Next Article in Journal
Computer Vision Algorithms of DigitSeis for Building a Vectorised Dataset of Historical Seismograms from the Archive of Royal Observatory of Belgium
Previous Article in Journal
RUC-Net: A Residual-Unet-Based Convolutional Neural Network for Pixel-Level Pavement Crack Segmentation
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Intelligent Reflecting Surface-Assisted Physical Layer Key Generation with Deep Learning in MIMO Systems

1
School of Computer Science, Sichuan University, Chengdu 610065, China
2
Institute for Industrial Internet Research, Sichuan University, Chengdu 610065, China
*
Authors to whom correspondence should be addressed.
These authors contributed equally to this work.
Sensors 2023, 23(1), 55; https://doi.org/10.3390/s23010055
Submission received: 14 November 2022 / Revised: 29 November 2022 / Accepted: 19 December 2022 / Published: 21 December 2022
(This article belongs to the Section Physical Sensors)

Abstract

:
Physical layer secret key generation (PLKG) is a promising technology for establishing effective secret keys. Current works for PLKG mostly study key generation schemes in ideal communication environments with little or even no signal interference. In terms of this issue, exploiting the reconfigurable intelligent reflecting surface (IRS) to assist PLKG has caused an increasing interest. Most IRS-assisted PLKG schemes focus on the single-input-single-output (SISO), which is limited in future communications with multi-input-multi-output (MIMO). However, MIMO could bring a serious overhead of channel reciprocity extraction. To fill the gap, this paper proposes a novel low-overhead IRS-assisted PLKG scheme with deep learning in the MIMO communications environments. We first combine the direct channel and the reflecting channel established by the IRS to construct the channel response function, and we propose a theoretically optimal interaction matrix to approach the optimal achievable rate. Then we design a channel reciprocity-learning neural network with an IRS introduced (IRS-CRNet), which is exploited to extract the channel reciprocity in time division duplexing (TDD) systems. Moreover, a PLKG scheme based on the IRS-CRNet is proposed. Final simulation results verify the performance of the PLKG scheme based on the IRS-CRNet in terms of key generation rate, key error rate and randomness.

1. Introduction

With the development of wireless communication technologies, more mobile devices will be connected to wireless systems [1]. Secure problems must be taken seriously because of the broadcast and openness of the wireless channel [2]. Traditionally, encryption algorithms, including symmetric key cryptography and asymmetric key cryptography, have been used to ensure the communication security [3]. However, traditional security schemes rely on public key infrastructures and complex encryption algorithms to manage secret keys [4], and they are not suitable for the Internet of Things (IoT) networks because IoT devices have constrained computational ability and resources. To address this issue, the physical layer key generation (PLKG), which exploits the inherent randomness of wireless fading channels, has become a promising technology to generate a shared secret key between wireless devices. The feasibility of PLKG relies on three principles, i.e., temporal variation, channel reciprocity, and spatial decorrelation [5,6].
Some works [7,8,9,10] have studied the process of PLKG, but they lack consideration of the signal interference existing between legitimate communication parties. In practice, the signal is susceptible to blockages such as a building or a wall. For these non-ideal communication environments, additional random signals and relay nodes [11,12] were introduced to improve the performance of PLKG schemes, while these methods can cause high power consumption and computation complexity, so they are not applicable to resource-constrained IoT devices. Therefore, how to design an efficient PLKG scheme in scenarios where signal interference exists is still an open question.
Nowadays, the reconfigurable intelligent reflecting surface (IRS) has been regarded as an intrinsic component in future wireless systems [13]. Some works [14,15,16,17,18,19,20] have employed the IRS to assist PLKG, and some of them considered SISO systems, while others considered MIMO systems. If we study PLKG in MIMO systems, how to reduce the overhead of channel reciprocity extraction is a crucial problem, especially for IoT devices with constrained resources. In addition, much prior knowledge is required in these works. Deep learning can alleviate these problems, as it is a meaningful technology that can bring promising applications to the physical layer [21], i.e., deep learning-based block-structured communications [22], signal recognition [23], channel estimation [24] and CSI feedback denoising [25]. For non-ideal communication environments, current PLKG schemes cannot achieve both low computation complexity and excellent performance.
In this paper, we introduce an IRS into the communication environment where signal interference exists. IRS has emerged as a promising technology to improve communication qualities through adjustments [15]. IRSs comprise massive numbers of nearly-passive elements interacting with incident signals [13], and the location of these elements can be adaptively placed. We can manipulate the wireless channel by adjusting the reflection coefficients of IRS continuously or discretely with low power consumption, i.e., phase, amplitude, frequency and even polarization [26,27]. Moreover, by exploiting deep learning networks, we design IRS-CRNet to extract reciprocal channel features in the orthogonal frequency division multiplexing (OFDM) TDD systems with low overhead. Then an efficient PLKG scheme based on IRS-CRNet is proposed for MIMO systems. The main contributions of this paper are as follows.
  • We introduce an IRS into scenarios where blockages exist between legitimate communication parties to assist PLKG. Then, we construct the hybrid channel function and achieve an optimal achievable rate by adjusting phase shifts.
  • We design the IRS-CRNet that can efficiently learn the reciprocity from the channel state information (CSI). Without any prior knowledge and much computational overhead, IRS-CRNet trained with a hybrid loss function can extract the channel features with high reciprocity, which can be used for generating the initial key directly.
  • Based on the IRS-CRNet, we propose a novel IRS-assisted PLKG scheme for TDD systems. Experimental simulation results show that the performance of this scheme is excellent in terms of three metrics, including key generation rate, key error rate and randomness.
The rest of this paper is organized as follows. The second part presents the related works. In the third part, we construct the channel function and the reciprocal channel features-learning model. A novel IRS-assisted PLKG scheme based on deep learning is also proposed in this part. In the fourth part, the simulation results are presented to evaluate the performance of this scheme. Finally, the last part concludes this paper with a summary of our work.

