Skip to main content
Erschienen in: Mobile Networks and Applications 2/2019

24.10.2018

A Physical Encryption Scheme for Low-Power Wireless M2M Devices: a Dynamic Key Approach

verfasst von: Hassan N. Noura, Reem Melki, Ali Chehab, Mohammad M. Mansour

Erschienen in: Mobile Networks and Applications | Ausgabe 2/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Physical Layer Security (PLS) has emerged as a promising solution for small and resource-limited wireless communications devices, to reduce the overhead associated with the required security resources and latency. In contrast to traditional security schemes, PLS relies on and benefits from the random nature of physical channels. However, the majority of PLS schemes in the literature lack the notion of secrecy and dynamicity, and employ static keys to generate fixed cipher primitives. In this paper, a dynamic key generation scheme that combines a pre-shared/stored secret key with a dynamic nonce extracted from channel information (for each new session) is proposed. The main advantage of this approach is that it achieves a high-security level with minimal overhead. Moreover, the obtained dynamic key can be changed frequently upon any change in channel parameters. Using the produced dynamic keys, cipher primitives are generated (permutation operations), which get updated for each frame symbol. This process ensures different and unique encryption layers for each new input frame and for each symbol in the input frame. Equally important, the proposed encryption algorithm operates at the modulation symbol level in order to attain performance by limiting the effect of error propagation and by realizing parallel encryption/decryption for each frame symbol. In addition, a preamble encryption scheme is also proposed to prevent unauthorized synchronization or channel estimation by illegitimate users. The security level of the proposed cipher scheme mainly depends on a secret key and the dynamicity of the channel to update the cipher primitives used for each frame symbol. Finally, security and performance analyses validate the efficiency and the robustness of the proposed approach.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Weitere Produktempfehlungen anzeigen
Literatur
1.
Zurück zum Zitat Zhang X et al (2018) Compressive sensing based multiuser detection via iterative reweighed approach in M2M communications. IEEE Wireless Commun Lett Zhang X et al (2018) Compressive sensing based multiuser detection via iterative reweighed approach in M2M communications. IEEE Wireless Commun Lett
2.
Zurück zum Zitat Chen B et al (2017) A dynamic module deployment framework for M2M platforms. In: IEEE Proc Int Symp Cloud and Service Computing (SC2). IEEE, pp 194–200 Chen B et al (2017) A dynamic module deployment framework for M2M platforms. In: IEEE Proc Int Symp Cloud and Service Computing (SC2). IEEE, pp 194–200
3.
Zurück zum Zitat Akitaya T, Saba T (2015) Energy efficient artificial fast fading for MISO-OFDM systems. In: Proc IEEE Global Commun Conf (GLOBECOM), San Diego, CA, USA, pp 1–6 Akitaya T, Saba T (2015) Energy efficient artificial fast fading for MISO-OFDM systems. In: Proc IEEE Global Commun Conf (GLOBECOM), San Diego, CA, USA, pp 1–6
4.
Zurück zum Zitat Zhang J et al (2017) Design of an OFDM physical layer encryption scheme. IEEE Trans Veh Technol 66 (3):2114–2127CrossRef Zhang J et al (2017) Design of an OFDM physical layer encryption scheme. IEEE Trans Veh Technol 66 (3):2114–2127CrossRef
5.
Zurück zum Zitat Lampinen K, Westman T, Haikola V Method and apparatus for physical layer link adaptation based on traffic properties, Mar. 14 2017, uS Patent 9,596,057 Lampinen K, Westman T, Haikola V Method and apparatus for physical layer link adaptation based on traffic properties, Mar. 14 2017, uS Patent 9,596,057
6.
Zurück zum Zitat Hussein S, Noura H, Martin S, Boukhatem L, Agha KA (2013) ERCA: Efficient and robust cipher algorithm for LTE data confidentiality. In: Proceedings of the 16th ACM international conference on modeling, analysis & simulation of wireless and mobile systems. ACM, pp 299–308 Hussein S, Noura H, Martin S, Boukhatem L, Agha KA (2013) ERCA: Efficient and robust cipher algorithm for LTE data confidentiality. In: Proceedings of the 16th ACM international conference on modeling, analysis & simulation of wireless and mobile systems. ACM, pp 299–308
