Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3522783.3529526acmconferencesArticle/Chapter ViewAbstractPublication PageswisecConference Proceedingsconference-collections
research-article

KNEW: Key Generation using NEural Networks from Wireless Channels

Published: 16 May 2022 Publication History

Abstract

Secret keys can be generated from reciprocal channels to be used for shared secret key encryption. However, challenges arise in practical scenarios from non-reciprocal measurements of reciprocal channels due to changing channel conditions, hardware inaccuracies and estimation errors resulting in low key generation rate (KGR) and high key disagreement rates (KDR). To combat these practical issues, we propose KNEW Key Generation using NEural Networks from Wireless Channels, which extracts the implicit features of channel in a compressed form to derive keys with high agreement rate. Two Neural Networks (NNs) are trained simultaneously to map each other's channel estimates to a different domain, the latent space, which remains inaccessible to adversaries. The model also minimizes the distance between the latent spaces generated by two trusted pair of nodes, thus improving the KDR. Our simulated results demonstrate that the latent vectors of the legitimate parties are highly correlated yielding high KGR (≈ 64 bits per measurement) and low KDR (<0.05 in most cases). Our experiments with over-the-air signals show that the model can adapt to realistic channels and hardware inaccuracies, yielding over 32 bits of key per channel estimation without any mismatch.

