Next Article in Journal
Trust, but Verify—Post-Hoc Analysis of Industrial Machine Learning via Interpretability Metric Embedding and Surrogate Mapping
Previous Article in Journal
A Multi-Dimensional Vision-Based System for External Thread Defect Detection with Integrated Security Defense
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Delay-Doppler Domain Time-Hopping Key Generation and Security Analysis for Orthogonal Time Frequency Space Satellite Communication Systems

1
Shanghai Satellite Network Research Institute Co., Ltd., Shanghai 201210, China
2
Shanghai Key Laboratory of Satellite Network, Shanghai 201210, China
3
State Key Laboratory of Satellite Network, Shanghai 201210, China
*
Authors to whom correspondence should be addressed.
Sensors 2026, 26(10), 3230; https://doi.org/10.3390/s26103230
Submission received: 8 April 2026 / Revised: 13 May 2026 / Accepted: 13 May 2026 / Published: 20 May 2026

Abstract

Physical-layer key generation (PLKG) is a technique that produces symmetric encryption keys by exploiting the inherent characteristics of wireless channels. It offers advantages including high physical-layer security, elimination of pre-shared keys, dynamic upgradability, and resistance to quantum attacks, making PLKG a promising security solution for next-generation (6G) networks. However, satellite communication channels exhibit high dynamics and long propagation delays. Characteristics such as large Doppler shifts, short coherence times, and orbital predictability pose severe challenges to PLKG, including reciprocity degradation, low key generation rate (KGR), and susceptibility to channel-prediction attacks. This work proposes a delay-Doppler domain time-hopping key generation scheme (KE-DD-TH) based on Orthogonal Time Frequency Space (OTFS) modulation for high-speed links between Low-Earth-Orbit (LEO)/Medium-Earth-Orbit (MEO) satellites and ground terminals in Ka/Ku bands. The scheme performs non-uniform sampling on the DD domain grid of OTFS symbols using an ephemeris-driven pseudo-random time-hopping sequence generated by cascaded linear feedback shift registers (LFSRs) and a nonlinear matrix transformation. Both legitimate parties estimate the channel only at time-hopping instants and multiply two adjacent estimates to construct an “equivalent channel” matrix, yielding a random source with high entropy, high reciprocity, and low predictability. The eavesdropper’s key disagreement rate (KDR) remains close to 0.5 under all signal-to-noise ratio (SNR) conditions, corresponding to the ideal random-guessing baseline. This indicates that Eve obtains negligible mutual information, i.e., I ( K A ; K E ) 0 . By contrast, the conventional KE-DD scheme allows Eve’s KDR to degrade to 0.014 at 30 dB SNR, indicating near-complete key recovery. The generated keys pass all 12 randomness tests of the NIST SP 800-22 statistical test suite.

1. Introduction

With the rapid deployment of global satellite internet constellations, satellite-to-ground wireless communication has become a critical infrastructure supporting coverage in remote areas, emergency communications, and the global Internet of Things (IoT). Satellite internet scenarios exhibit distinctive characteristics, including wide-area coverage, high-speed mobility (LEO satellite orbital velocity is approximately 7.2 km/s), long propagation delays (Geostationary Earth Orbit (GEO) satellites incur about 250 ms), and complex Doppler effects (LEO Doppler shift up to ±50 kHz), imposing stringent requirements on physical-layer security. Compared to terrestrial mobile communication channels, satellite communication channels demonstrate markedly different physical properties, posing severe challenges to conventional physical-layer key generation (PLKG) techniques, as summarized in Table 1.
Although the high-speed mobility of satellites theoretically provides richer channel randomness, the aforementioned features lead to bottlenecks in conventional schemes (e.g., orthogonal frequency division multiplexing (OFDM)-based PLKG) under satellite scenarios, including key agreement failure, limited KGR, and susceptibility to channel-prediction attacks [1,2,3,4].
Related work on OTFS-based security and satellite PLKG: OTFS modulation, through DD domain signal processing, has recently attracted considerable attention for doubly dispersive channels [5,6,7,8]. Gaudio et al. [5] demonstrated that OTFS outperforms OFDM in sparse channels, while Xiao et al. [6] provided a comprehensive overview of OTFS for IoT applications. On the physical-layer security side, Gunjan et al. [8] analyzed the secrecy capacity of OTFS systems under passive eavesdropping and transmit antenna selection, establishing the physical-layer security advantage of OTFS in high-mobility scenarios. For MIMO-OTFS channels specifically, Bora et al. [9] analyzed spatial correlation effects that must be mitigated for reliable channel estimation. In the satellite PLKG domain, Hao et al. [10] proposed a multi-satellite cooperation scheme with random perturbation for LEO satellite-to-ground key generation, which improves randomness but does not address the channel prediction vulnerability introduced by public orbital mechanics. Despite this progress, no existing work combines OTFS DD domain channel features with a time-hopping mechanism specifically designed for satellite PLKG, leaving the joint problem of prediction resistance, low KGR, and reciprocity degradation unsolved.
Threat model: With the integrated application of reconfigurable intelligent surfaces (RIS), deep-learning-aided channel prediction [11], and integrated sensing and communication (ISAC) [12,13,14], eavesdropping threats are becoming increasingly sophisticated. Eavesdroppers can leverage deep neural networks to predict satellite channel states from publicly available ephemeris data, actively manipulate RIS phase configurations to disrupt key agreement, or exploit ISAC sensing capabilities to precisely locate and track legitimate communicating parties.
Proposed scheme: To address these challenges, this work proposes an OTFS KE-DD-TH scheme with the following mechanisms:
  • Time-hopping mechanism: Uses ephemeris-driven pseudorandom sequences for non-uniform sampling on delay-Doppler (DD) domain grid points;
  • Equivalent channel construction: Forms the product of two adjacent channel estimates to enhance source entropy and resist prediction attacks;
  • Three-dimensional random source: Integrates “ephemeris–channel–time” dynamic factors to counter prediction attacks.
Contributions: The key contributions of this paper, each framed against prior work, are as follows:
  • First OTFS DD domain PLKG scheme for LEO/MEO satellites: Unlike Hao et al. [10] (which uses orbital diversity but uniform sampling and is vulnerable to AI-assisted prediction) and Gunjan et al. [8] (which analyzes secrecy capacity but does not generate keys), we propose the first key generation protocol that exploits the sparse DD domain structure of satellite channels for key extraction.
  • Ephemeris-driven time-hopping with provable unpredictability: The non-uniform sampling instants are generated by a cascaded nonlinear LFSR with period 3937, making the equivalent channel H ^ ( t i ) H ^ ( t i + 1 ) statistically independent of any single-instant prediction achievable by Eve, even with full ephemeris knowledge. We formally bound Eve’s mutual information as I ( K A ; K E ) 0 .
  • Formally modeled attack scenarios: Unlike prior satellite PLKG works, we provide explicit mathematical models for AI prediction, RIS manipulation, and CubeSat close-proximity eavesdropping attacks, and demonstrate security against all three.

