Physical-Layer Secret Key Generation With Colluding Untrusted Relays

被引:71
|
作者
Chan Dai Truyen Thai [1 ]
Lee, Jemin [2 ]
Quek, Tony Q. S. [3 ]
机构
[1] Singapore Univ Technol & Design, iTrust, Singapore 487372, Singapore
[2] Singapore Univ Technol & Design, iTrust Res Ctr, Singapore 487372, Singapore
[3] Singapore Univ Technol & Design, Informat Syst Technol & Design Pillar, Singapore 487372, Singapore
关键词
Secret key generation; untrusted relay; physical-layer security; colluding eavesdroppers; MIMO; POWER ALLOCATION; NETWORKS; SECURITY; CHANNEL; TRANSMISSION; COOPERATION; SELECTION;
D O I
10.1109/TWC.2015.2491935
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, we propose a physical-layer secret key generation scheme for multiantenna legitimate nodes with the help of multiple untrusted relays, equipped with multiple antennas. The untrusted relays conform to the relaying transmission protocol of legitimate nodes, but they also eavesdrop the confidential information of an legitimate transmitter. The key generation scheme is designed with zero forcing (ZF) and minimum mean square error (MMSE) channel estimators for non-, partially, and fully colluding modes of untrusted relays. Furthermore, we propose a scheme adaptive to channel coherence time. Specifically, to achieve a higher secret key rate (SKR) within the channel coherence time, the number of relay and legitimate nodes' antennas are optimally determined and the most suitable antennas are selected for the key generation. Our results show that the proposed scheme achieves a higher SKR than a prior work, and non- and partially colluding modes provide a higher SKR than the fully colluding mode through the proposed scheme. We also verify that exploiting more antennas of untrusted relays does not always enhance the SKR by showing the existence of the optimal number of antennas of the relays participating in the scheme.
引用
收藏
页码:1517 / 1530
页数:14
相关论文
共 50 条
  • [31] Physical Layer Security with Untrusted Relays in Wireless Cooperative Networks
    Luo, Guiyang
    Li, Jinglin
    Liu, Zhihan
    Tao, Xiaofeng
    Yang, FangChun
    2017 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2017,
  • [32] Physical-Layer Security of NOMA Systems under Untrusted Users
    ElHalawany, Basem M.
    Wu, Kaishun
    2018 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2018,
  • [33] PHY-PSIONICS: Physical-Layer Phase Secret Key Encapsulation in Correlated Subchannels
    Han, Seungnam
    Choi, Jinho
    Hwang, Euiseok
    IEEE WIRELESS COMMUNICATIONS LETTERS, 2023, 12 (08) : 1409 - 1413
  • [34] Physical-Layer Secret Key Agreement in Two-Way Wireless Relaying Systems
    Shimizu, Takayuki
    Iwai, Hisato
    Sasaoka, Hideichi
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (03) : 650 - 660
  • [35] A Countermeasure Against RIS Jamming Attack in Physical-Layer Key Generation
    Wan, Zheng
    Hu, Xiaoyan
    Sun, Xiaoli
    Xu, Xiaoming
    Huang, Kaizhi
    Jin, Liang
    IEEE WIRELESS COMMUNICATIONS LETTERS, 2023, 12 (12) : 2193 - 2197
  • [36] On the RIS Manipulating Attack and Its Countermeasures in Physical-layer Key Generation
    Hu, Lei
    Le, Guyue
    Luo, Hongyi
    Hu, Aiqun
    2021 IEEE 94TH VEHICULAR TECHNOLOGY CONFERENCE (VTC2021-FALL), 2021,
  • [37] Evaluation of Physical Layer Secret Key Generation for IoT Devices
    Jacovic, Marko
    Kraus, Martin
    Mainland, Geoffrey
    Dandekar, Kapil R.
    2019 IEEE 20TH WIRELESS AND MICROWAVE TECHNOLOGY CONFERENCE (WAMICON), 2019,
  • [38] Is Adversarial RIS Harmful to Physical Layer Secret Key Generation
    Fang, Yi
    Wu, Huici
    Wei, Zhiqing
    Tao, Xiaofeng
    IEEE CONFERENCE ON GLOBAL COMMUNICATIONS, GLOBECOM, 2023, : 7225 - 7230
  • [39] Secret Group Key Generation in Physical Layer for Mesh Topology
    Thai, Chan Dai Truyen
    Lee, Jemin
    Quek, Tony Q. S.
    2015 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2015,
  • [40] Pairwise Physical Layer Secret Key Generation for FDD Systems
    Olyaei Torshizi, Ehsan
    Henkel, Werner
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 9518 - 9533