2. Related Work

2.1. PLKG without IRS

Different metrics in the wireless communication system have been used to assist PLKG. Zhan et al. [10] proposed a PLKG scheme using the multi-level discrete wavelet transform to enhance the availability of key generation in real environments. Mathur et al. [28] extracted the RSS information of the wireless channel and exploited it to assist PLKG. The RSS-based methods cannot achieve high KGR and sufficient randomness, and more works [7,8,9] exploiting CSI have achieved better performance.
Many works have studied PLKG in MIMO systems so far. Li et al. [20] proposed a multiuser secret key generation in massive MIMO wireless networks and focused on the sum secret ket rate maximization. Jiao et al. [19] exploited new channel characteristics, including AoA (angle to arrival) and AoD (angle to departure), to generate the secret key. Jorswieck et al. [17] studied the secret key rate for a model with a MIMO channel and showed the impact of the statistic of the MIMO channel. Furqan et al. [18] developed a key generation method based on channel quantization with singular value decomposition. Moreover, some works consider protecting PLKG from attacks. Mitev et al. [29] analyzed the rejection and reactive jamming attacks in MIMO PLKG systems, and they showed a pilot randomization scheme can reduce injection attacks to jamming attacks and used a game-theoretic approach to deal with jamming attacks.
Deep learning has been applied to the process of the physical layer key generation. Zhang et al. [3] applied deep learning for PLKG in FDD for the first time, they first proved the existence of the band feature mapping function and proposed a key generation neural network (KGNet), the results turned out to be good. He et al. [30] designed the Channel Reciprocity Learning Net (CRLNet) to learn the channel reciprocity features of the wireless channels, and the CRLNet-based key generation scheme showed good performance. Zhou et al. [31] proposed a PLKG scheme combining the autoencoder and the multi-task learning, and this scheme can extract the reciprocal features from the weakly correlated channel.
All works mentioned above only focused on the relatively ideal wireless communication environments in which no blockage exists between transmitters and receivers. However, blockages exist in most wireless communication systems in practice, and they can interfere with the signal severely. To solve this problem, IRS can be exploited to assist PLKG.

2.2. PLKG with IRS

A few works have studied applying IRS to the PLKG scheme, and combining IRS with the conventional transmission control can potentially bring about performance gain compared with wireless networks without IRS [32]
Ji et al. [16] formulated the minimum achievable secret key capacity for an IRS acting as a passive beamformer in the presence of multiple eavesdroppers, and they designed an SDR-SCA optimization algorithm to maximize the minimum achievable secret key capacity for the worst-case eavesdropper. Lu et al. [33] proposed a key generation protocol with the aid of IRS to boost the secret key rate in quasi-static environments. Ji et al. [34] studied IRS-assisted PLKG schemes in scenarios with a single user and multiple eavesdroppers. Li et al. [35] introduced a multiuser secret key generation scheme that capitalizes on the presence of IRS, and it achieved a high sum secret key rate. Liu et al. [14] proposed a deep reinforcement learning approach to boost the secret key generation in an IRS-assisted system. Taha et al. [13] developed a deep learning-based solution in which IRS learns how to interact with the incident signal to increase the achievable rate.
However, current works mainly focus on SISO systems, and deep learning has not been effectively used for this application. In this paper, we propose an IRS-assisted PLKG scheme with deep learning to generate the shared consistent keys for TDD MIMO systems.

3. Materials and Methods

3.1. Channel Model

The process of PLKG involves two legitimate communication parties, called Alice and Bob, as well as an eavesdropper, called Eve. As shown in Figure 1, we assume a wireless communication scenario with a blockage. In this paper, we regard the base station as Alice and the user device in the user grid area as Bob, so either User_A or User_B can be regarded as Bob. Meanwhile, compared with User_A, the signal strength User_B receives should be smaller because the signal User_B receives is blocked more severely, and we apply an IRS to achieve the signal strength gain. By introducing an IRS into the scenario with a blockage, we combine the direct channel and the reflecting channel in a TDD system to construct the channel function.
In the OFDM-based TDD system with K subcarriers we adopt, we assume that IRS and the base station have both M antennas, and the user device has 8 antennas. Note that the base station can be either the transmitter or the receiver, as can the user device. For the reflecting channel, we define H B , R as the M × M × K downlink channel from the base station to IRS, H R , U as the 8 × M × K downlink channel from IRS to the user, H U , R as the M × 8 × K uplink channel from the user to IRS, and H R , B as the M × M × K uplink channel from IRS to the base station. For the direct channel, we define H B , U as the 8 × M × K downlink channel from the base station to the user, and H U , B as the M × 8 × K uplink channel from the user to the base station. Note that all these data are complex matrices. H B , R , k represents the channel information of H B , R at the kth subcarrier; similarly, we can obtain other channel information. Taking the user device as the receiver, then we can obtain the received signal at the kth subcarrier as
H U , k = ( H R , U , k Φ H B , R , k ) T B , k + H B , U , k T B , k + N k
taking the base station as the receiver, we obtain a similar equation as
H B , k = ( H R , B , k Φ H U , R , k ) T U , k + H U , B , k T U , k + N k
where Φ denotes a M × M IRS interaction matrix, which represents how IRS interacts with the incident signal. T B , k and T U , k denote the transmitted signal over the kth subcarrier and satisfy E [ | T α , k | 2 ] = P T K where α { B , U } . P T represents the total transmitting power. N k is the received noise and satisfies N k N C ( 0 , σ N 2 ) .
The achievable signal rate can be expressed as
R = 1 K k = 1 K log 2 ( 1 + S N R | ( H R , U , k Φ H B , R , k ) | 2 )
where S N R = P T K σ N 2 denotes the signal-to-noise ratio. To maximize the achievable rate at the receiver, we need to design an optimal interaction matrix Φ , which can be expressed as
Φ = ( ϕ 0 , ϕ 1 , ϕ 2 , , ϕ M 1 ) = ψ 0 0 0 0 0 ψ 1 0 0 0 0 ψ 2 0 0 0 0 ψ M 1
where Φ has a diagonal structure and ϕ i denotes a beamforming vector. We assume locations of different devices are shown in Figure 2. P B , P R and P U represent the base station, the IRS and the user device, respectively. P R P R represents an element of IRS, and we lengthen it to make it clear. P R O is the angular bisector of P B P R P U , and right angles include P B O P R , O P R P R , O P R O and P U O P R . According to the geometrical model, we can obtain a theoretically optimal reflecting angle β . We can deduce angles as
α = arctan x R x B y R y B
γ = arctan x U x R y U y R
β = m a x ( α , γ ) α + γ 2
to maximize the achievable rate, and we need to adjust the phase of every element of IRS according to Equation (7). Assuming the location of the ith element of IRS as ( x R , i , y R . i ) , an extensive equation can be expressed as
ψ i = m a x ( arctan x R , i x B y R , i y B , arctan x U x R , i y U y R , i ) arctan x R , i x B y R , i y B + arctan x U x R , i y U y R , i 2
we can obtain a theoretically optimal interaction matrix Φ according to Equation (8).
Moreover, we assume the location of the eavesdropper, Eve, is more than half of the wavelength away from Alice and Bob. Then the channel of Eve is irrelevant to the channel of legitimate users, so Eve cannot deduce the channel of legitimate users and threaten the key generation.