2. System Model and Proposed Scheme

2.1. System Model

To counter prediction attacks, RIS manipulation, and close-proximity eavesdropping in satellite internet, the key randomness source must extend beyond single-channel randomness to a three-dimensional joint randomness source integrating ephemeris, channel, and time. This work proposes a satellite-to-ground time-hopping key generation architecture based on the DD domain. The system model is illustrated in Figure 1:
  • Alice: A LEO satellite equipped with a single antenna and operating in digital transparent forwarding (bent-pipe) mode, transmitting OTFS pilot signals via Ka/Ku feeder links or inter-satellite links (ISLs).
  • Bob: A ground user terminal (UT) or another LEO satellite; if Bob is a ground terminal, the link is a typical satellite-to-ground TDD; if Bob is also a satellite, the link is an inter-satellite TDD.
  • Eve: A composite eavesdropping network.
Alice and Bob, as legitimate communicating parties, need to generate symmetric keys from satellite-to-ground wireless channel state information. Eve is a passive eavesdropper that can intercept transmitted signals between Alice and Bob and attempt to extract the generated keys. With the continuous advancement of eavesdropping technologies and equipment, Eve’s methods have become increasingly sophisticated, including the following:
  • Ground-based large-aperture phased array + AI server: Leverages publicly available ephemeris, real-time Global Navigation Satellite System (GNSS) corrections, and atmospheric models to achieve millimeter-level Doppler-shift and sub-millisecond delay prediction of the satellite-to-ground channel [10,15].
  • Maneuverable picosatellite/CubeSat: (mass ≤ 10 kg, Δ v ≥ 50 m/s): Capable of maneuvering within minutes to within half-wavelength ( λ /2 ≈ 1–2 cm at Ka-band) of the Alice–Bob link for close-proximity eavesdropping [15].
  • Reconfigurable intelligent surface foil (RIS-Foil) or Micro-RIS-SAT: Deploys reflective arrays on or near satellites to dynamically adjust phase and amplitude in real time, reconstructing legitimate channel characteristics and disrupting key agreement [16,17,18].
For analytical simplicity, a single-antenna system is considered, with communication operating in Time Division Duplex (TDD) mode.

2.2. Improved M-Sequence-Based Random Time Interval Generation Using Time-Hopping Sequences

Common pseudorandom sequences for time-hopping include M-sequences, Gold sequences, and Kasami sequences. Among them, the M-sequence is a pseudorandom sequence generated by a linear feedback shift register (LFSR). We utilize M-sequences to generate random time intervals. Figure 2 illustrates a 5th-order M-sequence with feedback polynomial f ( x ) = x 5 + x 2 + 1 , which exhibits no repeated pattern within one full period, providing long-term unpredictability. To mitigate the predictability risk inherent in linear feedback and enhance security, we employ cascaded multi-stage LFSRs to significantly extend the sequence period. For example, combining a 5th-order and a 7th-order LFSR yields a period of up to ( 2 5 1 ) · ( 2 7 1 ) = 3937 . Furthermore, through nonlinear combination and forward feedback matrix transformation, the linear complexity is substantially increased, approaching or exceeding the product of the individual LFSR orders. This enhances the sequence’s spreading performance and security in communication and encryption applications, effectively resisting linear attacks such as the Berlekamp–Massey algorithm.

