Abstract
Physical layer secret key generation (PLKG) is a promising technology for establishing effective secret keys. Current works for PLKG mostly study key generation schemes in ideal communication environments with little or even no signal interference. In terms of this issue, exploiting the reconfigurable intelligent reflecting surface (IRS) to assist PLKG has caused an increasing interest. Most IRS-assisted PLKG schemes focus on the single-input-single-output (SISO), which is limited in future communications with multi-input-multi-output (MIMO). However, MIMO could bring a serious overhead of channel reciprocity extraction. To fill the gap, this paper proposes a novel low-overhead IRS-assisted PLKG scheme with deep learning in the MIMO communications environments. We first combine the direct channel and the reflecting channel established by the IRS to construct the channel response function, and we propose a theoretically optimal interaction matrix to approach the optimal achievable rate. Then we design a channel reciprocity-learning neural network with an IRS introduced (IRS-CRNet), which is exploited to extract the channel reciprocity in time division duplexing (TDD) systems. Moreover, a PLKG scheme based on the IRS-CRNet is proposed. Final simulation results verify the performance of the PLKG scheme based on the IRS-CRNet in terms of key generation rate, key error rate and randomness.
1. Introduction
With the development of wireless communication technologies, more mobile devices will be connected to wireless systems [1]. Secure problems must be taken seriously because of the broadcast and openness of the wireless channel [2]. Traditionally, encryption algorithms, including symmetric key cryptography and asymmetric key cryptography, have been used to ensure the communication security [3]. However, traditional security schemes rely on public key infrastructures and complex encryption algorithms to manage secret keys [4], and they are not suitable for the Internet of Things (IoT) networks because IoT devices have constrained computational ability and resources. To address this issue, the physical layer key generation (PLKG), which exploits the inherent randomness of wireless fading channels, has become a promising technology to generate a shared secret key between wireless devices. The feasibility of PLKG relies on three principles, i.e., temporal variation, channel reciprocity, and spatial decorrelation [5,6].
Some works [7,8,9,10] have studied the process of PLKG, but they lack consideration of the signal interference existing between legitimate communication parties. In practice, the signal is susceptible to blockages such as a building or a wall. For these non-ideal communication environments, additional random signals and relay nodes [11,12] were introduced to improve the performance of PLKG schemes, while these methods can cause high power consumption and computation complexity, so they are not applicable to resource-constrained IoT devices. Therefore, how to design an efficient PLKG scheme in scenarios where signal interference exists is still an open question.
Nowadays, the reconfigurable intelligent reflecting surface (IRS) has been regarded as an intrinsic component in future wireless systems [13]. Some works [14,15,16,17,18,19,20] have employed the IRS to assist PLKG, and some of them considered SISO systems, while others considered MIMO systems. If we study PLKG in MIMO systems, how to reduce the overhead of channel reciprocity extraction is a crucial problem, especially for IoT devices with constrained resources. In addition, much prior knowledge is required in these works. Deep learning can alleviate these problems, as it is a meaningful technology that can bring promising applications to the physical layer [21], i.e., deep learning-based block-structured communications [22], signal recognition [23], channel estimation [24] and CSI feedback denoising [25]. For non-ideal communication environments, current PLKG schemes cannot achieve both low computation complexity and excellent performance.
In this paper, we introduce an IRS into the communication environment where signal interference exists. IRS has emerged as a promising technology to improve communication qualities through adjustments [15]. IRSs comprise massive numbers of nearly-passive elements interacting with incident signals [13], and the location of these elements can be adaptively placed. We can manipulate the wireless channel by adjusting the reflection coefficients of IRS continuously or discretely with low power consumption, i.e., phase, amplitude, frequency and even polarization [26,27]. Moreover, by exploiting deep learning networks, we design IRS-CRNet to extract reciprocal channel features in the orthogonal frequency division multiplexing (OFDM) TDD systems with low overhead. Then an efficient PLKG scheme based on IRS-CRNet is proposed for MIMO systems. The main contributions of this paper are as follows.
- We introduce an IRS into scenarios where blockages exist between legitimate communication parties to assist PLKG. Then, we construct the hybrid channel function and achieve an optimal achievable rate by adjusting phase shifts.
- We design the IRS-CRNet that can efficiently learn the reciprocity from the channel state information (CSI). Without any prior knowledge and much computational overhead, IRS-CRNet trained with a hybrid loss function can extract the channel features with high reciprocity, which can be used for generating the initial key directly.
- Based on the IRS-CRNet, we propose a novel IRS-assisted PLKG scheme for TDD systems. Experimental simulation results show that the performance of this scheme is excellent in terms of three metrics, including key generation rate, key error rate and randomness.
