Skip to main content
Log in

A Non-Time-Limited Channel Sounding Protocol for Key Generation

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

The traditional channel sounding protocol requires that the whole sounding process must be completed within a coherent time. When the communication delay is close to or greater than the coherent time, the protocol will not work properly. In order to solve this problem, a novel Non-Time-Limited channel sounding protocol is proposed. The proposed channel sounding protocol does not need to guarantee the channel reciprocity, has no limit on the communication delay and has strong multi-relay scalability. At the same time, a relay-assisted security extension mechanism is proposed to prevent the collaborative eavesdropping of the neighboring attackers. Simulation experiments show that the Non-Time-Limited channel sounding protocol can get rid of the influence of channel change speed on key generation, effectively improve key consistency in high-speed mobile scenarios, and still maintain good key agreement rate performance in underwater acoustic communication.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Rivest, R. L. (1978). A method for obtaining digital signatures and public-key cryptosystems. Communication of ACM, 21(2), 1–7.

    Article  MathSciNet  Google Scholar 

  2. Wang, T., Liu, Y., & Vasilakos, A. V. (2015). Survey on channel reciprocity based key establishment techniques for wireless systems. Wireless Networks, 21(6), 1–12.

    Google Scholar 

  3. Liu, Y., Hsiao-Hwa, C., & Liangmin, W. (2017). Physical layer security for next generation wireless networks: Theories, technologies, and challenges. IEEE Communications Surveys & Tutorials, 19(1), 347–376.

    Article  Google Scholar 

  4. Maurer, U. M. (1993). Secret key agreement by public discussion from common information. IEEE Transactions on Information Theory, 39(3), 733–742.

    Article  MathSciNet  Google Scholar 

  5. Liu, J., Hu, Q., Suny, R., Duz, X., & M. Guizani. (2020). A physical layer security scheme with compressed sensing in ofdm-based iot systems. In ICC 2020–2020 IEEE International Conference on Communications (ICC) (pp. 1–6).

  6. Han, Q., Liu, J., Shen, Z., Liu, J., & Gong, F. (2019). Vector partitioning quantization utilizing k-means clustering for physical layer secret key generation. Information Sciences, 512, 1171.

    MathSciNet  Google Scholar 

  7. Moara-Nkwe, K., Shi, Q., Lee, G. M., & Eiza, M. H. (2019). A novel physical layer secure key generation and refreshment scheme for wireless sensor networks. IEEE Access, 6, 11374–11387.

    Article  Google Scholar 

  8. Hajomer, A. A. E., Zhang, L., Yang, X., & Hu, W. (2020). Post-processing protocol for physical-layer key generation and distribution in fiber networks. IEEE Photonics Technology Letters, 32(15), 901–904.

    Article  Google Scholar 

  9. Xu, P., Hu, D., & Chen G. (2020). Physical-layer cooperative key generation with correlated eavesdropping channels in iot. In: IEEE International Conference on Internet of Things (iThings) (pp. 29–36).

  10. Shen, Z., Liu, J., & Han, Q. (2018). A local pilot auxiliary key generation scheme for secure underwater acoustic communication. Information Sciences, 473, 1–12.

    Article  Google Scholar 

  11. Zan, B., Gruteser, M., & Hu, F. (2012). Improving robustness of key extraction from wireless channels with differential techniques. In 2012 International Conference on Computing, Networking and Communications (ICNC) (pp. 980–984).

  12. Hou, X., Gao, C., Zhu, Y., & Yang, S. (2016). Detection of active attacks based on random orthogonal pilots. In 2016 8th International Conference on Wireless Communications Signal Processing (WCSP) (pp. 1–4).

  13. Qin, D., & Ding, Z. (2016). Exploiting multi-antenna non-reciprocal channels for shared secret key generation. IEEE Transactions on Information Forensics and Security, 11, 2693–2705.

    Article  Google Scholar 

  14. Ren, K., Su, H., & Wang, Q. (2011). Secret key generation exploiting channel characteristics in wireless communications. IEEE Wireless Communications, 18, 6–12.

    Article  Google Scholar 

  15. Kong, Y., Lyu, B., Chen, F., & Yang, Z. (2018). The security network coding system with physical layer key generation in two-way relay networks. IEEE Access, 6, 40673–40681.

    Article  Google Scholar 

  16. Xiao, S., Guo, Y., Huang, K., & Jin, L. (2017). High-rate secret key generation aided by multiple relays for internet of things. Electronics Letters, 53(17), 1198–1200.

    Article  Google Scholar 

  17. Zhang, S., Jin, L., Lou, Y., & Zhong, Z. (2018). Secret key generation based on two-way randomness for tdd-siso system. China Communications, 15(7), 202–216.

    Article  Google Scholar 

  18. Zhuang, Z., Jiang, S., Xu, Y., Luo, X., & Cheng, X. (2019). A physical layer key generation scheme based on full-duplex mode in wireless networks without fixed infrastructure. In: 2019 International Conference on Computer, Information and Telecommunication Systems (CITS) (pp. 1–5).

  19. Han, J., Zeng, X., Xue, X., & Ma, J. (2020). Physical layer secret key generation based on autoencoder for weakly correlated channels. In 2020 IEEE/CIC International Conference on Communications in China (ICCC) (pp. 1220–1225).

  20. Bakşi, S., & Popescu, D. C. (2019). Secret key generation with precoding and role reversal in mimo wireless systems. IEEE Transactions on Wireless Communications, 18(6), 3104–3112.

    Article  Google Scholar 

  21. Li, G., Hu, A., Peng, L., & Sun, C. (2016). The optimal preprocessing approach for secret key generation from ofdm channel measurements. In 2016 IEEE Globecom Workshops (GC Wkshps) (pp. 1–6).

Download references

Acknowledgements

This work were supported in part by Joint Fund of Ministry of Education of China under Grant 6141A02022338 and Natural Science Basic Research Program of Shaanxi (Program No.2021JM-134).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shen Zhiwei.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Jingmei, L., Zhiwei, S., Zhuangzhuang, R. et al. A Non-Time-Limited Channel Sounding Protocol for Key Generation. Wireless Pers Commun 120, 787–807 (2021). https://doi.org/10.1007/s11277-021-08490-4

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-021-08490-4

Keywords

Navigation