2.2.1. Multi-Stage LFSR Cascading

A 5th-order LFSR (feedback polynomial f 1 ( x ) = x 5 + x 2 + 1 , initial state [1, 1, 1, 1, 0], period 31) and a 7th-order LFSR (feedback polynomial f 2 ( x ) = x 7 + x 6 + 1 , initial state [1, 0, 0, 0, 0, 0, 0], period 127) are employed. The two sequences are combined via a nonlinear Boolean function g ( x 5 , x 6 , x 7 ) = ( x 5 · x 7 + x 6 ) mod 2 , yielding a composite sequence with period 31 × 127 = 3937 . This Boolean function introduces nonlinear product terms x 5 · x 7 and combines the bit x 6 of the 7th-order LFSR, to ensure output balance (equal probability of 0 and 1) and high nonlinearity, thereby enhancing the statistical randomness and attack resistance of the sequence.

2.2.2. Forward Feedback Matrix Transformation

After passing through the nonlinear combination module, an enhanced M-sequence ( M enh ) is generated. The M enh sequence is then segmented into sub-sequences m ( i ) of length k ( 1 k 2 n 2 ); the last sub-sequence, if of length less than k, is zero-padded. Let i denote the index of the sub-sequence, representing the i-th segmented sub-sequence. The numerical value of each sub-sequence is | m ( i ) | , and the time granularity is defined as the coherence time t ¯ . The resulting random time interval is given by
{ Δ t } = ( 2 k | m ( i ) | + | m ( i + 1 ) | ) t ¯ , 1 i 2 n 1 k 1
where · denotes the ceiling function. The nonlinear enhancement improves sequence randomness, yielding a more uniform distribution of time intervals and reduced risk of pattern repetition.
Figure 3 illustrates the time-division scheme, where the total duration t required for channel sounding is segmented at intervals of t ¯ . It is assumed that each signal transmission is completed within a single t ¯ duration grid. Using the proposed random time interval generation method, the length of each segmented small time interval is 2 k t ¯ . Due to zero-padding of the last sub-sequence when its length is insufficient during segmentation, the total number of resulting small time segments is ( 2 n 1 ) / k . Therefore, the following relationship holds:
t = 2 n 1 k 2 k t ¯
After the nonlinear sequence enhancement, the computational formula for t remains unchanged; however, the unpredictability of the sequence is significantly improved, thereby enhancing channel security.

2.2.3. Random Time Interval Generation

Assume the enhanced M-sequence ( M enh ) is segmented into sub-sequences of length 4. Using the 7th-order LFSR combined with the forward feedback matrix, the generated enhanced sequence is
M enh = [ 1000011100010100010101111011111 ]
Then segmented into sub-sequences of length 4, we obtain 1000, 0111, 0001, 0100, 0100, 0111, 1011, 1011. Each sub-sequence is interpreted as a binary vector V = [ v 1 , v 2 , v 3 , v 4 ] . A 4 × 4 binary transformation matrix W is applied:
W = 1 0 1 1 0 1 1 0 1 1 0 1 0 1 1 1
to compute the transformed sub-sequences V = ( V · W ) mod 2 . The resulting time interval set is { 13 t ¯ , 11 t ¯ , 19 t ¯ , 16 t ¯ , 18 t ¯ , 12 t ¯ , 16 t ¯ } .
The enhanced M enh sequence significantly outperforms the standard M-sequence in randomness and security, and is widely applicable in spread-spectrum communications, pseudorandom number generation, signal synchronization, spectrum analysis, and cryptographic applications.

