Aerospace Knowledge and Technology Journal

Aerospace Knowledge and Technology Journal

Secret key generation for UAV communications using an Untrusted Relay

Document Type : Research Paper

Authors
1 Assistant Professor, ICT Research Institute, Iran Telecommunication Research Center (ITRC), Tehran, Iran
2 Assistant Professor, Faculty of Electrical and Computer Engineering, Qom University of Technology, Qom, Iran.
Abstract
In recent years, the development of UAVs has been a fundamental and innovative strategic change in wireless communication systems. Recently, a new and efficient security solution called physical layer secret key generation has attracted the attention of researchers and industrialists. This method is attractive for UAV applications due to its lightweight and easy scalability. However, in static UAV communication, secret key generation faces two major challenges: low key generation rate and the existence of vulnerable areas. To overcome the first weakness, local random generators can be used by the UAVs themselves. Specifically, in this paper, the channel probe signals sent by UAVs have random phases. Also, to increase the key generation rate, it is suggested that an external node called relay (which is untrusted) cooperates in the key generation process. For this collaborative key generation scheme, while presenting possible attacks for eavesdroppers, it is evaluated from the perspective of geometric secrecy. The simulation results show that the proposed scheme has less vulnerable areas compared to the recent reference (without relay).
Keywords
Subjects

[1]. Y. Zeng, R. Zhang, and T. J. Lim, Wireless Communications with Unmanned Aerial Vehicles: Opportunities and Challenges, IEEE Commun. Mag., vol. 54, no. 5, pp. 36–42, May 2016.
[2]. Shui Wang, Kehan Zhang, Bingcheng Zhu, Wei Wang, Zaichen Zhang, Visible Light Communications for Unmanned Aerial Vehicle: Channel Modeling and Experimental Validation, IEEE Commun. Lett., vol. 27, no. 6, pp.1530-1534, May 2023.
[3]. J. Liang, W. Liu, N. N. Xiong, A. Liu, and S. Zhang, An intelligent and trust uav-assisted code dissemination 5g system for industrial internetof-things, IEEE Trans. Industrial Informatics, vol. 18, no. 4, pp. 2877–2889, June 2022.
[4]. M. Ahmed, H. Shi, X. Chen, Y. Li, M. Waqas, and D. Jin, Socially aware secrecy-ensured resource allocation in d2d underlay communication: An overlapping coalitional game scheme, IEEE Trans. Wireless Commun., vol. 17, no. 6, pp. 4118–4133, Aug. 2018.
[5]. X. Sun, D. W. K. Ng, Z. Ding, Y. Xu, and Z. Zhong, Physical layer security in UAV systems: Challenges and opportunities, IEEE Wireless Commun., vol. 26, no. 5, pp. 40–47, Jan. 2019.
[6]. A. D. Wyner, The Wiretap Channel, J. Bell System Tech., vol. 54, pp. 1355–1387, 1975.
[7]. D. Abbasi-Moghadam, V. T. Vakili, and A. Falahati, Combination of turbo coding and cryptography in NONGEO satellite communication systems, International Symposium on Telecommunications (IST), 2008, pp. 666-670.
[8]. G. Noubir, On connectivity in Ad-hoc network under jamming using directional antennas and mobility, 2nd Int’l. Conf. Wired and Wireless Internet Commun. 2004.
[9]. A‌. Kuhestani, A. Mohammadi, and M. Mohammadi, Joint relay selection and power allocation in large-scale MIMO systems with untrusted relays and passive eavesdroppers, IEEE Trans. Inf. Forensics Security, vol 13, no. 2, pp. 341–355, Feb. 2018.
[10]. M. Forouzesh, F. Samsami Khodadad, P. Azmi, A. Kuhestani and H. Ahmadi, Simultaneous secure and covert transmissions against two attacks under practical assumptions, IEEE Internet of Things J., vol. 10, no. 12, pp. 10160-10171, June 2023.
[11] M. Ragheb, A. Kuhestani, M. Kazemi, H. Ahmadi and L. Hanzo, RIS-aided secure millimeter-wave communication under RF-chain impairments, IEEE Trans. Veh. Technol., doi: 10.1109/TVT.2023.330745.
[12]. M. Letafati, A. Kuhestani, and H. Behroozi, Three-hop untrusted relay networks with hardware imperfections and channel estimation errors for Internet of Things, IEEE Trans. Inf. Forensics Security, vol. 15, pp. 2856–2868, Mar. 2020.
[13]. M. Ragheb, S. M. S. Hemami, A. Kuhestani, D. W. K. Ng and L. Hanzo, On the physical layer security of untrusted millimeter wave relaying networks: A stochastic geometry Approach, IEEE Trans. Inf. Foren. Sec., vol. 17, pp. 53-68, Feb. 2022.
[14]. J. Zhang, G. Li, A. Marshall, A. Hu and L. Hanzo, A new frontier for IoT security emerging from three decades of key generation relying on wireless channels, IEEE Access, vol. 8, pp. 138406–138446, Jul. 2020.
[15] M. Letafati, A. Kuhestani, K. -K. Wong and M. J. Piran, A lightweight secure and resilient transmission scheme for the Internet of Things in the presence of a hostile jammer, IEEE Internet of Things Journal, vol. 8, no. 6, pp. 4373-4388, 15 Mar. 2021.
[16]. M. Letafati, A. Kuhestani, D. W. K. Ng, and H. Behroozi, A new frequency hopping-aided secure communication in the presence of an adversary jammer and an untrusted relay, IEEE ICC’20 Workshop, Dublin, Ireland, Jun. 2020.
[17]. A. H. Khalili Tirandaz and A. Kuhestani, Security evaluation of mutual random phase injection scheme for secret key generation over static point-to-point communications, Journal of Electronic & Cyber Defense, Oct. 2022.
[18]. K. Ren, H. Su, and Q. Wang, Secret key generation exploiting channel characteristics in wireless communications, IEEE Wireless Communications, vol. 18, pp. 6-12, 2011.
[19] Q. Wang, H. Su, K. Ren, and K. Kim, Fast and scalable secret key generation exploiting channel phase randomness in wireless networks, 2011 Proceedings IEEE INFOCOM, pp. 1422-1430.
[20] A. A. Hassan, W. E. Stark, J. E. Hershey, and S. Chennakeshu, Cryptographic key agreement for mobile radio, Digital Signal Processing, vol. 6, pp. 207-212, Apr. 1996.
[21] D. Rife and R. Boorstyn, Single-tone parameter estimation from discrete-time observations, IEEE Transactions on Information Theory, vol. 20, no. 5, pp. 591–598, Aug. 1974.
[22] S. Eberz, M. Strohmeier, M. Wilhelm and I. Martinovic, A Practical Man-In-The-Middle Attack on Signal-Based Key Generation Protocols, Computer Security – ESORICS, vol 7459, pp. 235-252, May 2012.
[23] C. Feng and L. Sun, Physical layer key generation from wireless channels with non-ideal channel reciprocity: A deep learning based approach, IEEE 95th Vehicular Technology Conference: (VTC2022-Spring), Helsinki, Finland, 2022, pp. 1-6.
[24] X. Guan, N. Ding, Y. Cai and W. Yang, Wireless key generation from imperfect channel state information: Performance analysis and improvements, IEEE International Conf. Commun. (ICC), Shanghai, China, 2019, pp. 1-6.