You are currently on the new version of our website. Access the old version .
SensorsSensors
  • Article
  • Open Access

19 April 2023

RIS-Enabled Secret Key Generation for Secured Vehicular Communication in the Presence of Denial-of-Service Attacks

,
,
,
,
,
,
and
1
James Watt School of Engineering, University of Glasgow, Glasgow G12 8QQ, UK
2
Department of Communications Engineering, Military Technical College, Cairo 11646, Egypt
3
Directorate of Research Services, University of New England, Armidale, NSW 2351, Australia
*
Authors to whom correspondence should be addressed.
This article belongs to the Special Issue Security and Communication Networks

Abstract

Wireless communication has become an integral part of modern vehicles. However, securing the information exchanged between interconnected terminals poses a significant challenge. Effective security solutions should be computationally inexpensive, ultra-reliable, and capable of operating in any wireless propagation environment. Physical layer secret key generation has emerged as a promising technique, which leverages the inherent randomness of wireless-channel responses in amplitude and phase to generate high-entropy symmetric shared keys. The sensitivity of the channel-phase responses to the distance between network terminals makes this technique a viable solution for secure vehicular communication, given the dynamic behavior of these terminals. However, the practical implementation of this technique in vehicular communication is hindered by fluctuations in the communication link between line-of-sight (LoS) and non-line-of-sight (NLoS) conditions. This study introduces a key-generation approach that uses a reconfigurable intelligent surface (RIS) to secure message exchange in vehicular communication. The RIS improves the performance of key extraction in scenarios with low signal-to-noise ratios (SNRs) and NLoS conditions. Additionally, it enhances the network’s security against denial-of-service (DoS) attacks. In this context, we propose an efficient RIS configuration optimization technique that reinforces the signals received from legitimate users and weakens the signals from potential adversaries. The effectiveness of the proposed scheme is evaluated through practical implementation using a 1-bit RIS with 64 × 64 elements and software-defined radios operating within the 5G frequency band. The results demonstrate improved key-extraction performance and increased resistance to DoS attacks. The hardware implementation of the proposed approach further validated its effectiveness in enhancing key-extraction performance in terms of the key generation and mismatch rates, while reducing the effect of the DoS attacks on the network.

1. Introduction

The integration of wireless technology into modern vehicles has greatly enhanced the exchange of crucial information such as location, speed, and direction, offering drivers real-time traffic updates and reducing the risk of accidents [1]. However, the wireless channel used for this exchange can also be vulnerable to malicious attacks, such as the interception and alteration of transmitted data [2,3]. Public-key cryptography (PKC) has been widely used to secure these communications and protect privacy. However, PKC-based key management faces power-consumption and computational-complexity challenges [4]. Symmetric-key cryptography is a more effective alternative in that respect. However, establishing a symmetric shared key using cryptographic operations still depends on PKC-based approaches such as Diffie–Hellman key exchange [5].
In this context, the study of secret key generation through the physical-layer security mechanism has gained increasing attention, especially since Maurer proposed the idea in 1993 [6]. The unique properties of wireless channels, such as their time-varying, short-term reciprocity, and space–time uniqueness within the coherence interval T c , provide a natural source for generating secret keys [7]. The key-generation process involves channel probing, measurement quantization, information reconciliation, and privacy amplification, resulting in the establishment of a secure shared key between the sender and receiver [8]. The secret key capacity is a crucial aspect of this field of study. Theoretical upper limits of secret key capacity have been established through the works of Ahlswede and Csiszar et al. [9] in source-type and channel-type models with wiretappers. Subsequently, research on the secret key capacity under more complex system models has been developed. The channel-phase response is a valuable resource for secure key extraction, as it is highly sensitive to the distance between terminals [10]. This makes it effective in highly dynamic vehicular networks, generating high-entropy cryptographic keys. However, it is important to consider the shadowing effect from surrounding terminals (i.e., vehicles and infrastructures) that can lead to unpredictable channel-fading variations in urban and rural areas. Additionally, the key-extraction performance is adversely affected by the decrease in signal-to-noise ratio (SNR) values. This limitation results in reduced PHY-layer key-extraction performance for non-line-of-sight (NLoS) communication scenarios and long-range applications.
Recently, the reconfigurable intelligent surface (RIS) field has emerged as a technology that can improve communication quality by adjusting reflection coefficients such as phase, amplitude, frequency, or polarization [11]. The RIS has been employed in various applications, such as satellite communications [12], physical-layer security [13], and internet-of-things (IoT) networks [14], demonstrating its versatility and the potential for diverse use cases. RISs comprise many passive reflecting units that can be placed at adaptable locations and independently alter the incident signal, therefore improving signal transmission [15]. In recent years, some researchers have applied RISs to the physical-layer security of wireless communications to improve the secrecy data rate under the wiretap channel, a concept referred to as keyless information theory security [16]. However, the application of RISs to phase-based key-extraction mechanisms has not yet been explored. The effective extraction of keys with the aid of the RIS and the use of channel-phase responses to generate shared keys remains an open issue in the field of physical-layer security technology. Given the ability of RISs to configure the wireless channel in real time through passive reflection, they have the potential to improve secret key capacity significantly. Furthermore, flooding attacks are a potential hazard, whereby the attacker floods the network with a substantial volume of simultaneous communication requests, thus constituting a Denial-of-Service (DoS) attack [17]. By strengthening the signal from a certain side (i.e., a legitimate user) while weakening it from another (i.e., the adversary), the RIS can help mitigate the effect of such attacks. An effective way to accomplish this is to configure the RIS elements in a way that can destructively interfere in one direction, and constructively interfere in another.
In summary, the main contributions of this work are as follows:
  • This study extends our previous work introduced in [5] by proposing a RIS-assisted key-extraction method that enhances the signal strength for the designated user’s location while reducing that from the active attacker’s location. Hence, the proposed method improves the key-extraction performance for designated users while mitigating the impact of DoS attacks within the network.
  • To accomplish this, a RIS configuration optimization algorithm is designed using the Hadamard matrix codebook. This algorithm optimizes the measurement quantization order based on the optimal configuration’s average SNR estimate.
  • The proposed RIS optimization algorithm is practically implemented using a 1-bit RIS with 64 × 64 elements and two Universal Serial Radio Peripherals (USRPs) operating in the 5G communication frequency range (3.75 GHz). Finally, the statistical randomness of the extracted keys is measured to demonstrate the extracted key suitability for use as cryptographic keys.
The structure of this paper is as follows: Section 2 provides an overview of the existing phase-based key-extraction method. Section 3 presents the preliminary concepts required for this research. Section 4 presents the proposed RIS-assisted key-extraction method. Section 5 analyses the hardware implementation of the method. Finally, Section 6 summarizes the findings and contributions of this work.