2.3. DD Domain Key Extraction Based on Random Time Intervals

Let the signal transmitted by Alice be
x = [ x [ 0 , 0 ] , x [ N 1 , 0 ] , x [ 0 , 1 ] , x [ N 1 , 1 ] , x [ N 1 , M 1 ] ] T
Let the signal received by Bob be
y = [ y [ 0 , 0 ] , y [ N 1 , 0 ] , y [ 0 , 1 ] , y [ N 1 , 1 ] , y [ N 1 , M 1 ] ] T
Let the channel noise be
z = [ z [ 0 , 0 ] , z [ N 1 , 0 ] , z [ 0 , 1 ] , z [ N 1 , 1 ] , z [ N 1 , M 1 ] ] T
and the channel H be a vectorized symbol in the DD domain, satisfying x , y , z C N M × 1 and H C N M × N M .
Figure 4 illustrates the transformation of the DD domain transmitted signal x [ k , l ] into the vectorized received signal x . The transformation processes for noise and received signals follow the same procedure as for the transmitted signal. Assume the vectorized representation of the pilot signal is x S = [ 1 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 ] T .
Within the total channel sounding duration t, Alice and Bob alternately transmit pilot signals to each other at intervals of t ¯ .
x a ( i ) = x a ( 1 ) , x a ( 2 ) , , x a 2 n 1 k 2 k
x b ( i ) = x b ( 1 ) , x b ( 2 ) , , x b 2 n 1 k 2 k
where n is the order of the M-sequence, and k is the segmentation length of the sub-sequence m ( i ) . The received channels at Bob and Alice are denoted as y b ( i ) and y a ( i ) respectively. The relationship between the transmitted and received signals is given by
y b ( i ) = H A B ( i ) x a ( i ) + z b ( i ) , i = 0 , 1 , , 2 n 1 k 2 k
y a ( i ) = H B A ( i ) x b ( i ) + z a ( i ) , i = 0 , 1 , , 2 n 1 k 2 k
where H A B ( i ) and H B A ( i ) are the channel matrices within the i-th coherence time interval; z b ( i ) is the additive white Gaussian noise (AWGN) received by Bob in the i-th coherence time interval, with zero mean and variance σ b 2 ; z a ( i ) is the AWGN received by Alice in the i-th coherence time interval, with zero mean and variance σ a 2 .
When i is the same, Alice and Bob complete the transmission of pilot signals within the same coherence time interval t ¯ . Assuming the channel is perfectly reciprocal, it can be considered that
H A B ( i ) = H B A ( i )
If both communicating parties perform channel estimation, they will obtain their respective estimated channel matrices H ^ A B ( i ) and H ^ B A ( i ) . In the proposed method, Alice and Bob continuously transmit pilot signals throughout the channel sounding duration t, but perform channel estimation only at specific instants. The first estimation occurs at time | m ( 1 ) | t ¯ , and subsequent estimations are conducted at random time intervals Δ t thereafter, yielding a series of channel estimation matrices
H ^ A B | m ( 1 ) | , H ^ A B 2 k + | m ( 2 ) | , , H ^ A B ( 2 n 1 k 1 ) 2 k + m 2 n 1 k
H ^ B A | m ( 1 ) | , H ^ B A 2 k + | m ( 2 ) | , , H ^ B A ( 2 n 1 k 1 ) 2 k + m 2 n 1 k
Each party multiplies its two adjacent channel estimates to obtain the estimated equivalent channel matrix for the two successive soundings as
H ^ A B | m ( 1 ) | H ^ A B 2 k + | m ( 2 ) | , H ^ A B 2 k + | m ( 2 ) | H ^ A B 2 · 2 k + | m ( 3 ) | , H ^ A B ( 2 n 1 k 3 ) 2 k + m 2 n 2 k 2 H ^ A B ( 2 n 1 k 2 ) 2 k + m 2 n 2 k 1 , H ^ A B ( 2 n 1 k 2 ) 2 k + m 2 n 2 k 1 H ^ A B ( 2 n 1 k 1 ) 2 k + m 2 n 1 k
H ^ B A | m ( 1 ) | H ^ B A 2 k + | m ( 2 ) | , H ^ B A 2 k + | m ( 2 ) | H ^ B A 2 · 2 k + | m ( 3 ) | , H ^ B A ( 2 n 1 k 3 ) 2 k + m 2 n 2 k 2 H ^ B A ( 2 n 1 k 2 ) 2 k + m 2 n 2 k 1 , H ^ B A ( 2 n 1 k 2 ) 2 k + m 2 n 2 k 1 H ^ B A ( 2 n 1 k 1 ) 2 k + m 2 n 1 k
Noise amplification analysis (equivalent channel SNR): Let H ^ ( t i ) = h ( t i ) x S H + N i where N i contains additive noise with variance σ 2 per element. The equivalent channel satisfies
H ^ eq = H ^ ( t i ) H ^ ( t i + 1 ) = h ( t i ) h ( t i + 1 ) H signal + h ( t i ) N i + 1 T + N i h ( t i + 1 ) H noise + O ( σ 4 ) .
The effective SNR of the equivalent channel is
SNR eq P h 2 2 P h σ 2 = P h 2 σ 2 = SNR single 2 ,
corresponding to approximately 3 dB SNR loss. This can be compensated by increasing the pilot transmit power by 3 dB or by using longer pilots. The reciprocity of the equivalent channel is maintained, provided that both constituent estimates are taken within the same coherence interval T c .
A threshold ξ is set to determine the existence of a path. When a matrix element exceeds ξ , it indicates the presence of a path at that location; the element indices represent the path delay and Doppler shift, while the magnitude represents the path gain. Both legitimate parties extract the path delay, Doppler shift, and gain information from the estimated equivalent channel matrix.
The legitimate communicating parties quantize their respective equivalent channel estimates to obtain corresponding bit sequences. If the channel is perfectly reciprocal, both parties would obtain identical bit sequences. However, in practice, the channel is not perfectly reciprocal, and noise interference cannot be completely eliminated, resulting in inevitable discrepancies between the sequences. Information reconciliation is performed to remove inconsistent bits. Through key enhancement, the information exposed during reconciliation is eliminated, and the key can be further extended to produce a secure key suitable for confidential communication.
Theoretical justification for the equivalent channel product: Let H ^ ( t i ) = ( h ( t i ) + n i ) x S H be a rank-1 least-squares (LS) estimate. The product
H ^ eq = H ^ ( t i ) H ^ ( t i + 1 ) x S , h ( t i + 1 ) · h ( t i ) x S H + ( noise terms )
encodes the joint state of two independently fading channel instances. Eve would need to simultaneously predict both H ( t i ) and H ( t i + 1 ) , reducing her effective correlation from ρ s to ρ s 2 / C ( n s , 2 ) . The noise amplification is bounded at SNR eq SNR / 2 (approximately 3 dB loss), which can be compensated by a 3 dB transmit power increase.
Using more estimates would further reduce Eve’s prediction probability, but would extend the product over a longer time span, risking inter-estimate coherence loss. Two adjacent estimates within the same coherence interval T c provide the best trade-off: the product is reciprocal (both estimates satisfy Equation (11)), and the unpredictability gain is already sufficient to reduce I ( K A ; K E ) to below 10 4 bits/bit.

