Half-Duplex Mode-Based Secure Key Generation Method for Resource-Constrained IoT Devices

被引:2
|
作者
Hu, Qiao [1 ]
Zhang, Jingyi [2 ]
Hancke, Gerhard P. [2 ]
Hu, Yupeng [1 ]
Li, Wenjia [3 ]
Jiang, Hongbo [1 ]
Qin, Zheng [1 ]
机构
[1] Hunan Univ, Coll Comp Sci & Elect Engn, Changsha 410082, Peoples R China
[2] City Univ Hong Kong, Dept Comp Sci, Hong Kong, Peoples R China
[3] New York Inst Technol, Dept Comp Sci, New York, NY 10023 USA
基金
中国国家自然科学基金;
关键词
Security; Relays; OFDM; Internet of Things; Probes; Mathematical model; Privacy; Key management; physical layer security; privacy preserving; AGREEMENT;
D O I
10.1109/JIOT.2021.3086847
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The physical layer secret key generation scheme is a preferred solution designed for resource-constrained Internet of Things (IoT) devices. But it suffers from a severe attack, the signal manipulating attack, which aims at controlling the generated key. The existing solutions either cannot prevent all kinds of signal manipulation attacks or require working in full-duplex mode, which is not suitable for resource-constrained IoT devices. In this article, we introduce a secret key generation scheme with the help of an untrusted relay to address this dilemma. Also, our method can protect the privacy of legitimate users from the untrusted relay. We conclude a general signal manipulation attack model from existing practical signal manipulation attacks and analyze the security strength and privacy preserving ability of our scheme based on this model. Finally, we compare our method with existing signal manipulation attack solutions. The result shows that our method is the best solution for resource-constrained IoT systems.
引用
收藏
页码:1326 / 1338
页数:13
相关论文
共 50 条
  • [31] Optimizing IoT-Based Asset and Utilization Tracking: Efficient Activity Classification with MINIROCKET on Resource-Constrained Devices
    Giordano, Marco
    Cortesi, Silvano
    Crabolu, Michele
    Pedrollo, Lavinia
    Bellusci, Giovanni
    Bendinelli, Tommaso
    Turetken, Engin
    Dunbar, Andrea
    Magno, Michele
    2023 IEEE 9TH WORLD FORUM ON INTERNET OF THINGS, WF-IOT, 2023,
  • [32] Lattice-based cryptosystems for the security of resource-constrained IoT devices in post-quantum world: a survey
    Seyhan, Kübra
    Nguyen, Tu N.
    Akleylek, Sedat
    Cengiz, Korhan
    Cluster Computing, 2022, 25 (03): : 1729 - 1748
  • [33] Encryption Protocol for Resource-Constrained Devices in Fog-Based IoT Using One-Time Pads
    Boakye-Boateng, Kwasi
    Kuada, Eric
    Antwi-Boasiako, Emmanuel
    Djaba, Emmanuel
    IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (02) : 3925 - 3933
  • [34] MacLeR: Machine Learning-Based Runtime Hardware Trojan Detection in Resource-Constrained IoT Edge Devices
    Khalid, Faiq
    Hasan, Syed Rafay
    Zia, Sara
    Hasan, Osman
    Awwad, Falah
    Shafique, Muhammad
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2020, 39 (11) : 3748 - 3761
  • [35] A Novel Approach of a Low-Cost Voltage Fault Injection Method for Resource-Constrained IoT Devices: Design and Analysis
    Ruminot, Nicolas
    Estevez, Claudio
    Montejo-Sanchez, Samuel
    SENSORS, 2023, 23 (16)
  • [36] Accelerometer-Based Key Generation and Distribution Method for Wearable IoT Devices
    Sun, Fangmin
    Zang, Weilin
    Huang, Haohua
    Farkhatdinov, Ildar
    Li, Ye
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (03) : 1636 - 1650
  • [37] Efficient Authentication of Resource-Constrained IoT Devices based on ECQV Implicit Certificates and Datagram Transport Layer Security Protocol
    Duy An Ha
    Kha Tho Nguyen
    Zao, John K.
    PROCEEDINGS OF THE SEVENTH SYMPOSIUM ON INFORMATION AND COMMUNICATION TECHNOLOGY (SOICT 2016), 2016, : 173 - 179
  • [38] Secure Online/Offline Multi-Authority Attribute-Based Encryption for Resource-Constrained Devices in Cloud Computing
    Shao, Jiaye
    Zhu, Yanqin
    Ji, Qijin
    2018 IEEE SMARTWORLD, UBIQUITOUS INTELLIGENCE & COMPUTING, ADVANCED & TRUSTED COMPUTING, SCALABLE COMPUTING & COMMUNICATIONS, CLOUD & BIG DATA COMPUTING, INTERNET OF PEOPLE AND SMART CITY INNOVATION (SMARTWORLD/SCALCOM/UIC/ATC/CBDCOM/IOP/SCI), 2018, : 642 - 649
  • [39] A Lightweight Decentralized-Learning-Based Automatic Modulation Classification Method for Resource-Constrained Edge Devices
    Dong, Biao
    Liu, Yuchao
    Gui, Guan
    Fu, Xue
    Dong, Heng
    Adebisi, Bamidele
    Gacanin, Haris
    Sari, Hikmet
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (24) : 24708 - 24720
  • [40] Side channel analysis on biometric-based key generation algorithms on resource constrained devices
    Delivasilis, Dimitrios L.
    Katsikas, Sokratis K.
    International Journal of Network Security, 2006, 3 (01) : 44 - 50