Investigating the eavesdropper attack in physical layer security wireless key generation: a simulation case study

被引:0
|
作者
Zoli, Marco [1 ]
Barreto, Andre N. [1 ]
Fettweis, Gerhard [1 ]
机构
[1] Barkhausen Inst, Dresden, Germany
关键词
Physical Layer Security; Key Generation; Wireless Communication; Radio Channel; Signal Processing; Key Exchange;
D O I
10.1109/VTC2021-Spring51267.2021.9448992
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this work we explore the problem of physical layer security key exchange between two communicating devices in wideband wireless networks. We propose to obtain a pair of symmetric keys through a general filtering procedure, which exploits the frequency-selective characteristics of the radio channel. We focus our analysis on the keys bits mismatch with respect to the signal-to-noise-ratio and the link distance, through simulations of realistic radio channels in both indoor and outdoor scenarios. We investigated the impact of a proximity-attack by a malicious third device, founding that it is capable to eavesdrop large parts of the generated key compromising the overall security.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] Experimental Study on Key Generation for Physical Layer Security in Wireless Communications
    Zhang, Junqing
    Woods, Roger
    Duong, Trung Q.
    Marshal, Alan
    Ding, Yuan
    Huang, Yi
    Xu, Qian
    IEEE ACCESS, 2016, 4 : 4464 - 4477
  • [2] A Product Channel Attack to Wireless Physical Layer Security
    Anaya-Lopez, Gonzalo J.
    Gomez, Gerardo
    Javier Lopez-Martinez, F.
    IEEE WIRELESS COMMUNICATIONS LETTERS, 2021, 10 (05) : 943 - 947
  • [3] Physical Layer Security With Uncertainty on the Location of the Eavesdropper
    Karas, Dimitrios S.
    Boulogeorgos, Alexandros-Apostolos A.
    Karagiannidis, George K.
    IEEE WIRELESS COMMUNICATIONS LETTERS, 2016, 5 (05) : 540 - 543
  • [4] Jamming Power Estimation Technique Under Wireless Physical Layer Security in Presence of an Eavesdropper
    Salem, Mohammed Ahmed
    Aziz, Azlan Bin Abd
    Bin Alias, Mohamad Yusoff
    Rahman, Abdul Aziz Abdul
    2019 7TH INTERNATIONAL CONFERENCE ON SMART COMPUTING & COMMUNICATIONS (ICSCC), 2019, : 123 - 126
  • [5] Physical Layer Security for RIS-Aided Wireless Communications With Uncertain Eavesdropper Distributions
    Gu, Xiaohui
    Duan, Wei
    Zhang, Guoan
    Sun, Qiang
    Wen, Miaowen
    Ho, Pin-Han
    IEEE SYSTEMS JOURNAL, 2023, 17 (01): : 848 - 859
  • [6] Physical Layer Security Aided Wireless Interference Networks in the Presence of Strong Eavesdropper Channels
    Sheng, Zhichao
    Tuan, Hoang Duong
    Nasir, Ali Arshad
    Poor, H. Vincent
    Dutkiewicz, Eryk
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 3228 - 3240
  • [7] Secret Key Generation Schemes for Physical Layer Security
    Kumar, Megha S.
    Ramanathan, R.
    Jayakumar, M.
    Yadav, Devendra Kumar
    DEFENCE SCIENCE JOURNAL, 2021, 71 (04) : 545 - 555
  • [8] Randomness Test for Wireless Physical Layer Key Generation
    Upadhyay, Raksha
    Singh, Shubham
    Trivedi, Vasundhara
    Soni, Ankit
    2018 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTATION AND TELECOMMUNICATION (ICACAT), 2018,
  • [9] Efficient secret key generation scheme of physical layer security communication in ubiquitous wireless networks
    Xiong, Hailiang
    Wang, Guangyuan
    Ding, Jian
    Zhu, Weihong
    Xu, Hongji
    Hu, Changwu
    Mai, Zhenzhen
    Bian, Ruochen
    IET COMMUNICATIONS, 2021, 15 (08) : 1123 - 1132
  • [10] Dimensionality Reduction in Wireless Physical Layer Key Generation
    Soni, Ankit
    Upadhyay, Raksha
    Kumar, Abhay
    2019 IEEE 16TH INDIA COUNCIL INTERNATIONAL CONFERENCE (IEEE INDICON 2019), 2019,