3.2. Channel Reciprocal Features Extraction Model

In this paper, we focus on exploiting IRS to assist PLKG with deep learning in a non-ideal scenario where signal interference exists between legitimate communication parties, as shown in Figure 1. Channel reciprocity could be affected by many factors. Though the frequency of the downlink ( f d ) and the frequency of the uplink ( f u ) are normally assumed to be exactly the same in an OFDM-based TDD system, a small frequency offset exists between f d and f u , and it may cause non-ideal reciprocity. Additionally, the noise that existed in the channel response may decrease the reciprocity further. To exftract the reciprocal features from the wireless channel with deep learning, we propose a model called IRS-CRNet to learn the reciprocity of the channel response.
The architecture of IRS-CRNet is shown in Figure 3. According to Equation (1), we propose an optimized E n c o d e r and D e c o d e r . E n c o d e r is designed to extract the reciprocal components R α from the original channel response H α ; meanwhile, D e c o d e r is exploited to keep the same dimensionality of H α with maintained high reciprocity. The detailed hyper-parameters of each non-linear layer that we implement in E n c o d e r are shown in Table 1. After the non-linear process, we flatten the tensor and send it to the fully-connected linear layers, and the numbers of fully-connected layers are 64, 128 and 64, respectively. The detailed hyper-parameters of D e c o d e r are shown in Table 2.
In the training phase, we propose a hybrid loss function, which is expressed as
L o s s h = L 1 + L 2
where the loss function consists of two parts. L 1 is the mean squared loss (MSE) of R U and R B , representing the quadratic sum of the deviation between the downlink channel response and the uplink channel response. L 1 is is expressed as
L 1 = 1 R × T i = 0 R × T 1 ( R U , i R B , i ) 2
where R and T denote the numbers of antennas of the receiver and the transmitter, respectively. We adopt MSE to make our model learn the reciprocity; however, MSE is not suitable for dealing with the abnormal data because it could give more weight to them. To solve this problem, we introduce another loss function L 2 called Log-Cosh, which is expressed as
L 2 = 1 R × T i = 0 R × T 1 l o g ( c o s h ( R U , i R B , i ) )
Compared with MSE, Log-Cosh is less susceptible to abnormal data and makes up for the deficiency of MSE.

3.3. PLKG Process

In this paper, we propose a novel IRS-assisted PLKG scheme with deep learning. The scheme contains the following steps.
  • Channel probing: Conventionally, two legitimate communication parties, i.e., Alice and Bob, send a pilot signal synchronously, and then we can estimate the channel state information (CSI). However, after introducing an IRS, we need to consider the reflecting channel. According to Equation (1), the combined channel response can be expressed as
    H α = H r + H d + N t
    where α { B , U } . H r and H d , respectively, represent the reflecting channel response and the direct channel response of the wireless channel. N t represents the total noise of the wireless channel.
  • Reciprocal Channel Features Extraction: Though we adopted the TDD system, the actual reciprocity is not great enough to be used directly to generate the key. We need to extract the reciprocal channel features from the estimated CSI after combining the reflecting and direct channel according to Equation (12). Because of the significant amount of prior knowledge required, it is difficult to extract the reciprocity by theoretical equations. Therefore, we exploit the IRS-CRNet to extract the reciprocal channel features.
  • Quantization: We intend to convert the channel features to a binary bit sequence with high key generation rate, low key error rate and sufficient randomness. First, we need to preprocess the original channel matrix over each subcarrier with the method below
    H ¯ α , k = F l a t t e n ( [ R e a l ( H α , k ) I m a g ( H α , k ) ] )
    where R e a l ( ) represents the real part of ∗, I m a g ( ) represents the image part of ∗, and F l a t t e n ( ) converts * from a matrix to a vector. Then, we normalize the vector to keep the value of each element of the vector in the range of 0 to 1, and we convert each element according to the equation below
    H ¯ α , k , i = H ¯ α , k , i m i n ( H ¯ α , k ) m a x ( H ¯ α , k ) m i n ( H ¯ α , k )
    where H ¯ α , k , i represents the ith element of H ¯ α , k , m i n ( ) represents the minimum value of ∗ and m a x ( ) represents the maximum value of ∗. Finally, we propose a multi-level quantization method based on the percent point function (PPF), which is the inverse of the cumulative distribution function, to quantize the normalized sequence. The process of quantization is expressed as Algorithm 1.
  • Information Reconciliation and Privacy Amplifying: The mismatched bits in the initial key can be corrected by information reconciliation to reduce KER. Information reconciliation can be realized by many protocols, i.e., BCH code [36], ECC [37], Cascade [38], and Golay code [39]. The privacy amplifying phase mostly exploits the hash function to convert the corrected key sequence with the information reconciliation to a shorter secret key, which can be used directly.
Algorithm 1 The multi-level quantization algorithm based on PPF
Input: The normalized feature vector H ¯ α , k ; the quantization factor δ with a default value: 10 2
Output: The quantized bit sequence Q α ;
  1:
Calculate the mean μ and the standard deviation σ of the feature vector H ¯ α , k ;
  2:
Use PPF of the s c i p y . s t a t s library ( p p f ) to confirm the benchmarks;
  3:
l o w 1 = p p f ( 0.25 δ , l o c = μ , s c a l e = σ ) ;
  4:
h i g h 1 = p p f ( 0.25 + δ , l o c = μ , s c a l e = σ ) ;
  5:
l o w 2 = p p f ( 0.75 δ , l o c = μ , s c a l e = σ ) ;
  6:
h i g h 2 = p p f ( 0.75 + δ , l o c = μ , s c a l e = σ ) ;
  7:
Initialize Q α as an empty list;
  8:
for i i n r a n g e ( l e n ( H ¯ α , k ) ) do
  9:
  if  H ¯ α , k , i > = l o w 1 and H ¯ α , k , i < = h i g h 1  then
10:
    Q α . a p p e n d ( 0 )
11:
  else
12:
   if  H ¯ α , k , i > = l o w 2 and H ¯ α , k , i < = h i g h 2  then
13:
     Q α . a p p e n d ( 1 )
14:
   else
15:
     Q α . a p p e n d ( 1 )
16:
   end if
17:
  end if
18:
end for
19:
return Q α .