3. Preliminaries

This section provides a brief overview of the secret key extraction process [5]. A thorough discussion of our considered system model is also provided. The notations used in this paper are summarized in Table 1 for better readability.
Table 1. List of notations.

3.1. Review of the PHY-Layer Secret Key Extraction Scheme in [5]

The work introduced in [5] proposes a novel Diffie–Hellman channel-probing mechanism that uses the extended Chebyshev chaotic mapping operation to exchange probing signals in an interleaved fashion. Specifically, the extended Chebyshev mapping operation for the OFDM system of N subcarriers is formulated as
T n i ( θ i ) = n i · θ i mod p , θ i [ 0 , 2 π ) n i · cos 1 ( x i ) mod p , x i = cos ( θ i ) for i = 1 , , N ,
where p = 2 π , n i is a large integer number, and θ i = 2 Π 2 r for r { 1 , 2 , 3 } is the primitive root of the ith subcarrier. The primitive root θ i is a generator of the group G such that its multiples generate the entire group. For example, let r = 2 , then θ i = Π 2 . Thus, the cyclic group elements are G 2 = { 0 , Π 2 , Π , 3 Π 2 } . For r = 3 , θ i = Π 4 . Thus, the cyclic group elements are G 3 = { 0 , Π 4 , Π 2 , 3 Π 4 , Π , 5 Π 4 , 3 Π 2 , 7 Π 4 } . We have considered a scenario where two parties (Alice and Bob) are in the same communication range and want to establish a secure communication link. In this context, Alice and Bob exchange authenticated probing packets at times t 0 and t 1 , respectively. Based on the received probing packets, both terminals can extract a high-entropy secret key, which is used to secure subsequent transmissions using the upper layer’s crypto-based approaches. Figure 1 reviews the steps involved in the secret key extraction process in [5]. Generally, the extraction process comprises channel probing and quantization, information reconciliation, and privacy amplification. In the former, Alice sends the probing packet in the form of two OFDM symbols of N subcarriers, which can be represented in a simplified form as:
s a t 0 = i = 1 N 2 E S T e j T 2 n i θ i = i = 1 N 2 E S T e j 2 n i θ i s a t 0 + Δ t = i = 1 N 2 E S T e j T n i θ i = i = 1 N 2 E s T e j n i θ i ,
where the transmission time interval between both OFDM symbols is Δ t T c . Thus, Bob’s received signal can be expressed as
r b t 0 = i = 1 N 2 h i 2 E s T e j T 2 n i θ i + ξ b , i + N i r b t 0 + Δ t = i = 1 N 2 h i 2 E s T e j T n i θ i + ξ b , i + N i ,
where { | h i | , | h i | } and { ξ i , ξ i } are the channel-fading coefficients and phase responses of the ith subcarrier at times { t 0 , t 0 + Δ t } , respectively and { N i , N i } are complex additive Gaussian noises CN 0 , σ n 2 with zero means and σ n 2 variances. It is noteworthy to mention that the channel responses { | h i | , ξ i } are highly correlated with { | h i | , ξ i } for Δ t T c . Similarly, Bob replies by sending an authenticated probing packet as in (2) with phases { T 2 m i θ i , T m i θ i } at times { t 1 , t 1 + Δ t } . Then, both terminals, Alice and Bob, equalize their received signals by computing e a ( t ) = r a t 1 r a t 1 + Δ t * and e b ( t ) = r b t 0 r b t 0 + Δ t * , respectively. Hence, the phases of e a ( t ) and e b ( t ) of the ith subcarrier can be formulated as
e a , i ( t ) = m i θ i + ξ a , i ξ a , i + ω a , i ω a , i e b , i ( t ) = n i θ i + ξ b , i ξ b , i + ω b , i ω b , i ,
where { ω a , i , ω a , i } and { ω b , i , ω b , i } are the noisy added estimates result from { N i , N i } in (3) at the sides of Alice and Bob, respectively with Gaussian distributions N 0 , σ 2 . Accordingly, both terminals use the R o u n d function to obtain T ^ m i θ i and T ^ n i θ i as
T ^ m i ( θ i ) = R o u n d e a , i ( t ) = R o u n d m i θ i + ξ a , i ξ a , i + ω a , i ω a , i T ^ n i ( θ i ) = R o u n d e b , i ( t ) = R o u n d n i θ i + ξ b , i ξ b , i + ω b , i ω b , i ,
where the function R o u n d ( x ) is used to round x to the nearest multiple of 2 π / 2 r for r { 1 , 2 , 3 } . Then, Alice and Bob compute T n i m i θ i | A l i c e = T n i T ^ m i θ i and T n i m i θ i | B o b = T m i T ^ n i θ i , respectively. The use of the R o u n d function in the context is important to avoid the significant error results from multiplying the negligible value of ( ( ξ ξ ) + ( ω ω ) ) by the large integer number n i or m i . Finally, both terminals quantize their estimates to convert them into bit streams using a mapping operation M 1 ( . ) of order r. For clarity, a Gray code mapping operation of order 2 can be expressed as
M 1 T n i m i θ i = 00 T n i m i θ i [ π 4 , π 4 ) 01 T n i m i θ i [ π 4 , 3 π 4 ) 11 T n i m i θ i [ 3 π 4 , 3 π 4 ) 10 T n i m i θ i [ 3 π 4 , π 4 ) for i = 1 , , N .
Figure 1. The PHY-layer secret key extraction scheme in a noiseless channel.
Note that the higher the variance σ 2 of the phase noisy estimates in (4), the lower the quantization order r, and vice versa [5].

