Advertisement

A Physical-Layer Key Distribution Mechanism for IoT Networks

  • Mohanad AlhasanatEmail author
  • Saud Althunibat
  • Khalid Darabkeh
  • Abdullah Alhasanat
  • Moath Alsafasfeh
Article

Abstract

Physical layer security has gained an increasing attention due to its efficiency and simplicity as compared to other conventional security protocols. Thus, it has been recently nominated for Internet of Things (IoT) applications. In this paper, a novel key distribution mechanism is proposed for IoT networks. The proposed mechanism exploits the channel diversity to distribute encryption keys among nodes within the network. A main novelty aspect of the proposed mechanism is that it guarantees distributing different keys with different lengths to all nodes at the same time. In addition, an intelligent eavesdropper model has been considered. Simulation results prove the high performance of the proposed scheme and its robustness against channel estimation errors, and immunity against eavesdroppers.

Keywords

Physical layer security Key distribution Internet of things 

Notes

References

  1. 1.
    Atzori L, Iera A, Morabito G (2010) The internet of things: a survey. Comput Netw 54.15:2787–2805CrossRefzbMATHGoogle Scholar
  2. 2.
    Luong NC, Hoang DT, Wang P, Niyato D, Kim DI, Han Z (2016) Data collection and wireless communication in internet of things (IoT) using economic analysis and pricing models: a survey. IEEE Commun Surv Tutorials 18(4):2546–2590CrossRefGoogle Scholar
  3. 3.
    Wortmann F, Flüchter K (2015) Internet of things. Business Inf Syst Eng 57.3:221–224CrossRefGoogle Scholar
  4. 4.
    Granjal J, Monteiro E, Silva JS (2015) Security for the internet of things: a survey of existing protocols and open research issues. IEEE Commun Surv Tutorials 17(3):1294–1312CrossRefGoogle Scholar
  5. 5.
    Mukherjee A (2015) Physical-layer security in the internet of things: sensing and communication confidentiality under resource constraints. Proc IEEE 103.10:1747–1761CrossRefGoogle Scholar
  6. 6.
    Shiu YS, Chang SY, Wu HC, Huang SCH, Chen HH (2011) Physical layer security in wireless networks: a tutorial. IEEE Wireless Commun 18(2):66–74CrossRefGoogle Scholar
  7. 7.
    Khisti A, Wornell GW (2010) Secure transmission with multiple antennas: the MIMOME channel. IEEE Trans Inform Theory 56(11):5515–5532MathSciNetCrossRefzbMATHGoogle Scholar
  8. 8.
    Liang Y, Poor HV (2008) Multiple-access channels with confidential messages. IEEE Trans Inform Theory 54(3):976–1002MathSciNetCrossRefzbMATHGoogle Scholar
  9. 9.
    Husain MI et al (2012) CD-PHY: physical layer security in wireless networks through constellation diversity. In: Proceedings IEEE MILCOM, pp 1–9Google Scholar
  10. 10.
    Althunibat S et al (2017) A physical-layer security scheme by phase-based adaptive modulation. IEEE Trans Veh Technol 66(11):9931–9942CrossRefGoogle Scholar
  11. 11.
    Hou W, Wang X, Chouinard JY, Refaey A (2014) Physical Layer Authentication for Mobile Systems with Time-Varying Carrier Frequency Offsets. IEEE Trans Commun 62(5):1658–1667CrossRefGoogle Scholar
  12. 12.
    Xiao L et al (2007) Fingerprints in the ether: Using the physical layer for wireless authentication. IEEE ICC, Glasgow, 4646–4651Google Scholar
  13. 13.
    Althunibat S et al (2018) Physical-layer entity authentication scheme for mobile MIMO systems. IET Commun 12.6:712–718CrossRefGoogle Scholar
  14. 14.
    Sayeed A, Perrig A (2008) Secure wireless communications: secret keys through multipath. IEEE ICASSPGoogle Scholar
  15. 15.
    Hassan AA, Stark WE, Hershey JE, Chennakeshu S (1996) Cryptographic key agreement for mobile radio. Digital Signal Process 207-212:6Google Scholar
  16. 16.
    Azimi-sadjadi B et al (2007) Robust key generation from signal envelopes in wireless networks. In: Proceedings of the 14th ACM conference on computer and communications security. ACMGoogle Scholar
  17. 17.
    Premnath SN, Jana S, Croft J, Gowda PL, Clark M, Kasera SK et al (2013) Secret key extraction from wireless signal strength in real environments. IEEE Trans Mob Comput 12(5):917–930.  https://doi.org/10.1109/TMC.2012.63 CrossRefGoogle Scholar
  18. 18.
    Zan B, Gruteser M, Hu F (2012) Improving robustness of key extraction from wireless channels with differential techniques. IEEE ICNC, 980–984Google Scholar
  19. 19.
    Wang T, Liu Y, Vasilakos AV (2015) Survey on channel reciprocity based key establishment techniques for wireless systems. Wireless Netw 21.6:1835–1846CrossRefGoogle Scholar
  20. 20.
    Mathur S, Miller R, Varshavsky A, Trappe W, Mandayam N (2011) Proximate: proximity-based secure pairing using ambient wireless signals. In: Proceedings of ACM Mobisys, New York, NY, USAGoogle Scholar
  21. 21.
    E.Shehadeh Y, Alfandi O, Hogrefe D (2012) On improving the robustness of physical-layer key extraction mechanisms against delay and mobility. IEEE IWCMC, 1028–1033Google Scholar
  22. 22.
    Wang Q et al (2011) Fast and scalable secret key generation exploiting channel phase randomness in wireless networks. In: Proceedings of IEEE INFOCOM, pp 1422–1430Google Scholar
  23. 23.
    El Hajj Shehadeh Y, Hogrefe D (2011) An optimal guardintervals based mechanism for key generation from multipath wireless channels. In: Proceedings of IFIP NTMS, pp 1–5Google Scholar
  24. 24.
    Liu Y et al (2012) Exploiting channel diversity in secret key generation from multipath fading randomness. IEEE Trans Inf Forensics Secur 7(5):1484–1497CrossRefGoogle Scholar
  25. 25.
    Zeng K (2015) Physical layer key generation in wireless networks: challenges and opportunities. IEEE Commun Mag 53.6:33–39CrossRefGoogle Scholar
  26. 26.
    Edman M et al (2016) On the security of key extraction from measuring physical quantities. IEEE Trans Inf Forensics Secur 11.8:1796–1806CrossRefGoogle Scholar
  27. 27.
    Zhang J et al (2016) Key generation from wireless channels: a review. IEEE Access 4:614–626CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  • Mohanad Alhasanat
    • 1
    Email author
  • Saud Althunibat
    • 2
  • Khalid Darabkeh
    • 3
  • Abdullah Alhasanat
    • 1
    • 4
  • Moath Alsafasfeh
    • 1
  1. 1.Department of Computer EngineeringAl-Hussein Bin Talal UniversityMa’anJordan
  2. 2.Department of Communications EngineeringAl-Hussein Bin Talal UniversityMa’anJordan
  3. 3.Computer Engineering Department, Faculty of Engineering and TechnologyThe University of JordanAmmanJordan
  4. 4.Department of Electrical and Computer Engineering, College of Engineering and ArchitectureUniversity of NizwaNizwaOman

Personalised recommendations