Computer Science ›› 2024, Vol. 51 ›› Issue (5): 414-420.doi: 10.11896/jsjkx.221000037

• Information Security • Previous Articles    

Key Generation Scheme Based on RIS Multipath Random Superposition

ZHANG Zhongxin1, YI Ming2, XIAO Shuaifang2   

  1. 1 School of Cyberspace Security,Zhengzhou University,Zhengzhou 450000,China
    2 Chinese Information Engineering University of the Strategic Support Force of the People's Liberation Army,Zhengzhou 450001,China
  • Received:2022-10-08 Revised:2023-02-20 Online:2024-05-15 Published:2024-05-08
  • About author:ZHANG Zhongxin,born in 1997,postgraduate.His main research interest is physical layer security.
    YI Ming,born in 1986,Ph.D,associate researcher.His main research interests include wireless communication and cyberspace security.

Abstract: In static scenario,the multipath phase and amplitude changes slowly,and the key rate at physical layer based on wireless channel characteristics is low,making it difficult to meet the communication security requirements of high-speed data ser-vices.This paper proposes a key generation scheme based on random superposition of multipaths with the help of RIS.Firstly,both the sender and the receiver use the real-time controllability of the RIS and the agile characteristics of the pattern to separate the multipath in the space through the multipath power spectrum characteristics.Then,the power allocation strategy of multipath is changed many times in the channel coherent time,an equivalent fast-changing channel is constructed,and the randomness of the key source is improved.Finally,a consistent security key is generated through quantization,negotiation,and privacy amplification.Simulation results show that,compared with the existing physical layer key generation schemes based on RIS antenna,the proposed scheme improves the source entropy by exploiting the multipath characteristics of the channel.On the other hand,the randomness of the source is improved by the power distribution on the multipath,which brings a certain gain to the key rate.

Key words: Physical layer key, Static scene, Multipath, Wireless channel characteristics

CLC Number: 

