when transmitting with power p th . Used parameters Γ = 3 , N = 10 , σ 2 = σ J 2 = 1 .
Entropy 23 00960 g004
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Mitev, M.; Chorti, A.; Belmega, E.V.; Poor, H.V. Protecting Physical Layer Secret Key Generation from Active Attacks. Entropy 2021, 23, 960. https://0-doi-org.brum.beds.ac.uk/10.3390/e23080960

AMA Style

Mitev M, Chorti A, Belmega EV, Poor HV. Protecting Physical Layer Secret Key Generation from Active Attacks. Entropy. 2021; 23(8):960. https://0-doi-org.brum.beds.ac.uk/10.3390/e23080960

Chicago/Turabian Style

Mitev, Miroslav, Arsenia Chorti, E. Veronica Belmega, and H. Vincent Poor. 2021. "Protecting Physical Layer Secret Key Generation from Active Attacks" Entropy 23, no. 8: 960. https://0-doi-org.brum.beds.ac.uk/10.3390/e23080960

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop