Authenticated secret key generation in delay-constrained wireless systems

被引:0
|
作者
Miroslav Mitev
Arsenia Chorti
Martin Reed
Leila Musavian
机构
[1] School of CSEE,
[2] University of Essex,undefined
[3] ETIS UMR8051,undefined
[4] CY University,undefined
[5] ENSEA,undefined
[6] CNRS,undefined
关键词
Physical layer security; Secret key generation; Physical unclonable functions; Resumption protocols; Effective capacity; QoS; Wireless communications; 5G applications;
D O I
暂无
中图分类号
学科分类号
摘要
With the emergence of 5G low-latency applications, such as haptics and V2X, low-complexity and low-latency security mechanisms are needed. Promising lightweight mechanisms include physical unclonable functions (PUF) and secret key generation (SKG) at the physical layer, as considered in this paper. In this framework, we propose (i) a zero round trip time (0-RTT) resumption authentication protocol combining PUF and SKG processes, (ii) a novel authenticated encryption (AE) using SKG, and (iii) pipelining of the AE SKG and the encrypted data transfer in order to reduce latency. Implementing the pipelining at PHY, we investigate a parallel SKG approach for multi-carrier systems, where a subset of the subcarriers are used for SKG and the rest for data transmission. The optimal solution to this PHY resource allocation problem is identified under security, power, and delay constraints, by formulating the subcarrier scheduling as a subset-sum 0−1 knapsack optimization. A heuristic algorithm of linear complexity is proposed and shown to incur negligible loss with respect to the optimal dynamic programming solution. All of the proposed mechanisms have the potential to pave the way for a new breed of latency aware security protocols.
引用
收藏
相关论文
共 50 条
  • [1] Authenticated secret key generation in delay-constrained wireless systems
    Mitev, Miroslav
    Chorti, Arsenia
    Reed, Martin
    Musavian, Leila
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2020, 2020 (01)
  • [2] Delay-Constrained Scheduling in Wireless Sensor Networks
    Ngoc-Thai Pham
    Hoang-Hiep Nguyen
    Thong Huynh
    Hwang, Won-Joo
    INTERNET OF THINGS AND M2M COMMUNICATIONS, 2013, : 69 - 91
  • [3] Adaptive Transmission for Delay-Constrained Wireless Video
    Gong, Chen
    Wang, Xiaodong
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2014, 13 (01) : 49 - 61
  • [4] Scheduling delay-constrained data in wireless data networks
    Meng, Xiaoqiao
    Nandagopal, Thyaga
    Wong, Starsky H. Y.
    Yang, Hao
    Lu, Songwu
    2007 IEEE WIRELESS COMMUNICATIONS & NETWORKING CONFERENCE, VOLS 1-9, 2007, : 4265 - +
  • [5] Analysis of a delay-constrained hybrid ARQ wireless system
    Lee, Kelvin K.
    Chanson, Samuel T.
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2006, 54 (11) : 2014 - 2022
  • [6] Delay and Delay-Constrained Throughput Analysis of a Wireless Powered Communication System
    Li, Zhidu
    Jiang, Yuming
    Gao, Yuehong
    Sang, Lin
    Yang, Dacheng
    2017 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2017,
  • [7] Delay-constrained data aggregation scheduling in wireless sensor networks
    Feng, Cheng
    Li, Zhijun
    Jiang, Shouxu
    Jing, Weipeng
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2017, 13 (06):
  • [8] Maximizing Quality of Aggregation in Delay-Constrained Wireless Sensor Networks
    Alinia, Bahram
    Yousefi, Hamed
    Talebi, Mohammad Sadegh
    Khonsari, Ahmad
    IEEE COMMUNICATIONS LETTERS, 2013, 17 (11) : 2084 - 2087
  • [9] Efficient Aggregation of Delay-Constrained Data in Wireless Sensor Networks
    Akkaya, Kemal
    Younis, Mohamed
    Youssef, Moustafa
    3RD ACS/IEEE INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, 2005, 2005,
  • [10] Delay-Constrained Optimal Link Scheduling in Wireless Sensor Networks
    Wang, Qing
    Wu, Dapeng Oliver
    Fan, Pingyi
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2010, 59 (09) : 4564 - 4577