7.
Zurück zum Zitat Noura H, Hussein S, Martin S, Boukhatem L, Agha KA (2015) ERDIA: An efficient and robust data integrity algorithm for mobile and wireless networks. In: IEEE Proc. Wireless Commun Net. Conf. (WCNC). IEEE, pp 2103–2108 Noura H, Hussein S, Martin S, Boukhatem L, Agha KA (2015) ERDIA: An efficient and robust data integrity algorithm for mobile and wireless networks. In: IEEE Proc. Wireless Commun Net. Conf. (WCNC). IEEE, pp 2103–2108
8.
Zurück zum Zitat Huo F, Gong G (2014) A new efficient physical layer OFDM encryption scheme. In: Proc IEEE Int Conf Computer Commun (INFOCOM), Toronto, ON, Canada, pp 1024–1032 Huo F, Gong G (2014) A new efficient physical layer OFDM encryption scheme. In: Proc IEEE Int Conf Computer Commun (INFOCOM), Toronto, ON, Canada, pp 1024–1032
9.
Zurück zum Zitat Akitaya T, Asano S, Saba T (2014) Time-domain artificial noise generation technique using time-domain and frequency-domain processing for physical layer security in MIMO-OFDM systems. In: Proc IEEE Int Conf Commun (ICC), Sydney, NSW, Australia, pp 807–812 Akitaya T, Asano S, Saba T (2014) Time-domain artificial noise generation technique using time-domain and frequency-domain processing for physical layer security in MIMO-OFDM systems. In: Proc IEEE Int Conf Commun (ICC), Sydney, NSW, Australia, pp 807–812
10.
Zurück zum Zitat Wu X et al (2016) Artificial-noise-aided physical layer phase challenge-response authentication for practical OFDM transmission. IEEE Trans Wirel Commun 15(10):6611–6625CrossRef Wu X et al (2016) Artificial-noise-aided physical layer phase challenge-response authentication for practical OFDM transmission. IEEE Trans Wirel Commun 15(10):6611–6625CrossRef
11.
Zurück zum Zitat Cao Y, Jiang T, Han Z (2016) A survey of emerging M2M systems: Context, task, and objective. IEEE Internet of Things Journal 3(6):1246–1258CrossRef Cao Y, Jiang T, Han Z (2016) A survey of emerging M2M systems: Context, task, and objective. IEEE Internet of Things Journal 3(6):1246–1258CrossRef
12.
Zurück zum Zitat Atzori L, Iera A, Morabito G (2010) The internet of things: a survey. Comput Netw 54(15):2787–2805CrossRefMATH Atzori L, Iera A, Morabito G (2010) The internet of things: a survey. Comput Netw 54(15):2787–2805CrossRefMATH
13.
Zurück zum Zitat Asadi A, Wang Q, Mancuso V (2014) A survey on device-to-device communication in cellular networks. IEEE Commun Surv Tutorials 16(4):1801–1819. FourthquarterCrossRef Asadi A, Wang Q, Mancuso V (2014) A survey on device-to-device communication in cellular networks. IEEE Commun Surv Tutorials 16(4):1801–1819. FourthquarterCrossRef
14.
Zurück zum Zitat Chen S, et al. (2017) Vehicle-to-everything (v2x) services supported by LTE-based systems and 5G. IEEE Commun Standards Mag 1(2):70–76CrossRef Chen S, et al. (2017) Vehicle-to-everything (v2x) services supported by LTE-based systems and 5G. IEEE Commun Standards Mag 1(2):70–76CrossRef
15.
Zurück zum Zitat Adame T, Bel A, Bellalta B, Barcelo J, Oliver M (2014) IEEE 802.11 Ah: the WiFi approach for M2M communications. IEEE Wireless Commun 21(6):144–152CrossRef Adame T, Bel A, Bellalta B, Barcelo J, Oliver M (2014) IEEE 802.11 Ah: the WiFi approach for M2M communications. IEEE Wireless Commun 21(6):144–152CrossRef
16.
Zurück zum Zitat Huo F, Gong G (2014) A new efficient physical layer OFDM encryption scheme. In: Proc IEEE Int Conf Computer Commun (INFOCOM), Toronto, ON, Canada, pp 1024–1032 Huo F, Gong G (2014) A new efficient physical layer OFDM encryption scheme. In: Proc IEEE Int Conf Computer Commun (INFOCOM), Toronto, ON, Canada, pp 1024–1032
17.
Zurück zum Zitat Noura H, Melki R, Chehab A, Mansour M, Martin S (2018) Efficient and secure physical encryption scheme for Low-Power wireless M2M devices. In: IWCMC 2018 Security Symposium (IWCMC-security 2018), Limassol, Cyprus Noura H, Melki R, Chehab A, Mansour M, Martin S (2018) Efficient and secure physical encryption scheme for Low-Power wireless M2M devices. In: IWCMC 2018 Security Symposium (IWCMC-security 2018), Limassol, Cyprus
18.
