Abstract
Abstract
With the emergence of 5G low-latency applications, such as haptics and V2X, low-complexity and low-latency security mechanisms are needed. Promising lightweight mechanisms include physical unclonable functions (PUF) and secret key generation (SKG) at the physical layer, as considered in this paper. In this framework, we propose (i) a zero round trip time (0-RTT) resumption authentication protocol combining PUF and SKG processes, (ii) a novel authenticated encryption (AE) using SKG, and (iii) pipelining of the AE SKG and the encrypted data transfer in order to reduce latency. Implementing the pipelining at PHY, we investigate a parallel SKG approach for multi-carrier systems, where a subset of the subcarriers are used for SKG and the rest for data transmission. The optimal solution to this PHY resource allocation problem is identified under security, power, and delay constraints, by formulating the subcarrier scheduling as a subset-sum 0−1 knapsack optimization. A heuristic algorithm of linear complexity is proposed and shown to incur negligible loss with respect to the optimal dynamic programming solution. All of the proposed mechanisms have the potential to pave the way for a new breed of latency aware security protocols.
- 1 Physical-layer security in the Internet of Things: sensing and communication confidentiality under resource constraintsProc. IEEE20151031017471761Google Scholar
Cross Ref
- 2 Wireless physical-layer security: lessons learned from information theoryProc. IEEE20151031018141825Google Scholar
Cross Ref
- 3 Teaching old sensors new tricks: archetypes of intelligenceIEEE Sensors J.200775868881Google Scholar
- 4 3GPP TR 33.825 V0.3.0, Study on the Security for 5G URLLC (Release 16). 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects. https://www.3gpp.org/ftp/Specs/archive/33_series/33.825/. Accessed 1 2019.Google Scholar
- 5 A. Chorti, C. Hollanti, J. -C. Belfiore, H. V. Poor, Physical layer security: a paradigm shift in data confidentiality. Lect. Notes Electr. Eng.358: (2016). 10.1007/978-3-319-23609-4_1.Google Scholar
- 6 Optimal power allocation in block fading channels with confidential messagesIEEE Trans. Wirel. Commun.201514947084719Google Scholar
Digital Library
- 7 On the resilience of wireless multiuser networks to passive and active eavesdroppersIEEE J. Sel. Areas Commun.201331918501863Google Scholar
Cross Ref
- 8 A. Chorti, H. V. Poor, in 2012 International Conference on Computing, Networking and Communications (ICNC). Achievable secrecy rates in physical layer secure systems with a helping interferer, (2012), pp. 18–22. 10.1109/ICCNC.2012.6167408.Google Scholar
- 9 M. Mitev, A. Chorti, M. Reed, in 2019 IEEE Global Communications Conference (GLOBECOM). Subcarrier scheduling for joint data transfer and key generation schemes in multicarrier systems, (2019), pp. 1–6. 10.1109/GLOBECOM38437.2019.9013809.Google Scholar
- 10 Y. Kanaras, A. Chorti, M. Rodrigues, I. Darwazeh, in Proc. 13th Int. OFDM WS. An optimum detection for a spectrally efficient non orthogonal FDM system, (2008), pp. 65–68.Google Scholar
- 11 A. Chorti, H. V. Poor, in 2011 Asilomar Conf. Signals, Systems and Computers (ASILOMAR). Faster than Nyquist interference assisted secret communication for OFDM systems, (2011), pp. 183–187. 10.1109/ACSSC.2011.6189981.Google Scholar
- 12 A. Chorti, in 2012 46th Annual Conference on Information Sciences and Systems (CISS). Helping interferer physical layer security strategies for M-QAM and M-PSK systems, (2012), pp. 1–6. 10.1109/CISS.2012.6310861.Google Scholar
- 13 M. Latvaaho, K. Leppänen, Key drivers and research challenges for 6G ubiquitous wireless intelligence (2019). http://urn.fi/urn:isbn:9789526223544.Google Scholar