3.2. System Model

In this study, the vehicular communication network comprises the following entities, as shown in Figure 2.
Figure 2. System modeling.
1.
The RSU: RSUs are stationary devices located along roads that facilitate wireless communication between themselves and surrounding vehicles within a particular range. Each RSU acts as a relay between vehicles, extending the communication range and improving the network’s reliability. It is equipped with wireless communication capabilities and can support various applications, such as traffic management, safety warnings, and entertainment services. It also has a reliable communication link with the RIS’s intelligent controller, so configurations of reflecting units can be optimized. Through this mechanism, the RSU effectively manages the RIS to enhance the transmission of signals towards a designated direction while simultaneously reducing the strength of signals toward potential unauthorized interceptors, commonly referred to as “Eve”.
2.
The vehicle’s onboard units (OBUs): OBU is a communication device installed within each vehicle in the network. It can communicate with other OBUs and RSUs within range, facilitating the exchange of traffic-related messages in 100–300 ms intervals based on the dedicated short-range communication protocol [26]. In this way, OBUs play a crucial role in the functioning of the vehicular network.
3.
The RIS: RISs are intelligent surfaces that can dynamically change their electromagnetic behaviors to improve the performance of wireless networks. RISs can be used to manipulate the propagation of radio signals, allowing for better signal quality, increased network coverage, and improved energy efficiency. The intelligent controller is an integral component of each RIS. It manages and configures the multiple meta-surface reflecting units (RUs) of order N elements that make up the RIS. It plays a crucial role in optimizing the performance of the RIS in the network.
4.
The adversary Eve: “Eve” is an active attacker who overloads the network with excessive traffic, causing it to become unavailable to legitimate users. In this attack, the adversary overwhelms the target’s resources and prevents it from functioning properly, therefore denying service to its intended users. By constructing and launching a flooding DoS attack, the attacker aims to disrupt the system’s normal functioning and cause inconvenience or harm to its users.

4. RIS-Assisted Secret Key Extraction Method

This section shows how the RIS improves the key-extraction performance and reduces the impact of potential flooding-based DoS attacks on the network.