4. Experimental Results

4.1. Simulation Setup

We adopted the DeepMIMO [40] dataset to generate the channels and the dataset we needed based on the outdoor ray-tracing scenario ‘O1’ (Outdoor 1). The crucial part that we need to focus on is shown in Figure 4. The DeepMIMO dataset parameters we adopted are summarized in Table 3.
According to the OFDM TDD system we adopted, we set a constant operating frequency at 3.4 GHz. Active users from R551 to R1100 are exploited to generate the training dataset with a total of 99,550 channel responses, while active users from R1101 to R1200 are exploited to generate the testing dataset with a total of 18,100 channel responses. The training dataset is divided into 550 files, and the testing dataset is divided into 100 files. Each file contains information of 181 CSI matrices. In addition, hyper-parameters used to train IRS-CRNet are given in Table 4, and the input size of IRS-CRNet is set to ( 64 , 1 , 8 , 8 ) .

4.2. Performance Metrics of PLKG

We use the following metrics to evaluate the performance of the PLKG scheme.
  • Key generation rate (KGR): In this paper, this metric is slightly different from K G R mentioned in other works. We define K G R as
    K G R = N b i t s N r e c × T t r a n s × N s u b
    where N b i t s denotes the number of bits the initial key contains. N r e c , N t r a n s and N s u b denote the number of receiver antennas, transmitter antennas and subcarriers, respectively. According to Equation (15), we normalize and keep the value of KGR in the range of 0 to 1.
  • Key error rate (KER): It is defined as the number of error bits divided by the number of total bits [3].
  • Randomness: The randomness of the initial key generated based on the PLKG scheme is important to maintain security. We use a test suit based on The National Institute of Standards and Technology (NIST) [42] to evaluate the randomness of the initial key.

4.3. Performance of Achievable Rate

To verify the effectiveness of the introduced IRS, we take the bottom user device at R1200 in Figure 4 for a test. The performance of the IRS and the interaction matrix Φ according to Equation (8) is evaluated by the achievable rate. In Figure 5, we compare the achievable rate under different conditions. We first obtain the ideal achievable rate when IRS has different numbers of antennas, including 1 × 4 × 4 , 1 × 8 × 8 and 1 × 16 × 16 . Then we obtain the actual achievable rate when IRS is introduced or not. Compared with the condition when IRS is not introduced, the achievable rate when IRS is introduced is apparently better and very close to the ideal one. When SNR exceeds 20 dB, we can obtain a steady and relatively ideal achievable rate.

4.4. Performance of IRS-CRNet

In this section, we evaluate the performance of different models. We compare IRS-CRNet with three other networks shown as follows.
  • AutoEncoder [21]: It is a simple autoencoder model which consists of an encoder and a decoder. It inspires a new way of thinking as an end-to-end reconstruction optimization task.
  • DNN [43]: It is designed for channel calibration in generic massive MIMO systems. It has the potential in many parameter estimation problems for communications. It has the multilayer structure with three hidden fully connected layers.
  • KGNet [3]: It is designed for frequency band feature mapping to construct reciprocal channel features between legitimate communication parties in SISO FDD systems. It has a multilayer structure with four hidden, fully connected layers.
The result of loss functions during the training phase is an important metric of the performance of models. Figure 6 shows how the results of L o s s h of four models change as the training epoch grows. Every model is trained for the same time based on the same training dataset with a constant of 99,550 training sets. After 100 training epochs, all four models achieve stable results of L o s s h .
In Figure 7, we compare the performance of four models on the testing dataset through L o s s h and MSE, and the effectiveness of L o s s h is verified. Compared with models trained with MSE, the models trained with L o s s h obtained better results. According to Figure 6 and Figure 7, our model performs better than other three models in both the training phase and testing phase. Moreover, though the number of the hidden layers in KGNet is bigger than the number in DNN, KGNet does not achieve appropriate performance gain. We can tell that the increased numbers of hidden layers cannot directly improve the performance of a model.
The original CSI matrices are complex matrices, and we evaluate the performance of IRS-CRNet on the real part of CSI matrices. In Figure 8a, we compare downlink channel features with uplink channel features; these features cannot be directly used for key generation because of many nonreciprocal features. We exploit the trained IRS-CRNet to extract the reciprocal features existing in both downlink and uplink channel responses. Channel features predicted by IRS-CRNet with great reciprocity are shown in Figure 8b.