- 14 Secret key agreement by public discussion from common informationIEEE Trans. Inf. Theory199339373374212377120784.94018Google Scholar
Digital Library
- 15 Common randomness in information theory and cryptography. i. secret sharingIEEE Trans. Inf. Theory19933941121113212671510802.94013Google Scholar
Digital Library
- 16 C. Ye, A. Reznik, Y. Shah, in 2006 IEEE International Symposium on Information Theory. Extracting secrecy from jointly gaussian random variables, (2006), pp. 2593–2597. 10.1109/ISIT.2006.262101.Google Scholar
- 17 Silicon physical random functionsProceedings of the 9th ACM Conference on Computer and Communications Security, CCS ’022002New YorkAssociation for Computing Machinery148160Google Scholar
- 18 Physical one-way functionsScience2002297558920262030Google Scholar
Cross Ref
- 19 R. Maes, I. Verbauwhede, Physically unclonable functions: a study on the state of the art and future research directions, (2010). 10.1007/978-3-642-14452-3_1.Google Scholar
- 20 Security solutions for local wireless networks in control applications based on physical layer securityIFAC-PapersOnLine2018513239Google Scholar
Cross Ref
- 21 Principles of physical layer security in multiuser wireless networks: a surveyIEEE Commun. Surv. Tutor.201416315501573Google Scholar
Cross Ref
- 22 A study of injection and jamming attacks in wireless secret sharing systemsin Proc. Workshop on Communication Security (WCS)2017ChamSpringerGoogle Scholar
- 23 E Rescorla, The transport layer security (TLS) protocol version 1.3. RFC 8446 (2018). https://rfc-editor.org/rfc/rfc8446.txt. Accessed 8 2018.Google Scholar
- 24 N. Aviram, K. Gellert, T. Jager, Session resumption protocols and efficient forward security for TLS 1.3 0-RTT. Cryptology ePrint Archive, Report 2019/228 (2019). https://eprint.iacr.org/2019/228. Accessed 2 2019.Google Scholar
- 25 Authenticated encryption: relations among notions and- analysis of the generic composition paradigmJ. Cryptol.200821446949124385061161.94435Google Scholar
Digital Library
- 26 The software performance of authenticated-encryption modesFSE, Lecture Notes in Computer Science2011BerlinSpringerGoogle Scholar
- 27 Comparative study of authenticated encryption targeting lightweight IoT applicationsIEEE Design Test20173442633Google Scholar
Cross Ref
- 28 Effective capacity: a wireless link model for support of quality of serviceIEEE Trans. Wirel. Commun.200324630643Google Scholar
Digital Library
- 29 A privacy-preserving, mutual puf-based authentication protocolCryptography201613Google Scholar
Cross Ref
- 30 Silicon physical random functionsProceedings of the 9th ACM Conference on Computer and Communications Security (CCS ’02)2002New YorkAssociation for Computing Machinery148160Google Scholar
- 31 Implementation and characterization of a physical unclonable function for IoT: a case study with the TERO-PUFIEEE Trans. Comput.-Aided Des. Integr. Circ. Syst.201837197109Google Scholar
Cross Ref
- 32 FPGA intrinsic PUFs and their use for IP protectionProceedings of the 9th International Workshop on Cryptographic Hardware and Embedded Systems (CHES ’07)2007BerlinSpringer6380Google Scholar
- 33 Help: a hardware-embedded delay PUFIEEE Des. Test20133021725Google Scholar
Cross Ref
- 34 Physical unclonable functions in the internet of things: State of the art and open challengesSensors2019BaselMDPIGoogle Scholar
- 35 P. Maurya, S. Bagchi, A secure PUF-based unilateral authentication scheme for RFID system. Wirel. Pers. Commun.103: (2018). 10.1007/s11277-018-5875-2.Google Scholar
- 36 A lockdown technique to prevent machine learning on PUFs for lightweight authenticationIEEE Trans. Multi-Scale Comput. Syst.201623146159Google Scholar
Cross Ref
- 37 Physical unclonable function (PUF)-based e-cash transaction protocol (PUF-Cash)Cryptography2019318Google Scholar
