Authenticated secret key generation in delay-constrained wireless systems

Abstract With the emergence of 5G low-latency applications, such as haptics and V2X, low-complexity and low-latency security mechanisms are needed. Promising lightweight mechanisms include physical unclonable functions (PUF) and secret key generation (SKG) at the physical layer, as considered in thi...

Full description

Bibliographic Details
Main Authors: Miroslav Mitev, Arsenia Chorti, Martin Reed, Leila Musavian
Format: Article
Language:English
Published: SpringerOpen 2020-06-01
Series:EURASIP Journal on Wireless Communications and Networking
Subjects:
Online Access:http://link.springer.com/article/10.1186/s13638-020-01742-0
_version_ 1828425646228897792
author Miroslav Mitev
Arsenia Chorti
Martin Reed
Leila Musavian
author_facet Miroslav Mitev
Arsenia Chorti
Martin Reed
Leila Musavian
author_sort Miroslav Mitev
collection DOAJ
description Abstract With the emergence of 5G low-latency applications, such as haptics and V2X, low-complexity and low-latency security mechanisms are needed. Promising lightweight mechanisms include physical unclonable functions (PUF) and secret key generation (SKG) at the physical layer, as considered in this paper. In this framework, we propose (i) a zero round trip time (0-RTT) resumption authentication protocol combining PUF and SKG processes, (ii) a novel authenticated encryption (AE) using SKG, and (iii) pipelining of the AE SKG and the encrypted data transfer in order to reduce latency. Implementing the pipelining at PHY, we investigate a parallel SKG approach for multi-carrier systems, where a subset of the subcarriers are used for SKG and the rest for data transmission. The optimal solution to this PHY resource allocation problem is identified under security, power, and delay constraints, by formulating the subcarrier scheduling as a subset-sum 0−1 knapsack optimization. A heuristic algorithm of linear complexity is proposed and shown to incur negligible loss with respect to the optimal dynamic programming solution. All of the proposed mechanisms have the potential to pave the way for a new breed of latency aware security protocols.
first_indexed 2024-12-10T16:34:19Z
format Article
id doaj.art-7aadb0a5373549faa77e67f5da533880
institution Directory Open Access Journal
issn 1687-1499
language English
last_indexed 2024-12-10T16:34:19Z
publishDate 2020-06-01
publisher SpringerOpen
record_format Article
series EURASIP Journal on Wireless Communications and Networking
spelling doaj.art-7aadb0a5373549faa77e67f5da5338802022-12-22T01:41:28ZengSpringerOpenEURASIP Journal on Wireless Communications and Networking1687-14992020-06-012020112910.1186/s13638-020-01742-0Authenticated secret key generation in delay-constrained wireless systemsMiroslav Mitev0Arsenia Chorti1Martin Reed2Leila Musavian3School of CSEE, University of EssexETIS UMR8051, CY University, ENSEA, CNRSSchool of CSEE, University of EssexSchool of CSEE, University of EssexAbstract With the emergence of 5G low-latency applications, such as haptics and V2X, low-complexity and low-latency security mechanisms are needed. Promising lightweight mechanisms include physical unclonable functions (PUF) and secret key generation (SKG) at the physical layer, as considered in this paper. In this framework, we propose (i) a zero round trip time (0-RTT) resumption authentication protocol combining PUF and SKG processes, (ii) a novel authenticated encryption (AE) using SKG, and (iii) pipelining of the AE SKG and the encrypted data transfer in order to reduce latency. Implementing the pipelining at PHY, we investigate a parallel SKG approach for multi-carrier systems, where a subset of the subcarriers are used for SKG and the rest for data transmission. The optimal solution to this PHY resource allocation problem is identified under security, power, and delay constraints, by formulating the subcarrier scheduling as a subset-sum 0−1 knapsack optimization. A heuristic algorithm of linear complexity is proposed and shown to incur negligible loss with respect to the optimal dynamic programming solution. All of the proposed mechanisms have the potential to pave the way for a new breed of latency aware security protocols.http://link.springer.com/article/10.1186/s13638-020-01742-0Physical layer securitySecret key generationPhysical unclonable functionsResumption protocolsEffective capacityQoS
spellingShingle Miroslav Mitev
Arsenia Chorti
Martin Reed
Leila Musavian
Authenticated secret key generation in delay-constrained wireless systems
EURASIP Journal on Wireless Communications and Networking
Physical layer security
Secret key generation
Physical unclonable functions
Resumption protocols
Effective capacity
QoS
title Authenticated secret key generation in delay-constrained wireless systems
title_full Authenticated secret key generation in delay-constrained wireless systems
title_fullStr Authenticated secret key generation in delay-constrained wireless systems
title_full_unstemmed Authenticated secret key generation in delay-constrained wireless systems
title_short Authenticated secret key generation in delay-constrained wireless systems
title_sort authenticated secret key generation in delay constrained wireless systems
topic Physical layer security
Secret key generation
Physical unclonable functions
Resumption protocols
Effective capacity
QoS
url http://link.springer.com/article/10.1186/s13638-020-01742-0
work_keys_str_mv AT miroslavmitev authenticatedsecretkeygenerationindelayconstrainedwirelesssystems
AT arseniachorti authenticatedsecretkeygenerationindelayconstrainedwirelesssystems
AT martinreed authenticatedsecretkeygenerationindelayconstrainedwirelesssystems
AT leilamusavian authenticatedsecretkeygenerationindelayconstrainedwirelesssystems