TY - GEN
T1 - Secure Key Distribution Scheme in IoT Networks Exploiting Channel State Information
AU - Alshamaseen, Tasneem
AU - Althunibat, Saud
AU - Qaraqe, Marwa
AU - Illi, Elmehdi
N1 - Publisher Copyright:
© 2024 IEEE.
PY - 2024/6/27
Y1 - 2024/6/27
N2 - The Internet of Things (IoT) is a popular technology that refers to a network of internet-connected physical devices that interact to perform tasks with minimal human intervention. However, as these networks expand, ensuring their security becomes challenging due to the communication broadcasting nature and extensive data exchanges. Traditional cryptographic security methods may not be optimal due to the constrained resources of IoT devices. In this study, we propose a novel secure key distribution scheme from a physical layer perspective suitable for an IoT environment. The proposed scheme takes advantage of the availability of Channel State Information (CSI) at both ends of the communication to enhance security. Specifically, CSI is utilized to precode the key symbols during the key distribution process. Additionally, the scheme employs the xor operation to add an extra layer of difficulty for potential eavesdroppers that attempt to retrieve the transmitted key symbols. The performance of the proposed scheme is evaluated in terms of Key Error Rate (KER) at legitimate nodes and eavesdroppers by using Monte Carlo simulations.
AB - The Internet of Things (IoT) is a popular technology that refers to a network of internet-connected physical devices that interact to perform tasks with minimal human intervention. However, as these networks expand, ensuring their security becomes challenging due to the communication broadcasting nature and extensive data exchanges. Traditional cryptographic security methods may not be optimal due to the constrained resources of IoT devices. In this study, we propose a novel secure key distribution scheme from a physical layer perspective suitable for an IoT environment. The proposed scheme takes advantage of the availability of Channel State Information (CSI) at both ends of the communication to enhance security. Specifically, CSI is utilized to precode the key symbols during the key distribution process. Additionally, the scheme employs the xor operation to add an extra layer of difficulty for potential eavesdroppers that attempt to retrieve the transmitted key symbols. The performance of the proposed scheme is evaluated in terms of Key Error Rate (KER) at legitimate nodes and eavesdroppers by using Monte Carlo simulations.
KW - Bit error probability
KW - Internet of Things (IoT)
KW - Key distribution
KW - Physical layer security
UR - https://www.scopus.com/pages/publications/85206200848
U2 - 10.1109/VTC2024-Spring62846.2024.10683263
DO - 10.1109/VTC2024-Spring62846.2024.10683263
M3 - Conference contribution
AN - SCOPUS:85206200848
T3 - Ieee Vehicular Technology Conference Vtc
BT - 2024 Ieee 99th Vehicular Technology Conference, Vtc2024-spring
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 99th IEEE Vehicular Technology Conference, VTC2024-Spring 2024
Y2 - 24 June 2024 through 27 June 2024
ER -