Abstract:This paper presents automatic key generation for long-range wireless communications in low power wide area networks (LPWANs), employing LoRa as a case study. Differential quantization is adopted to extract a high level of randomness. Experiments conducted both in an outdoor urban environment and in an indoor environment demonstrate that this key generation technique is applicable for LPWANs, and shows that it is able to reliably generate secure keys.Index Terms-Internet of Things, low power wide area networks,… Show more
“…The receiver calculates the power for each received transmission, through which the channel randomness can be exploited. LoRa extends key generation applications to unexplored long range communication scenarios [ 54 , 55 , 56 , 57 ]. For example, the distance between Alice and Bob is as high as 1.5 km in the experiments of [ 56 ].…”
Section: Bringing Crkg Into the Field: Securing Practical Iot Commmentioning
confidence: 99%
“…A LoRa-based key generation system is designed in [ 54 ]. The LoRa node consists of an Arduino and a LoRa Shield which uses SX1276 as the LoRa transceiver.…”
Section: Bringing Crkg Into the Field: Securing Practical Iot Commmentioning
The fifth generation (5G) and beyond wireless communications will transform many exciting applications and trigger massive data connections with private, confidential, and sensitive information. The security of wireless communications is conventionally established by cryptographic schemes and protocols in which the secret key distribution is one of the essential primitives. However, traditional cryptography-based key distribution protocols might be challenged in the 5G and beyond communications because of special features such as device-to-device and heterogeneous communications, and ultra-low latency requirements. Channel reciprocity-based key generation (CRKG) is an emerging physical layer-based technique to establish secret keys between devices. This article reviews CRKG when the 5G and beyond networks employ three candidate technologies: duplex modes, massive multiple-input multiple-output (MIMO) and mmWave communications. We identify the opportunities and challenges for CRKG and provide corresponding solutions. To further demonstrate the feasibility of CRKG in practical communication systems, we overview existing prototypes with different IoT protocols and examine their performance in real-world environments. This article shows the feasibility and promising performances of CRKG with the potential to be commercialized.
“…The receiver calculates the power for each received transmission, through which the channel randomness can be exploited. LoRa extends key generation applications to unexplored long range communication scenarios [ 54 , 55 , 56 , 57 ]. For example, the distance between Alice and Bob is as high as 1.5 km in the experiments of [ 56 ].…”
Section: Bringing Crkg Into the Field: Securing Practical Iot Commmentioning
confidence: 99%
“…A LoRa-based key generation system is designed in [ 54 ]. The LoRa node consists of an Arduino and a LoRa Shield which uses SX1276 as the LoRa transceiver.…”
Section: Bringing Crkg Into the Field: Securing Practical Iot Commmentioning
The fifth generation (5G) and beyond wireless communications will transform many exciting applications and trigger massive data connections with private, confidential, and sensitive information. The security of wireless communications is conventionally established by cryptographic schemes and protocols in which the secret key distribution is one of the essential primitives. However, traditional cryptography-based key distribution protocols might be challenged in the 5G and beyond communications because of special features such as device-to-device and heterogeneous communications, and ultra-low latency requirements. Channel reciprocity-based key generation (CRKG) is an emerging physical layer-based technique to establish secret keys between devices. This article reviews CRKG when the 5G and beyond networks employ three candidate technologies: duplex modes, massive multiple-input multiple-output (MIMO) and mmWave communications. We identify the opportunities and challenges for CRKG and provide corresponding solutions. To further demonstrate the feasibility of CRKG in practical communication systems, we overview existing prototypes with different IoT protocols and examine their performance in real-world environments. This article shows the feasibility and promising performances of CRKG with the potential to be commercialized.
“…In order to obtain correlated channel observations, key generation is usually studied with the aid of systems operating in time division duplexing (TDD) mode, e.g. Wi-Fi [6]- [9], ZigBee [4], [10]- [12], Bluetooth [13], and LoRa [14]- [16], etc. 2 A station is a device that supports Wi-Fi functions in the Wi-Fi terminology.…”
Section: Related Workmentioning
confidence: 99%
“…The National Institute of Standards and Technology (NIST) randomness test suite [31] is a popular tool for evaluating the randomness of the output of the random number generator (RNG) and pseudo random number generator (PRNG). It has been widely used in the key generation research area [8]- [10], [12]- [14], [17], [21], [28], [30], and it is also adopted in this paper.…”
Secret key generation exploits the unique random features of wireless channels, hence it is eminently suitable for the resource constrained Internet of Things applications. However, it has only been involved for single links between a pair of users, whilst there is a paucity of literature on group and multi-user key generation. This paper proposes an orthogonal frequency-division multiple access (OFDMA)-based multi-user key generation protocol to efficiently establish keys in a star topology. The uplink and downlink multi-user access facilitated by OFDMA allows the central node to simultaneously communicate with multiple users, which can significantly reduce the channel probing overhead. In particular, we provide a compelling case study of multi-user secret key generation by designing a prototype based on IEEE 802.11ax, a new Wi-Fi standard to be released. Our simulation results have demonstrated that the OFDMA-based multi-user key generation protocol incurs low interference amongst the users, whilst benefiting from channel reciprocity and generating unique random keys.
“…RFF identification and key generation thus have attracted much research interest (see [2], [3] and references therein). The authors have carried out extensive work in these areas including RFF identification for ZigBee [5], [6], key generation for WiFi [7], [8] and LoRa [9]. This paper firstly reviews the RFF identification protocol.…”
A low-complexity, yet secure framework is proposed for protecting the Internet of Things (IoT) and for achieving both authentication and secure communication. In particular, the slight random difference among transceivers is extracted for creating a unique radio frequency fingerprint and for ascertaining the unique user identity. The wireless channel between any two users is a perfect source of randomness and can be exploited as cryptographic keys. This can be applied to the physical layer of the communications protocol stack. This article reviews these protocols and shows how they can be integrated to provide a complete IoT security framework. We conclude by outlining the future challenges in applying these compelling physical layer security techniques to the IoT.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.