Skip to main content
Top
Published in: Mobile Networks and Applications 1/2020

13-02-2019

A Physical-Layer Key Distribution Mechanism for IoT Networks

Authors: Mohanad Alhasanat, Saud Althunibat, Khalid A. Darabkh, Abdullah Alhasanat, Moath Alsafasfeh

Published in: Mobile Networks and Applications | Issue 1/2020

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Physical layer security has gained an increasing attention due to its efficiency and simplicity as compared to other conventional security protocols. Thus, it has been recently nominated for Internet of Things (IoT) applications. In this paper, a novel key distribution mechanism is proposed for IoT networks. The proposed mechanism exploits the channel diversity to distribute encryption keys among nodes within the network. A main novelty aspect of the proposed mechanism is that it guarantees distributing different keys with different lengths to all nodes at the same time. In addition, an intelligent eavesdropper model has been considered. Simulation results prove the high performance of the proposed scheme and its robustness against channel estimation errors, and immunity against eavesdroppers.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Show more products
Literature
1.
go back to reference Atzori L, Iera A, Morabito G (2010) The internet of things: a survey. Comput Netw 54.15:2787–2805CrossRef Atzori L, Iera A, Morabito G (2010) The internet of things: a survey. Comput Netw 54.15:2787–2805CrossRef
2.
go back to reference Luong NC, Hoang DT, Wang P, Niyato D, Kim DI, Han Z (2016) Data collection and wireless communication in internet of things (IoT) using economic analysis and pricing models: a survey. IEEE Commun Surv Tutorials 18(4):2546–2590CrossRef Luong NC, Hoang DT, Wang P, Niyato D, Kim DI, Han Z (2016) Data collection and wireless communication in internet of things (IoT) using economic analysis and pricing models: a survey. IEEE Commun Surv Tutorials 18(4):2546–2590CrossRef
3.
go back to reference Wortmann F, Flüchter K (2015) Internet of things. Business Inf Syst Eng 57.3:221–224CrossRef Wortmann F, Flüchter K (2015) Internet of things. Business Inf Syst Eng 57.3:221–224CrossRef
4.
go back to reference Granjal J, Monteiro E, Silva JS (2015) Security for the internet of things: a survey of existing protocols and open research issues. IEEE Commun Surv Tutorials 17(3):1294–1312CrossRef Granjal J, Monteiro E, Silva JS (2015) Security for the internet of things: a survey of existing protocols and open research issues. IEEE Commun Surv Tutorials 17(3):1294–1312CrossRef
5.
go back to reference Mukherjee A (2015) Physical-layer security in the internet of things: sensing and communication confidentiality under resource constraints. Proc IEEE 103.10:1747–1761CrossRef Mukherjee A (2015) Physical-layer security in the internet of things: sensing and communication confidentiality under resource constraints. Proc IEEE 103.10:1747–1761CrossRef
6.
go back to reference Shiu YS, Chang SY, Wu HC, Huang SCH, Chen HH (2011) Physical layer security in wireless networks: a tutorial. IEEE Wireless Commun 18(2):66–74CrossRef Shiu YS, Chang SY, Wu HC, Huang SCH, Chen HH (2011) Physical layer security in wireless networks: a tutorial. IEEE Wireless Commun 18(2):66–74CrossRef
7.
go back to reference Khisti A, Wornell GW (2010) Secure transmission with multiple antennas: the MIMOME channel. IEEE Trans Inform Theory 56(11):5515–5532MathSciNetCrossRef Khisti A, Wornell GW (2010) Secure transmission with multiple antennas: the MIMOME channel. IEEE Trans Inform Theory 56(11):5515–5532MathSciNetCrossRef
8.
go back to reference Liang Y, Poor HV (2008) Multiple-access channels with confidential messages. IEEE Trans Inform Theory 54(3):976–1002MathSciNetCrossRef Liang Y, Poor HV (2008) Multiple-access channels with confidential messages. IEEE Trans Inform Theory 54(3):976–1002MathSciNetCrossRef
9.
go back to reference Husain MI et al (2012) CD-PHY: physical layer security in wireless networks through constellation diversity. In: Proceedings IEEE MILCOM, pp 1–9 Husain MI et al (2012) CD-PHY: physical layer security in wireless networks through constellation diversity. In: Proceedings IEEE MILCOM, pp 1–9
10.
go back to reference Althunibat S et al (2017) A physical-layer security scheme by phase-based adaptive modulation. IEEE Trans Veh Technol 66(11):9931–9942CrossRef Althunibat S et al (2017) A physical-layer security scheme by phase-based adaptive modulation. IEEE Trans Veh Technol 66(11):9931–9942CrossRef
11.
go back to reference Hou W, Wang X, Chouinard JY, Refaey A (2014) Physical Layer Authentication for Mobile Systems with Time-Varying Carrier Frequency Offsets. IEEE Trans Commun 62(5):1658– 1667CrossRef Hou W, Wang X, Chouinard JY, Refaey A (2014) Physical Layer Authentication for Mobile Systems with Time-Varying Carrier Frequency Offsets. IEEE Trans Commun 62(5):1658– 1667CrossRef
12.
go back to reference Xiao L et al (2007) Fingerprints in the ether: Using the physical layer for wireless authentication. IEEE ICC, Glasgow, 4646– 4651 Xiao L et al (2007) Fingerprints in the ether: Using the physical layer for wireless authentication. IEEE ICC, Glasgow, 4646– 4651