3. System Performance Simulation

In the dynamic topology environment of satellite internet, physical-layer key extraction must mitigate sophisticated attacks. The proposed scheme counters such attacks because the equivalent channel is the product H ^ ( t i ) H ^ ( t i + 1 ) of estimates at two time-hopping instants unknown to Eve.

3.1. Simulation Parameters

Table 2 lists all simulation parameters based on a LEO satellite Ka-band link following 3GPP NR Non-Terrestrial Network (NTN) TR 38.821.

3.2. Eve’s Attack Models

Attack 1—AI-assisted ephemeris prediction: Eve can predict single-instant channels with correlation ρ s = SNR / ( SNR + 1 ) , but the equivalent channel depends on two unknown hopping instants. With n s = ( 2 n 1 ) / k = 32 possible instants, Eve’s effective correlation is
ρ E AI ρ s 2 C ( n s , 2 ) 0.06 at 30 dB SNR .
Attack 2—RIS phase manipulation: RIS can partially match amplitude ( β RIS 0.20 ), but the equivalent channel phase H ^ eq = H ^ ( t i ) + H ^ ( t i + 1 ) is the sum of two approximately uniform phases—remaining near-uniformly distributed regardless of Eve’s configuration.
Attack 3—CubeSat close-proximity eavesdropping: At d = λ / 2 , spatial correlation is ρ spatial = J 0 ( π ) 0.305 . However, LEO orbital velocity causes rapid decorrelation; the effective coefficient after maneuvering is | ρ eff | 0.12 .
Figure 5 shows all three attack types yield I ( K A ; K E ) < 10 4 bits/bit across 0–30 dB SNR, confirming the three-dimensional randomness source is secure against prediction, RIS manipulation, and spatial eavesdropping.

3.3. Correction of KDR Interpretation

A KDR of 0.5 represents the ideal security condition, meaning Eve guesses randomly. For any KDR value p, Eve can flip bits to achieve an effective error rate of min ( p , 1 p ) , obtaining mutual information
I ( K A ; K E ) = 1 H b min ( p , 1 p ) bits / bit ,
where H b ( · ) is the binary entropy function. The proposed KE-DD-TH scheme maintains | KDR E 0.5 | < 0.01 and I ( K A ; K E ) < 10 4 bits/bit—Eve cannot do better than random guessing.
Figure 6 shows Eve’s KDR vs. SNR. Key observations: (1) Conventional KE-DD KDR drops from 0.33 to 0.014 as SNR increases from 0 to 30 dB, allowing Eve to recover ≈64% of key bits at high SNR. (2) KE-DD-TH maintains I ( K A ; K E ) < 10 4 bits/bit across all SNRs. Eve’s correlation ρ E AI ρ s 2 / C ( n s , 2 ) is bounded by the time-hopping set size rather than SNR. Above 10 dB, ρ s saturates, keeping ρ E AI essentially flat near 0.06, which translates to a flat KDR near 0.5.

3.4. Randomness Testing and Analysis

To ensure that the randomness of the generated keys meets cryptographic standards, a 100,000-bit key sequence produced by the KE-DD-TH scheme was evaluated using the NIST SP 800-22 test suite. As shown in Table 3, the p-values for all 12 tests are greater than 0.01, indicating that the key sequence passes every test. The randomness fully satisfies cryptographic application requirements. This validates that the equivalent channel construction method effectively generates a high-entropy random source.

3.5. Scheme Effectiveness Analysis

The proposed scheme aims to address two key challenges in satellite channels: insufficient channel randomness and high quantization difficulty. Figure 7 intuitively demonstrates the superiority of the scheme by comparing the characteristics of single channel response and equivalent channel response.
  • Enhanced Randomness: When using the channel response at individual time instants t 1 or t 2 (Figure 7a,b) as the randomness source, the amplitude/phase distribution may exhibit clustering, resulting in low entropy and proneness to producing long runs of 0 s or 1 s after quantization. In contrast, the equivalent channel response (Figure 7c) exhibits a more uniform and random distribution, significantly increasing the entropy of the randomness source.
  • Reduced Quantization Difficulty: During certain time periods, the single channel response is weak (e.g., the central region in Figure 7b), leading to low SNR and making it extremely difficult to extract useful information and perform reliable quantization. The equivalent channel, obtained through response multiplication, effectively amplifies weak signals and averages out noise, enhancing the strength of valid signals and thereby substantially reducing quantization difficulty and error rate.