4.1. Performance Optimization

Three critical evaluation metrics must be considered while optimizing the key-extraction performance, namely the bit generation rate (BGR), the bit mismatch rate (BMR), and the secret bit generation rate (SBGR). The BGR is a measure of the efficiency of this process and typically represents the number of generated bits per channel sample, expressed as:
B G R = Total extracted bits Channel sample .
A high valuation of the BGR indicates a more efficient extraction process and a higher rate of secret bit generation, resulting in improved security and faster key establishment for the communication system. On the other hand, the BMR represents the number of mismatched bits extracted from each channel sample, expressed as:
B M R = No . of mismatched bits Channel sample .
We define the SBGR as the number of matched bits, which is represented as S B G R = B G R B M R . Hence, the SBGR considers both the BGR and the BMR in the process of secret key extraction. For negligible channel-phase decorrelation ξ ξ 0 , the phase distribution of the equalized signal e ( t ) in (4) is normally distributed with means { T n i θ i = n i θ i , T m i θ i = m i θ i } and variance 2 σ 2 for {Alice, Bob}, respectively [5]. Thus, its cumulative distribution function (CDF) is approximated as:
ϕ ( x ) = 1 2 1 + erf x T n i m i θ i 2 σ , erf ( z ) = 2 π 0 z e t 2 d t
where erf ( z ) is the error function. Thus, the probability of error P e is the probability of the estimated e ( t ) in (4) to be out of the interval T n i m i + π 2 r , T n i m i π 2 r , which can be represented by:
P e = 2 ϕ T n i m i θ i π 2 r .
Accordingly, the communicating terminals can agree on the optimum quantization order r { 1 , 2 , 3 } for an acceptable P e a 1 as:
x = arg max x erf x T n i m i θ i 2 σ a 1 1 .
Based on x, r is optimized as:
r = arg max r 2 r π x for r = 1 , 2 , 3 .

4.2. Channel Modeling

The scenario depicted in Figure 3 involves the concurrent processes of communication establishment between Bob and Alice, and Eve’s deliberate disruption of network integrity through the inundation of the network with excessive communication requests. In this scenario, the RSU can manage the RIS and optimize its configuration to reinforce the signal in the direction of the intended recipient “Bob”, while simultaneously mitigating the strength of the signals received from the adversary “Eve”. Hence, the signals received by Alice from both Bob and Eve can be theoretically formulated as follows:
y A | B o b = h B A + h B I A x + N A = h B A + i = 1 N h B I A i β i Ψ i x + N A y A | E v e = h E A + h E I A x + N A = h E A + i = 1 N h E I A i β i Ψ i x + N A ,
where N A is the complex additive Gaussian noise C N 0 , σ n 2 , { h B A , h E A } are the channel responses in the complex form of the direct link from ( Bob Alice ) and ( Eve Alice ) , respectively, and { h B I A , h E I A } are the superposition of the N channel multipath components of the RIS’s elements of the indirect link from ( Bob RIS Alice ) and ( Eve RIS Alice ) , respectively. Additionally, the configuration of the RIS is represented by the variable H = β 1 Ψ 1 , β 2 Ψ 2 , , β N Ψ N T , where { β i , Ψ i } defines the state of each RIS element. An example of a 1-bit RIS can be described as follows: the phase shift applied by each unit cell, denoted by Ψ i , is equal to Π , and the reflection coefficient, represented by β i , is a binary variable that can take on values of either 0 or 1.
Figure 3. RIS-assisted channel modeling.
The use of the RIS helps increase the secret key capacity I, which refers to the maximum amount of information that can be securely extracted from the physical layer of a communication system and used as a secret key. By properly designing and controlling the phase shifts applied by the RIS, the RIS can counter the effects of fading and interference in the channel, which can also result in higher secret key capacities. Therefore, the RIS can be seen as a valuable tool for improving the secret key capacity I in the presence of an eavesdropper and ensuring secure communication. The work in [16] provides a theoretical formulation for the secret key capacity denoted by:
I = log 2 1 + σ h B A 2 + i = 1 N β i 2 σ h B I A i 2 2 / σ n 4 1 + 2 σ h B A 2 + i = 1 N β i 2 σ h B I A i 2 / σ n 2 .
The RIS can adjust signal directionality, consequently reducing the signal strength from Eve’s direction and enhancing the signal coming from Bob. This can be achieved by adjusting the phase shifts applied by each unit cell of the RIS so that the reflection coefficients of the unit cells constructively interfere in certain directions and destructively interfere in others. Therefore, the goal is to optimize the RIS configuration H to maximize the secret key capacity I in (14) while concurrently reducing any interference from Eve.