13.
go back to reference Althunibat S et al (2018) Physical-layer entity authentication scheme for mobile MIMO systems. IET Commun 12.6:712–718CrossRef Althunibat S et al (2018) Physical-layer entity authentication scheme for mobile MIMO systems. IET Commun 12.6:712–718CrossRef
14.
go back to reference Sayeed A, Perrig A (2008) Secure wireless communications: secret keys through multipath. IEEE ICASSP Sayeed A, Perrig A (2008) Secure wireless communications: secret keys through multipath. IEEE ICASSP
15.
go back to reference Hassan AA, Stark WE, Hershey JE, Chennakeshu S (1996) Cryptographic key agreement for mobile radio. Digital Signal Process 207-212:6 Hassan AA, Stark WE, Hershey JE, Chennakeshu S (1996) Cryptographic key agreement for mobile radio. Digital Signal Process 207-212:6
16.
go back to reference Azimi-sadjadi B et al (2007) Robust key generation from signal envelopes in wireless networks. In: Proceedings of the 14th ACM conference on computer and communications security. ACM Azimi-sadjadi B et al (2007) Robust key generation from signal envelopes in wireless networks. In: Proceedings of the 14th ACM conference on computer and communications security. ACM
18.
go back to reference Zan B, Gruteser M, Hu F (2012) Improving robustness of key extraction from wireless channels with differential techniques. IEEE ICNC, 980–984 Zan B, Gruteser M, Hu F (2012) Improving robustness of key extraction from wireless channels with differential techniques. IEEE ICNC, 980–984
19.
go back to reference Wang T, Liu Y, Vasilakos AV (2015) Survey on channel reciprocity based key establishment techniques for wireless systems. Wireless Netw 21.6:1835–1846CrossRef Wang T, Liu Y, Vasilakos AV (2015) Survey on channel reciprocity based key establishment techniques for wireless systems. Wireless Netw 21.6:1835–1846CrossRef
20.
go back to reference Mathur S, Miller R, Varshavsky A, Trappe W, Mandayam N (2011) Proximate: proximity-based secure pairing using ambient wireless signals. In: Proceedings of ACM Mobisys, New York, NY, USA Mathur S, Miller R, Varshavsky A, Trappe W, Mandayam N (2011) Proximate: proximity-based secure pairing using ambient wireless signals. In: Proceedings of ACM Mobisys, New York, NY, USA
21.
go back to reference E.Shehadeh Y, Alfandi O, Hogrefe D (2012) On improving the robustness of physical-layer key extraction mechanisms against delay and mobility. IEEE IWCMC, 1028–1033 E.Shehadeh Y, Alfandi O, Hogrefe D (2012) On improving the robustness of physical-layer key extraction mechanisms against delay and mobility. IEEE IWCMC, 1028–1033
22.
go back to reference Wang Q et al (2011) Fast and scalable secret key generation exploiting channel phase randomness in wireless networks. In: Proceedings of IEEE INFOCOM, pp 1422–1430 Wang Q et al (2011) Fast and scalable secret key generation exploiting channel phase randomness in wireless networks. In: Proceedings of IEEE INFOCOM, pp 1422–1430
23.
go back to reference El Hajj Shehadeh Y, Hogrefe D (2011) An optimal guardintervals based mechanism for key generation from multipath wireless channels. In: Proceedings of IFIP NTMS, pp 1–5 El Hajj Shehadeh Y, Hogrefe D (2011) An optimal guardintervals based mechanism for key generation from multipath wireless channels. In: Proceedings of IFIP NTMS, pp 1–5
24.
go back to reference Liu Y et al (2012) Exploiting channel diversity in secret key generation from multipath fading randomness. IEEE Trans Inf Forensics Secur 7(5):1484–1497CrossRef Liu Y et al (2012) Exploiting channel diversity in secret key generation from multipath fading randomness. IEEE Trans Inf Forensics Secur 7(5):1484–1497CrossRef
25.
go back to reference Zeng K (2015) Physical layer key generation in wireless networks: challenges and opportunities. IEEE Commun Mag 53.6:33–39CrossRef Zeng K (2015) Physical layer key generation in wireless networks: challenges and opportunities. IEEE Commun Mag 53.6:33–39CrossRef
26.
go back to reference Edman M et al (2016) On the security of key extraction from measuring physical quantities. IEEE Trans Inf Forensics Secur 11.8:1796–1806CrossRef Edman M et al (2016) On the security of key extraction from measuring physical quantities. IEEE Trans Inf Forensics Secur 11.8:1796–1806CrossRef
27.
go back to reference Zhang J et al (2016) Key generation from wireless channels: a review. IEEE Access 4:614–626CrossRef Zhang J et al (2016) Key generation from wireless channels: a review. IEEE Access 4:614–626CrossRef
Metadata
Title
A Physical-Layer Key Distribution Mechanism for IoT Networks
Authors
Mohanad Alhasanat
Saud Althunibat
Khalid A. Darabkh
Abdullah Alhasanat
Moath Alsafasfeh
Publication date
13-02-2019
Publisher
Springer US
Published in
Mobile Networks and Applications / Issue 1/2020
Print ISSN: 1383-469X
Electronic ISSN: 1572-8153
DOI
https://doi.org/10.1007/s11036-019-01219-5

Other articles of this Issue 1/2020

Mobile Networks and Applications 1/2020 Go to the issue