Cross Ref
- 38 Mutual authentication in IoT systems using physical unclonable functionsIEEE Internet Things J.20174513271340Google Scholar
Cross Ref
- 39 J. Delvaux, R. Peeters, D. Gu, I. Verbauwhede, A survey on lightweight entity authentication with strong PUFs. ACM Comput. Surv.48(2) (2015). 10.1145/2818186.Google Scholar
- 40 S. Jana, S. N. Premnath, M. Clark, S. K. Kasera, N. Patwari, S. V. Krishnamurthy, in Proceedings of the 15th Annual International Conference on Mobile Computing and Networking (MobiCom ’09). On the effectiveness of secret key extraction from wireless signal strength in real environments (Association for Computing MachineryNew York, 2009), pp. 321–332. URL 10.1145/1614320.1614356.Google Scholar
- 41 Wireless communications: principles and practice, 2nd edn.2001USAPrentice Hall PTRGoogle Scholar
- 42 J. Wan, A. B. Lopez, M. A. Al Faruque, in 2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS). Exploiting wireless channel randomness to generate keys for automotive cyber-physical system security, (2016), pp. 1–10. 10.1109/ICCPS.2016.7479103.Google Scholar
- 43 Key agreement algorithms for vehicular communication networks based on reciprocity and diversity theoremsIEEE Trans. Veh. Technol.201362840204027Google Scholar
Cross Ref
- 44 Y. Liu, J. Jing, J. Yang, in 2008 9th International Conference on Signal Processing. Secure underwater acoustic communication based on a robust key generation scheme, (2008), pp. 1838–1841. 10.1109/ICOSP.2008.4697498.Google Scholar
- 45 Physical layer cryptographic key generation by exploiting PMD of an optical fiber linkJ. Light. Technol.2018362459035911Google Scholar
Cross Ref
- 46 D. Tian, W. Zhang, J. Sun, C. Wang, in 2019 IEEE/CIC International Conference on Communications in China (ICCC). Physical-layer security of visible light communications with jamming, (2019), pp. 512–517. 10.1109/ICCChina.2019.8855859.Google Scholar
- 47 Key generation from wireless channels: a reviewIEEE Access20164614626Google Scholar
Cross Ref
- 48 Single-user channel estimation and equalizationIEEE Signal Proc. Mag.20001731728Google Scholar
Cross Ref
- 49 Microwave mobile communications1994New YorkWiley-IEEE PressGoogle Scholar
Digital Library
- 50 H. Liu, Y. Wang, J. Yang, Y. Chen, in 2013 Proceedings IEEE INFOCOM. Fast and practical secret key extraction by exploiting channel response, (2013), pp. 3048–3056. 10.1109/INFCOM.2013.6567117.Google Scholar
- 51 Radio-telepathy: extracting a secret key from an unauthenticated wireless channelProceedings of the 14th ACM International Conference on Mobile Computing and Networking (MobiCom ’08)2008New YorkAssociation for Computing Machinery128139Google Scholar
- 52 Eliminating reconciliation cost in secret key generation for body-worn health monitoring devicesIEEE Trans. Mobile Comput.2014131227632776Google Scholar
Cross Ref
- 53 Proximate: proximity-based secure pairing using ambient wireless signalsProceedings of the 9th International Conference on Mobile Systems, Applications, and Services (MobiSys ’11)2011New YorkAssociation for Computing Machinery211224Google Scholar
- 54 Intrinsic-id company. https://www.intrinsic-id.com/sram-puf.Google Scholar
- 55 ICTK holdings corporation. https://ictk-puf.com/puf-technology.Google Scholar
- 56 A robust physical unclonable function with enhanced challenge-response setIEEE Trans. Inf. Forensic Secur.201271333345Google Scholar
Digital Library
- 57 Comparative analysis of IEEE 802.1x authentication methodsProceedings of the 11th Conference on 11th WSEAS International Conference on Communications - Volume 11(ICCOM’07)2007Stevens PointWorld Scientific and Engineering Academy and Society (WSEAS)16Google Scholar