4.5. Performance of PLKG Scheme Based on IRS-CRNet

We implement some experiments and use the performance metrics mentioned before to evaluate the performance of the PLKG scheme we designed. We generate the initial key based on the testing dataset with 18,100 sets. In Figure 9, we compare the performance of KGR and KER with different values of the quantization factor δ , i.e., 0.01, 0.05, 0.1 and 0.2. The results show that KGR becomes bigger and the KER becomes smaller with the value of δ growing. In addition, we add complex Gaussian noise in the range of 0–40 dB with a 5 dB step. Figure 9 also shows how KGR and KER change when SNR changes—KGR increases and KER decreases significantly when SNR increases. Moreover, to keep KER at an ideally low level, we can set different values of δ under different SNRs.
In this paper, we focus on the scenario where blockages exist between legitimate communication parties, and we introduce an IRS to assist the key generation. We need to prove the effectiveness of the introduced IRS. For the scenario without IRS, we do not consider the reflecting channel in Equation (1), but we keep other phases the same. We use the same training dataset to train our model, and we test the results on the same testing dataset. In Figure 10, we can see the performance is much better when the IRS is introduced. Moreover, the more antennas IRS has, the more bits the initial key has.
In Figure 11, we compare the performance of KGR when we set different numbers of antennas that IRS has. KGR is not acceptable when IRS is not introduced, and KGR only slightly increases when SNR increases because of limited channel features. However, the constructed channel responses contain more detailed information when IRS is introduced, and IRS-CRNet can learn great reciprocity to help improve KGR. The performance of secret keys generated by different models when IRS with 1 × 16 × 16 elements is introduced is shown in Table 5. Compared with prior works, IRS-CRNet apparently achieves better performance.
To verify the randomness of the generated initial keys, we used the Github repository r a n d o m n e s s _ t e s t s u i t e as the randomness testing suite, which is implemented based on a NIST statistical test suite. The quantization factor was set to 0.01, and we generated a secret key based on the PLKG scheme. Then we took the bit sequence as the input of r a n d o m n e s s _ t e s t s u i t e . The test results are shown in Table 6, and all the test types passed the randomness test.

4.6. Overhead Analysis

The models were implemented on a computer with AMD Ryzen 7 4800U, 16 GB RAM and Windows 11 Professional 64-bit operating system. Pytorch 1.12 was employed as the deep learning framework. To analyze computational overhead, the number of antennas that the base station and IRS exploit is 1 × 8 × 8 , and the training time and CPU load of different models are shown in Table 7. In addition, the time of extracting reciprocity from a pair of downlink/uplink channel responses was calculated. In general, the training of IRS-CRNet does not need the high-performance GPU, and the trained model can effectively extract reciprocity; thus, the overhead is quite acceptable.

5. Conclusions

In this paper, we consider an IRS-introduced wireless communication scenario in which blockages exist between legitimate communication parties and propose an efficient method to assist PLKG. First, we construct the channel function combining the direct channel and the reflecting channel. Then a theoretically optimal interaction matrix is proposed to approach the optimal achievable rate. Moreover, we design the IRS-CRNet that can learn reciprocity from channel state information (CSI) matrices in the OFDM TDD MIMO systems. Based on the IRS-CRNet, we propose an efficient PLKG scheme for TDD systems. Finally, we implement sufficient experiments. The simulation results demonstrate that the introduced IRS indeed contributes to the key generation, the IRS-CRNet achieves excellent performance in the reciprocity-learning phase, and the PLKG scheme achieves high KGR, low KER and sufficient randomness.
In future work, on the one hand, we will study how to optimize the performance of IRS-assisted key generation in non-ideal scenarios with legitimate mobile communication users. On the other hand, we will extend this scheme to PLKG for massive TDD-MIMO systems. Moreover, how to effectively protect key generation from active and passive attacks could be meaningful research.

Author Contributions

Conceptualization, S.L., G.W.; methodology, S.L., G.W.; software, S.L., G.W.; validation, S.L., G.W.; writing—original draft, S.L., G.W.; writing—review and editing, H.H., H.W., Y.C., D.H., Y.J. and L.C.; supervision, Y.J. and L.C. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported in part by the National Natural Science Foundation of China (grant no. 62072319, no. 62262074), the Science and Technology on Communication Security Laboratory (grant no. 6142103190415), the Science and Technology Department of Sichuan Province (grant no. 2022YFG0041, no. 2022YFG0159), the Luzhou Science and Technology Innovation R&D Program (grant no. 2021CDLZ-11), Chengdu Science and Technology R&D Project (grant no. 2022YFG0041, no. 2021-YF05-02000-SN).

Data Availability Statement

The available DeepMIMO dataset in this study can be found at https://deepmimo.net/scenarios/o1-scenario (accessed on 26 November 2022). In addition, the randomness testing suit used in this paper can be found at [https://github.com/stevenang/randomness_testsuite (accessed on 26 November 2022)].

