A DWT-Based PHY Key Generation Scheme for the Cross-Layer Security in IoT Networks

被引:0
|
作者
Liu, Fangfang [1 ]
Liu, Yueyi [1 ]
An, Wei [1 ]
Li, Xiaona [2 ]
机构
[1] Beijing Univ Posts & Telecommun, Sch Informat & Commun Engn, Beijing 100876, Peoples R China
[2] Chinese Acad Sci, Inst Informat Engn, Beijing 100093, Peoples R China
基金
中国国家自然科学基金;
关键词
Security; Discrete wavelet transforms; Channel estimation; Privacy; Law; Delays; Base stations; Cross PHY/MAC layer security; key generation; access security; random access procedure; HANDOVER AUTHENTICATION; PRIVACY; ACCESS;
D O I
10.1109/LCOMM.2024.3381179
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
In this letter, a novel cross physical layer (PHY)/medium access control (MAC) layer security scheme is proposed, where PHY key generated based on channel information is introduced into the random access procedure to protect the security of wireless communications from the very outset. To ensure the accessing rate of legal user, high key generation rate (KGR) and low key disagreement rate (KDR) are critical. We first utilize instantaneous channel information of demodulation reference signal to rapidly generate key without frequently information exchanging in PHY. Then, to reduce the inconsistency of the generated PHY key caused by high-frequency noise, discrete wavelet transform is used to decrease the KDR. Furthermore, the theoretical KGR upper bound of the proposed scheme is derived from the aspect of information theory. Finally, the proposed scheme is verified in OpenAirInterface platform. Simulation results show that the proposed scheme has the high accessing rate of legal user and low-delay, which effectively protects the random access procedure from unauthorized user.
引用
收藏
页码:1258 / 1262
页数:5
相关论文
共 50 条
  • [1] A Cross-Layer Key Establishment Scheme in Wireless Mesh Networks
    Zhang, Yuexin
    Xiang, Yang
    Huang, Xinyi
    Xu, Li
    COMPUTER SECURITY - ESORICS 2014, PT I, 2014, 8712 : 526 - 541
  • [2] A Physical-layer Security Scheme Based on Cross-layer Cooperation in Dense Heterogeneous Networks
    Zhang Bo
    Huang Kai-zhi
    Chen Ya-jun
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2018, 12 (06): : 2595 - 2618
  • [3] Energy balance based cross-layer key management scheme in heterogeneous sensor networks
    Yuan Q.
    Ma C.
    Yao J.
    1846, Chinese Institute of Electronics (40): : 1846 - 1854
  • [4] A Key Management and Cross-layer Routing Scheme for Wireless Sensor Networks
    Shang, Fengjun
    Deng, Xiaolin
    Zhou, Yongkui
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (07): : 119 - 134
  • [5] Cross-Layer based TCP Performance Enhancement in IoT Networks
    Parween, Sultana
    Hussain, Syed Zeeshan
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2022, 13 (06) : 383 - 396
  • [6] SecDCF: An Optimized Cross-layer Scheduling Scheme Based on Physical Layer Security
    Sun Donglai
    Wang Xudong
    Zhao Yimeng
    Wu Yue
    2011 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2011,
  • [7] A prediction based cross-layer MAC/PHY interface for CDMA ad hoc networks
    Kouraogo, Pegdwinde Justin
    Gagnon, Francois
    Dziong, Zbigniew
    AD-HOC, MOBILE AND WIRELESS NETWORKS, PROCEEDINGS, 2008, 5198 : 293 - 306
  • [8] On Cross-Layer Based Handoff Scheme in Heterogeneous Mobile Networks
    Song, Byunghun
    Shin, Junho
    Jang, Hana
    Lee, Yongkil
    Jeong, Jongpil
    Cho, Jun-Dong
    INTELLIGENT COMPUTING METHODOLOGIES, ICIC 2016, PT III, 2016, 9773 : 482 - 493
  • [9] DWT-based anomaly detection method for cyber security of wireless sensor networks
    Saganowski, Lukasz
    Andrysiak, Tomasz
    Kozik, Rafal
    Choras, Michal
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (15) : 2911 - 2922
  • [10] Cross-Layer Handover Scheme for Multimedia Communications in Next Generation Wireless Networks
    Yuliang Tang
    Chun-Cheng Lin
    Guannan Kou
    Der-Jiunn Deng
    EURASIP Journal on Wireless Communications and Networking, 2010