- 58 A practical analysis of EAP authentication methods9th RoEduNet IEEE International Conference2010SibiuIEEE3135Google Scholar
- 59 Physical unclonable functions and applications: a tutorialProc. IEEE2014102811261141Google Scholar
Cross Ref
- 60 Physical unclonable functions for device authentication and secret key generation2007 44th ACM/IEEE Design Automation Conference2007San DiegoIEEE914Google Scholar
- 61 Physical unclonable functions in theory and practice2012New YorkSpringerGoogle Scholar
Digital Library
- 62 A PUF-based secure communication protocol for IoTACM Trans. Embedded Comput. Syst.201716125Google Scholar
Digital Library
- 63 Two-factor authentication for IoT with location informationIEEE Internet Things J.20196233353351Google Scholar
Cross Ref
- 64 M. H Mahalat, S Saha, A Mondal, B. Sen, in 2018 8th International Symposium on Embedded Computing and System Design (ISED). A PUF based light weight protocol for secure WiFi authentication of IoT devices, (2018), pp. 183–187. 10.1109/ISED.2018.8703993.Google Scholar
- 65 PUF based authentication protocol for IoTSymmetry201810352Google Scholar
Cross Ref
- 66 Y. Yilmaz, S. R. Gunn, B. Halak, in 2018 IEEE 3rd International Verification and Security Workshop (IVSW). Lightweight PUF-based authentication protocol for IoT devices, (2018), pp. 38–43. 10.1109/IVSW.2018.8494884.Google Scholar
- 67 S. Ahmad, A. H. Mir, G. R. Beigh, in 2011 Fifth IEEE International Conference on Advanced Telecommunication Systems and Networks (ANTS). Latency evaluation of extensible authentication protocols in WLANs, (2011), pp. 1–5. 10.1109/ANTS.2011.6163654.Google Scholar
- 68 Lightweight and privacy-preserving two-factor authentication scheme for IoT devicesIEEE Internet Things J.201961580589Google Scholar
Cross Ref
- 69 A. Ometov, P. Masek, L. Malina, R. Florea, J. Hosek, S. Andreev, J. Hajny, J. Niutanen, Y. Koucheryavy, in 2016 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops). Feasibility characterization of cryptographic primitives for constrained (wearable) IoT devices, (2016), pp. 1–6. 10.1109/PERCOMW.2016.7457161.Google Scholar
- 70 Efficient software-based encoding and decoding of BCH codesIEEE Trans. Comput.200958787888927507921367.94387Google Scholar
Digital Library
- 71 Secret key establishment using temporally and spatially correlated wireless channel coefficientsIEEE Trans. Mob. Comput.2011102205215Google Scholar
Digital Library
- 72 Efficient key generation by exploiting randomness from channel responses of individual ofdm subcarriersIEEE Trans. Commun.201664625782588Google Scholar
Cross Ref
- 73 On the key generation from correlated wireless channelsIEEE Commun. Lett.2017214961964Google Scholar
Cross Ref
- 74 M. Mitev, A. Chorti, E. V. Belmega, M. Reed, in 2019 IEEE Global Communications Conference (GLOBECOM). Man-in-the-middle and denial of service attacks in wireless secret key generation, (2019), pp. 1–6. 10.1109/GLOBECOM38437.2019.9013816.Google Scholar
- 75 C. Saiki, A. Chorti, in 2015 IEEE Conference on Communications and Network Security (CNS). A novel physical layer authenticated encryption protocol exploiting shared randomness, (2015), pp. 113–118. 10.1109/CNS.2015.7346818.Google Scholar
- 76 Q. Wang, H. Su, K. Ren, K. Kim, in 2011 Proceedings IEEE INFOCOM. Fast and scalable secret key generation exploiting channel phase randomness in wireless networks, (2011), pp. 1422–1430. 10.1109/INFCOM.2011.5934929.Google Scholar
- 77 Information-theoretically secret key generation for fading wireless channelsIEEE Trans. Inf. Forensics Secur.201052240254Google Scholar
Digital Library
- 78 Information reconciliation schemes in physical-layer securityComput. Netw.2016109P184104Google Scholar
Digital Library
- 79 A hybrid information reconciliation method for physical layer key generationEntropy2019216883988377Google Scholar
