Robust Key Generation With Hardware Mismatch for Secure MIMO Communications

In practical implementations, physical-layer key generation (PKG) encounters the bottlenecks of imperfect channel reciprocity, nearby attack, and high temporal auto-correlation. Existing One-Band Multiple-Antenna Loop-bAck key generation (OB-MALA) schemes try to address these challenges through esta...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE transactions on information forensics and security 2021, Vol.16, p.5264-5278
Hauptverfasser: Li, Guyue, Xu, Yinghao, Xu, Wei, Jorswieck, Eduard, Hu, Aiqun
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 5278
container_issue
container_start_page 5264
container_title IEEE transactions on information forensics and security
container_volume 16
creator Li, Guyue
Xu, Yinghao
Xu, Wei
Jorswieck, Eduard
Hu, Aiqun
description In practical implementations, physical-layer key generation (PKG) encounters the bottlenecks of imperfect channel reciprocity, nearby attack, and high temporal auto-correlation. Existing One-Band Multiple-Antenna Loop-bAck key generation (OB-MALA) schemes try to address these challenges through establishing bi-directional channels via echoing rotated received signals. However, we find that OB-MALA schemes can be vulnerable to a multiply-divide (MD) attack, as they echo the received signals through the same band with the pilot signals. To overcome this deficiency, we propose a new method, named Two-Band Multiple-Antenna Loop-bAck key generation (TB-MALA), which exploits two separate bands for pilot transmission and echo reception. The TB-MALA is proved to be robust to the imperfect channel reciprocity caused by radio frequency (RF) front-ends and can resist both the nearby attack and the MD attack. It also reduces the auto-correlation of effective channels with the help of a rotation matrix. The secret key rate of TB-MALA is analyzed and the closed-form of a lower bound is derived for the worst case. Numerical results demonstrate that the proposed TB-MALA protects against these attacks and achieves performance comparable to the ideal case with the perfect reciprocity of RF front-ends. It can thus be used to form a robust, fast, and secure key generation in a multiple-input and multiple-output (MIMO) system.
doi_str_mv 10.1109/TIFS.2021.3127021
format Article
fullrecord <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_ieee_primary_9609992</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>9609992</ieee_id><sourcerecordid>2604925486</sourcerecordid><originalsourceid>FETCH-LOGICAL-c293t-e660efca387732a9a402742e3118fd5cf4bc21758247c16f4f762320611da0663</originalsourceid><addsrcrecordid>eNo9kF9rwjAUxcPYYM7tA4y9BPZcl5ukafM4ZP5BRZiOPYYYE6ysjUtaxG-_dopP53A551z4IfQMZABA5Nt6OloNKKEwYECzVm9QD9JUJKL1t1cP7B49xLgnhHMQeQ_NPv2miTWe2RMe28oGXRe-wt9FvcMTHbZHHSxeFLHUtdlh5wNeWdN0t-liiYe-LJuqMP-l-IjunP6J9umiffQ1-lgPJ8l8OZ4O3-eJoZLViRWCWGc0y7OMUS01JzTj1DKA3G1T4_jGUMjSnPLMgHDcZYIySgTAVhMhWB-9nncPwf82NtZq75tQtS8VFYRLmvK8S8E5ZYKPMVinDqEodTgpIKpjpjpmqmOmLszazsu5U1hrr3kpiJSSsj-Dn2X_</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2604925486</pqid></control><display><type>article</type><title>Robust Key Generation With Hardware Mismatch for Secure MIMO Communications</title><source>IEEE Electronic Library (IEL)</source><creator>Li, Guyue ; Xu, Yinghao ; Xu, Wei ; Jorswieck, Eduard ; Hu, Aiqun</creator><creatorcontrib>Li, Guyue ; Xu, Yinghao ; Xu, Wei ; Jorswieck, Eduard ; Hu, Aiqun</creatorcontrib><description>In practical implementations, physical-layer key generation (PKG) encounters the bottlenecks of imperfect channel reciprocity, nearby attack, and high temporal auto-correlation. Existing One-Band Multiple-Antenna Loop-bAck key generation (OB-MALA) schemes try to address these challenges through establishing bi-directional channels via echoing rotated received signals. However, we find that OB-MALA schemes can be vulnerable to a multiply-divide (MD) attack, as they echo the received signals through the same band with the pilot signals. To overcome this deficiency, we propose a new method, named Two-Band Multiple-Antenna Loop-bAck key generation (TB-MALA), which exploits two separate bands for pilot transmission and echo reception. The TB-MALA is proved to be robust to the imperfect channel reciprocity caused by radio frequency (RF) front-ends and can resist both the nearby attack and the MD attack. It also reduces the auto-correlation of effective channels with the help of a rotation matrix. The secret key rate of TB-MALA is analyzed and the closed-form of a lower bound is derived for the worst case. Numerical results demonstrate that the proposed TB-MALA protects against these attacks and achieves performance comparable to the ideal case with the perfect reciprocity of RF front-ends. It can thus be used to form a robust, fast, and secure key generation in a multiple-input and multiple-output (MIMO) system.