Vulnerabilities of physical layer secret key generation against environment reconstruction based attacks

  • Zijie Ji
  • , Yan Zhang*
  • , Zunwen He
  • , Kun Lin
  • , Bin Li
  • , Phee Lep Yeoh
  • , Hao Yin
  • *Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

Abstract

This letter investigates the security of physical layer secret key generation in highly reconfigurable scattering environments. Based on our derived secret key capacity expression, we show that the eavesdropper's accurate knowledge of surrounding environments and propagation laws can significantly decrease the secret key capacity, i.e., the security of keys does not only rely on the channel correlation. We term this new physical layer attack as Environment Reconstruction based Attack for SEcret keys (ERASE) and provide a practical application of this attack based on a generalized 3D channel model. Finally, the impact of crucial parameters related to the channel scattering conditions is analyzed through simulation results, and useful insights for the secure and practical design of physical layer key generation are highlighted.

Original languageEnglish
Article number8957701
Pages (from-to)693-697
Number of pages5
JournalIEEE Wireless Communications Letters
Volume9
Issue number5
DOIs
Publication statusPublished - May 2020

Keywords

  • Concealed attack
  • environment reconstruction
  • parameter estimation
  • physical layer security
  • secret key

Fingerprint

Dive into the research topics of 'Vulnerabilities of physical layer secret key generation against environment reconstruction based attacks'. Together they form a unique fingerprint.

Cite this