  • TN92
[1]HUANG K Z,JIN L,CHEN Y J,et al.Development and new challenges of wireless physical layer key generation technology [J].Journal of Electronics and Information,2020,42(10):2330-2341.
[2]ZHANG J,HE B,DUONG T Q,et al.On the Key Generation From Correlated Wireless Channels [J].IEEE Communications Letters,2017,21(4):961-964.
[3]ROTTENBERG F,NGUYEN T H,DRICOT J M,et al.CSI-Based Versus RSS-Based Secret-Key Generation Under Correlated Eavesdropping [J].IEEE Transactions on Communications,2021,69(3):1868-1881.
[4]ZHANG J,DING M,LI G,et al.Key Generation Based on Large Scale Fading [J].IEEE Transactions on Vehicular Technology,2019,68(8):8222-8226.
[5]HU X Y,JIN L,HUANG K Z,et al.Physical Layer Key Gene-ration Scheme Based on Signal Propagation Characteristics [J].Electronic Journal,2019,47(2):483-488.
[6]GUO D,CAO K,XIONG J,et al.A Lightweight Key Generation Scheme for the Internet of Things [J].IEEE Internet of Things Journal,2021,8(15):12137-12149.
[7]LOU Y M,ZHONG Z,JIN L,et al.Key Generation Scheme Based on Received Signal Waveform [J].Journal of the University of Information Engineering,2017,18(2):166-171.
[8]ZHANG S J,JIN L,LOU Y,et al.Secret key generation based on two-way randomness for TDD-SISO system [J].China Communications,2018,15(7):202-216.
[9]LI G Y.Research on Theory and Method of Wireless Communication Physical Layer Security [D].Nanjing:University of Southeast,2017.
[10]XIAO S F.Research on physical layer key generation technology for Internet of Things [D].Zhengzhou:University of Information Engineering,2018.
[11]ALDAGHRI N,MAHDAVIFAR H.Physical Layer Secret Key Generation in Static Environments [J].IEEE Transactions on Information Forensics and Security,2020,15:2692-2705.
[12]LIANG Y C,CHEN J,LONG R Z,et al.Reconfigurable intelligent surfaces for smart wireless environments:channel estimation,system design and applications in 6G networks [J].Science China(Information Sciences),2021,64(10):52-72.
[13]HAO Y N,JIN L,HUANG K Z,et al.Key generation method based on smart metasurface in quasi-static scene [J].Journal of Network and Information Security,2021,7(2):77-85.
[14]YANG J,JI X S,HUANG K Z,et al.Physical layer key generation scheme based on RIS antenna in static scene [J].Chinese Science:Information Science,2022,52(2):253-269.
[15]JIN L,LOU Y M,XU X M,et al.Separating Multi-Stream Signals Based on Space-Time Isomerism [C]//2020 International Conference on Wireless Communications and Signal Processing(WCSP).2020:418-423.
[16]LOU Y M,JIN L,SUN X L,et al.Multi-path separation and parameter estimation by single DMA in fading channel [J].IET Communications,2022,16(13):1475-1485.
[17]ZHANG W.Research on Estimation Algorithm of CoherentSource Direction of Arrival Based on Matrix Reconstruction [D].Harbin:University of Harbin Industry,2021.
[18]ADIL M,WYNE S,NAWAZ S J.On Quantization for SecretKey Generation From Wireless Channel Samples [J].IEEE Access,2021,9(2):21653-21668.
[19]LI G,ZHANG Z,ZHANG J,et al.Encrypting Wireless Communications on the Fly Using One-Time Pad and Key Generation [J].IEEE Internet of Things Journal,2021,8(1):357-369.
[20]HU X Y.Key Generation Method Based on Wireless Endogenous Security [D].Zhengzhou:University of Information Engineering,2021.
[1] DONG Chao-ying, XU Xin, LIU Ai-jun, CHANG Jing-hui. New Routing Methods of LEO Satellite Networks [J]. Computer Science, 2020, 47(12): 285-290.
[2] ZHANG Jin-hui, DENG Qian, LI Zhen-yu. Study on Application of Network Coding and Multipath Transmission in Internet Live Video Broadcasting [J]. Computer Science, 2019, 46(8): 171-177.
[3] QIN Kuang-yu, HUANG Chuan-he, LIU Ke-wei, SHI Jiao-li and CHEN Xi. Multipath Routing Algorithm in Software Defined Networking Based on Multipath Broadcast Tree [J]. Computer Science, 2018, 45(1): 211-215.
[4] YAN Jun-ya, QIAN Yu-hua, LI Hua-feng and MA Shang-cai. Node Localization Based on Multipath Distance and Neural Network in WSN [J]. Computer Science, 2017, 44(8): 71-75.
[5] NONG Huang-wu, HUANG Chuan-he and HUANG Xiao-peng. SDN-based Multipath Routing Algorithm for Fat-tree Data Center Networks [J]. Computer Science, 2016, 43(6): 32-34.
[6] WANG Jun, DU Wei-qi, LIU Hui and WANG Lei. Multipath Routing Protocol Based on Braid-multipath Network Coding Model for Wireless Sensor Networks [J]. Computer Science, 2016, 43(11): 135-141.
[7] ZHU Wei-na, ZHOU Jie, CAI Shi-qing and SHEN Xiao-yan. Research on Channel Esitimation of Scattering Channel Models in Mobile Communication Macrocell Environments [J]. Computer Science, 2016, 43(10): 87-92.
[8] DU Wen-feng and WU Zhen. Data Distribution Algorithm with Out-of-order Feedback for CMT over Diversity Network [J]. Computer Science, 2015, 42(3): 60-64.
[9] HAN Li and QIAN Huan-yan. Algorithm of Network Coding Based Multipath Opportunistic Routing for Wireless Networks [J]. Computer Science, 2014, 41(5): 116-119.
[10] . Cluster-based Multipath Routing Protocol for Wireless Sensor Networks [J]. Computer Science, 2013, 40(2): 91-94.
[11] . Algorithm for MFSK Symbol Rate Estimation Based on Signal Decomposition [J]. Computer Science, 2012, 39(2): 66-67.
[12] . Fast Fault Location Mechanism Based on Multipath Traffic Transmission [J]. Computer Science, 2012, 39(12): 87-90.
[13] . Distributed Protocol for Multipath Relay Routing Based on Node's Security Degree [J]. Computer Science, 2012, 39(10): 54-.
[14] LI Dan,WANG Bin-qiang,LIU Qiang,MA Hai-long. Analysis for Loop-freeness of Multipath Inter-domain Routing Based on Locator/ID Decoupling Architecture [J]. Computer Science, 2011, 38(1): 130-135.
[15] CAI Ling,WANG Jin-kuan,WANG Cui-rong. Optimization Based on Traffic Balance over Multipath Network [J]. Computer Science, 2010, 37(7): 74-78.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!