</description><identifier>ISSN: 1556-6013</identifier><identifier>EISSN: 1556-6021</identifier><identifier>DOI: 10.1109/TIFS.2021.3127021</identifier><identifier>CODEN: ITIFA6</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Antennas ; Autocorrelation ; Channel estimation ; Channels ; Correlation ; imperfect channel reciprocity ; Lower bounds ; MIMO communication ; nearby attacks ; physical-layer security ; Radio frequency ; Reciprocity ; Robustness (mathematics) ; Secret key generation ; Security ; Transceivers ; Transforms ; Wireless communication</subject><ispartof>IEEE transactions on information forensics and security, 2021, Vol.16, p.5264-5278</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2021</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c293t-e660efca387732a9a402742e3118fd5cf4bc21758247c16f4f762320611da0663</citedby><cites>FETCH-LOGICAL-c293t-e660efca387732a9a402742e3118fd5cf4bc21758247c16f4f762320611da0663</cites><orcidid>0000-0003-1145-1168 ; 0000-0001-9341-8382 ; 0000-0001-7893-8435 ; 0000-0002-0398-4899 ; 0000-0002-0401-6013</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/9609992$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,780,784,796,4024,27923,27924,27925,54758</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/9609992$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Li, Guyue</creatorcontrib><creatorcontrib>Xu, Yinghao</creatorcontrib><creatorcontrib>Xu, Wei</creatorcontrib><creatorcontrib>Jorswieck, Eduard</creatorcontrib><creatorcontrib>Hu, Aiqun</creatorcontrib><title>Robust Key Generation With Hardware Mismatch for Secure MIMO Communications</title><title>IEEE transactions on information forensics and security</title><addtitle>TIFS</addtitle><description>In practical implementations, physical-layer key generation (PKG) encounters the bottlenecks of imperfect channel reciprocity, nearby attack, and high temporal auto-correlation. Existing One-Band Multiple-Antenna Loop-bAck key generation (OB-MALA) schemes try to address these challenges through establishing bi-directional channels via echoing rotated received signals. However, we find that OB-MALA schemes can be vulnerable to a multiply-divide (MD) attack, as they echo the received signals through the same band with the pilot signals. To overcome this deficiency, we propose a new method, named Two-Band Multiple-Antenna Loop-bAck key generation (TB-MALA), which exploits two separate bands for pilot transmission and echo reception. The TB-MALA is proved to be robust to the imperfect channel reciprocity caused by radio frequency (RF) front-ends and can resist both the nearby attack and the MD attack. It also reduces the auto-correlation of effective channels with the help of a rotation matrix. The secret key rate of TB-MALA is analyzed and the closed-form of a lower bound is derived for the worst case. Numerical results demonstrate that the proposed TB-MALA protects against these attacks and achieves performance comparable to the ideal case with the perfect reciprocity of RF front-ends. It can thus be used to form a robust, fast, and secure key generation in a multiple-input and multiple-output (MIMO) system.</description><subject>Antennas</subject><subject>Autocorrelation</subject><subject>Channel estimation</subject><subject>Channels</subject><subject>Correlation</subject><subject>imperfect channel reciprocity</subject><subject>Lower bounds</subject><subject>MIMO communication</subject><subject>nearby attacks</subject><subject>physical-layer security</subject><subject>Radio frequency</subject><subject>Reciprocity</subject><subject>Robustness (mathematics)</subject><subject>Secret key generation</subject><subject>Security</subject><subject>Transceivers</subject><subject>Transforms</subject><subject>Wireless communication</subject><issn>1556-6013</issn><issn>1556-6021</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNo9kF9rwjAUxcPYYM7tA4y9BPZcl5ukafM4ZP5BRZiOPYYYE6ysjUtaxG-_dopP53A551z4IfQMZABA5Nt6OloNKKEwYECzVm9QD9JUJKL1t1cP7B49xLgnhHMQeQ_NPv2miTWe2RMe28oGXRe-wt9FvcMTHbZHHSxeFLHUtdlh5wNeWdN0t-liiYe-LJuqMP-l-IjunP6J9umiffQ1-lgPJ8l8OZ4O3-eJoZLViRWCWGc0y7OMUS01JzTj1DKA3G1T4_jGUMjSnPLMgHDcZYIySgTAVhMhWB-9nncPwf82NtZq75tQtS8VFYRLmvK8S8E5ZYKPMVinDqEodTgpIKpjpjpmqmOmLszazsu5U1hrr3kpiJSSsj-Dn2X_</recordid><startdate>2021</startdate><enddate>2021</enddate><creator>Li, Guyue</creator><creator>Xu, Yinghao</creator><creator>Xu, Wei</creator><creator>Jorswieck, Eduard</creator><creator>Hu, Aiqun</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7TB</scope><scope>8FD</scope><scope>FR3</scope><scope>JQ2</scope><scope>KR7</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><orcidid>https://orcid.org/0000-0003-1145-1168</orcidid><orcidid>https://orcid.org/0000-0001-9341-8382</orcidid><orcidid>https://orcid.org/0000-0001-7893-8435</orcidid><orcidid>https://orcid.org/0000-0002-0398-4899</orcidid><orcidid>https://orcid.org/0000-0002-0401-6013</orcidid></search><sort><creationdate>2021</creationdate><title>Robust Key Generation With Hardware Mismatch for Secure MIMO Communications</title><author>Li, Guyue ; Xu, Yinghao ; Xu, Wei ; Jorswieck, Eduard ; Hu, Aiqun</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c293t-e660efca387732a9a402742e3118fd5cf4bc21758247c16f4f762320611da0663</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Antennas</topic><topic>Autocorrelation</topic><topic>Channel estimation</topic><topic>Channels</topic><topic>Correlation</topic><topic>imperfect channel reciprocity</topic><topic>Lower bounds</topic><topic>MIMO communication</topic><topic>nearby attacks</topic><topic>physical-layer security</topic><topic>Radio frequency</topic><topic>Reciprocity</topic><topic>Robustness (mathematics)</topic><topic>Secret key generation</topic><topic>Security</topic><topic>Transceivers</topic><topic>Transforms</topic><topic>Wireless communication</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Li, Guyue</creatorcontrib><creatorcontrib>Xu, Yinghao</creatorcontrib><creatorcontrib>Xu, Wei</creatorcontrib><creatorcontrib>Jorswieck, Eduard</creatorcontrib><creatorcontrib>Hu, Aiqun</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Mechanical &amp; Transportation Engineering Abstracts</collection><collection>Technology Research Database</collection><collection>Engineering Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Civil Engineering Abstracts</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>IEEE transactions on information forensics and security</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Li, Guyue</au><au>Xu, Yinghao</au><au>Xu, Wei</au><au>Jorswieck, Eduard</au><au>Hu, Aiqun</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Robust Key Generation With Hardware Mismatch for Secure MIMO Communications</atitle><jtitle>IEEE transactions on information forensics and security</jtitle><stitle>TIFS</stitle><date>2021</date><risdate>2021</risdate><volume>16</volume><spage>5264</spage><epage>5278</epage><pages>5264-5278</pages><issn>1556-6013</issn><eissn>1556-6021</eissn><coden>ITIFA6</coden><abstract>In practical implementations, physical-layer key generation (PKG) encounters the bottlenecks of imperfect channel reciprocity, nearby attack, and high temporal auto-correlation. Existing One-Band Multiple-Antenna Loop-bAck key generation (OB-MALA) schemes try to address these challenges through establishing bi-directional channels via echoing rotated received signals. However, we find that OB-MALA schemes can be vulnerable to a multiply-divide (MD) attack, as they echo the received signals through the same band with the pilot signals. To overcome this deficiency, we propose a new method, named Two-Band Multiple-Antenna Loop-bAck key generation (TB-MALA), which exploits two separate bands for pilot transmission and echo reception. The TB-MALA is proved to be robust to the imperfect channel reciprocity caused by radio frequency (RF) front-ends and can resist both the nearby attack and the MD attack. It also reduces the auto-correlation of effective channels with the help of a rotation matrix. The secret key rate of TB-MALA is analyzed and the closed-form of a lower bound is derived for the worst case. Numerical results demonstrate that the proposed TB-MALA protects against these attacks and achieves performance comparable to the ideal case with the perfect reciprocity of RF front-ends. It can thus be used to form a robust, fast, and secure key generation in a multiple-input and multiple-output (MIMO) system.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/TIFS.2021.3127021</doi><tpages>15</tpages><orcidid>https://orcid.org/0000-0003-1145-1168</orcidid><orcidid>https://orcid.org/0000-0001-9341-8382</orcidid><orcidid>https://orcid.org/0000-0001-7893-8435</orcidid><orcidid>https://orcid.org/0000-0002-0398-4899</orcidid><orcidid>https://orcid.org/0000-0002-0401-6013</orcidid></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1556-6013
ispartof IEEE transactions on information forensics and security, 2021, Vol.16, p.5264-5278
issn 1556-6013
1556-6021
language eng
recordid cdi_ieee_primary_9609992
source IEEE Electronic Library (IEL)
subjects Antennas
Autocorrelation
Channel estimation
Channels
Correlation
imperfect channel reciprocity
Lower bounds
MIMO communication
nearby attacks
physical-layer security
Radio frequency
Reciprocity
Robustness (mathematics)
Secret key generation
Security
Transceivers
Transforms
Wireless communication
title Robust Key Generation With Hardware Mismatch for Secure MIMO Communications
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-21T08%3A33%3A43IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Robust%20Key%20Generation%20With%20Hardware%20Mismatch%20for%20Secure%20MIMO%20Communications&rft.jtitle=IEEE%20transactions%20on%20information%20forensics%20and%20security&rft.au=Li,%20Guyue&rft.date=2021&rft.volume=16&rft.spage=5264&rft.epage=5278&rft.pages=5264-5278&rft.issn=1556-6013&rft.eissn=1556-6021&rft.coden=ITIFA6&rft_id=info:doi/10.1109/TIFS.2021.3127021&rft_dat=%3Cproquest_RIE%3E2604925486%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2604925486&rft_id=info:pmid/&rft_ieee_id=9609992&rfr_iscdi=true