The rest of this paper is organized as follows. The second part presents the related works. In the third part, we construct the channel function and the reciprocal channel features-learning model. A novel IRS-assisted PLKG scheme based on deep learning is also proposed in this part. In the fourth part, the simulation results are presented to evaluate the performance of this scheme. Finally, the last part concludes this paper with a summary of our work.
2. Related Work
2.1. PLKG without IRS
Different metrics in the wireless communication system have been used to assist PLKG. Zhan et al. [10] proposed a PLKG scheme using the multi-level discrete wavelet transform to enhance the availability of key generation in real environments. Mathur et al. [28] extracted the RSS information of the wireless channel and exploited it to assist PLKG. The RSS-based methods cannot achieve high KGR and sufficient randomness, and more works [7,8,9] exploiting CSI have achieved better performance.
Many works have studied PLKG in MIMO systems so far. Li et al. [20] proposed a multiuser secret key generation in massive MIMO wireless networks and focused on the sum secret ket rate maximization. Jiao et al. [19] exploited new channel characteristics, including AoA (angle to arrival) and AoD (angle to departure), to generate the secret key. Jorswieck et al. [17] studied the secret key rate for a model with a MIMO channel and showed the impact of the statistic of the MIMO channel. Furqan et al. [18] developed a key generation method based on channel quantization with singular value decomposition. Moreover, some works consider protecting PLKG from attacks. Mitev et al. [29] analyzed the rejection and reactive jamming attacks in MIMO PLKG systems, and they showed a pilot randomization scheme can reduce injection attacks to jamming attacks and used a game-theoretic approach to deal with jamming attacks.
Deep learning has been applied to the process of the physical layer key generation. Zhang et al. [3] applied deep learning for PLKG in FDD for the first time, they first proved the existence of the band feature mapping function and proposed a key generation neural network (KGNet), the results turned out to be good. He et al. [30] designed the Channel Reciprocity Learning Net (CRLNet) to learn the channel reciprocity features of the wireless channels, and the CRLNet-based key generation scheme showed good performance. Zhou et al. [31] proposed a PLKG scheme combining the autoencoder and the multi-task learning, and this scheme can extract the reciprocal features from the weakly correlated channel.
All works mentioned above only focused on the relatively ideal wireless communication environments in which no blockage exists between transmitters and receivers. However, blockages exist in most wireless communication systems in practice, and they can interfere with the signal severely. To solve this problem, IRS can be exploited to assist PLKG.
2.2. PLKG with IRS
A few works have studied applying IRS to the PLKG scheme, and combining IRS with the conventional transmission control can potentially bring about performance gain compared with wireless networks without IRS [32]
Ji et al. [16] formulated the minimum achievable secret key capacity for an IRS acting as a passive beamformer in the presence of multiple eavesdroppers, and they designed an SDR-SCA optimization algorithm to maximize the minimum achievable secret key capacity for the worst-case eavesdropper. Lu et al. [33] proposed a key generation protocol with the aid of IRS to boost the secret key rate in quasi-static environments. Ji et al. [34] studied IRS-assisted PLKG schemes in scenarios with a single user and multiple eavesdroppers. Li et al. [35] introduced a multiuser secret key generation scheme that capitalizes on the presence of IRS, and it achieved a high sum secret key rate. Liu et al. [14] proposed a deep reinforcement learning approach to boost the secret key generation in an IRS-assisted system. Taha et al. [13] developed a deep learning-based solution in which IRS learns how to interact with the incident signal to increase the achievable rate.
However, current works mainly focus on SISO systems, and deep learning has not been effectively used for this application. In this paper, we propose an IRS-assisted PLKG scheme with deep learning to generate the shared consistent keys for TDD MIMO systems.
3. Materials and Methods
3.1. Channel Model
The process of PLKG involves two legitimate communication parties, called Alice and Bob, as well as an eavesdropper, called Eve. As shown in Figure 1, we assume a wireless communication scenario with a blockage. In this paper, we regard the base station as Alice and the user device in the user grid area as Bob, so either User_A or User_B can be regarded as Bob. Meanwhile, compared with User_A, the signal strength User_B receives should be smaller because the signal User_B receives is blocked more severely, and we apply an IRS to achieve the signal strength gain. By introducing an IRS into the scenario with a blockage, we combine the direct channel and the reflecting channel in a TDD system to construct the channel function.
Figure 1.
The wireless communication scenario with an IRS introduced. A blockage exists between the base station and user devices, including User_A and User_B, and interferes with the wireless signal. The received signal at User_B is interfered with more severely compared with User_A.