- 80 P. Treeviriyanupab, P. Sangwongngam, K. Sripimanwat, O. Sangaroon, in 2012 9th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology. BCH-based Slepian-Wolf coding with feedback syndrome decoding for quantum key reconciliation, (2012), pp. 1–4. 10.1109/ECTICon.2012.6254266.Google Scholar
- 81 J. Etesami, W. Henkel, in 2012 1st IEEE International Conference on Communications in China (ICCC). LDPC code construction for wireless physical-layer key reconciliation, (2012), pp. 208–213. 10.1109/ICCChina.2012.6356879.Google Scholar
- 82 Generalized privacy amplificationIEEE Trans. Inf. Theory19954161915192313855860856.94018Google Scholar
Digital Library
- 83 On the using of discrete wavelet transform for physical layer key generationAd Hoc Netw.2017642231Google Scholar
- 84 Wireless information-theoretic securityIEEE Trans. Inf. Theory20085462515253424492591304.94096Google Scholar
Digital Library
- 85 M. Mitev, A. Chorti, M. Reed, in 2019 15th International Wireless Communications Mobile Computing Conference (IWCMC). Optimal resource allocation in joint secret key generation and data transfer schemes, (2019), pp. 360–365. 10.1109/IWCMC.2019.8766766.Google Scholar
- 86 Protecting secret key generation systems against jamming: energy harvesting and channel hopping approachesIEEE Trans. Inf. Forensic Secur.2017121126112626Google Scholar
Digital Library
- 87 The effect upon channel capacity in wireless communications of perfect and imperfect knowledge of the channelIEEE Trans. Inf. Theory200046393394623028061008.94536Google Scholar
Digital Library
- 88 Order statistics in wireless communications: diversity, adaptation, and scheduling in MIMO and OFDM systems, 1st edn2011USACambridge University PressGoogle Scholar
- 89 Knapsack problems: algorithms and computer implementations1990USAWileyGoogle Scholar
Digital Library
- 90 Knapsack problems2004BostonSpringerGoogle Scholar
Cross Ref
- 91 Approximation algorithms2001BerlinSpringerGoogle Scholar
Cross Ref
- 92 Stability, queue length, and delay of deterministic and stochastic queueing networksIEEE Trans. Autom. Control199439591393112743380818.90050Google Scholar
Cross Ref
- 93 On large deviation from invariant measureTheory Prob. Appl.19772224394710400375.60033Google Scholar
Cross Ref
- 94 R. Ellis, Large deviations for a general class of random vectors. Ann. Probab.12: (1984). 10.1214/aop/1176993370.Google Scholar
- 95 Achieving maximum effective capacity in ofdma networks operating under statistical delay guaranteeIEEE Access201751433314346Google Scholar
- 96 Convex optimization2004USACambridge University PressGoogle Scholar
Cross Ref
Recommendations
Authenticated Group Key Transfer Protocol Based on Secret Sharing
Key transfer protocols rely on a mutually trusted key generation center (KGC) to select session keys and transport session keys to all communication entities secretly. Most often, KGC encrypts session keys under another secret key shared with each ...
An Improved Authenticated Group Key Transfer Protocol Based on Secret Sharing
To achieve secure group communication, one-time session keys need to be shared among group members in a secure and authenticated manner. In this paper, we propose an improved authenticated key transfer protocol based on Shamir's secret sharing. The ...
Practical and post-quantum authenticated key exchange from one-way secure key encapsulation mechanism
ASIA CCS '13: Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications securityThis paper discusses how to realize practical post-quantum authenticated key exchange (AKE) with strong security, i.e., CK+ security (Krawczyk, CRYPTO 2005). It is known that strongly secure post-quantum AKE protocols exist on a generic construction ...
Comments