Skip to main content

Efficient and Appropriate Key Generation Scheme in Different IoT Scenarios

  • Conference paper
  • First Online:
Information and Communications Security (ICICS 2023)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 14252))

Included in the following conference series:

  • 654 Accesses

Abstract

Most Internet of Things (IoT) devices have limited computing power and resources. Therefore, lightweight encryption protocols are essential to secure communications between IoT devices. As a promising technique, physical layer key generation has been widely used in IoT applications to secure communication between devices. In this paper, we propose an Efficient and Appropriate Key Generation Scheme (EAKGS) for various IoT scenarios. According to the characteristics of the channel data, we design the pre-judgment stage to classify the values. Considering the key generation requirements and measured values characteristics in different scenarios, we propose efficient key generation schemes for static and dynamic scenarios. Furthermore, we conduct real-world experimental analysis and validation of our scheme. We analyze the feasibility of EAKGS from key generation rate, key error rate and randomness. Our experimental results demonstrate that EAKGS meets the requirements for adaptability and key performance.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Mathur, S., Trappe, W., Mandayam, N.B., Ye, C., Reznik, A.: Radio-telepathy: extracting a secret key from an unauthenticated wireless channel. In: Proceedings of 2008 the Annual International Conference on Mobile Computing and Networking, pp. 128–139 (2008)

    Google Scholar 

  2. Jana, S., Premnath, S.N., Clark, M., Kasera, S.K., Patwari, N., Krishnamurthy, S.V.: On the effectiveness of secret key extraction from wireless signal strength in real environments. In: Proceedings of 2009 the Annual International Conference on Mobile Computing and Networking, pp. 321–332 (2009)

    Google Scholar 

  3. Abdelgader, A.M.S., Wu, L.: A secret key extraction technique applied in vehicular networks. In: Proceedings of 2014 IEEE International Conference on Computational Science and Engineering, pp. 1396–1403 (2014)

    Google Scholar 

  4. Zhao, H., Zhang, Y., Huang, X., Xiang, Y.: An adaptive secret key establishment scheme in smart home environments. In: Proceedings of 2019 IEEE International Conference on Communications, pp. 1–6 (2019)

    Google Scholar 

  5. Ji, Z., et al.: Physical-layer-based secure communications for static and low-latency industrial internet of things. IEEE Internet Things J. 9(19), 18 392–18 405 (2022)

    Google Scholar 

  6. Li, Z., Pei, Q., Markwood, I., Liu, Y., Zhu, H.: Secret key establishment via RSS trajectory matching between wearable devices. IEEE Trans. Inf. Forensics Secur. 13(3), 802–817 (2017)

    Article  Google Scholar 

  7. Zhan, F., Yao, N.: On the using of discrete wavelet transform for physical layer key generation. Ad Hoc Netw. 64, 22–31 (2017)

    Article  Google Scholar 

  8. Margelis, G., Fafoutis, X., Oikonomou, G.C., Piechocki, R.J., Tryfonas, T., Thomas, P.: Physical layer secret-key generation with discreet cosine transform for the internet of things. In: Proceedings of 2017 IEEE International Conference on Communications, pp. 1–6 (2017)

    Google Scholar 

  9. Weinand, A., de la Fuente, A., Lipps, C., Karrenbauer, M.: Physical layer security based key management for LoRaWAN. In: Workshop on Next Generation Networks and Applications (2021)

    Google Scholar 

  10. Thai, C.D.T., Lee, J., Quek, T.Q.S.: Secret group key generation in physical layer for mesh topology. In: Proceedings of 2015 IEEE Global Communications Conference, pp. 1–6 (2015)

    Google Scholar 

  11. Tang, J., Wen, H., Song, H.-H., Jiao, L., Zeng, K.: Sharing secrets via wireless broadcasting: a new efficient physical layer group secret key generation for multiple IoT devices. IEEE Internet Things J. 9(16), 15 228–15 239 (2022)

    Google Scholar 

  12. Yuliana, M.: An efficient key generation for the internet of things based synchronized quantization. Sensors 19(12), 2674 (2019)

    Article  Google Scholar 

  13. Dodis, Y., Kanukurthi, B., Katz, J., Reyzin, L., Smith, A.: Robust fuzzy extractors and authenticated key agreement from close secrets. IEEE Trans. Inf. Theory 58(9), 6207–6222 (2012)

    Article  MathSciNet  MATH  Google Scholar 

  14. Dodis, Y., Ostrovsky, R., Reyzin, L., Smith, A.: Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. SIAM J. Comput. 38(1), 97–139 (2008)

    Article  MathSciNet  MATH  Google Scholar 

  15. Li, X., Liu, J., Yao, Q., Ma, J.: Efficient and consistent key extraction based on received signal strength for vehicular ad hoc networks. IEEE Access 5, 5281–5291 (2017)

    Article  Google Scholar 

Download references

Acknowledgment

This work was partially supported by JSPS Grant-in-Aid for Scientific Research (C) 23K11103.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chunhua Su .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zhao, H., Guo, E., Su, C., Huang, X. (2023). Efficient and Appropriate Key Generation Scheme in Different IoT Scenarios. In: Wang, D., Yung, M., Liu, Z., Chen, X. (eds) Information and Communications Security. ICICS 2023. Lecture Notes in Computer Science, vol 14252. Springer, Singapore. https://doi.org/10.1007/978-981-99-7356-9_43

Download citation

  • DOI: https://doi.org/10.1007/978-981-99-7356-9_43

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-99-7355-2

  • Online ISBN: 978-981-99-7356-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics