Authenticated secret key generation in delay-constrained wireless systems

被引:0
|
作者
Miroslav Mitev
Arsenia Chorti
Martin Reed
Leila Musavian
机构
[1] School of CSEE,
[2] University of Essex,undefined
[3] ETIS UMR8051,undefined
[4] CY University,undefined
[5] ENSEA,undefined
[6] CNRS,undefined
关键词
Physical layer security; Secret key generation; Physical unclonable functions; Resumption protocols; Effective capacity; QoS; Wireless communications; 5G applications;
D O I
暂无
中图分类号
学科分类号
摘要
With the emergence of 5G low-latency applications, such as haptics and V2X, low-complexity and low-latency security mechanisms are needed. Promising lightweight mechanisms include physical unclonable functions (PUF) and secret key generation (SKG) at the physical layer, as considered in this paper. In this framework, we propose (i) a zero round trip time (0-RTT) resumption authentication protocol combining PUF and SKG processes, (ii) a novel authenticated encryption (AE) using SKG, and (iii) pipelining of the AE SKG and the encrypted data transfer in order to reduce latency. Implementing the pipelining at PHY, we investigate a parallel SKG approach for multi-carrier systems, where a subset of the subcarriers are used for SKG and the rest for data transmission. The optimal solution to this PHY resource allocation problem is identified under security, power, and delay constraints, by formulating the subcarrier scheduling as a subset-sum 0−1 knapsack optimization. A heuristic algorithm of linear complexity is proposed and shown to incur negligible loss with respect to the optimal dynamic programming solution. All of the proposed mechanisms have the potential to pave the way for a new breed of latency aware security protocols.
引用
收藏
相关论文
共 50 条
  • [41] Broadcasting Delay-Constrained Traffic over Unreliable Wireless Links with Network Coding
    Hou, I-Hong
    Kumar, P. R.
    PROCEEDINGS OF THE TWELFTH ACM INTERNATIONAL SYMPOSIUM ON MOBILE AD HOC NETWORKING AND COMPUTING (MOBIHOC' 11), 2011,
  • [42] Delay-Constrained Optimized Packet Aggregation in High-Speed Wireless Networks
    Peyman Teymoori
    Nasser Yazdani
    Journal of Computer Science and Technology, 2013, 28 : 525 - 539
  • [43] The Base Station Placement for Delay-constrained Information Coverage in Mobile Wireless Networks
    Keung, Gabriel Y.
    Zhang, Qian
    Li, Bo
    2010 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2010,
  • [44] Delay-Constrained Optimized Packet Aggregation in High-Speed Wireless Networks
    Teymoori, Peyman
    Yazdani, Nasser
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2013, 28 (03) : 525 - 539
  • [45] Secret Key Generation in MIMO Wireless Systems Using Precoded Channel Measurements
    Baksi, Saygin
    Popescu, Dimitrie C.
    2017 IEEE 28TH ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR, AND MOBILE RADIO COMMUNICATIONS (PIMRC), 2017,
  • [46] Delay-Constrained Optimized Packet Aggregation in High-Speed Wireless Networks
    Peyman Teymoori
    Nasser Yazdani
    JournalofComputerScience&Technology, 2013, 28 (03) : 525 - 539
  • [47] A Delay-Constrained Network Coding Algorithm Based on Power Control in Wireless Networks
    Wang, Qi
    Cheng, Xi
    Wang, Qingshan
    Liu, Peng
    Deng, Bin
    IEEE ACCESS, 2018, 6 : 62224 - 62233
  • [48] Delay-constrained capacity with causal feedback
    Negi, R
    Cioffi, JM
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2002, 48 (09) : 2478 - 2494
  • [49] Robust delay-constrained routing in telecommunications
    Hijazi, Hassan
    Bonami, Pierre
    Ouorou, Adam
    ANNALS OF OPERATIONS RESEARCH, 2013, 206 (01) : 163 - 181
  • [50] Robust delay-constrained routing in telecommunications
    Hassan Hijazi
    Pierre Bonami
    Adam Ouorou
    Annals of Operations Research, 2013, 206 : 163 - 181