Conflicts of Interest

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

References

  1. Ahmad, I.; Shahabuddin, S.; Kumar, T.; Okwuibe, J.; Gurtov, A.; Ylianttila, M. Security for 5G and beyond. IEEE Commun. Surv. Tutorials 2019, 21, 3682–3722. [Google Scholar] [CrossRef]
  2. Khan, R.; Kumar, P.; Jayakody, D.N.K.; Liyanage, M. A survey on security and privacy of 5G technologies: Potential solutions, recent advancements, and future directions. IEEE Commun. Surv. Tutorials 2019, 22, 196–248. [Google Scholar] [CrossRef] [Green Version]
  3. Zhang, X.; Li, G.; Zhang, J.; Hu, A.; Hou, Z.; Xiao, B. Deep-Learning-Based Physical-Layer Secret Key Generation for FDD Systems. IEEE Internet Things J. 2021, 9, 6081–6094. [Google Scholar] [CrossRef]
  4. Ren, K.; Su, H.; Wang, Q. Secret key generation exploiting channel characteristics in wireless communications. IEEE Wirel. Commun. 2011, 18, 6–12. [Google Scholar] [CrossRef]
  5. Zeng, K. Physical layer key generation in wireless networks: Challenges and opportunities. IEEE Commun. Mag. 2015, 53, 33–39. [Google Scholar] [CrossRef]
  6. Zhang, J.; Duong, T.Q.; Marshall, A.; Woods, R. Key generation from wireless channels: A review. IEEE Access 2016, 4, 614–626. [Google Scholar] [CrossRef] [Green Version]
  7. Liu, H.; Wang, Y.; Yang, J.; Chen, Y. Fast and practical secret key extraction by exploiting channel response. In Proceedings of the 2013 Proceedings IEEE INFOCOM, Turin, Italy, 14–19 April 2013; pp. 3048–3056. [Google Scholar]
  8. Zhang, J.; Marshall, A.; Woods, R.; Duong, T.Q. Efficient key generation by exploiting randomness from channel responses of individual OFDM subcarriers. IEEE Trans. Commun. 2016, 64, 2578–2588. [Google Scholar] [CrossRef] [Green Version]
  9. Zhao, J.; Xi, W.; Han, J.; Tang, S.; Li, X.; Liu, Y.; Gong, Y.; Zhou, Z. Efficient and secure key extraction using CSI without chasing down errors. arXiv 2012, arXiv:1208.0688. [Google Scholar]
  10. Zhan, F.; Yao, N. On the using of discrete wavelet transform for physical layer key generation. Ad Hoc Netw. 2017, 64, 22–31. [Google Scholar] [CrossRef]
  11. Aldaghri, N.; Mahdavifar, H. Fast secret key generation in static environments using induced randomness. In Proceedings of the 2018 IEEE Global Communications Conference (GLOBECOM), Abu Dhabi, United Arab Emirates, 9–13 December 2018; pp. 1–6. [Google Scholar]
  12. Aldaghri, N.; Mahdavifar, H. Physical layer secret key generation in static environments. IEEE Trans. Inf. Forensics Secur. 2020, 15, 2692–2705. [Google Scholar] [CrossRef] [Green Version]
  13. Taha, A.; Alrabeiah, M.; Alkhateeb, A. Deep learning for large intelligent surfaces in millimeter wave and massive MIMO systems. In Proceedings of the 2019 IEEE Global communications conference (GLOBECOM), Waikoloa, HI, USA, 9–13 December 2019; pp. 1–6. [Google Scholar]
  14. Liu, Y.; Wang, M.; Xu, J.; Gong, S.; Hoang, D.T.; Niyato, D. Boosting secret key generation for IRS-assisted symbiotic radio communications. In Proceedings of the 2021 IEEE 93rd Vehicular Technology Conference (VTC2021-Spring), Helsinki, Finland, 25–28 April 2021; pp. 1–6. [Google Scholar]
  15. Lu, X.; Lei, J.; Shi, Y.; Li, W. Intelligent reflecting surface assisted secret key generation. IEEE Signal Process. Lett. 2021, 28, 1036–1040. [Google Scholar] [CrossRef]
  16. Ji, Z.; Yeoh, P.L.; Zhang, D.; Chen, G.; Zhang, Y.; He, Z.; Yin, H. Secret key generation for intelligent reflecting surface assisted wireless communication networks. IEEE Trans. Veh. Technol. 2020, 70, 1030–1034. [Google Scholar] [CrossRef]
  17. Jorswieck, E.A.; Wolf, A.; Engelmann, S. Secret key generation from reciprocal spatially correlated MIMO channels. In Proceedings of the 2013 IEEE Globecom Workshops (GC Wkshps), Atlanta, GA, USA, 9–13 December 2013; pp. 1245–1250. [Google Scholar]
  18. Furqan, H.M.; Hamamreh, J.M.; Arslan, H. Secret key generation using channel quantization with SVD for reciprocal MIMO channels. In Proceedings of the 2016 international symposium on wireless communication systems (ISWCS), Poznan, Poland, 20–23 September 2016; pp. 597–602. [Google Scholar]
  19. Jiao, L.; Tang, J.; Zeng, K. Physical layer key generation using virtual AoA and AoD of mmWave massive MIMO channel. In Proceedings of the 2018 IEEE Conference on Communications and Network Security (CNS), Beijing, China, 30 May 2018–1 June 2018; pp. 1–9. [Google Scholar]
  20. Li, G.; Sun, C.; Jorswieck, E.A.; Zhang, J.; Hu, A.; Chen, Y. Sum secret key rate maximization for TDD multi-user massive MIMO wireless networks. IEEE Trans. Inf. Forensics Secur. 2020, 16, 968–982. [Google Scholar] [CrossRef]
  21. O’shea, T.; Hoydis, J. An introduction to deep learning for the physical layer. IEEE Trans. Cogn. Commun. Netw. 2017, 3, 563–575. [Google Scholar] [CrossRef] [Green Version]
  22. Qin, Z.; Ye, H.; Li, G.Y.; Juang, B.H.F. Deep learning in physical layer communications. IEEE Wirel. Commun. 2019, 26, 93–99. [Google Scholar] [CrossRef] [Green Version]
  23. Lin, Y.; Tu, Y.; Dou, Z.; Chen, L.; Mao, S. Contour stella image and deep learning for signal recognition in the physical layer. IEEE Trans. Cogn. Commun. Netw. 2020, 7, 34–46. [Google Scholar] [CrossRef]
  24. Ma, W.; Qi, C.; Zhang, Z.; Cheng, J. Sparse channel estimation and hybrid precoding using deep learning for millimeter wave massive MIMO. IEEE Trans. Commun. 2020, 68, 2838–2849. [Google Scholar] [CrossRef] [Green Version]
  25. Ye, H.; Gao, F.; Qian, J.; Wang, H.; Li, G.Y. Deep learning-based denoise network for CSI feedback in FDD massive MIMO systems. IEEE Commun. Lett. 2020, 24, 1742–1746. [Google Scholar] [CrossRef] [Green Version]
  26. Wu, Q.; Zhang, R. Beamforming optimization for wireless network aided by intelligent reflecting surface with discrete phase shifts. IEEE Trans. Commun. 2019, 68, 1838–1851. [Google Scholar] [CrossRef] [Green Version]
  27. Basar, E.; Di Renzo, M.; De Rosny, J.; Debbah, M.; Alouini, M.S.; Zhang, R. Wireless communications through reconfigurable intelligent surfaces. IEEE Access 2019, 7, 116753–116773. [Google Scholar] [CrossRef]
  28. Mathur, S.; Trappe, W.; Mandayam, N.; Ye, C.; Reznik, A. Radio-telepathy: Extracting a secret key from an unauthenticated wireless channel. In Proceedings of the 14th ACM International Conference on Mobile Computing and Networking, San Francisco, CA, USA, 14–19 September 2008; pp. 128–139. [Google Scholar]
  29. Mitev, M.; Chorti, A.; Belmega, E.V.; Poor, H.V. Protecting physical layer secret key generation from active attacks. Entropy 2021, 23, 960. [Google Scholar] [CrossRef] [PubMed]
  30. He, H.; Chen, Y.; Huang, X.; Xing, M.; Li, Y.; Xing, B.; Chen, L. Deep Learning-Based Channel Reciprocity Learning for Physical Layer Secret Key Generation. Secur. Commun. Netw. 2022, 2022, 1844345. [Google Scholar] [CrossRef]
  31. Zhou, J.; Zeng, X. Physical Layer Secret Key Generation for Spatially Correlated Channels Based on Multi-Task Autoencoder. In Proceedings of the 2022 7th International Conference on Intelligent Computing and Signal Processing (ICSP), Xi’an, China, 15–17 April 2022; pp. 144–150. [Google Scholar]
  32. Gong, S.; Lu, X.; Hoang, D.T.; Niyato, D.; Shu, L.; Kim, D.I.; Liang, Y.C. Toward smart wireless communications via intelligent reflecting surfaces: A contemporary survey. IEEE Commun. Surv. Tutor. 2020, 22, 2283–2314. [Google Scholar] [CrossRef]
  33. Lu, T.; Chen, L.; Zhang, J.; Cao, K.; Hu, A. Reconfigurable Intelligent Surface Assisted Secret Key Generation in Quasi-Static Environments. IEEE Commun. Lett. 2021, 26, 244–248. [Google Scholar] [CrossRef]
  34. Ji, Z.; Yeoh, P.L.; Chen, G.; Pan, C.; Zhang, Y.; He, Z.; Yin, H.; Li, Y. Random shifting intelligent reflecting surface for OTP encrypted data transmission. IEEE Wirel. Commun. Lett. 2021, 10, 1192–1196. [Google Scholar] [CrossRef]
  35. Li, G.; Sun, C.; Xu, W.; Di Renzo, M.; Hu, A. On maximizing the sum secret key rate for reconfigurable intelligent surface-assisted multiuser systems. IEEE Trans. Inf. Forensics Secur. 2021, 17, 211–225. [Google Scholar] [CrossRef]
  36. Dodis, Y.; Reyzin, L.; Smith, A. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In International Conference on the Theory and Applications of Cryptographic Techniques; Springer: Berlin/Heidelberg, Germany, 2004; pp. 523–540. [Google Scholar]
  37. Bloch, M.; Barros, J.; Rodrigues, M.R.; McLaughlin, S.W. Wireless information-theoretic security. IEEE Trans. Inf. Theory 2008, 54, 2515–2534. [Google Scholar] [CrossRef]
  38. Zhu, X.; Xu, F.; Novak, E.; Tan, C.C.; Li, Q.; Chen, G. Extracting secret key from wireless link dynamics in vehicular environments. In Proceedings of the 2013 Proceedings IEEE INFOCOM, Turin, Italy, 14–19 April 2013; pp. 2283–2291. [Google Scholar]
  39. Liu, H.; Yang, J.; Wang, Y.; Chen, Y. Collaborative secret key extraction leveraging received signal strength in mobile wireless networks. In Proceedings of the 2012 Proceedings IEEE Infocom, Orlando, FL, USA, 25–30 March 2012; pp. 927–935. [Google Scholar]
  40. Alkhateeb, A. DeepMIMO: A generic deep learning dataset for millimeter wave and massive MIMO applications. arXiv 2019, arXiv:1902.06435. [Google Scholar]
  41. Kingma, D.P.; Ba, J. Adam: A method for stochastic optimization. arXiv 2014, arXiv:1412.6980. [Google Scholar]
  42. Rukhin, A.; Soto, J.; Nechvatal, J.; Smid, M.; Barker, E. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications; Technical report; Booz-Allen and Hamilton Inc.: Mclean VA, USA, 2001. [Google Scholar]
  43. Huang, C.; Alexandropoulos, G.C.; Zappone, A.; Yuen, C.; Debbah, M. Deep learning for UL/DL channel calibration in generic massive MIMO systems. In Proceedings of the ICC 2019—2019 IEEE International Conference on Communications (ICC), Shanghai, China, 20–24 May 2019; pp. 1–6. [Google Scholar]
Figure 1. The wireless communication scenario with an IRS introduced. A blockage exists between the base station and user devices, including User_A and User_B, and interferes with the wireless signal. The received signal at User_B is interfered with more severely compared with User_A.
Figure 1. The wireless communication scenario with an IRS introduced. A blockage exists between the base station and user devices, including User_A and User_B, and interferes with the wireless signal. The received signal at User_B is interfered with more severely compared with User_A.
Sensors 23 00055 g001
Figure 2. Assumed locations of the base station, the IRS and the user device.
Figure 2. Assumed locations of the base station, the IRS and the user device.
Sensors 23 00055 g002
Figure 3. Structure of IRS-CRNet. Note that H α { H B , H U } .
Figure 3. Structure of IRS-CRNet. Note that H α { H B , H U } .
Sensors 23 00055 g003
Figure 4. This figure represents a part of the O1 scenario. The sixth base station (BS6) is acting as an IRS to reflect the signal from a transmitter to a receiver. BS16 is a transmitter and also a receiver, as is every user device in the User Grid from row 551 (R551) to row 1200 (R1200). Every row contains 181 user devices. The building across the road from BS16 is acting as a blockage.
