Cargando…

An anti-collusion attack defense method for physical layer key generation scheme based on transmission delay

Physical layer security (PLS) is considered one of the most promising solutions to solve the security problems of massive Internet of Things (IoTs) devices because of its lightweight and high efficiency. Significantly, the recent physical layer key generation (PLKG) scheme based on transmission dela...

Descripción completa

Detalles Bibliográficos
Autores principales: Wang, Xiaowen, Huang, Jie, Qi, Chunyang, Peng, Yang, Zhang, Shuaishuai
Formato: Online Artículo Texto
Lenguaje:English
Publicado: PeerJ Inc. 2023
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10280582/
https://www.ncbi.nlm.nih.gov/pubmed/37346720
http://dx.doi.org/10.7717/peerj-cs.1349
_version_ 1785060827846410240
author Wang, Xiaowen
Huang, Jie
Qi, Chunyang
Peng, Yang
Zhang, Shuaishuai
author_facet Wang, Xiaowen
Huang, Jie
Qi, Chunyang
Peng, Yang
Zhang, Shuaishuai
author_sort Wang, Xiaowen
collection PubMed
description Physical layer security (PLS) is considered one of the most promising solutions to solve the security problems of massive Internet of Things (IoTs) devices because of its lightweight and high efficiency. Significantly, the recent physical layer key generation (PLKG) scheme based on transmission delay proposed by Huang et al. (2021) does not have any restrictions on communication methods and can extend the traditional physical layer security based on wireless channels to the whole Internet scene. However, the secret-sharing strategy adopted in this scheme has hidden dangers of collusion attack, which may lead to security problems such as information tampering and privacy disclosure. By establishing a probability model, this article quantitatively analyzes the relationship between the number of malicious collusion nodes and the probability of key exposure, which proves the existence of this security problem. In order to solve the problem of collusion attack in Huang et al.’s scheme, this article proposes an anti-collusion attack defense method, which minimizes the influence of collusion attack on key security by optimizing parameters including the number of the middle forwarding nodes, the random forwarding times, the time delay measurement times and the out-of-control rate of forwarding nodes. Finally, based on the game model, we prove that the defense method proposed in this article can reduce the risk of key leakage to zero under the scenario of the “Careless Defender” and “Cautious Defender” respectively.
format Online
Article
Text
id pubmed-10280582
institution National Center for Biotechnology Information
language English
publishDate 2023
publisher PeerJ Inc.
record_format MEDLINE/PubMed
spelling pubmed-102805822023-06-21 An anti-collusion attack defense method for physical layer key generation scheme based on transmission delay Wang, Xiaowen Huang, Jie Qi, Chunyang Peng, Yang Zhang, Shuaishuai PeerJ Comput Sci Cryptography Physical layer security (PLS) is considered one of the most promising solutions to solve the security problems of massive Internet of Things (IoTs) devices because of its lightweight and high efficiency. Significantly, the recent physical layer key generation (PLKG) scheme based on transmission delay proposed by Huang et al. (2021) does not have any restrictions on communication methods and can extend the traditional physical layer security based on wireless channels to the whole Internet scene. However, the secret-sharing strategy adopted in this scheme has hidden dangers of collusion attack, which may lead to security problems such as information tampering and privacy disclosure. By establishing a probability model, this article quantitatively analyzes the relationship between the number of malicious collusion nodes and the probability of key exposure, which proves the existence of this security problem. In order to solve the problem of collusion attack in Huang et al.’s scheme, this article proposes an anti-collusion attack defense method, which minimizes the influence of collusion attack on key security by optimizing parameters including the number of the middle forwarding nodes, the random forwarding times, the time delay measurement times and the out-of-control rate of forwarding nodes. Finally, based on the game model, we prove that the defense method proposed in this article can reduce the risk of key leakage to zero under the scenario of the “Careless Defender” and “Cautious Defender” respectively. PeerJ Inc. 2023-04-24 /pmc/articles/PMC10280582/ /pubmed/37346720 http://dx.doi.org/10.7717/peerj-cs.1349 Text en © 2023 Wang et al. https://creativecommons.org/licenses/by/4.0/This is an open access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/) , which permits unrestricted use, distribution, reproduction and adaptation in any medium and for any purpose provided that it is properly attributed. For attribution, the original author(s), title, publication source (PeerJ Computer Science) and either DOI or URL of the article must be cited.
spellingShingle Cryptography
Wang, Xiaowen
Huang, Jie
Qi, Chunyang
Peng, Yang
Zhang, Shuaishuai
An anti-collusion attack defense method for physical layer key generation scheme based on transmission delay
title An anti-collusion attack defense method for physical layer key generation scheme based on transmission delay
title_full An anti-collusion attack defense method for physical layer key generation scheme based on transmission delay
title_fullStr An anti-collusion attack defense method for physical layer key generation scheme based on transmission delay
title_full_unstemmed An anti-collusion attack defense method for physical layer key generation scheme based on transmission delay
title_short An anti-collusion attack defense method for physical layer key generation scheme based on transmission delay
title_sort anti-collusion attack defense method for physical layer key generation scheme based on transmission delay
topic Cryptography
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10280582/
https://www.ncbi.nlm.nih.gov/pubmed/37346720
http://dx.doi.org/10.7717/peerj-cs.1349
work_keys_str_mv AT wangxiaowen ananticollusionattackdefensemethodforphysicallayerkeygenerationschemebasedontransmissiondelay
AT huangjie ananticollusionattackdefensemethodforphysicallayerkeygenerationschemebasedontransmissiondelay
AT qichunyang ananticollusionattackdefensemethodforphysicallayerkeygenerationschemebasedontransmissiondelay
AT pengyang ananticollusionattackdefensemethodforphysicallayerkeygenerationschemebasedontransmissiondelay
AT zhangshuaishuai ananticollusionattackdefensemethodforphysicallayerkeygenerationschemebasedontransmissiondelay
AT wangxiaowen anticollusionattackdefensemethodforphysicallayerkeygenerationschemebasedontransmissiondelay
AT huangjie anticollusionattackdefensemethodforphysicallayerkeygenerationschemebasedontransmissiondelay
AT qichunyang anticollusionattackdefensemethodforphysicallayerkeygenerationschemebasedontransmissiondelay
AT pengyang anticollusionattackdefensemethodforphysicallayerkeygenerationschemebasedontransmissiondelay
AT zhangshuaishuai anticollusionattackdefensemethodforphysicallayerkeygenerationschemebasedontransmissiondelay