Zurück zum Zitat Tsai Y-R, Tai C-W, Yang K-J (2014) Effective channel perturbation based on cyclic delay for physical layer security in OFDM systems. In: Proc Int Conf Inf science, Electronics Electrical Eng’g (ISEEE), vol 2, pp 823–827 Tsai Y-R, Tai C-W, Yang K-J (2014) Effective channel perturbation based on cyclic delay for physical layer security in OFDM systems. In: Proc Int Conf Inf science, Electronics Electrical Eng’g (ISEEE), vol 2, pp 823–827
19.
Zurück zum Zitat Hamamreh J, Arslan H (2017) Secure orthogonal transform division multiplexing (OTDM) waveform for 5G and beyond. IEEE Commun Lett 21(5):1191–1194CrossRef Hamamreh J, Arslan H (2017) Secure orthogonal transform division multiplexing (OTDM) waveform for 5G and beyond. IEEE Commun Lett 21(5):1191–1194CrossRef
20.
Zurück zum Zitat Zhang J, Duong TQ, Marshall A, Woods R (2016) Key generation from wireless channels: a review. IEEE Access 4:614–626CrossRef Zhang J, Duong TQ, Marshall A, Woods R (2016) Key generation from wireless channels: a review. IEEE Access 4:614–626CrossRef
21.
Zurück zum Zitat Zhang J, Marshall A, Woods R, Duong TQ (2016) Efficient key generation by exploiting randomness from channel responses of individual ofdm subcarriers. IEEE Trans Commun 64(6):2578–2588CrossRef Zhang J, Marshall A, Woods R, Duong TQ (2016) Efficient key generation by exploiting randomness from channel responses of individual ofdm subcarriers. IEEE Trans Commun 64(6):2578–2588CrossRef
22.
Zurück zum Zitat Zhang J, He B, Duong TQ, Woods R (2017) On the key generation from correlated wireless channels. IEEE Commun Lett 21(4):961–964CrossRef Zhang J, He B, Duong TQ, Woods R (2017) On the key generation from correlated wireless channels. IEEE Commun Lett 21(4):961–964CrossRef
23.
Zurück zum Zitat Rahbari H, Krunz M (2017) Exploiting frame preamble waveforms to support new physical-layer functions in OFDM-based 802.11 systems. IEEE Trans Wirel Commun 16(6):3775–3786CrossRef Rahbari H, Krunz M (2017) Exploiting frame preamble waveforms to support new physical-layer functions in OFDM-based 802.11 systems. IEEE Trans Wirel Commun 16(6):3775–3786CrossRef
24.
Zurück zum Zitat Zhang J, Marshall A, Woods R, Duong TQ (2017) Design of an ofdm physical layer encryption scheme. IEEE Trans Veh Technol 66(3):2114–2127CrossRef Zhang J, Marshall A, Woods R, Duong TQ (2017) Design of an ofdm physical layer encryption scheme. IEEE Trans Veh Technol 66(3):2114–2127CrossRef
25.
Zurück zum Zitat Badawy A et al (2016) Unleashing the secure potential of the wireless physical layer: Secret key generation methods. Phys Commun 19:1–10CrossRef Badawy A et al (2016) Unleashing the secure potential of the wireless physical layer: Secret key generation methods. Phys Commun 19:1–10CrossRef
26.
Zurück zum Zitat Noura H, Chehab A, Sleem L, Noura M, Couturier R, Mansour M (2018) One round cipher algorithm for multimedia IoT devices. Multimed Tools Appl 77(14):18383–18413CrossRef Noura H, Chehab A, Sleem L, Noura M, Couturier R, Mansour M (2018) One round cipher algorithm for multimedia IoT devices. Multimed Tools Appl 77(14):18383–18413CrossRef
27.
Zurück zum Zitat Bassham L et al (2010) A statistical test suite for random and pseudorandom number generators for cryptographic applications, NIST NIST Pubs 800-22 Rev 1a Bassham L et al (2010) A statistical test suite for random and pseudorandom number generators for cryptographic applications, NIST NIST Pubs 800-22 Rev 1a
28.
Zurück zum Zitat Lee Rodgers J, Nicewander WA (1988) Thirteen ways to look at the correlation coefficient. Amer Statist 42(1):59–66CrossRef Lee Rodgers J, Nicewander WA (1988) Thirteen ways to look at the correlation coefficient. Amer Statist 42(1):59–66CrossRef
29.
Zurück zum Zitat Massoudi A et al (2008) Overview on selective encryption of image and video: challenges and perspectives. EURASIP J Inf Secur 2008(1):1–18 Massoudi A et al (2008) Overview on selective encryption of image and video: challenges and perspectives. EURASIP J Inf Secur 2008(1):1–18
Metadaten
Titel
A Physical Encryption Scheme for Low-Power Wireless M2M Devices: a Dynamic Key Approach
verfasst von
Hassan N. Noura
Reem Melki
Ali Chehab
Mohammad M. Mansour
Publikationsdatum
24.10.2018
Verlag
Springer US
Erschienen in
Mobile Networks and Applications / Ausgabe 2/2019
Print ISSN: 1383-469X
Elektronische ISSN: 1572-8153
DOI
https://doi.org/10.1007/s11036-018-1151-7

Weitere Artikel der Ausgabe 2/2019

Mobile Networks and Applications 2/2019 Zur Ausgabe

Neuer Inhalt