Half-Duplex Mode-Based Secure Key Generation Method for Resource-Constrained IoT Devices

被引:2
|
作者
Hu, Qiao [1 ]
Zhang, Jingyi [2 ]
Hancke, Gerhard P. [2 ]
Hu, Yupeng [1 ]
Li, Wenjia [3 ]
Jiang, Hongbo [1 ]
Qin, Zheng [1 ]
机构
[1] Hunan Univ, Coll Comp Sci & Elect Engn, Changsha 410082, Peoples R China
[2] City Univ Hong Kong, Dept Comp Sci, Hong Kong, Peoples R China
[3] New York Inst Technol, Dept Comp Sci, New York, NY 10023 USA
基金
中国国家自然科学基金;
关键词
Security; Relays; OFDM; Internet of Things; Probes; Mathematical model; Privacy; Key management; physical layer security; privacy preserving; AGREEMENT;
D O I
10.1109/JIOT.2021.3086847
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The physical layer secret key generation scheme is a preferred solution designed for resource-constrained Internet of Things (IoT) devices. But it suffers from a severe attack, the signal manipulating attack, which aims at controlling the generated key. The existing solutions either cannot prevent all kinds of signal manipulation attacks or require working in full-duplex mode, which is not suitable for resource-constrained IoT devices. In this article, we introduce a secret key generation scheme with the help of an untrusted relay to address this dilemma. Also, our method can protect the privacy of legitimate users from the untrusted relay. We conclude a general signal manipulation attack model from existing practical signal manipulation attacks and analyze the security strength and privacy preserving ability of our scheme based on this model. Finally, we compare our method with existing signal manipulation attack solutions. The result shows that our method is the best solution for resource-constrained IoT systems.
引用
收藏
页码:1326 / 1338
页数:13
相关论文
共 50 条
  • [21] Breathing-Based Authentication on Resource-Constrained IoT Devices using Recurrent Neural Networks
    Chauhan, Jagmohan
    Seneviratne, Suranga
    Hu, Yining
    Misra, Archan
    Seneviratne, Aruna
    Lee, Youngki
    COMPUTER, 2018, 51 (05) : 60 - 67
  • [22] A High Resilience and High Scalable Key Pre-distribution Scheme Based on Combinatorial Designs for Resource-Constrained Devices in IoT Networks
    Esfehani, Neda Solari
    Javadi, Hamid Haj Seyyed
    WIRELESS PERSONAL COMMUNICATIONS, 2022, 127 (04) : 2905 - 2934
  • [23] A Full Connectable and High Scalable Key Pre-distribution Scheme Based on Combinatorial Designs for Resource-Constrained Devices in IoT Network
    Aski, Akbar Morshed
    Javadi, Hamid Haj Seyyed
    Shirdel, Gholam Hassan
    WIRELESS PERSONAL COMMUNICATIONS, 2020, 114 (03) : 2079 - 2103
  • [24] A High Resilience and High Scalable Key Pre-distribution Scheme Based on Combinatorial Designs for Resource-Constrained Devices in IoT Networks
    Neda Solari Esfehani
    Hamid Haj Seyyed Javadi
    Wireless Personal Communications, 2022, 127 : 2905 - 2934
  • [25] A Full Connectable and High Scalable Key Pre-distribution Scheme Based on Combinatorial Designs for Resource-Constrained Devices in IoT Network
    Akbar Morshed Aski
    Hamid Haj Seyyed Javadi
    Gholam Hassan Shirdel
    Wireless Personal Communications, 2020, 114 : 2079 - 2103
  • [26] MQTTSec Based on Context-Aware Cryptographic Selection Algorithm (CASA) for Resource-Constrained IoT Devices
    Massad, Mohammad A.
    Alsaify, Baha A.
    2020 11TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION SYSTEMS (ICICS), 2020, : 349 - 354
  • [27] Lightweight and host-based denial of service (DoS) detection and defense mechanism for resource-constrained IoT devices
    Kponyo, Jerry John
    Agyemang, Justice Owusu
    Klogo, Griffith Selorm
    Boateng, Joshua Ofori
    INTERNET OF THINGS, 2020, 12
  • [28] CloudEyes: Cloud-based malware detection with reversible sketch for resource-constrained internet of things (IoT) devices
    Sun, Hao
    Wang, Xiaofeng
    Buyya, Rajkumar
    Su, Jinshu
    SOFTWARE-PRACTICE & EXPERIENCE, 2017, 47 (03): : 421 - 441
  • [29] Lattice-based cryptosystems for the security of resource-constrained IoT devices in post-quantum world: a survey
    Kübra Seyhan
    Tu N. Nguyen
    Sedat Akleylek
    Korhan Cengiz
    Cluster Computing, 2022, 25 : 1729 - 1748
  • [30] Lattice-based cryptosystems for the security of resource-constrained IoT devices in post-quantum world: a survey
    Seyhan, Kubra
    Nguyen, Tu N.
    Akleylek, Sedat
    Cengiz, Korhan
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2022, 25 (03): : 1729 - 1748