In the OFDM-based TDD system with K subcarriers we adopt, we assume that IRS and the base station have both M antennas, and the user device has 8 antennas. Note that the base station can be either the transmitter or the receiver, as can the user device. For the reflecting channel, we define as the downlink channel from the base station to IRS, as the downlink channel from IRS to the user, as the uplink channel from the user to IRS, and as the uplink channel from IRS to the base station. For the direct channel, we define as the downlink channel from the base station to the user, and as the uplink channel from the user to the base station. Note that all these data are complex matrices. represents the channel information of at the kth subcarrier; similarly, we can obtain other channel information. Taking the user device as the receiver, then we can obtain the received signal at the kth subcarrier as
taking the base station as the receiver, we obtain a similar equation as
where denotes a IRS interaction matrix, which represents how IRS interacts with the incident signal. and denote the transmitted signal over the kth subcarrier and satisfy where . represents the total transmitting power. is the received noise and satisfies .
The achievable signal rate can be expressed as
where denotes the signal-to-noise ratio. To maximize the achievable rate at the receiver, we need to design an optimal interaction matrix , which can be expressed as
where has a diagonal structure and denotes a beamforming vector. We assume locations of different devices are shown in Figure 2. , and represent the base station, the IRS and the user device, respectively. represents an element of IRS, and we lengthen it to make it clear. is the angular bisector of , and right angles include , , and . According to the geometrical model, we can obtain a theoretically optimal reflecting angle . We can deduce angles as
to maximize the achievable rate, and we need to adjust the phase of every element of IRS according to Equation (7). Assuming the location of the ith element of IRS as , an extensive equation can be expressed as
we can obtain a theoretically optimal interaction matrix according to Equation (8).
Figure 2.
Assumed locations of the base station, the IRS and the user device.
Moreover, we assume the location of the eavesdropper, Eve, is more than half of the wavelength away from Alice and Bob. Then the channel of Eve is irrelevant to the channel of legitimate users, so Eve cannot deduce the channel of legitimate users and threaten the key generation.
3.2. Channel Reciprocal Features Extraction Model
In this paper, we focus on exploiting IRS to assist PLKG with deep learning in a non-ideal scenario where signal interference exists between legitimate communication parties, as shown in Figure 1. Channel reciprocity could be affected by many factors. Though the frequency of the downlink () and the frequency of the uplink () are normally assumed to be exactly the same in an OFDM-based TDD system, a small frequency offset exists between and , and it may cause non-ideal reciprocity. Additionally, the noise that existed in the channel response may decrease the reciprocity further. To exftract the reciprocal features from the wireless channel with deep learning, we propose a model called IRS-CRNet to learn the reciprocity of the channel response.
The architecture of IRS-CRNet is shown in Figure 3. According to Equation (1), we propose an optimized and . is designed to extract the reciprocal components from the original channel response ; meanwhile, is exploited to keep the same dimensionality of with maintained high reciprocity. The detailed hyper-parameters of each non-linear layer that we implement in are shown in Table 1. After the non-linear process, we flatten the tensor and send it to the fully-connected linear layers, and the numbers of fully-connected layers are 64, 128 and 64, respectively. The detailed hyper-parameters of are shown in Table 2.
Figure 3.
Structure of IRS-CRNet. Note that .
Table 1.
Details of different non-linear layers of .
Table 2.
Details of layers of .
In the training phase, we propose a hybrid loss function, which is expressed as
where the loss function consists of two parts. is the mean squared loss (MSE) of and , representing the quadratic sum of the deviation between the downlink channel response and the uplink channel response. is is expressed as
where R and T denote the numbers of antennas of the receiver and the transmitter, respectively. We adopt MSE to make our model learn the reciprocity; however, MSE is not suitable for dealing with the abnormal data because it could give more weight to them. To solve this problem, we introduce another loss function called Log-Cosh, which is expressed as
Compared with MSE, Log-Cosh is less susceptible to abnormal data and makes up for the deficiency of MSE.
3.3. PLKG Process
In this paper, we propose a novel IRS-assisted PLKG scheme with deep learning. The scheme contains the following steps.
- Channel probing: Conventionally, two legitimate communication parties, i.e., Alice and Bob, send a pilot signal synchronously, and then we can estimate the channel state information (CSI). However, after introducing an IRS, we need to consider the reflecting channel. According to Equation (1), the combined channel response can be expressed aswhere . and , respectively, represent the reflecting channel response and the direct channel response of the wireless channel. represents the total noise of the wireless channel.
- Reciprocal Channel Features Extraction: Though we adopted the TDD system, the actual reciprocity is not great enough to be used directly to generate the key. We need to extract the reciprocal channel features from the estimated CSI after combining the reflecting and direct channel according to Equation (12). Because of the significant amount of prior knowledge required, it is difficult to extract the reciprocity by theoretical equations. Therefore, we exploit the IRS-CRNet to extract the reciprocal channel features.