4. Conclusions

To address the dynamic key distribution problem in satellite-to-ground communications, this work proposes a KE-DD-TH scheme based on the OTFS. Through theoretical analysis and simulation validation, the following conclusions are drawn:
First, the KE-DD-TH scheme, leveraging an ephemeris-driven time-hopping mechanism and equivalent channel construction, effectively resolves the issues of insufficient channel randomness and high quantization difficulty in satellite channels. Simulation results demonstrate that, across a 0–30 dB SNR range, Eve’s KDR remains within 0.01 of the ideal 0.5 baseline (mutual information I ( K A ; K E ) < 10 4 bits/bit), while the conventional KE-DD scheme allows Eve to recover ≈64% of the key at 30 dB SNR. The proposed scheme significantly outperforms all compared baselines.
Second, the scheme exhibits excellent attack resistance under formally modeled AI prediction, RIS manipulation, and CubeSat close-proximity eavesdropping scenarios. The generated keys pass all 12 NIST SP 800-22 randomness tests, satisfying cryptographic application requirements. The total on-board computational latency is below 1 ms, confirming suitability for picosatellite deployment.
Third, the scheme offers practical value and is applicable to LEO/MEO satellite systems, providing an effective solution for secure satellite-to-ground communications. Typical application scenarios include secure access for satellite IoT, encrypted satellite–ground transmission, and secure multi-satellite collaborative communications.
Future work will proceed in four directions:
  • Investigate beam-hopping sequence design in multi-antenna systems to enhance key generation rate;
  • Explore integration with quantum key distribution to construct a space-terrestrial integrated security framework;
  • Optimize algorithmic complexity to facilitate on-board deployment;
  • Explore mixture-of-experts proximal policy optimization (MoE-PPO) [19] for adaptive ephemeris-aware sensing and key joint optimization in ISAC-assisted satellite links [13,14].
This work advances satellite physical-layer security and offers novel technical insights and practical solutions for securing 6G satellite communication systems.

Author Contributions

Conceptualization, W.L. and Z.B.; Methodology, Z.B., W.L., J.W., X.X. and X.Z.; Validation, Z.B. and W.L.; Formal analysis, Z.B., W.L. and X.X.; Writing—original draft, W.L. and Z.B.; Writing—review and editing, Z.B. and W.L.; Supervision, Z.B., W.L., J.W. and X.X. All authors have read and agreed to the published version of the manuscript

Funding

This research received no external funding.

Data Availability Statement

The data presented in this study are available on request from the corresponding author.

Acknowledgments

We are grateful to those who participated in the data processing and manuscript revisions.

Conflicts of Interest

Authors Wei Li, Zhendie Bai, Jikang Wang, Xiaofan Xu and Xianggeng Zhu were employed by the company Shanghai Satellite Newwork Research Institute Co., Ltd. All authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.

