Exploiting Malicious RIS for Secret Key Acquisition in Physical-Layer Key Generation

被引:2
|
作者
Hu, Lei [1 ]
Li, Guyue [1 ,2 ]
Hu, Aiqun [2 ,3 ]
Ng, Derrick Wing Kwan [4 ]
机构
[1] Southeast Univ, Sch Cyber Sci & Engn, Nanjing 210096, Peoples R China
[2] Purple Mt Labs, Nanjing 211111, Peoples R China
[3] Southeast Univ, Natl Mobile Commun Res Lab, Nanjing 210096, Peoples R China
[4] Univ New South Wales, Sch Elect Engn & Telecommun, Sydney, NSW 2052, Australia
关键词
Wireless communication; Communication system security; Fading channels; Laboratories; Resists; Channel models; Wireless sensor networks; Physical layer security; secret key generation; reconfigurable intelligent surface (RIS); active attack; INTELLIGENT REFLECTING SURFACE;
D O I
10.1109/LWC.2023.3330809
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the capability of controlling wireless environments, reconfigurable intelligent surface (RIS) can be exploited to assist radio channel-based physical-layer key generation (PKG). However, this may also pose great security threats to PKG when it is controlled by an attacker. To this end, this letter studies a RIS leakage (RISL) attack that assists the attacker to manipulate the generated keys between the legitimate ends in PKG systems. Specifically, in block fading environments, by alternatingly adapting the RIS reflection coefficients to all 0s and 1s in each block, the received signal strength (RSS) at the legitimate ends is likely to be boosted and attenuated regularly across time, causing predictable 0s and 1s in the quantized bits. To resist this attack, we propose a countermeasure based on dynamic private pilots (CDPP) and prove that the RISL success probability can be significantly reduced by CDPP. Simulation results verify the effectiveness of the proposed attack and countermeasure, highlighting the importance of introducing artificial randomness for secret key security in block fading channels.
引用
收藏
页码:417 / 421
页数:5
相关论文
共 50 条
  • [1] Physical-Layer Secret Key Generation with Untrusted Relays
    Chan Dai Truyen Thai
    Lee, Jemin
    Cheng, Chi
    Quek, Tony Q. S.
    2014 GLOBECOM WORKSHOPS (GC WKSHPS), 2014, : 1385 - 1390
  • [2] STAR-RIS-Assisted Physical-Layer Key Generation
    Wan, Zheng
    Chu, Zheng
    Mi, De
    Wang, Hui-Ming
    Jin, Liang
    Huang, Kaizhi
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2024, 73 (06) : 9165 - 9170
  • [3] Is Adversarial RIS Harmful to Physical Layer Secret Key Generation
    Fang, Yi
    Wu, Huici
    Wei, Zhiqing
    Tao, Xiaofeng
    IEEE CONFERENCE ON GLOBAL COMMUNICATIONS, GLOBECOM, 2023, : 7225 - 7230
  • [4] Physical-Layer Secret Key Generation With Colluding Untrusted Relays
    Chan Dai Truyen Thai
    Lee, Jemin
    Quek, Tony Q. S.
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2016, 15 (02) : 1517 - 1530
  • [5] A Countermeasure Against RIS Jamming Attack in Physical-Layer Key Generation
    Wan, Zheng
    Hu, Xiaoyan
    Sun, Xiaoli
    Xu, Xiaoming
    Huang, Kaizhi
    Jin, Liang
    IEEE WIRELESS COMMUNICATIONS LETTERS, 2023, 12 (12) : 2193 - 2197
  • [6] On the RIS Manipulating Attack and Its Countermeasures in Physical-layer Key Generation
    Hu, Lei
    Le, Guyue
    Luo, Hongyi
    Hu, Aiqun
    2021 IEEE 94TH VEHICULAR TECHNOLOGY CONFERENCE (VTC2021-FALL), 2021,
  • [7] Physical-Layer Secret Key Generation in Power Line Communication Networks
    Zhang, Jiarui
    Liu, Xiaosheng
    Cui, Ying
    Xu, Dianguo
    IEEE ACCESS, 2022, 10 : 48539 - 48550
  • [8] Physical-Layer Secret Key Generation for Dual-Task Scenarios
    Yang Lilin
    Li Guyue
    Guo Tao
    Xu Hao
    Hu Aiqun
    China Communications, 2024, 21 (07) : 252 - 266
  • [9] Physical-Layer Secret Key Generation for Dual-Task Scenarios
    Yang, Lilin
    Li, Guyue
    Guo, Tao
    Xu, Hao
    Hu, Aiqun
    CHINA COMMUNICATIONS, 2024, 21 (07) : 252 - 266
  • [10] Integration of Device Fingerprint Authentication and Physical-Layer Secret Key Generation
    Chai, Zhi
    Zhang, Liuming
    Huang, Xinran
    Li, Mingye
    Yang, Xuelin
    IEEE SIGNAL PROCESSING LETTERS, 2023, 30 : 1257 - 1261