Half-Duplex Mode-Based Secure Key Generation Method for Resource-Constrained IoT Devices

被引:2
|
作者
Hu, Qiao [1 ]
Zhang, Jingyi [2 ]
Hancke, Gerhard P. [2 ]
Hu, Yupeng [1 ]
Li, Wenjia [3 ]
Jiang, Hongbo [1 ]
Qin, Zheng [1 ]
机构
[1] Hunan Univ, Coll Comp Sci & Elect Engn, Changsha 410082, Peoples R China
[2] City Univ Hong Kong, Dept Comp Sci, Hong Kong, Peoples R China
[3] New York Inst Technol, Dept Comp Sci, New York, NY 10023 USA
基金
中国国家自然科学基金;
关键词
Security; Relays; OFDM; Internet of Things; Probes; Mathematical model; Privacy; Key management; physical layer security; privacy preserving; AGREEMENT;
D O I
10.1109/JIOT.2021.3086847
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The physical layer secret key generation scheme is a preferred solution designed for resource-constrained Internet of Things (IoT) devices. But it suffers from a severe attack, the signal manipulating attack, which aims at controlling the generated key. The existing solutions either cannot prevent all kinds of signal manipulation attacks or require working in full-duplex mode, which is not suitable for resource-constrained IoT devices. In this article, we introduce a secret key generation scheme with the help of an untrusted relay to address this dilemma. Also, our method can protect the privacy of legitimate users from the untrusted relay. We conclude a general signal manipulation attack model from existing practical signal manipulation attacks and analyze the security strength and privacy preserving ability of our scheme based on this model. Finally, we compare our method with existing signal manipulation attack solutions. The result shows that our method is the best solution for resource-constrained IoT systems.
引用
收藏
页码:1326 / 1338
页数:13
相关论文
共 50 条
  • [1] Secure Communications for Resource-Constrained IoT Devices†
    Taha, Abd-Elhamid M.
    Rashwan, Abdulmonem M.
    Hassanein, Hossam S.
    SENSORS, 2020, 20 (13) : 1 - 18
  • [2] A Secure Secret Key-Sharing System for Resource-Constrained IoT Devices using MQTT
    Noguchi, Taku
    Nakagawa, Masato
    Yoshida, Masami
    Ramonet, Alberto Gallegos
    2022 24TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT): ARITIFLCIAL INTELLIGENCE TECHNOLOGIES TOWARD CYBERSECURITY, 2022, : 147 - +
  • [3] SHAKE: SHared Acceleration Key Establishment for Resource-Constrained IoT Devices
    Bejder, Emil
    Mathiasen, Adam Krog
    De Donno, Michele
    Dragoni, Nicola
    Fafoutis, Xenofon
    2020 IEEE 6TH WORLD FORUM ON INTERNET OF THINGS (WF-IOT), 2020,
  • [4] Secure Transmission in NOMA-Enabled Industrial IoT With Resource-Constrained Untrusted Devices
    Thapar, Sapna
    Mishra, Deepak
    Saini, Ravikant
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2024, 20 (01) : 411 - 420
  • [5] Fair Cloud Auditing Based on Blockchain for Resource-Constrained IoT Devices
    Zhou, Lei
    Fu, Anmin
    Yang, Guomin
    Gao, Yansong
    Yu, Shui
    Deng, Robert H.
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (05) : 4325 - 4342
  • [6] Enhancing IoT security using lightweight key management with PRESENT for resource-constrained devices
    Ohal, Hemlata Sandip
    Fatangare, Mrunal Pravinkumar
    Aware, Mrunal Swapnil
    Nehete, Pallavi Utkarsh
    Dongre, Nita Ganesh
    Kothoke, Priyanka M.
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2024, 27 (2B): : 879 - 888
  • [7] A Lightweight Block Validation Method for Resource-Constrained IoT Devices in Blockchain-Based Applications
    Le, Tam
    Mutka, Matt W.
    2019 IEEE 20TH INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS, MOBILE AND MULTIMEDIA NETWORKS (WOWMOM), 2019,
  • [8] Provably Secure and Generalized Signcryption With Public Verifiability for Secure Data Transmission Between Resource-Constrained IoT Devices
    Karati, Arijit
    Fan, Chun-I
    Hsu, Ruei-Hau
    IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (06) : 10431 - 10440
  • [9] A survey of key pre-distribution schemes based on combinatorial designs for resource-constrained devices in the IoT network
    Neda Solari Esfehani
    Hamid Haj Seyyed Javadi
    Wireless Networks, 2021, 27 : 3025 - 3052
  • [10] A survey of key pre-distribution schemes based on combinatorial designs for resource-constrained devices in the IoT network
    Solari Esfehani, Neda
    Haj Seyyed Javadi, Hamid
    WIRELESS NETWORKS, 2021, 27 (04) : 3025 - 3052