A DWT-Based PHY Key Generation Scheme for the Cross-Layer Security in IoT Networks

被引:0
|
作者
Liu, Fangfang [1 ]
Liu, Yueyi [1 ]
An, Wei [1 ]
Li, Xiaona [2 ]
机构
[1] Beijing Univ Posts & Telecommun, Sch Informat & Commun Engn, Beijing 100876, Peoples R China
[2] Chinese Acad Sci, Inst Informat Engn, Beijing 100093, Peoples R China
基金
中国国家自然科学基金;
关键词
Security; Discrete wavelet transforms; Channel estimation; Privacy; Law; Delays; Base stations; Cross PHY/MAC layer security; key generation; access security; random access procedure; HANDOVER AUTHENTICATION; PRIVACY; ACCESS;
D O I
10.1109/LCOMM.2024.3381179
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
In this letter, a novel cross physical layer (PHY)/medium access control (MAC) layer security scheme is proposed, where PHY key generated based on channel information is introduced into the random access procedure to protect the security of wireless communications from the very outset. To ensure the accessing rate of legal user, high key generation rate (KGR) and low key disagreement rate (KDR) are critical. We first utilize instantaneous channel information of demodulation reference signal to rapidly generate key without frequently information exchanging in PHY. Then, to reduce the inconsistency of the generated PHY key caused by high-frequency noise, discrete wavelet transform is used to decrease the KDR. Furthermore, the theoretical KGR upper bound of the proposed scheme is derived from the aspect of information theory. Finally, the proposed scheme is verified in OpenAirInterface platform. Simulation results show that the proposed scheme has the high accessing rate of legal user and low-delay, which effectively protects the random access procedure from unauthorized user.
引用
收藏
页码:1258 / 1262
页数:5
相关论文
共 50 条
  • [21] A symmetric neural cryptographic key generation scheme for Iot security
    Sarkar, Arindam
    APPLIED INTELLIGENCE, 2023, 53 (08) : 9344 - 9367
  • [22] A MAC and PHY Analytical Cross-Layer Model for Energy Consumption in IEEE 802.11 Networks
    Fabris Hoefel, Roger Pierre
    PROCEEDINGS OF THE IEEE INTERNATIONAL TELECOMMUNICATIONS SYMPOSIUM, VOLS 1 AND 2, 2006, : 237 - 242
  • [23] A MAC-PHY cross-layer protocol for wireless ad-hoc networks
    Liu, Feilu
    Korakis, Thanasis
    Tao, Zhifeng
    Panwar, Shivendra
    WCNC 2008: IEEE WIRELESS COMMUNICATIONS & NETWORKING CONFERENCE, VOLS 1-7, 2008, : 1792 - +
  • [24] The Impact of Cross-Layer Ressource Management MAC-PHY In Wireless OFDMA Networks
    Maryam, Basly
    Hamdi, Noureddine
    Hedia, Kochkar
    Ammar, Bouallegue
    2012 16TH IEEE MEDITERRANEAN ELECTROTECHNICAL CONFERENCE (MELECON), 2012, : 732 - 735
  • [25] A PHY/MAC-aware cross-layer routing meetric for wireless mesh networks
    Zhang, Xiaoxue
    Yang, Zhen
    Li, Fenghua
    2007 INTERNATIONAL SYMPOSIUM ON INTELLIGENT SIGNAL PROCESSING AND COMMUNICATION SYSTEMS, VOLS 1 AND 2, 2007, : 750 - +
  • [26] Approach for PHY/MAC Cross-layer Design in Vehicular Ad-hoc Networks
    Joo, Jhihoon
    Lee, Hee Chang
    Han, Dong Seog
    2013 FIFTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS (ICUFN), 2013, : 58 - 59
  • [27] An Opportunistic Cross-Layer Architecture for New Generation Networks
    Torregoza, John Paul
    Pham Ngoc Thai
    Han, Yun-Sop
    Andre, Martin
    Teraoka, Fumio
    Harai, Hiroaki
    Hwang, Won-Joo
    2010 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE GLOBECOM 2010, 2010,
  • [28] A Cross-Layer Security Solution for Publish/Subscribe-based IoT Services Communication Infrastructure
    Zhang, Yang
    Duan, Li
    Sun, Chang-ai
    Cheng, Bo
    Chen, Junliang
    2017 IEEE 24TH INTERNATIONAL CONFERENCE ON WEB SERVICES (ICWS 2017), 2017, : 580 - 587
  • [29] Cross-Layer Security Management Framework for Mobile Tactical Networks
    Song, Ronggong
    Tang, Helen
    Mason, Peter C.
    Wei, Zhexiong
    2013 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2013), 2013, : 220 - 225
  • [30] A Cross-Layer Parallel Handover Optimization Scheme for WiMAX Networks
    Zhou, Ting
    Sharif, Hamid
    Hempel, Michael
    Mahasukhon, Puttipong
    Ma, Tao
    Shrestha, Pradhumna Lal
    2011 - MILCOM 2011 MILITARY COMMUNICATIONS CONFERENCE, 2011, : 699 - 704