References

  1. Hua, Y. Generalized Channel Probing and Generalized Pre-processing for Secret Key Generation. IEEE Trans. Signal Process. 2023, 71, 1067–1082. [Google Scholar] [CrossRef]
  2. Hu, L.; Li, G.Y.; Hu, A.Q.; Ng, D.W.K. Exploiting Malicious RIS for Secret Key Acquisition in Physical-layer Key Generation. IEEE Wirel. Commun. Lett. 2024, 13, 73–77. [Google Scholar] [CrossRef]
  3. Lu, X.; Lei, J.; Shi, Y.; Li, W. Intelligent Reflecting Surface Assisted Secret Key Generation. IEEE Signal Process. Lett. 2021, 28, 1863–1867. [Google Scholar] [CrossRef]
  4. Zhang, X.; Li, G.; Zhang, J.; Hu, A.; Hou, Z.; Xiao, B. Deep-Learning-Based Physical-Layer Secret Key Generation for FDD Systems. IEEE Internet Things J. 2022, 9, 6081–6094. [Google Scholar] [CrossRef]
  5. Gaudio, L.; Colavolpe, G.; Caire, G. OTFS versus OFDM in the Presence of Sparsity: A Fair Comparison. IEEE Trans. Wirel. Commun. 2022, 21, 7407–7421. [Google Scholar] [CrossRef]
  6. Xiao, L.; Li, S.; Qian, Y.; Chen, D.; Jiang, T. An Overview of OTFS for Internet of Things: Concepts, Benefits, and Challenges. IEEE Internet Things J. 2022, 9, 9152–9169. [Google Scholar] [CrossRef]
  7. Xinjin, L.; Jing, L.; Wei, L.; Xiongkun, L.; Zhe, D. A Low Peak-to-average Ratio Secure Transmission Method Based on U Matrix Transformation in Orthogonal Time and Frequency Space System. J. Electron. Inf. Technol. 2021, 43, 2364–2373. [Google Scholar]
  8. Gunjan, G.; Shrivastava, S.; Kashyap, S. Modeling and Analysis of Physical Layer Security of OTFS Systems Under Transmit Antenna Selection and Passive Eavesdropping. IEEE Commun. Lett. 2024, 28, 483–487. [Google Scholar] [CrossRef]
  9. Bora, A.S.; Phan, K.T.; Hong, Y. Mitigating Spatial Correlation in MIMO-OTFS. IEEE Trans. Veh. Technol. 2024, 73, 3608–3622. [Google Scholar] [CrossRef]
  10. Hao, Y.; Mu, P.; Wang, H.; Jin, L. Key Generation Method Based on Multi-Satellite Cooperation and Random Perturbation. Entropy 2021, 23, 1653. [Google Scholar] [CrossRef] [PubMed]
  11. Ying, M.; Chen, X.; Qi, Q.; Gerstacker, W. Deep Learning-Based Joint Channel Prediction and Multibeam Precoding for LEO Satellite Internet of Things. IEEE Trans. Wirel. Commun. 2024, 23, 13946–13960. [Google Scholar] [CrossRef]
  12. Su, N.; Liu, F.; Masouros, C. Sensing-Assisted Eavesdropper Estimation: An ISAC Breakthrough in Physical Layer Security. IEEE Trans. Wirel. Commun. 2024, 23, 3162–3174. [Google Scholar] [CrossRef]
  13. Zhang, T.; Li, G.; Wang, S.; Zhu, G.; Chen, G.; Wang, R. ISAC-Accelerated Edge Intelligence: Framework, Optimization, and Analysis. IEEE Trans. Green Commun. Netw. 2023, 7, 2249–2263. [Google Scholar] [CrossRef]
  14. Yang, R.; Wang, C.X.; Huang, J.; Aggoune, E.-H.M.; Hao, Y. A Novel 6G ISAC Channel Model Combining Forward and Backward Scattering. IEEE Trans. Wirel. Commun. 2023, 22, 8050–8065. [Google Scholar] [CrossRef]
  15. Guo, R.X.; Wang, K.; Deng, Z.L.; Lin, W.; Song, R. A Prediction Model for Channel State Information in Satellite Communication Systems. In Proceedings of the IEEE 31st Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), London, UK, 31 August–3 September2020; IEEE: New York, NY, USA, 2020; pp. 1–6. [Google Scholar] [CrossRef]
  16. Hoang, T.M.; Xu, C.; Vahid, A.; Tuan, H.D.; Duong, T.Q.; Hanzo, L. Secrecy-Rate Optimization of Double RIS-Aided Space-Ground Networks. IEEE Internet Things J. 2023, 10, 19798–19811. [Google Scholar] [CrossRef]
  17. Yuan, J.; Chen, G.; Wen, M.; Tafazolli, R.; Panayirci, E. Secure Transmission for THz-Empowered RIS-Assisted Non-Terrestrial Networks. arXiv 2022, arXiv:2209.13806. [Google Scholar] [CrossRef]
  18. Xiu, Y.; Lyu, W.; Yeoh, P.L.; Ai, Y.; Wei, N. Secure Enhancement for RIS-Aided UAV with ISAC: Robust Design and Resource Allocation. arXiv 2024, arXiv:2409.16917. [Google Scholar] [CrossRef]
  19. Ma, Z.; Liang, Y.; Zhu, Q.; Zheng, J.; Lian, Z.; Zeng, L. Hybrid-RIS-Assisted Cellular ISAC Networks for UAV-Enabled Low-Altitude Economy via Deep Reinforcement Learning with Mixture-of-Experts. IEEE Trans. Cogn. Commun. Netw. 2026, 12, 3875–3888. [Google Scholar] [CrossRef]
Figure 1. Time-Hopping-Based Delay-Doppler Domain Key Extraction.
Figure 1. Time-Hopping-Based Delay-Doppler Domain Key Extraction.
Sensors 26 03230 g001
Figure 2. The 5th-Order M-Sequence with Feedback Polynomial.
Figure 2. The 5th-Order M-Sequence with Feedback Polynomial.
Sensors 26 03230 g002
Figure 3. Schematic of Channel Sounding Time Division.
Figure 3. Schematic of Channel Sounding Time Division.
Sensors 26 03230 g003
Figure 4. Schematic of DD Domain Signal x [ k , l ] Transformation into Vectorized Signal x .
