A New Fuzzy Key Generation Method Based on PHY-Layer Fingerprints in Mobile Cognitive Radio Networks

被引:2
|
作者
Gao, Ning [1 ,2 ]
Jing, Xiaojun [1 ,2 ]
Sun, Songlin [1 ,2 ]
Mu, Junsheng [1 ,2 ]
Lu, Xiang [3 ]
机构
[1] Beijing Univ Posts & Telecommun, Sch Informat & Commun Engn, Beijing 100876, Peoples R China
[2] Beijing Univ Posts & Telecommun, Minist Educ, Key Lab Trustworthy Distributed Comp & Serv, Beijing 100876, Peoples R China
[3] Chinese Acad Sci, Inst Informat Engn, Beijing 100095, Peoples R China
关键词
Fuzzy key generation; PHY-layer security; PUE; SSDF; Mobile CRNs; USER EMULATION ATTACKS; WIRELESS; DEFENSE;
D O I
10.3837/tiis.2016.07.030
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Classical key generation is complicated to update and key distribution generally requires fixed infrastructures. In order to eliminate these restrictions researchers have focused much attention on physical-layer (PHY-layer) based key generation methods. In this paper, we present a PHY-layer fingerprints based fuzzy key generation scheme, which works to prevent primary user emulation (PUE) attacks and spectrum sensing data falsification (SSDF) attacks, with multi-node collaborative defense strategies. We also propose two algorithms, the EA algorithm and the TA algorithm, to defend against eavesdropping attacks and tampering attacks in mobile cognitive radio networks (CRNs). We give security analyses of these algorithms in both the spatial and temporal domains, and prove the upper bound of the entropy loss in theory. We present a simulation result based on a MIMO-OFDM communication system which shows that the channel response characteristics received by legitimates tend to be consistent and phase characteristics are much more robust for key generation in mobile CRNs. In addition, NIST statistical tests show that the generated key in our proposed approach is secure and reliable.
引用
收藏
页码:3414 / 3434
页数:21
相关论文
共 50 条
  • [1] Robust Collaborative Spectrum Sensing Using PHY-Layer Fingerprints in Mobile Cognitive Radio Networks
    Gao, Ning
    Jing, Xiaojun
    Huang, Hai
    Mu, Junsheng
    IEEE COMMUNICATIONS LETTERS, 2017, 21 (05) : 1063 - 1066
  • [2] A Framework of the PHY-layer Approach to Defense Against Security Threats in Cognitive Radio Networks
    Wen, Hong
    Li, Shaoqian
    Zhu, Xiping
    Zhou, Liang
    IEEE NETWORK, 2013, 27 (03): : 34 - 39
  • [3] Symmetric Key Generation from Imperfect Shared PHY-Layer Secrecy
    Shen, Chen
    Feng, Siyuan
    Sahin, Gokhan
    Choi, Hyeong-Ah
    2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
  • [4] AI-Based Abnormality Detection at the PHY-Layer of Cognitive Radio by Learning Generative Models
    Toma, Andrea
    Krayani, Ali
    Farrukh, Muhammad
    Qi, Haoran
    Marcenaro, Lucio
    Gao, Yue
    Regazzoni, Carlo S.
    IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING, 2020, 6 (01) : 21 - 34
  • [5] Neural Network Based PHY-Layer Key Exchange for Wireless Communications
    Karas, Dimitrios S.
    Karagiannidis, George K.
    Schober, Robert
    2011 IEEE 22ND INTERNATIONAL SYMPOSIUM ON PERSONAL INDOOR AND MOBILE RADIO COMMUNICATIONS (PIMRC), 2011, : 1233 - 1238
  • [6] Learning-Based PHY-Layer Authentication for Underwater Sensor Networks
    Xiao, Liang
    Sheng, Geyi
    Wan, Xiaoyue
    Su, Wei
    Cheng, Peng
    IEEE COMMUNICATIONS LETTERS, 2019, 23 (01) : 60 - 63
  • [7] A Tag-Based PHY-Layer Authentication Scheme Without Key Distribution
    An, Yongli
    Zhang, Shikang
    Ji, Zhanlin
    IEEE ACCESS, 2021, 9 : 85947 - 85955
  • [8] Power Allocation for Fingerprint-Based PHY-Layer Authentication with mmWave UAV Networks
    Maeng, Sung Joon
    Yapici, Yavuz
    Guvenc, Ismail
    Dai, Huaiyu
    Bhuyan, Arupjyoti
    IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2021), 2021,
  • [9] Corridor-based Routing: Opening Doors to PHY-Layer Advances for Wireless Multihop Networks
    Loch, Adrian
    Hollick, Matthias
    Kuehne, Alexander
    Klein, Anja
    2014 IEEE 15TH INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS, MOBILE AND MULTIMEDIA NETWORKS (WOWMOM), 2014,
  • [10] A DWT-Based PHY Key Generation Scheme for the Cross-Layer Security in IoT Networks
    Liu, Fangfang
    Liu, Yueyi
    An, Wei
    Li, Xiaona
    IEEE COMMUNICATIONS LETTERS, 2024, 28 (06) : 1258 - 1262