Skip to main content
Erschienen in: Mobile Networks and Applications 1/2020

13.02.2019

A Physical-Layer Key Distribution Mechanism for IoT Networks

verfasst von: Mohanad Alhasanat, Saud Althunibat, Khalid A. Darabkh, Abdullah Alhasanat, Moath Alsafasfeh

Erschienen in: Mobile Networks and Applications | Ausgabe 1/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Physical layer security has gained an increasing attention due to its efficiency and simplicity as compared to other conventional security protocols. Thus, it has been recently nominated for Internet of Things (IoT) applications. In this paper, a novel key distribution mechanism is proposed for IoT networks. The proposed mechanism exploits the channel diversity to distribute encryption keys among nodes within the network. A main novelty aspect of the proposed mechanism is that it guarantees distributing different keys with different lengths to all nodes at the same time. In addition, an intelligent eavesdropper model has been considered. Simulation results prove the high performance of the proposed scheme and its robustness against channel estimation errors, and immunity against eavesdroppers.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Weitere Produktempfehlungen anzeigen
Literatur
1.
Zurück zum Zitat Atzori L, Iera A, Morabito G (2010) The internet of things: a survey. Comput Netw 54.15:2787–2805CrossRef Atzori L, Iera A, Morabito G (2010) The internet of things: a survey. Comput Netw 54.15:2787–2805CrossRef
2.
Zurück zum Zitat Luong NC, Hoang DT, Wang P, Niyato D, Kim DI, Han Z (2016) Data collection and wireless communication in internet of things (IoT) using economic analysis and pricing models: a survey. IEEE Commun Surv Tutorials 18(4):2546–2590CrossRef Luong NC, Hoang DT, Wang P, Niyato D, Kim DI, Han Z (2016) Data collection and wireless communication in internet of things (IoT) using economic analysis and pricing models: a survey. IEEE Commun Surv Tutorials 18(4):2546–2590CrossRef
3.
Zurück zum Zitat Wortmann F, Flüchter K (2015) Internet of things. Business Inf Syst Eng 57.3:221–224CrossRef Wortmann F, Flüchter K (2015) Internet of things. Business Inf Syst Eng 57.3:221–224CrossRef
4.
Zurück zum Zitat Granjal J, Monteiro E, Silva JS (2015) Security for the internet of things: a survey of existing protocols and open research issues. IEEE Commun Surv Tutorials 17(3):1294–1312CrossRef Granjal J, Monteiro E, Silva JS (2015) Security for the internet of things: a survey of existing protocols and open research issues. IEEE Commun Surv Tutorials 17(3):1294–1312CrossRef
5.
Zurück zum Zitat Mukherjee A (2015) Physical-layer security in the internet of things: sensing and communication confidentiality under resource constraints. Proc IEEE 103.10:1747–1761CrossRef Mukherjee A (2015) Physical-layer security in the internet of things: sensing and communication confidentiality under resource constraints. Proc IEEE 103.10:1747–1761CrossRef
6.
Zurück zum Zitat Shiu YS, Chang SY, Wu HC, Huang SCH, Chen HH (2011) Physical layer security in wireless networks: a tutorial. IEEE Wireless Commun 18(2):66–74CrossRef Shiu YS, Chang SY, Wu HC, Huang SCH, Chen HH (2011) Physical layer security in wireless networks: a tutorial. IEEE Wireless Commun 18(2):66–74CrossRef
7.
Zurück zum Zitat Khisti A, Wornell GW (2010) Secure transmission with multiple antennas: the MIMOME channel. IEEE Trans Inform Theory 56(11):5515–5532MathSciNetCrossRef Khisti A, Wornell GW (2010) Secure transmission with multiple antennas: the MIMOME channel. IEEE Trans Inform Theory 56(11):5515–5532MathSciNetCrossRef
8.
Zurück zum Zitat Liang Y, Poor HV (2008) Multiple-access channels with confidential messages. IEEE Trans Inform Theory 54(3):976–1002MathSciNetCrossRef Liang Y, Poor HV (2008) Multiple-access channels with confidential messages. IEEE Trans Inform Theory 54(3):976–1002MathSciNetCrossRef
9.
Zurück zum Zitat Husain MI et al (2012) CD-PHY: physical layer security in wireless networks through constellation diversity. In: Proceedings IEEE MILCOM, pp 1–9 Husain MI et al (2012) CD-PHY: physical layer security in wireless networks through constellation diversity. In: Proceedings IEEE MILCOM, pp 1–9
10.
Zurück zum Zitat Althunibat S et al (2017) A physical-layer security scheme by phase-based adaptive modulation. IEEE Trans Veh Technol 66(11):9931–9942CrossRef Althunibat S et al (2017) A physical-layer security scheme by phase-based adaptive modulation. IEEE Trans Veh Technol 66(11):9931–9942CrossRef
11.
Zurück zum Zitat Hou W, Wang X, Chouinard JY, Refaey A (2014) Physical Layer Authentication for Mobile Systems with Time-Varying Carrier Frequency Offsets. IEEE Trans Commun 62(5):1658– 1667CrossRef Hou W, Wang X, Chouinard JY, Refaey A (2014) Physical Layer Authentication for Mobile Systems with Time-Varying Carrier Frequency Offsets. IEEE Trans Commun 62(5):1658– 1667CrossRef
12.
Zurück zum Zitat Xiao L et al (2007) Fingerprints in the ether: Using the physical layer for wireless authentication. IEEE ICC, Glasgow, 4646– 4651 Xiao L et al (2007) Fingerprints in the ether: Using the physical layer for wireless authentication. IEEE ICC, Glasgow, 4646– 4651
13.
Zurück zum Zitat Althunibat S et al (2018) Physical-layer entity authentication scheme for mobile MIMO systems. IET Commun 12.6:712–718CrossRef Althunibat S et al (2018) Physical-layer entity authentication scheme for mobile MIMO systems. IET Commun 12.6:712–718CrossRef
14.
Zurück zum Zitat Sayeed A, Perrig A (2008) Secure wireless communications: secret keys through multipath. IEEE ICASSP Sayeed A, Perrig A (2008) Secure wireless communications: secret keys through multipath. IEEE ICASSP
15.
Zurück zum Zitat Hassan AA, Stark WE, Hershey JE, Chennakeshu S (1996) Cryptographic key agreement for mobile radio. Digital Signal Process 207-212:6 Hassan AA, Stark WE, Hershey JE, Chennakeshu S (1996) Cryptographic key agreement for mobile radio. Digital Signal Process 207-212:6
16.
Zurück zum Zitat Azimi-sadjadi B et al (2007) Robust key generation from signal envelopes in wireless networks. In: Proceedings of the 14th ACM conference on computer and communications security. ACM Azimi-sadjadi B et al (2007) Robust key generation from signal envelopes in wireless networks. In: Proceedings of the 14th ACM conference on computer and communications security. ACM
18.
Zurück zum Zitat Zan B, Gruteser M, Hu F (2012) Improving robustness of key extraction from wireless channels with differential techniques. IEEE ICNC, 980–984 Zan B, Gruteser M, Hu F (2012) Improving robustness of key extraction from wireless channels with differential techniques. IEEE ICNC, 980–984
19.
Zurück zum Zitat Wang T, Liu Y, Vasilakos AV (2015) Survey on channel reciprocity based key establishment techniques for wireless systems. Wireless Netw 21.6:1835–1846CrossRef Wang T, Liu Y, Vasilakos AV (2015) Survey on channel reciprocity based key establishment techniques for wireless systems. Wireless Netw 21.6:1835–1846CrossRef
20.
Zurück zum Zitat Mathur S, Miller R, Varshavsky A, Trappe W, Mandayam N (2011) Proximate: proximity-based secure pairing using ambient wireless signals. In: Proceedings of ACM Mobisys, New York, NY, USA Mathur S, Miller R, Varshavsky A, Trappe W, Mandayam N (2011) Proximate: proximity-based secure pairing using ambient wireless signals. In: Proceedings of ACM Mobisys, New York, NY, USA
21.
Zurück zum Zitat E.Shehadeh Y, Alfandi O, Hogrefe D (2012) On improving the robustness of physical-layer key extraction mechanisms against delay and mobility. IEEE IWCMC, 1028–1033 E.Shehadeh Y, Alfandi O, Hogrefe D (2012) On improving the robustness of physical-layer key extraction mechanisms against delay and mobility. IEEE IWCMC, 1028–1033
22.
Zurück zum Zitat Wang Q et al (2011) Fast and scalable secret key generation exploiting channel phase randomness in wireless networks. In: Proceedings of IEEE INFOCOM, pp 1422–1430 Wang Q et al (2011) Fast and scalable secret key generation exploiting channel phase randomness in wireless networks. In: Proceedings of IEEE INFOCOM, pp 1422–1430
23.
Zurück zum Zitat El Hajj Shehadeh Y, Hogrefe D (2011) An optimal guardintervals based mechanism for key generation from multipath wireless channels. In: Proceedings of IFIP NTMS, pp 1–5 El Hajj Shehadeh Y, Hogrefe D (2011) An optimal guardintervals based mechanism for key generation from multipath wireless channels. In: Proceedings of IFIP NTMS, pp 1–5
24.
Zurück zum Zitat Liu Y et al (2012) Exploiting channel diversity in secret key generation from multipath fading randomness. IEEE Trans Inf Forensics Secur 7(5):1484–1497CrossRef Liu Y et al (2012) Exploiting channel diversity in secret key generation from multipath fading randomness. IEEE Trans Inf Forensics Secur 7(5):1484–1497CrossRef
25.
Zurück zum Zitat Zeng K (2015) Physical layer key generation in wireless networks: challenges and opportunities. IEEE Commun Mag 53.6:33–39CrossRef Zeng K (2015) Physical layer key generation in wireless networks: challenges and opportunities. IEEE Commun Mag 53.6:33–39CrossRef
26.
Zurück zum Zitat Edman M et al (2016) On the security of key extraction from measuring physical quantities. IEEE Trans Inf Forensics Secur 11.8:1796–1806CrossRef Edman M et al (2016) On the security of key extraction from measuring physical quantities. IEEE Trans Inf Forensics Secur 11.8:1796–1806CrossRef
27.
Zurück zum Zitat Zhang J et al (2016) Key generation from wireless channels: a review. IEEE Access 4:614–626CrossRef Zhang J et al (2016) Key generation from wireless channels: a review. IEEE Access 4:614–626CrossRef
Metadaten
Titel
A Physical-Layer Key Distribution Mechanism for IoT Networks
verfasst von
Mohanad Alhasanat
Saud Althunibat
Khalid A. Darabkh
Abdullah Alhasanat
Moath Alsafasfeh
Publikationsdatum
13.02.2019
Verlag
Springer US
Erschienen in
Mobile Networks and Applications / Ausgabe 1/2020
Print ISSN: 1383-469X
Elektronische ISSN: 1572-8153
DOI
https://doi.org/10.1007/s11036-019-01219-5

Weitere Artikel der Ausgabe 1/2020

Mobile Networks and Applications 1/2020 Zur Ausgabe

Neuer Inhalt