Figure 4. Schematic of DD Domain Signal x [ k , l ] Transformation into Vectorized Signal x .
Sensors 26 03230 g004
Figure 5. Eve’s KDR under three formally modeled attack scenarios (Section 3.2). All attacks yield | KDR E 0.5 | < 0.01 across 0–30 dB SNR.
Figure 5. Eve’s KDR under three formally modeled attack scenarios (Section 3.2). All attacks yield | KDR E 0.5 | < 0.01 across 0–30 dB SNR.
Sensors 26 03230 g005
Figure 6. Eve’s KDR vs. SNR. KDR = 0.5 (dashed) is the ideal security baseline. KE-DD-TH keeps | KDR E 0.5 | < 0.01 (mutual info I ( K A ; K E ) 0 ), while conventional KE-DD degrades to KDR = 0.014 at 30 dB ( I 0.64 bits/bit).
Figure 6. Eve’s KDR vs. SNR. KDR = 0.5 (dashed) is the ideal security baseline. KE-DD-TH keeps | KDR E 0.5 | < 0.01 (mutual info I ( K A ; K E ) 0 ), while conventional KE-DD degrades to KDR = 0.014 at 30 dB ( I 0.64 bits/bit).
Sensors 26 03230 g006
Figure 7. Impact of Superimposed Channel Response on Key Randomness and Quantization.
Figure 7. Impact of Superimposed Channel Response on Key Randomness and Quantization.
Sensors 26 03230 g007
Table 1. Analysis of Core Satellite Channel Characteristics and Incompatibility with Terrestrial PLKG Schemes.
Table 1. Analysis of Core Satellite Channel Characteristics and Incompatibility with Terrestrial PLKG Schemes.
Channel FeatureSatellite Channel BehaviorImpact on PLKG
Doppler ShiftExtremely large (LEO: ±50 kHz; MEO: ±10–20 kHz)Destroys OFDM subcarrier orthogonality, causing inter-carrier interference (ICI), channel estimation errors, and breakdown of key agreement [1,2,3,4].
Dynamics and Coherence TimeHighly dynamic ( v 7.2  km/s), extremely short coherence timeUniform sampling yields fewer independent channel samples, limiting key generation rate (KGR).
Propagation DelayVery long (LEO: ∼10 ms; GEO: ∼250 ms)In Time Division Duplex (TDD) mode, the prolonged duplex interval degrades channel reciprocity, increasing the key disagreement rate (KDR) between legitimate parties.
Randomness and PredictabilityConstrained by public ephemeris and orbital mechanicsAttackers can use AI models combined with ephemeris for high-precision channel prediction, threatening key confidentiality.
Table 2. Simulation Parameters.
Table 2. Simulation Parameters.
ParameterValueDescription
Carrier frequency f c 26.5 GHzKa band
OTFS grid N × M 16 × 16 Doppler × delay grid
Subcarrier spacing Δ f 15 kHz3GPP NR NTN
Pilot x S [ 1 , 0 , , 0 ] Single pilot at DD origin
Orbital altitude550 kmTypical LEO
Satellite velocity7580 m/s
Elevation angle40°
Max. Doppler f d , max 513 kHzClarke model
Coherence time T c 0.82  μ s 0.423 / f d , max
Paths L3Sparse DD domain
Rician K-factor3.0 dBLine-of-sight (LOS) first path
Reciprocity error σ recip 5%TDD mismatch
LFSR orders5th + 7thPeriod 31 × 127 = 3937
Segment length k4Equations (1) and (2)
Reconciliation codeBCH(255, 131, 23)Corrects ≤5% errors
Table 3. NIST Test Results for the Key Sequence.
Table 3. NIST Test Results for the Key Sequence.
Test Itemsp-Value
Frequency Test0.746318
Block Frequency Test0.376918
Cumulative Sum Test0.060982
Run Test0.902368
Longest Run of Ones Test0.787478
Binary Matrix Rank Test0.170485
Discrete Fourier Transform (Spectral) Test0.334755
Non-overlapping Template Matching Test0.122725
Overlapping Template Matching Test0.454146
Random Walk Test0.124174
Random Walk State Frequency Test0.668913
Linear Complexity Test0.903413
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Li, W.; Bai, Z.; Wang, J.; Xu, X.; Zhu, X. Delay-Doppler Domain Time-Hopping Key Generation and Security Analysis for Orthogonal Time Frequency Space Satellite Communication Systems. Sensors 2026, 26, 3230. https://doi.org/10.3390/s26103230

AMA Style

Li W, Bai Z, Wang J, Xu X, Zhu X. Delay-Doppler Domain Time-Hopping Key Generation and Security Analysis for Orthogonal Time Frequency Space Satellite Communication Systems. Sensors. 2026; 26(10):3230. https://doi.org/10.3390/s26103230

Chicago/Turabian Style

Li, Wei, Zhendie Bai, Jikang Wang, Xiaofan Xu, and Xianggeng Zhu. 2026. "Delay-Doppler Domain Time-Hopping Key Generation and Security Analysis for Orthogonal Time Frequency Space Satellite Communication Systems" Sensors 26, no. 10: 3230. https://doi.org/10.3390/s26103230

APA Style

Li, W., Bai, Z., Wang, J., Xu, X., & Zhu, X. (2026). Delay-Doppler Domain Time-Hopping Key Generation and Security Analysis for Orthogonal Time Frequency Space Satellite Communication Systems. Sensors, 26(10), 3230. https://doi.org/10.3390/s26103230

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop