Skip to main content

Protecting Physical Layer Secret Key Generation from Active Attacks

Author(s): Mitev, Miroslav; Chorti, Arsenia; Belmega, E Veronica; Poor, H Vincent

Download
To refer to this page use: http://arks.princeton.edu/ark:/88435/pr1wm13t5f
Full metadata record
DC FieldValueLanguage
dc.contributor.authorMitev, Miroslav-
dc.contributor.authorChorti, Arsenia-
dc.contributor.authorBelmega, E Veronica-
dc.contributor.authorPoor, H Vincent-
dc.date.accessioned2024-02-05T01:30:23Z-
dc.date.available2024-02-05T01:30:23Z-
dc.identifier.citationMitev, Miroslav, Chorti, Arsenia, Belmega, E Veronica, Poor, H Vincent. (Protecting Physical Layer Secret Key Generation from Active Attacks. Entropy, 23 (8), 960 - 960. doi:10.3390/e23080960en_US
dc.identifier.urihttp://arks.princeton.edu/ark:/88435/pr1wm13t5f-
dc.description.abstractLightweight session key agreement schemes are expected to play a central role in building Internet of things (IoT) security in sixth-generation (6G) networks. A well-established approach deriving from the physical layer is a secret key generation (SKG) from shared randomness (in the form of wireless fading coefficients). However, although practical, SKG schemes have been shown to be vulnerable to active attacks over the initial “advantage distillation” phase, throughout which estimates of the fading coefficients are obtained at the legitimate users. In fact, by injecting carefully designed signals during this phase, a man-in-the-middle (MiM) attack could manipulate and control part of the reconciled bits and thus render SKG vulnerable to brute force attacks. Alternatively, a denial of service attack can be mounted by a reactive jammer. In this paper, we investigate the impact of injection and jamming attacks during the advantage distillation in a multiple-input–multiple-output (MIMO) system. First, we show that a MiM attack can be mounted as long as the attacker has one extra antenna with respect to the legitimate users, and we propose a pilot randomization scheme that allows the legitimate users to successfully reduce the injection attack to a less harmful jamming attack. Secondly, by taking a game-theoretic approach we evaluate the optimal strategies available to the legitimate users in the presence of reactive jammers.en_US
dc.languageenen_US
dc.language.isoen_USen_US
dc.relation.ispartofEntropyen_US
dc.rightsFinal published version. This is an open access article.en_US
dc.titleProtecting Physical Layer Secret Key Generation from Active Attacksen_US
dc.typeJournal Articleen_US
dc.identifier.doidoi:10.3390/e23080960-
dc.date.eissued2021-07-27en_US
dc.identifier.eissn1099-4300-
pu.type.symplectichttp://www.symplectic.co.uk/publications/atom-terms/1.0/journal-articleen_US

Files in This Item:
File Description SizeFormat 
Protecting Physical Layer Secret Key Generation from Active Attacks. .pdf294.57 kBAdobe PDFView/Download


Items in OAR@Princeton are protected by copyright, with all rights reserved, unless otherwise indicated.