References

[1]
R. Ahlswede and I. Csiszar. 1993. Common randomness in information theory and cryptography. I. Secret sharing. IEEE Transactions on Information Theory, Vol. 39, 4 (1993), 1121--1132.
[2]
R. Ahlswede and I. Csiszar. 1998. Common randomness in information theory and cryptography. II. CR capacity. IEEE Transactions on Information Theory, Vol. 44, 1 (1998), 225--240.
[3]
Xinrong Guan, Ning Ding, Yueming Cai, and Weiwei Yang. 2019. Wireless Key Generation from Imperfect Channel State Information: Performance Analysis and Improvements. In 2019 IEEE International Conference on Communications Workshops (ICC Workshops). 1--6. https://doi.org/10.1109/ICCW.2019.8756656
[4]
Jingyuan Han, Xin Zeng, Xiaoping Xue, and Jingxiao Ma. 2020. Physical Layer Secret Key Generation Based on Autoencoder for Weakly Correlated Channels. In 2020 IEEE/CIC International Conference on Communications in China (ICCC). 1220--1225. https://doi.org/10.1109/ICCC49849.2020.9238931
[5]
IEEE Computer Society: LAN/MAN Standards Committee [n.d.]. Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. IEEE Computer Society: LAN/MAN Standards Committee. http://standards.ieee.org/getieee802/download/802.11-2007.pdf
[6]
Yann Lecun. 1987. PhD thesis: Modeles connexionnistes de l'apprentissage (connectionist learning models). Universite P. et M. Curie (Paris 6).
[7]
Mehdi Letafati, Hamid Behroozi, Babak Hossein Khalaj, and Eduard A. Jorswieck. 2021. Deep Learning for Hardware-Impaired Wireless Secret Key Generation with Man-in-the-Middle Attacks. In 2021 IEEE Global Communications Conference (GLOBECOM). 1--6. https://doi.org/10.1109/GLOBECOM46510.2021.9685537
[8]
Guyue Li, Aiqun Hu, Junqing Zhang, Linning Peng, Chen Sun, and Daming Cao. 2018. High-Agreement Uncorrelated Secret Key Generation Based on Principal Component Analysis Preprocessing. IEEE Transactions on Communications, Vol. 66, 7 (2018), 3022--3034. https://doi.org/10.1109/TCOMM.2018.2814607
[9]
Ruoheng Liu, Yingbin Liang, H. Vincent Poor, and Predrag Spasojevic. 2007. Secure Nested Codes for Type II Wiretap Channels. In 2007 IEEE Information Theory Workshop. 337--342. https://doi.org/10.1109/ITW.2007.4313097
[10]
U. Maurer and S. Wolf. 2003 a. Secret-key agreement over unauthenticated public channels. I. Definitions and a completeness result. IEEE Transactions on Information Theory, Vol. 49, 4 (2003), 822--831.
[11]
U. Maurer and S. Wolf. 2003 b. Secret-key agreement over unauthenticated public channels. II. Privacy amplification. IEEE Transactions on Information Theory, Vol. 49, 4 (2003), 839--851.
[12]
U. Maurer and S. Wolf. 2003 c. Secret-key agreement over unauthenticated public channels-Part II: the simulatability condition. IEEE Transactions on Information Theory, Vol. 49, 4 (2003), 832--838.
[13]
U. M. Maurer. 1993. Secret key agreement by public discussion from common information. IEEE Transactions on Information Theory, Vol. 39, 3 (1993), 733--742.
[14]
Neal Patwari, Jessica Croft, Suman Jana, and Sneha K. Kasera. 2010. High-Rate Uncorrelated Bit Extraction for Shared Secret Key Generation from Channel Measurements. IEEE Transactions on Mobile Computing, Vol. 9, 1 (2010), 17--30. https://doi.org/10.1109/TMC.2009.88
[15]
Yuexing Peng, Peng Wang, Wei Xiang, and Yonghui Li. 2017. Secret Key Generation Based on Estimated Channel State Information for TDD-OFDM Systems Over Fading Channels. IEEE Transactions on Wireless Communications, Vol. 16, 8 (2017), 5176--5186. https://doi.org/10.1109/TWC.2017.2706657
[16]
Claude E Shannon. 1949. Communication theory of secrecy systems. Bell system technical journal, Vol. 28, 4 (1949), 656--715.
[17]
Haowei Wang, Xiaofeng Tao, Na Li, and Zhu Han. 2018. Polar Coding for the Wiretap Channel With Shared Key. IEEE Transactions on Information Forensics and Security, Vol. 13, 6 (2018), 1351--1360. https://doi.org/10.1109/TIFS.2017.2774499
[18]
Pengjin Xie, Jingchao Feng, Zhichao Cao, and Jiliang Wang. 2018. GeneWave: Fast Authentication and Key Agreement on Commodity Mobile Devices. IEEE/ACM Transactions on Networking, Vol. 26, 4 (2018), 1688--1700. https://doi.org/10.1109/TNET.2018.2848262
[19]
Junqing Zhang, Alan Marshall, and Lajos Hanzo. 2018. Channel-Envelope Differencing Eliminates Secret Key Correlation: LoRa-Based Key Generation in Low Power Wide Area Networks. IEEE Transactions on Vehicular Technology, Vol. 67, 12 (2018), 12462--12466. https://doi.org/10.1109/TVT.2018.2877201
[20]
Junqing Zhang, Alan Marshall, Roger Woods, and Trung Q. Duong. 2016a. Efficient Key Generation by Exploiting Randomness From Channel Responses of Individual OFDM Subcarriers. IEEE Transactions on Communications, Vol. 64, 6 (2016), 2578--2588. https://doi.org/10.1109/TCOMM.2016.2552165
[21]
Junqing Zhang, Roger Woods, Trung Q. Duong, Alan Marshall, Yuan Ding, Yi Huang, and Qian Xu. 2016b. Experimental Study on Key Generation for Physical Layer Security in Wireless Communications. IEEE Access, Vol. 4 (2016), 4464--4477. https://doi.org/10.1109/ACCESS.2016.2604618
[22]
Xinwei Zhang, Guyue Li, Zongyue Hou, and Aiqun Hu. 2021. Secret Key Generation for FDD Systems Based on Complex-Valued Neural Network. In 2021 IEEE 94th Vehicular Technology Conference (VTC2021-Fall). 1--6. https://doi.org/10.1109/VTC2021-Fall52928.2021.9625252

