Abstract
Most Internet of Things (IoT) devices have limited computing power and resources. Therefore, lightweight encryption protocols are essential to secure communications between IoT devices. As a promising technique, physical layer key generation has been widely used in IoT applications to secure communication between devices. In this paper, we propose an Efficient and Appropriate Key Generation Scheme (EAKGS) for various IoT scenarios. According to the characteristics of the channel data, we design the pre-judgment stage to classify the values. Considering the key generation requirements and measured values characteristics in different scenarios, we propose efficient key generation schemes for static and dynamic scenarios. Furthermore, we conduct real-world experimental analysis and validation of our scheme. We analyze the feasibility of EAKGS from key generation rate, key error rate and randomness. Our experimental results demonstrate that EAKGS meets the requirements for adaptability and key performance.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Mathur, S., Trappe, W., Mandayam, N.B., Ye, C., Reznik, A.: Radio-telepathy: extracting a secret key from an unauthenticated wireless channel. In: Proceedings of 2008 the Annual International Conference on Mobile Computing and Networking, pp. 128–139 (2008)
Jana, S., Premnath, S.N., Clark, M., Kasera, S.K., Patwari, N., Krishnamurthy, S.V.: On the effectiveness of secret key extraction from wireless signal strength in real environments. In: Proceedings of 2009 the Annual International Conference on Mobile Computing and Networking, pp. 321–332 (2009)
Abdelgader, A.M.S., Wu, L.: A secret key extraction technique applied in vehicular networks. In: Proceedings of 2014 IEEE International Conference on Computational Science and Engineering, pp. 1396–1403 (2014)
Zhao, H., Zhang, Y., Huang, X., Xiang, Y.: An adaptive secret key establishment scheme in smart home environments. In: Proceedings of 2019 IEEE International Conference on Communications, pp. 1–6 (2019)
Ji, Z., et al.: Physical-layer-based secure communications for static and low-latency industrial internet of things. IEEE Internet Things J. 9(19), 18 392–18 405 (2022)
Li, Z., Pei, Q., Markwood, I., Liu, Y., Zhu, H.: Secret key establishment via RSS trajectory matching between wearable devices. IEEE Trans. Inf. Forensics Secur. 13(3), 802–817 (2017)
Zhan, F., Yao, N.: On the using of discrete wavelet transform for physical layer key generation. Ad Hoc Netw. 64, 22–31 (2017)
Margelis, G., Fafoutis, X., Oikonomou, G.C., Piechocki, R.J., Tryfonas, T., Thomas, P.: Physical layer secret-key generation with discreet cosine transform for the internet of things. In: Proceedings of 2017 IEEE International Conference on Communications, pp. 1–6 (2017)
Weinand, A., de la Fuente, A., Lipps, C., Karrenbauer, M.: Physical layer security based key management for LoRaWAN. In: Workshop on Next Generation Networks and Applications (2021)
Thai, C.D.T., Lee, J., Quek, T.Q.S.: Secret group key generation in physical layer for mesh topology. In: Proceedings of 2015 IEEE Global Communications Conference, pp. 1–6 (2015)
Tang, J., Wen, H., Song, H.-H., Jiao, L., Zeng, K.: Sharing secrets via wireless broadcasting: a new efficient physical layer group secret key generation for multiple IoT devices. IEEE Internet Things J. 9(16), 15 228–15 239 (2022)
Yuliana, M.: An efficient key generation for the internet of things based synchronized quantization. Sensors 19(12), 2674 (2019)
Dodis, Y., Kanukurthi, B., Katz, J., Reyzin, L., Smith, A.: Robust fuzzy extractors and authenticated key agreement from close secrets. IEEE Trans. Inf. Theory 58(9), 6207–6222 (2012)
Dodis, Y., Ostrovsky, R., Reyzin, L., Smith, A.: Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. SIAM J. Comput. 38(1), 97–139 (2008)
Li, X., Liu, J., Yao, Q., Ma, J.: Efficient and consistent key extraction based on received signal strength for vehicular ad hoc networks. IEEE Access 5, 5281–5291 (2017)
Acknowledgment
This work was partially supported by JSPS Grant-in-Aid for Scientific Research (C) 23K11103.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Zhao, H., Guo, E., Su, C., Huang, X. (2023). Efficient and Appropriate Key Generation Scheme in Different IoT Scenarios. In: Wang, D., Yung, M., Liu, Z., Chen, X. (eds) Information and Communications Security. ICICS 2023. Lecture Notes in Computer Science, vol 14252. Springer, Singapore. https://doi.org/10.1007/978-981-99-7356-9_43
Download citation
DOI: https://doi.org/10.1007/978-981-99-7356-9_43
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-99-7355-2
Online ISBN: 978-981-99-7356-9
eBook Packages: Computer ScienceComputer Science (R0)