- Quantization: We intend to convert the channel features to a binary bit sequence with high key generation rate, low key error rate and sufficient randomness. First, we need to preprocess the original channel matrix over each subcarrier with the method belowwhere represents the real part of ∗, represents the image part of ∗, and converts * from a matrix to a vector. Then, we normalize the vector to keep the value of each element of the vector in the range of 0 to 1, and we convert each element according to the equation belowwhere represents the ith element of , represents the minimum value of ∗ and represents the maximum value of ∗. Finally, we propose a multi-level quantization method based on the percent point function (PPF), which is the inverse of the cumulative distribution function, to quantize the normalized sequence. The process of quantization is expressed as Algorithm 1.
- Information Reconciliation and Privacy Amplifying: The mismatched bits in the initial key can be corrected by information reconciliation to reduce KER. Information reconciliation can be realized by many protocols, i.e., BCH code [36], ECC [37], Cascade [38], and Golay code [39]. The privacy amplifying phase mostly exploits the hash function to convert the corrected key sequence with the information reconciliation to a shorter secret key, which can be used directly.
| Algorithm 1 The multi-level quantization algorithm based on PPF |
| Input: The normalized feature vector ; the quantization factor with a default value: 10 Output: The quantized bit sequence ;
|
4. Experimental Results
4.1. Simulation Setup
We adopted the DeepMIMO [40] dataset to generate the channels and the dataset we needed based on the outdoor ray-tracing scenario ‘O1’ (Outdoor 1). The crucial part that we need to focus on is shown in Figure 4. The DeepMIMO dataset parameters we adopted are summarized in Table 3.
Figure 4.
This figure represents a part of the O1 scenario. The sixth base station (BS6) is acting as an IRS to reflect the signal from a transmitter to a receiver. BS16 is a transmitter and also a receiver, as is every user device in the User Grid from row 551 (R551) to row 1200 (R1200). Every row contains 181 user devices. The building across the road from BS16 is acting as a blockage.
Table 3.
The adopted DeepMIMO dataset parameters.
According to the OFDM TDD system we adopted, we set a constant operating frequency at 3.4 GHz. Active users from R551 to R1100 are exploited to generate the training dataset with a total of 99,550 channel responses, while active users from R1101 to R1200 are exploited to generate the testing dataset with a total of 18,100 channel responses. The training dataset is divided into 550 files, and the testing dataset is divided into 100 files. Each file contains information of 181 CSI matrices. In addition, hyper-parameters used to train IRS-CRNet are given in Table 4, and the input size of IRS-CRNet is set to .
Table 4.
Parameters for the IRS-CRNet.
4.2. Performance Metrics of PLKG
We use the following metrics to evaluate the performance of the PLKG scheme.
- Key generation rate (KGR): In this paper, this metric is slightly different from mentioned in other works. We define aswhere denotes the number of bits the initial key contains. , and denote the number of receiver antennas, transmitter antennas and subcarriers, respectively. According to Equation (15), we normalize and keep the value of KGR in the range of 0 to 1.
- Key error rate (KER): It is defined as the number of error bits divided by the number of total bits [3].
- Randomness: The randomness of the initial key generated based on the PLKG scheme is important to maintain security. We use a test suit based on The National Institute of Standards and Technology (NIST) [42] to evaluate the randomness of the initial key.
4.3. Performance of Achievable Rate
To verify the effectiveness of the introduced IRS, we take the bottom user device at R1200 in Figure 4 for a test. The performance of the IRS and the interaction matrix according to Equation (8) is evaluated by the achievable rate. In Figure 5, we compare the achievable rate under different conditions. We first obtain the ideal achievable rate when IRS has different numbers of antennas, including , and . Then we obtain the actual achievable rate when IRS is introduced or not. Compared with the condition when IRS is not introduced, the achievable rate when IRS is introduced is apparently better and very close to the ideal one. When SNR exceeds 20 dB, we can obtain a steady and relatively ideal achievable rate.
Figure 5.
The achievable rate comparison under different conditions when the IRS has different numbers of elements.
4.4. Performance of IRS-CRNet
In this section, we evaluate the performance of different models. We compare IRS-CRNet with three other networks shown as follows.
- AutoEncoder [21]: It is a simple autoencoder model which consists of an encoder and a decoder. It inspires a new way of thinking as an end-to-end reconstruction optimization task.
- DNN [43]: It is designed for channel calibration in generic massive MIMO systems. It has the potential in many parameter estimation problems for communications. It has the multilayer structure with three hidden fully connected layers.
- KGNet [3]: It is designed for frequency band feature mapping to construct reciprocal channel features between legitimate communication parties in SISO FDD systems. It has a multilayer structure with four hidden, fully connected layers.
The result of loss functions during the training phase is an important metric of the performance of models. Figure 6 shows how the results of of four models change as the training epoch grows. Every model is trained for the same time based on the same training dataset with a constant of 99,550 training sets. After 100 training epochs, all four models achieve stable results of .
Figure 6.
The result of of four different models versus the epoch of the training process.
In Figure 7, we compare the performance of four models on the testing dataset through and MSE, and the effectiveness of is verified. Compared with models trained with MSE, the models trained with obtained better results. According to Figure 6 and Figure 7, our model performs better than other three models in both the training phase and testing phase. Moreover, though the number of the hidden layers in KGNet is bigger than the number in DNN, KGNet does not achieve appropriate performance gain. We can tell that the increased numbers of hidden layers cannot directly improve the performance of a model.
Figure 7.
The MSE of four different models trained with and without .
The original CSI matrices are complex matrices, and we evaluate the performance of IRS-CRNet on the real part of CSI matrices. In Figure 8a, we compare downlink channel features with uplink channel features; these features cannot be directly used for key generation because of many nonreciprocal features. We exploit the trained IRS-CRNet to extract the reciprocal features existing in both downlink and uplink channel responses. Channel features predicted by IRS-CRNet with great reciprocity are shown in Figure 8b.
Figure 8.
Comparison between the original channel features and the predicted channel features. (a) Channel response that contains reciprocal and nonreciprocal components. (b) Channel response that mostly contains predicted reciprocity extracted by IRS-CRNet.
4.5. Performance of PLKG Scheme Based on IRS-CRNet
We implement some experiments and use the performance metrics mentioned before to evaluate the performance of the PLKG scheme we designed. We generate the initial key based on the testing dataset with 18,100 sets. In Figure 9, we compare the performance of KGR and KER with different values of the quantization factor , i.e., 0.01, 0.05, 0.1 and 0.2. The results show that KGR becomes bigger and the KER becomes smaller with the value of growing. In addition, we add complex Gaussian noise in the range of 0–40 dB with a 5 dB step. Figure 9 also shows how KGR and KER change when SNR changes—KGR increases and KER decreases significantly when SNR increases. Moreover, to keep KER at an ideally low level, we can set different values of under different SNRs.
Figure 9.
The KGR and KER of the initial key with different values of the quantization factor based on the IRS-CRNet versus SNR. The IRS-CRNet is trained with the training dataset with 99,550 sets of 0 dB. The solid line represents KGR, and the dashed line represents KER.
In this paper, we focus on the scenario where blockages exist between legitimate communication parties, and we introduce an IRS to assist the key generation. We need to prove the effectiveness of the introduced IRS. For the scenario without IRS, we do not consider the reflecting channel in Equation (1), but we keep other phases the same. We use the same training dataset to train our model, and we test the results on the same testing dataset. In Figure 10, we can see the performance is much better when the IRS is introduced. Moreover, the more antennas IRS has, the more bits the initial key has.
Figure 10.
Quantized numbers of effective bits that initial keys have with different IRS parameters versus SNR. The scenario with an IRS having antennas is treated as a benchmark. Note that is set to 0.01.
In Figure 11, we compare the performance of KGR when we set different numbers of antennas that IRS has. KGR is not acceptable when IRS is not introduced, and KGR only slightly increases when SNR increases because of limited channel features. However, the constructed channel responses contain more detailed information when IRS is introduced, and IRS-CRNet can learn great reciprocity to help improve KGR. The performance of secret keys generated by different models when IRS with elements is introduced is shown in Table 5. Compared with prior works, IRS-CRNet apparently achieves better performance.
Figure 11.
KGR of the initial key with a different number of antennas versus SNR.
Table 5.
Performance of different models.
To verify the randomness of the generated initial keys, we used the Github repository as the randomness testing suite, which is implemented based on a NIST statistical test suite. The quantization factor was set to 0.01, and we generated a secret key based on the PLKG scheme. Then we took the bit sequence as the input of . The test results are shown in Table 6, and all the test types passed the randomness test.
Table 6.
NIST statistical test results.
4.6. Overhead Analysis
The models were implemented on a computer with AMD Ryzen 7 4800U, 16 GB RAM and Windows 11 Professional 64-bit operating system. Pytorch 1.12 was employed as the deep learning framework. To analyze computational overhead, the number of antennas that the base station and IRS exploit is , and the training time and CPU load of different models are shown in Table 7. In addition, the time of extracting reciprocity from a pair of downlink/uplink channel responses was calculated. In general, the training of IRS-CRNet does not need the high-performance GPU, and the trained model can effectively extract reciprocity; thus, the overhead is quite acceptable.
Table 7.
Computational overhead of different models.
5. Conclusions
In this paper, we consider an IRS-introduced wireless communication scenario in which blockages exist between legitimate communication parties and propose an efficient method to assist PLKG. First, we construct the channel function combining the direct channel and the reflecting channel. Then a theoretically optimal interaction matrix is proposed to approach the optimal achievable rate. Moreover, we design the IRS-CRNet that can learn reciprocity from channel state information (CSI) matrices in the OFDM TDD MIMO systems. Based on the IRS-CRNet, we propose an efficient PLKG scheme for TDD systems. Finally, we implement sufficient experiments. The simulation results demonstrate that the introduced IRS indeed contributes to the key generation, the IRS-CRNet achieves excellent performance in the reciprocity-learning phase, and the PLKG scheme achieves high KGR, low KER and sufficient randomness.
In future work, on the one hand, we will study how to optimize the performance of IRS-assisted key generation in non-ideal scenarios with legitimate mobile communication users. On the other hand, we will extend this scheme to PLKG for massive TDD-MIMO systems. Moreover, how to effectively protect key generation from active and passive attacks could be meaningful research.
Author Contributions
Conceptualization, S.L., G.W.; methodology, S.L., G.W.; software, S.L., G.W.; validation, S.L., G.W.; writing—original draft, S.L., G.W.; writing—review and editing, H.H., H.W., Y.C., D.H., Y.J. and L.C.; supervision, Y.J. and L.C. All authors have read and agreed to the published version of the manuscript.
Funding
This work was supported in part by the National Natural Science Foundation of China (grant no. 62072319, no. 62262074), the Science and Technology on Communication Security Laboratory (grant no. 6142103190415), the Science and Technology Department of Sichuan Province (grant no. 2022YFG0041, no. 2022YFG0159), the Luzhou Science and Technology Innovation R&D Program (grant no. 2021CDLZ-11), Chengdu Science and Technology R&D Project (grant no. 2022YFG0041, no. 2021-YF05-02000-SN).
Data Availability Statement
The available DeepMIMO dataset in this study can be found at https://deepmimo.net/scenarios/o1-scenario (accessed on 26 November 2022). In addition, the randomness testing suit used in this paper can be found at [https://github.com/stevenang/randomness_testsuite (accessed on 26 November 2022)].
Conflicts of Interest
The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.
References
- Ahmad, I.; Shahabuddin, S.; Kumar, T.; Okwuibe, J.; Gurtov, A.; Ylianttila, M. Security for 5G and beyond. IEEE Commun. Surv. Tutorials 2019, 21, 3682–3722. [Google Scholar] [CrossRef]
- Khan, R.; Kumar, P.; Jayakody, D.N.K.; Liyanage, M. A survey on security and privacy of 5G technologies: Potential solutions, recent advancements, and future directions. IEEE Commun. Surv. Tutorials 2019, 22, 196–248. [Google Scholar] [CrossRef]
- Zhang, X.; Li, G.; Zhang, J.; Hu, A.; Hou, Z.; Xiao, B. Deep-Learning-Based Physical-Layer Secret Key Generation for FDD Systems. IEEE Internet Things J. 2021, 9, 6081–6094. [Google Scholar] [CrossRef]
- Ren, K.; Su, H.; Wang, Q. Secret key generation exploiting channel characteristics in wireless communications. IEEE Wirel. Commun. 2011, 18, 6–12. [Google Scholar] [CrossRef]
- Zeng, K. Physical layer key generation in wireless networks: Challenges and opportunities. IEEE Commun. Mag. 2015, 53, 33–39. [Google Scholar] [CrossRef]
- Zhang, J.; Duong, T.Q.; Marshall, A.; Woods, R. Key generation from wireless channels: A review. IEEE Access 2016, 4, 614–626. [Google Scholar] [CrossRef]
- Liu, H.; Wang, Y.; Yang, J.; Chen, Y. Fast and practical secret key extraction by exploiting channel response. In Proceedings of the 2013 Proceedings IEEE INFOCOM, Turin, Italy, 14–19 April 2013; pp. 3048–3056. [Google Scholar]
- Zhang, J.; Marshall, A.; Woods, R.; Duong, T.Q. Efficient key generation by exploiting randomness from channel responses of individual OFDM subcarriers. IEEE Trans. Commun. 2016, 64, 2578–2588. [Google Scholar] [CrossRef]
- Zhao, J.; Xi, W.; Han, J.; Tang, S.; Li, X.; Liu, Y.; Gong, Y.; Zhou, Z. Efficient and secure key extraction using CSI without chasing down errors. arXiv 2012, arXiv:1208.0688. [Google Scholar]
- Zhan, F.; Yao, N. On the using of discrete wavelet transform for physical layer key generation. Ad Hoc Netw. 2017, 64, 22–31. [Google Scholar] [CrossRef]
- Aldaghri, N.; Mahdavifar, H. Fast secret key generation in static environments using induced randomness. In Proceedings of the 2018 IEEE Global Communications Conference (GLOBECOM), Abu Dhabi, United Arab Emirates, 9–13 December 2018; pp. 1–6. [Google Scholar]
- Aldaghri, N.; Mahdavifar, H. Physical layer secret key generation in static environments. IEEE Trans. Inf. Forensics Secur. 2020, 15, 2692–2705. [Google Scholar] [CrossRef]
- Taha, A.; Alrabeiah, M.; Alkhateeb, A. Deep learning for large intelligent surfaces in millimeter wave and massive MIMO systems. In Proceedings of the 2019 IEEE Global communications conference (GLOBECOM), Waikoloa, HI, USA, 9–13 December 2019; pp. 1–6. [Google Scholar]
- Liu, Y.; Wang, M.; Xu, J.; Gong, S.; Hoang, D.T.; Niyato, D. Boosting secret key generation for IRS-assisted symbiotic radio communications. In Proceedings of the 2021 IEEE 93rd Vehicular Technology Conference (VTC2021-Spring), Helsinki, Finland, 25–28 April 2021; pp. 1–6. [Google Scholar]
- Lu, X.; Lei, J.; Shi, Y.; Li, W. Intelligent reflecting surface assisted secret key generation. IEEE Signal Process. Lett. 2021, 28, 1036–1040. [Google Scholar] [CrossRef]
- Ji, Z.; Yeoh, P.L.; Zhang, D.; Chen, G.; Zhang, Y.; He, Z.; Yin, H. Secret key generation for intelligent reflecting surface assisted wireless communication networks. IEEE Trans. Veh. Technol. 2020, 70, 1030–1034. [Google Scholar] [CrossRef]
- Jorswieck, E.A.; Wolf, A.; Engelmann, S. Secret key generation from reciprocal spatially correlated MIMO channels. In Proceedings of the 2013 IEEE Globecom Workshops (GC Wkshps), Atlanta, GA, USA, 9–13 December 2013; pp. 1245–1250. [Google Scholar]
- Furqan, H.M.; Hamamreh, J.M.; Arslan, H. Secret key generation using channel quantization with SVD for reciprocal MIMO channels. In Proceedings of the 2016 international symposium on wireless communication systems (ISWCS), Poznan, Poland, 20–23 September 2016; pp. 597–602. [Google Scholar]
- Jiao, L.; Tang, J.; Zeng, K. Physical layer key generation using virtual AoA and AoD of mmWave massive MIMO channel. In Proceedings of the 2018 IEEE Conference on Communications and Network Security (CNS), Beijing, China, 30 May 2018–1 June 2018; pp. 1–9. [Google Scholar]
- Li, G.; Sun, C.; Jorswieck, E.A.; Zhang, J.; Hu, A.; Chen, Y. Sum secret key rate maximization for TDD multi-user massive MIMO wireless networks. IEEE Trans. Inf. Forensics Secur. 2020, 16, 968–982. [Google Scholar] [CrossRef]
- O’shea, T.; Hoydis, J. An introduction to deep learning for the physical layer. IEEE Trans. Cogn. Commun. Netw. 2017, 3, 563–575. [Google Scholar] [CrossRef]
- Qin, Z.; Ye, H.; Li, G.Y.; Juang, B.H.F. Deep learning in physical layer communications. IEEE Wirel. Commun. 2019, 26, 93–99. [Google Scholar] [CrossRef]
- Lin, Y.; Tu, Y.; Dou, Z.; Chen, L.; Mao, S. Contour stella image and deep learning for signal recognition in the physical layer. IEEE Trans. Cogn. Commun. Netw. 2020, 7, 34–46. [Google Scholar] [CrossRef]
- Ma, W.; Qi, C.; Zhang, Z.; Cheng, J. Sparse channel estimation and hybrid precoding using deep learning for millimeter wave massive MIMO. IEEE Trans. Commun. 2020, 68, 2838–2849. [Google Scholar] [CrossRef]
- Ye, H.; Gao, F.; Qian, J.; Wang, H.; Li, G.Y. Deep learning-based denoise network for CSI feedback in FDD massive MIMO systems. IEEE Commun. Lett. 2020, 24, 1742–1746. [Google Scholar] [CrossRef]
- Wu, Q.; Zhang, R. Beamforming optimization for wireless network aided by intelligent reflecting surface with discrete phase shifts. IEEE Trans. Commun. 2019, 68, 1838–1851. [Google Scholar] [CrossRef]
- Basar, E.; Di Renzo, M.; De Rosny, J.; Debbah, M.; Alouini, M.S.; Zhang, R. Wireless communications through reconfigurable intelligent surfaces. IEEE Access 2019, 7, 116753–116773. [Google Scholar] [CrossRef]
- Mathur, S.; Trappe, W.; Mandayam, N.; Ye, C.; Reznik, A. Radio-telepathy: Extracting a secret key from an unauthenticated wireless channel. In Proceedings of the 14th ACM International Conference on Mobile Computing and Networking, San Francisco, CA, USA, 14–19 September 2008; pp. 128–139. [Google Scholar]
- Mitev, M.; Chorti, A.; Belmega, E.V.; Poor, H.V. Protecting physical layer secret key generation from active attacks. Entropy 2021, 23, 960. [Google Scholar] [CrossRef] [PubMed]
- He, H.; Chen, Y.; Huang, X.; Xing, M.; Li, Y.; Xing, B.; Chen, L. Deep Learning-Based Channel Reciprocity Learning for Physical Layer Secret Key Generation. Secur. Commun. Netw. 2022, 2022, 1844345. [Google Scholar] [CrossRef]
- Zhou, J.; Zeng, X. Physical Layer Secret Key Generation for Spatially Correlated Channels Based on Multi-Task Autoencoder. In Proceedings of the 2022 7th International Conference on Intelligent Computing and Signal Processing (ICSP), Xi’an, China, 15–17 April 2022; pp. 144–150. [Google Scholar]
- Gong, S.; Lu, X.; Hoang, D.T.; Niyato, D.; Shu, L.; Kim, D.I.; Liang, Y.C. Toward smart wireless communications via intelligent reflecting surfaces: A contemporary survey. IEEE Commun. Surv. Tutor. 2020, 22, 2283–2314. [Google Scholar] [CrossRef]
- Lu, T.; Chen, L.; Zhang, J.; Cao, K.; Hu, A. Reconfigurable Intelligent Surface Assisted Secret Key Generation in Quasi-Static Environments. IEEE Commun. Lett. 2021, 26, 244–248. [Google Scholar] [CrossRef]
- Ji, Z.; Yeoh, P.L.; Chen, G.; Pan, C.; Zhang, Y.; He, Z.; Yin, H.; Li, Y. Random shifting intelligent reflecting surface for OTP encrypted data transmission. IEEE Wirel. Commun. Lett. 2021, 10, 1192–1196. [Google Scholar] [CrossRef]
- Li, G.; Sun, C.; Xu, W.; Di Renzo, M.; Hu, A. On maximizing the sum secret key rate for reconfigurable intelligent surface-assisted multiuser systems. IEEE Trans. Inf. Forensics Secur. 2021, 17, 211–225. [Google Scholar] [CrossRef]
- Dodis, Y.; Reyzin, L.; Smith, A. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In International Conference on the Theory and Applications of Cryptographic Techniques; Springer: Berlin/Heidelberg, Germany, 2004; pp. 523–540. [Google Scholar]
- Bloch, M.; Barros, J.; Rodrigues, M.R.; McLaughlin, S.W. Wireless information-theoretic security. IEEE Trans. Inf. Theory 2008, 54, 2515–2534. [Google Scholar] [CrossRef]
- Zhu, X.; Xu, F.; Novak, E.; Tan, C.C.; Li, Q.; Chen, G. Extracting secret key from wireless link dynamics in vehicular environments. In Proceedings of the 2013 Proceedings IEEE INFOCOM, Turin, Italy, 14–19 April 2013; pp. 2283–2291. [Google Scholar]
- Liu, H.; Yang, J.; Wang, Y.; Chen, Y. Collaborative secret key extraction leveraging received signal strength in mobile wireless networks. In Proceedings of the 2012 Proceedings IEEE Infocom, Orlando, FL, USA, 25–30 March 2012; pp. 927–935. [Google Scholar]
- Alkhateeb, A. DeepMIMO: A generic deep learning dataset for millimeter wave and massive MIMO applications. arXiv 2019, arXiv:1902.06435. [Google Scholar]
- Kingma, D.P.; Ba, J. Adam: A method for stochastic optimization. arXiv 2014, arXiv:1412.6980. [Google Scholar]
- Rukhin, A.; Soto, J.; Nechvatal, J.; Smid, M.; Barker, E. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications; Technical report; Booz-Allen and Hamilton Inc.: Mclean VA, USA, 2001. [Google Scholar]
- Huang, C.; Alexandropoulos, G.C.; Zappone, A.; Yuen, C.; Debbah, M. Deep learning for UL/DL channel calibration in generic massive MIMO systems. In Proceedings of the ICC 2019—2019 IEEE International Conference on Communications (ICC), Shanghai, China, 20–24 May 2019; pp. 1–6. [Google Scholar]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).