Cited By

View all
  • (2024)Key Synchronization Method Based on Negative Databases and Physical Channel State Characteristics of Wireless Sensor NetworkSensors10.3390/s2419621724:19(6217)Online publication date: 25-Sep-2024
  • (2024)Enabling Deep Learning-Based Physical-Layer Secret Key Generation for FDD-OFDM Systems in Multi-EnvironmentsIEEE Transactions on Vehicular Technology10.1109/TVT.2024.336736273:7(10135-10149)Online publication date: Jul-2024
  • (2024)Secrecy Power Allocation Using Successive Convex Approximation for In-band Full Duplex Two-way MIMO Wiretap ChannelICC 2024 - IEEE International Conference on Communications10.1109/ICC51166.2024.10622668(3988-3993)Online publication date: 9-Jun-2024
  • Show More Cited By

Index Terms

  1. KNEW: Key Generation using NEural Networks from Wireless Channels

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      WiseML '22: Proceedings of the 2022 ACM Workshop on Wireless Security and Machine Learning
      May 2022
      93 pages
      ISBN:9781450392778
      DOI:10.1145/3522783
      • General Chair:
      • Murtuza Jadliwala
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 16 May 2022

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. key generation
      2. neural networks
      3. physical layer security
      4. wireless security

      Qualifiers

      • Research-article

      Conference

      WiSec '22

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)51
      • Downloads (Last 6 weeks)5
      Reflects downloads up to 10 Nov 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Key Synchronization Method Based on Negative Databases and Physical Channel State Characteristics of Wireless Sensor NetworkSensors10.3390/s2419621724:19(6217)Online publication date: 25-Sep-2024
      • (2024)Enabling Deep Learning-Based Physical-Layer Secret Key Generation for FDD-OFDM Systems in Multi-EnvironmentsIEEE Transactions on Vehicular Technology10.1109/TVT.2024.336736273:7(10135-10149)Online publication date: Jul-2024
      • (2024)Secrecy Power Allocation Using Successive Convex Approximation for In-band Full Duplex Two-way MIMO Wiretap ChannelICC 2024 - IEEE International Conference on Communications10.1109/ICC51166.2024.10622668(3988-3993)Online publication date: 9-Jun-2024
      • (2024)Robust Deep Learning-Based Secret Key Generation in Dynamic LiFi Networks Against Concept Drift2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)10.1109/CCNC51664.2024.10454770(899-904)Online publication date: 6-Jan-2024
      • (2024)Artificial intelligence empowered physical layer security for 6GComputer Networks: The International Journal of Computer and Telecommunications Networking10.1016/j.comnet.2024.110255242:COnline publication date: 2-Jul-2024
      • (2023)Credit Risk Prediction Model for Listed Companies Based on CNN-LSTM and Attention MechanismElectronics10.3390/electronics1207164312:7(1643)Online publication date: 30-Mar-2023
      • (2023)Efficient Neural Network for Text Recognition in Natural Scenes Based on End-to-End Multi-Scale Attention MechanismElectronics10.3390/electronics1206139512:6(1395)Online publication date: 15-Mar-2023
      • (2023)Efficient Lung Cancer Image Classification and Segmentation Algorithm Based on an Improved Swin TransformerElectronics10.3390/electronics1204102412:4(1024)Online publication date: 18-Feb-2023
      • (2023)A Financial Time-Series Prediction Model Based on Multiplex Attention and Linear Transformer StructureApplied Sciences10.3390/app1308517513:8(5175)Online publication date: 21-Apr-2023
      • (2023)A Channel Frequency Response-Based Secret Key Generation Scheme in In-Band Full-Duplex MIMO-OFDM SystemsIEEE Journal on Selected Areas in Communications10.1109/JSAC.2023.328761041:9(2951-2965)Online publication date: Sep-2023

      View Options

      Get Access

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media