4.3. Optimizing the Best RIS Configuration ( H o p t )

The use of the Hadamard matrix in the configuration of the RIS offers several advantages, including low complexity, high efficiency, and improved performance. This makes the Hadamard matrix effective for scenarios where reducing interference, enhancing privacy, and increasing energy efficiency are critical objectives in wireless communication systems [27]. The Hadamard matrix offers a suite of orthogonal and binary phase shift values that can be applied to the elements of the RIS to influence the reflection of incoming electromagnetic waves in a specific direction or with a preferred phase shift. The flexibility and efficacy of the Hadamard matrix in configuring the RIS to achieve these objectives while minimizing complexity makes it a promising solution for wireless communication challenges. This paper involves the measurement of the average signal-to-noise ratio ( SNR ¯ ) for every configuration (H) of the OFDM system. Based on these measurements, we developed an optimization method for the RIS configuration, which is presented in Algorithm 1. This method encompasses four phases: initialization, scanning toward Bob, scanning toward Eve, and configuration optimization.
  • Initialization: Alice initializes the Hadamard codebook H D = i = 1 N x × N y H i , where N x and N y are the number of elements in the RIS’s x and y coordinates, respectively.
  • Scanning toward Bob: Alice scans the average SNR value for the received OFDM symbols from Bob, denoted as SNR ¯ i B o b , for each configuration H i within the set of all possible configurations, H D , where i = 1 , 2 , , N x × N y .
  • Scanning toward Eve: Alice scans the average SNR value of the received OFDM symbols from Eve, denoted as SNR ¯ i E v e , for each configuration H i within the set of all possible configurations, H D , where i = 1 , 2 , , N x × N y .
  • Configuration optimization: Alice computes the ratio of the average SNR for Bob SNR ¯ i B o b over the average SNR for Eve SNR ¯ i E v e , denoted as C i , for i = 1 , 2 , , N x × N y . The maximum value of C i , referred to as C m a x , is then determined from the set of all values of C i . The optimum configuration, denoted as H o p t , is identified as the configuration H i that corresponds to the maximum value of C m a x . This calculation maximizes Bob’s average SNR while minimizing Eve’s average SNR.
Algorithm 1 Optimizing the Best RIS Configuration ( H o p t ) .
Initialization
1:The Hadamard codebook H D = i = 1 N x × N y H i for the ( N x × N y ) RIS reflecting units
2:Two empty variables, S N R B o b and S N R E v e , used to store the measured SNRs
3:An empty variable C
Alice is communicating with the legitimate terminal (Bob)
4:for  i = 1 : ( N x × N y ) do
5:      Measuring the average SNR value ( SNR ¯ i B o b ) for each Hadamard matrix ( H i )
6:      Appending the measured SNR ¯ i B o b to S N R B o b
7:end for
Alice is communicating with the illegitimate terminal (Eve)
8:for  i = 1 : ( N x × N y ) do
9:      Measuring the average SNR value ( SNR ¯ i E v e ) for each Hadamard matrix ( H i )
10:      Appending the measured SNR ¯ i E v e to S N R E v e
11:end for
Optimizing the best configuration
12:for  i = 1 : ( N x × N y ) do
13:      Computing C i = SNR ¯ i B o b SNR ¯ i E v e
14:      Appending the computed C i to C
15:end for
16:Finding the best configuration ( H o p t = H i ) corresponding to C m a x = max ( C i C )

5. Hardware Implementation Analysis

In this section, we present the hardware-based experimental results for the proposed RIS-assisted secret key-extraction method, and evaluate the effectiveness of the proposed optimization approach for configuring the RIS.

5.1. Experimental Setup and the RIS Configuration Analysis

We describe the experimental parameters in the following before evaluating the proposed method. As depicted in Figure 4, the experimental setup consists of two universal serial radio peripherals (USRPs) version Ettus X300 and a 1-bit RIS with 64 × 64 elements. One USRP serves as the transmitter, positioned 3 m from the RIS, while the other USRP is equipped with two channels with horn antennas and serves as two separate receivers, representing Bob and Eve, positioned 5 m from the RIS and situated at 45 degrees on either side of the line connecting the RIS and the first USRP. In this experiment, a single antenna is installed on all terminals. The carrier frequency is set to 3.75 GHz, and the sampling rate is configured at 200 KHz for an OFDM system with 256 subcarriers.
Figure 4. Experiment setup for the secret key generation scheme.
We calculated SNR ¯ i B o b and SNR ¯ i E v e for each configuration matrix H i H D , where H D is the Hadamard codebook of order | H D | = 64 × 64 = 4096 configurations. Figure 5a illustrates the relationship between SNR ¯ i B o b and H i , while Figure 5b presents the relationship between SNR ¯ i E v e and H i , for i = 1 , , 4096 . It can be observed from Figure 5b that some configurations enhance the transmitted signals’ received power, while others result in a reduction ranging from −3.5 dB to 6.5 dB. We applied Algorithm 1 to the estimated measurements to compute C i = SNR ¯ i B o b SNR ¯ i E v e for each configuration, as shown in Figure 5c. This figure shows that the configurations associated with the top three peaks are good candidates for H o p t . Therefore, we maximize the value of C i to determine H o p t .
Figure 5. The average SNR values for different configurations and their optimized value.
In Figure 6, we display the impact of the RIS on the received OFDM symbols at the sides of Bob and Eve. When the RIS is activated using the optimized configuration H o p t , it is evident that the received power at Bob’s side is boosted by approximately 2 dB compared to the scenario when the RIS is turned off. Additionally, the figure highlights the effectiveness of the RIS in reducing the received power at Eve’s side. This reduced received power at Eve’s side effectively reduces the impact of DoS attacks carried out by Eve.
Figure 6. The power/subcarrier for N = 256 at the side of Bob and Eve, with/without the RIS.