Figure 4. This figure represents a part of the O1 scenario. The sixth base station (BS6) is acting as an IRS to reflect the signal from a transmitter to a receiver. BS16 is a transmitter and also a receiver, as is every user device in the User Grid from row 551 (R551) to row 1200 (R1200). Every row contains 181 user devices. The building across the road from BS16 is acting as a blockage.
Sensors 23 00055 g004
Figure 5. The achievable rate comparison under different conditions when the IRS has different numbers of elements.
Figure 5. The achievable rate comparison under different conditions when the IRS has different numbers of elements.
Sensors 23 00055 g005
Figure 6. The result of L o s s h of four different models versus the epoch of the training process.
Figure 6. The result of L o s s h of four different models versus the epoch of the training process.
Sensors 23 00055 g006
Figure 7. The MSE of four different models trained with L o s s h and without L o s s h .
Figure 7. The MSE of four different models trained with L o s s h and without L o s s h .
Sensors 23 00055 g007
Figure 8. Comparison between the original channel features and the predicted channel features. (a) Channel response that contains reciprocal and nonreciprocal components. (b) Channel response that mostly contains predicted reciprocity extracted by IRS-CRNet.
Figure 8. Comparison between the original channel features and the predicted channel features. (a) Channel response that contains reciprocal and nonreciprocal components. (b) Channel response that mostly contains predicted reciprocity extracted by IRS-CRNet.
Sensors 23 00055 g008
Figure 9. The KGR and KER of the initial key with different values of the quantization factor δ based on the IRS-CRNet versus SNR. The IRS-CRNet is trained with the training dataset with 99,550 sets of 0 dB. The solid line represents KGR, and the dashed line represents KER.
Figure 9. The KGR and KER of the initial key with different values of the quantization factor δ based on the IRS-CRNet versus SNR. The IRS-CRNet is trained with the training dataset with 99,550 sets of 0 dB. The solid line represents KGR, and the dashed line represents KER.
Sensors 23 00055 g009
Figure 10. Quantized numbers of effective bits that initial keys have with different IRS parameters versus SNR. The scenario with an IRS having 1 × 8 × 8 antennas is treated as a benchmark. Note that δ is set to 0.01.
Figure 10. Quantized numbers of effective bits that initial keys have with different IRS parameters versus SNR. The scenario with an IRS having 1 × 8 × 8 antennas is treated as a benchmark. Note that δ is set to 0.01.
Sensors 23 00055 g010
Figure 11. KGR of the initial key with a different number of antennas versus SNR.
Figure 11. KGR of the initial key with a different number of antennas versus SNR.
Sensors 23 00055 g011
Table 1. Details of different non-linear layers of E n c o d e r .
Table 1. Details of different non-linear layers of E n c o d e r .
LayerTypeKernel SizeStridePadding
1Conv(3,3)10
2Max Pooling(2,2)11
3Conv(3,3)10
4Max Pooling(2,2)11
5Conv(3,3)10
6Max Pooling(2,2)11
7Conv(3,3)10
8Max Pooling(2,2)11
Table 2. Details of layers of D e c o d e r .
Table 2. Details of layers of D e c o d e r .
LayerTypeKernel SizeStridePadding
1TransConv(4,4)11
2TransConv(3,3)10
3TransConv(2,2)10
Table 3. The adopted DeepMIMO dataset parameters.
Table 3. The adopted DeepMIMO dataset parameters.
DeepMIMO Dataset ParametersValue
Active base stations (BSs)6, 16
Active users (training)from R551 to R1100
Active users (testing)from R1101 to R1200
Number of BS antennas ( x , y , z ) = ( 1 , 4 , 4 ) ; ( 1 , 8 , 8 ) ; ( 1 , 16 , 16 )
Antennas spacing0.5
Operating frequency3.4 GHz
Number of OFDM subcarriers512
OFDM limit64
OFDM sampling factor1
Number of paths10
Table 4. Parameters for the IRS-CRNet.
Table 4. Parameters for the IRS-CRNet.
ParameterValue
OptimizationADAM [41]
Exponential decay rates for ADAM: ( τ 1 , τ 2 ) (0.9, 0.999)
Learning rate10 2
Batch size64
Number of epochs100
Number of training samples99,550
Number of testing samples18,100
Table 5. Performance of different models.
Table 5. Performance of different models.
Different ModelsKGRKER
AutoEncoder [21]0.94375.3457 × 10 2
KGNet [3]0.97356.7642 × 10 3
DNN [43]0.98809.5565 × 10 6
IRS-CRNet0.99361.8265 × 10 7
Table 6. NIST statistical test results.
Table 6. NIST statistical test results.
Test Typep-ValueResult
Approximate Entropy0.8562Random
Block Frequency0.7172Random
Cumulative Sums0.9969Random
Discrete Fourier Transform0.9668Random
Frequency0.7172Random
Ranking0.8014Random
Runs0.3585Random
Serial0.4990Random
Table 7. Computational overhead of different models.
Table 7. Computational overhead of different models.
NetworksTraining TimeCPU Average LoadReciprocity Extraction Time
AutoEncoder [21]3 h 4 min89.2%0.998 ms
KGNet [3]4 h 58 min85.7%1.273 ms
DNN [43]2 h 36 min84.5%0.997 ms
IRS-CRNet3 h 32 min90.3%1.005 ms
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Liu, S.; Wei, G.; He, H.; Wang, H.; Chen, Y.; Hu, D.; Jiang, Y.; Chen, L. Intelligent Reflecting Surface-Assisted Physical Layer Key Generation with Deep Learning in MIMO Systems. Sensors 2023, 23, 55. https://doi.org/10.3390/s23010055

AMA Style

Liu S, Wei G, He H, Wang H, Chen Y, Hu D, Jiang Y, Chen L. Intelligent Reflecting Surface-Assisted Physical Layer Key Generation with Deep Learning in MIMO Systems. Sensors. 2023; 23(1):55. https://doi.org/10.3390/s23010055

Chicago/Turabian Style

Liu, Shengjie, Guo Wei, Haoyu He, Hao Wang, Yanru Chen, Dasha Hu, Yuming Jiang, and Liangyin Chen. 2023. "Intelligent Reflecting Surface-Assisted Physical Layer Key Generation with Deep Learning in MIMO Systems" Sensors 23, no. 1: 55. https://doi.org/10.3390/s23010055

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop