4.6 Article

Physical Layer Secret Key Generation Using Joint Interference and Phase Shift Keying Modulation

期刊

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TMTT.2021.3058183

关键词

Interference; Modulation; Protocols; Physical layer; Jamming; Signal to noise ratio; Phase shift keying; Full-duplex technology; interference; Internet of Things (IoT); physical layer; secret key; security

向作者/读者索取更多资源

In this study, a novel approach for physical layer security and key generation based on full-duplex communication was proposed, which utilizes random secret key exchange to provide efficient protection mechanisms without the need for node location information, effectively defending against eavesdropper attacks.
In existing physical layer security (PLS) and key generation protocols, major assumptions, including channel reciprocity, localization, and synchronization between the legitimate parties, are often considered. However, these assumptions are arguable in practice leading to major barriers in building systems based on PLS protocols. To overcome these barriers, we proposed, designed, and implemented a novel embedded architecture for distributed Internet-of-Things (IoT) networks that utilize a master-slave full-duplex communication to exchange a random secret key. In the proposed architecture, an IoT node generates a phase-modulated random key/data and transmits it to a master node in the presence of an eavesdropper, referred to as Eve. The master node, simultaneously, broadcasts a high-power signal using an omnidirectional antenna, which is received as a jammer signal or interference by Eve. This results in a high bit error rate (BER) making the data undetectable by Eve. The two legitimate nodes communicate in a full-duplex fashion and, consequently, subtract their transmitted signals from the received signal (self-interference cancellation). Our proposed protocol does not require any knowledge of the node locations. In particular, we show, using theoretical and measurement results, that our proposed approach provides significantly better security measures, in terms of the BER at Eve's location, compared to a conventional method based on directional beamforming antennas. Also, it is proved that in our novel system, the possible eavesdropping region, BER < 10(-1), is always smaller than the reliable communication region, BER < 10(-3).

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据