5.2. Implementation Results and Analysis of the Key-Extraction Process

We compare secret key extraction performance under two scenarios: when the RIS is activated with the optimal configuration ( H o p t ) and when the RIS is turned off. The performance evaluation is based on the SBGR metric from (7) and the BMR metric from (8), at various SNR values and r = { 1 , 2 , 3 } . As presented in Figure 7a–c, the results indicate that the SBGR improves when the RIS is activated. For instance, at an SNR of 0 dB, the SBGR increases from approximately 1.62 bits/sample when the RIS is off to approximately 1.75 bits/sample when the RIS is activated (see Figure 7b). Conversely, the BMR decreases when the RIS is activated as compared to when it is kept off. For instance, at an SNR of 0 dB, the BMR drops from approximately 0.38 bits/sample when the RIS is off to approximately 0.25 bits/sample when the RIS is activated (see Figure 7e). These results demonstrate the efficacy of the RIS in enhancing secret key-extraction performance.
Figure 7. The scheme’s performance of the SBGR and the BMR at different SNRs and r = { 1 , 2 , 3 } .
The quantization order, r, can be optimized based on the estimated average SNR at the side of Bob, SNR ¯ H o p t B o b , corresponding to the optimal configuration H o p t , where SNR ¯ H o p t B o b SNR ¯ B o b in step (6) from Algorithm 1. The optimization range for an acceptable BMR 0.1 bits/sample is presented in Table 2 for scenarios where the RIS is both ON and OFF. It can be inferred that the RIS is more effective in improving the system performance in scenarios with lower SNR values than in higher SNR scenarios. This suggests that the impact of the RIS on the SNR may be limited when the SNR is already high, and other factors, such as fading and shadowing, may have a more dominant impact on the system performance. For the terminals to agree on r = 2 , the estimated average SNR should be within the range of 5 dB SNR ¯ H o p t B o b < 12 dB when the RIS is OFF, and 3 dB SNR ¯ H o p t B o b < 12 dB when the RIS is ON. When the estimated average SNR is below the specified range, both terminals can agree on r = 1 if SNR ¯ H o p t B o b < 5 dB when the RIS is OFF, and SNR ¯ H o p t B o b < 3 dB when the RIS is ON.
Table 2. The optimized SNRs for r = { 1 , 2 , 3 } , with/without the RIS, and the BMR 0.1 bits/sample.
Furthermore, the extracted bit streams are rigorously evaluated for statistical defects through the application of the well-established randomness test suite developed by the National Institute of Standards and Technology (NIST) [28]. The results of each test are presented in the form of a p-value for extracted keys with a length of 256 bits, as depicted in Table 3. These values are then compared to the predetermined significance level (0.01) to assess the degree of randomness of the extracted bit streams. It can be observed that the extracted keys exhibit satisfactory randomness properties, as their chaotic characteristics are predominantly determined by the random large integer parameters n i and m i of chaotic mapping operation in (1), selected by the individual users.
Table 3. Statistical randomness analysis of the extracted keys.

5.3. Overhead Analysis

This part presents a discussion on the execution time required for Algorithm 1 and the identification of the optimal configuration ( H o p t ) to achieve the research objective. The reflecting units of the developed RIS prototype are controlled through positive-intrinsic-negative (PIN) diodes, which switch between two-phase states. The individual control of each unit element allows for operation in the near field and channel estimation. The configuration is generated using a Hadamard codebook in MATLAB, which is transferred over WiFi using a transmission control protocol/internet protocol (TCP/IP) link to a server program running on the Raspberry Pi-3 (Model B). The clock speed of the Raspberry was optimized at 7.8 MHz, with an operational power consumption of 12–15 watts and a beam switching speed of 8 ms. Based on the updating time, the overall running time for 4096 RIS configurations is calculated as 4096 × 0.008 = 32.7 s which is acceptable as a prototype RIS with limited performance capabilities. However, this time can be significantly reduced using a high-speed field programmable gate array (FPGA) that operates at a clock speed of up to 500 MHz. Specifically, this would entail updating the control circuits of the PIN diodes to ensure compatibility with the FPGA’s clock speed. This strategy holds the potential to significantly shorten the required running time.
The security robustness of the proposed secret key-extraction scheme depends on the infeasibility of solving the Diffie–Hellman problem through the use of the Chebyshev chaotic mapping operation presented in (1) [5]. This is facilitated by the straightforward multiplication and modular arithmetic operations involved in the calculation of T n i θ i . Hence, the proposed method exhibits significantly reduced computational complexity in comparison to that of the computationally intensive elliptic curve-based Diffie–Hellman key exchanging protocol.

6. Conclusions

In this paper, we have investigated the feasibility of employing the RIS to enhance the PHY-layer secret key extraction performance in the presence of DoS attacks. We propose an optimization algorithm that leverages the RIS to boost the signals transmitted by legitimate users while suppressing the interfering signals from malicious adversaries. Furthermore, we have experimentally demonstrated the effectiveness of the proposed RIS-assisted key-extraction method using a 1-bit RIS and two USRPs. Experimental results show that this method enhances the performance of the key extraction, as quantified by two performance metrics, the SBGR and BMR. Specifically, we observed an increase in the SBGR from 1.62 to 1.75 bits/sample when the RIS is turned on and a decrease in the BMR from 0.38 to 0.25 bits/sample when the RIS is enabled at a poor SNR of 0 dB. These findings are particularly significant for future insights into secure and reliable intelligent transportation systems. Additionally, we evaluated the statistical randomness of the extracted keys using the NIST statistical test suite, confirming that the extracted keys are suitable for use as cryptographic keys. In summary, the presented results and analyses offer valuable perspectives on the practical implementation and optimization of the RISs in enhancing the security and functionality of the PHY-layer secret key extraction for poor SNR and NLoS scenarios. Our future work will examine the possibility of employing the extracted key for designing an efficient message-authentication scheme for VANET applications, exploring the practicality of implementing it in a realistic vehicular channel.

Author Contributions

Conceptualization, M.A.S., S.T.S., S.A. and A.T.; Methodology, M.A.S., S.T.S., S.A. and A.T.; Resources, Q.H.A. and M.A.I.; Formal Analysis, M.A.S. and S.T.S.; Software, M.A.S. and S.T.S.; Data Curation, M.A.S. and S.T.S.; Supervision, Q.H.A., M.H., M.A.I., S.F.H., S.A. and A.T.; Visualization, M.A.S., S.T.S., Q.H.A., S.F.H., S.A. and A.T.; Funding, M.A.I. and S.F.H.; Writing—Original Draft Preparation, M.A.S. and S.T.S.; Writing—Review and Editing, M.A.S., S.T.S., Q.H.A., M.H., M.A.I., S.F.H., S.A. and A.T. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the Egyptian Ministry of Defence.

Data Availability Statement

Data will be made available on request.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Al-Shareeda, M.A.; Anbar, M.; Hasbullah, I.H.; Manickam, S. Survey of Authentication and Privacy Schemes in Vehicular ad hoc Networks. IEEE Sens. J. 2021, 21, 2422–2433. [Google Scholar] [CrossRef]
  2. Sheikh, M.S.; Liang, J.; Wang, W. A Survey of Security Services, Attacks, and Applications for Vehicular Ad Hoc Networks (VANETs). Sensors 2019, 19, 3589. [Google Scholar] [CrossRef] [PubMed]
  3. Abbas, S.; Talib, M.A.; Ahmed, A.; Khan, F.; Ahmad, S.; Kim, D.-H. Blockchain-Based Authentication in Internet of Vehicles: A Survey. Sensors 2021, 21, 7927. [Google Scholar] [CrossRef] [PubMed]
  4. Liu, S.; Wei, G.; He, H.; Wang, H.; Chen, Y.; Hu, D.; Jiang, Y.; Chen, L. Intelligent Reflecting Surface-Assisted Physical Layer Key Generation with Deep Learning in MIMO Systems. Sensors 2023, 23, 55. [Google Scholar] [CrossRef]
  5. Shawky, M.A.; Usman, M.; Imran, M.A.; Abbasi, Q.H.; Ansari, S.; Taha, A. Adaptive Chaotic Map-Based Key Extraction for Efficient Cross-Layer Authentication in VANETs. Veh. Commun. 2023, 39, 100547. [Google Scholar] [CrossRef]
  6. Maurer, U.M. Secret key agreement by public discussion from common information. IEEE Trans. Inf. Theory 1993, 39, 733–742. [Google Scholar] [CrossRef]
  7. Wang, X.; Hao, P.; Hanzo, L. Physical-layer authentication for wireless security enhancement: Current challenges and future developments. IEEE Commun. Mag. 2016, 54, 152–158. [Google Scholar] [CrossRef]
  8. Usman, M.; Althunibat, S.; Qaraqe, M. A Channel State Information-Based Key Generation Scheme for Internet of Things. Secur. Commun. Netw. 2022, 2022, 7976319. [Google Scholar] [CrossRef]
  9. Ahlswede, R.; Csiszar, I. Common Randomness in Information Theory and Cryptography. I. Secret Sharing. IEEE Trans. Inf. Theory 1993, 39, 1121–1132. [Google Scholar] [CrossRef]
  10. Cheng, L.; Zhou, L.; Seet, B.-C.; Li, W.; Ma, D.; Wei, J. Efficient Physical-Layer Secret Key Generation and Authentication Schemes Based on Wireless Channel-Phase. Mob. Inf. Syst. (Hindawi) 2017, 2017, 7393526. [Google Scholar]
  11. Björnson, E.; Wymeersch, H.; Matthiesen, B.; Popovski, P.; Sanguinetti, L.; Carvalho, E. Reconfigurable Intelligent Surfaces: A Signal Processing Perspective with Wireless Applications. IEEE Signal Process. Mag. 2022, 39, 135–158. [Google Scholar] [CrossRef]
  12. Lin, Z.; Li, Y.; Zhang, X.; Li, Z.; Chen, X. Refracting RIS-Aided Hybrid Satellite-Terrestrial Relay Networks: Joint Beamforming Design and Optimization. IEEE Trans. Aerosp. Electron. Syst. 2022, 58, 3717–3724. [Google Scholar] [CrossRef]
  13. Lin, Z.; Lin, M.; Champagne, B.; Zhu, W.-P.; Al-Dhahir, N. Secrecy-Energy Efficient Hybrid Beamforming for Satellite-Terrestrial Integrated Networks. IEEE Trans. Commun. 2021, 69, 6345–6360. [Google Scholar] [CrossRef]
  14. Niu, H.; Li, J.; Zhang, Q.; Zhang, X.; Shen, X.S. Joint Beamforming Design for Secure RIS-Assisted IoT Networks. IEEE Internet Things J. 2023, 10, 1628–1641. [Google Scholar] [CrossRef]
  15. Shawky, M.A.; Shah, S.T.; Mollel, M.S.; Kazim, J.R.; Imran, M.A.; Abbasi, Q.H.; Ansari, S.; Taha, A. Reconfigurable Intelligent Surface-Assisted Cross-Layer Authentication for Secure and Efficient Vehicular Communications. arXiv 2023, arXiv:2303.08911. [Google Scholar] [CrossRef]
  16. Lu, X.; Lei, J.; Shi, Y.; Li, W. Intelligent Reflecting Surface Assisted Secret Key Generation. IEEE Signal Process. Lett. 2021, 28, 1036–1040. [Google Scholar] [CrossRef]
  17. Krishna, N.J.; Prasanth, N. An Insight View on Denial of Service Attacks in Vehicular Ad Hoc Networks. In Advances in Computational Intelligence and Communication Technology; Springer: Singapore, 2022; pp. 273–285. [Google Scholar]
  18. Bottarelli, M.; Epiphaniou, G.; Ismail, D.K.B.; Karadimas, P.; Al-Khateeb, H. Physical Characteristics of Wireless Communication Channels for Secret Key Establishment: A Survey of the Research. Comput. Secur. 2018, 78, 454–476. [Google Scholar] [CrossRef]
  19. Koorapaty, H.; Hassan, A.; Chennakeshu, S. Secure Information Transmission for Mobile Radio. IEEE Commun. Lett. 2000, 4, 52–55. [Google Scholar] [CrossRef]
  20. Mathur, S.; Miller, R.; Varshavsky, A.; Trappe, W.; Mandayam, N. ProxiMate: Proximity-based Secure Pairing using Ambient Wireless Signals. In Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services, Bethesda, MD, USA, 28 June–1 July 2011; pp. 211–224. [Google Scholar]
  21. Wang, Q.; Su, H.; Ren, K.; Kim, K. Fast and Scalable Secret Key Generation Exploiting Channel Phase Randomness in Wireless Networks. In Proceedings of the IEEE INFOCOM, Shanghai, China, 10–15 April 2011; pp. 1422–1430. [Google Scholar]
  22. Shehadeh, Y.; Hogrefe, D. An Optimal Guard-Intervals based Mechanism for Key Generation from Multipath Wireless Channels. In Proceedings of the 4th IFIP International Conference on New Technologies, Mobility and Security, Paris, France, 1–5 February 2011. [Google Scholar]
  23. Bottarelli, M.; Karadimas, P.; Epiphaniou, G.; Ismail, D.K.B.; Maple, C. Adaptive and Optimum Secret Key Establishment for Secure Vehicular Communications. IEEE Trans. Veh. Technol. 2021, 70, 2310–2321. [Google Scholar] [CrossRef]
  24. Shawky, M.A.; Usman, M.; Imran, M.A.; Abbasi, Q.H.; Ansari, S.; Taha, A. Adaptive and Efficient Key Extraction for Fast and Slow Fading Channels in V2V Communications. In Proceedings of the 2022 IEEE 96th Vehicular Technology Conference (VTC2022-Fall), London, UK, 26–29 September 2022; pp. 1–6. [Google Scholar]
  25. Kwon, H.; Kim, Y.; Yoon, H.; Choi, D. Optimal Cluster Expansion-Based Intrusion Tolerant System to Prevent Denial of Service Attacks. Appl. Sci. 2017, 7, 1186. [Google Scholar] [CrossRef]
  26. Kenney, J.B. Dedicated Short-Range Communications (DSRC) Standards in the United states. Proc. IEEE 2011, 99, 1162–1182. [Google Scholar] [CrossRef]
  27. You, C.; Zheng, B.; Zhang, R. Intelligent Reflecting Surface with Discrete Phase Shifts: Channel Estimation and Passive Beamforming. In Proceedings of the IEEE International Conference on Communications (ICC), Dublin, Ireland, 7–11 June 2020; pp. 1–6. [Google Scholar]
  28. NIST. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications, 800th ed.; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2001.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.