Cargando…

Graph Layer Security: Encrypting Information via Common Networked Physics

The proliferation of low-cost Internet of Things (IoT) devices has led to a race between wireless security and channel attacks. Traditional cryptography requires high computational power and is not suitable for low-power IoT scenarios. Whilst recently developed physical layer security (PLS) can expl...

Descripción completa

Detalles Bibliográficos
Autores principales: Wei, Zhuangkun, Wang, Liang, Sun, Schyler Chengyao, Li, Bin, Guo, Weisi
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9144707/
https://www.ncbi.nlm.nih.gov/pubmed/35632362
http://dx.doi.org/10.3390/s22103951
_version_ 1784716113987239936
author Wei, Zhuangkun
Wang, Liang
Sun, Schyler Chengyao
Li, Bin
Guo, Weisi
author_facet Wei, Zhuangkun
Wang, Liang
Sun, Schyler Chengyao
Li, Bin
Guo, Weisi
author_sort Wei, Zhuangkun
collection PubMed
description The proliferation of low-cost Internet of Things (IoT) devices has led to a race between wireless security and channel attacks. Traditional cryptography requires high computational power and is not suitable for low-power IoT scenarios. Whilst recently developed physical layer security (PLS) can exploit common wireless channel state information (CSI), its sensitivity to channel estimation makes them vulnerable to attacks. In this work, we exploit an alternative common physics shared between IoT transceivers: the monitored channel-irrelevant physical networked dynamics (e.g., water/oil/gas/electrical signal-flows). Leveraging this, we propose, for the first time, graph layer security (GLS), by exploiting the dependency in physical dynamics among network nodes for information encryption and decryption. A graph Fourier transform (GFT) operator is used to characterise such dependency into a graph-bandlimited subspace, which allows the generation of channel-irrelevant cipher keys by maximising the secrecy rate. We evaluate our GLS against designed active and passive attackers, using IEEE 39-Bus system. Results demonstrate that GLS is not reliant on wireless CSI, and can combat attackers that have partial networked dynamic knowledge (realistic access to full dynamic and critical nodes remains challenging). We believe this novel GLS has widespread applicability in secure health monitoring and for digital twins in adversarial radio environments.
format Online
Article
Text
id pubmed-9144707
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-91447072022-05-29 Graph Layer Security: Encrypting Information via Common Networked Physics Wei, Zhuangkun Wang, Liang Sun, Schyler Chengyao Li, Bin Guo, Weisi Sensors (Basel) Article The proliferation of low-cost Internet of Things (IoT) devices has led to a race between wireless security and channel attacks. Traditional cryptography requires high computational power and is not suitable for low-power IoT scenarios. Whilst recently developed physical layer security (PLS) can exploit common wireless channel state information (CSI), its sensitivity to channel estimation makes them vulnerable to attacks. In this work, we exploit an alternative common physics shared between IoT transceivers: the monitored channel-irrelevant physical networked dynamics (e.g., water/oil/gas/electrical signal-flows). Leveraging this, we propose, for the first time, graph layer security (GLS), by exploiting the dependency in physical dynamics among network nodes for information encryption and decryption. A graph Fourier transform (GFT) operator is used to characterise such dependency into a graph-bandlimited subspace, which allows the generation of channel-irrelevant cipher keys by maximising the secrecy rate. We evaluate our GLS against designed active and passive attackers, using IEEE 39-Bus system. Results demonstrate that GLS is not reliant on wireless CSI, and can combat attackers that have partial networked dynamic knowledge (realistic access to full dynamic and critical nodes remains challenging). We believe this novel GLS has widespread applicability in secure health monitoring and for digital twins in adversarial radio environments. MDPI 2022-05-23 /pmc/articles/PMC9144707/ /pubmed/35632362 http://dx.doi.org/10.3390/s22103951 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Wei, Zhuangkun
Wang, Liang
Sun, Schyler Chengyao
Li, Bin
Guo, Weisi
Graph Layer Security: Encrypting Information via Common Networked Physics
title Graph Layer Security: Encrypting Information via Common Networked Physics
title_full Graph Layer Security: Encrypting Information via Common Networked Physics
title_fullStr Graph Layer Security: Encrypting Information via Common Networked Physics
title_full_unstemmed Graph Layer Security: Encrypting Information via Common Networked Physics
title_short Graph Layer Security: Encrypting Information via Common Networked Physics
title_sort graph layer security: encrypting information via common networked physics
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9144707/
https://www.ncbi.nlm.nih.gov/pubmed/35632362
http://dx.doi.org/10.3390/s22103951
work_keys_str_mv AT weizhuangkun graphlayersecurityencryptinginformationviacommonnetworkedphysics
AT wangliang graphlayersecurityencryptinginformationviacommonnetworkedphysics
AT sunschylerchengyao graphlayersecurityencryptinginformationviacommonnetworkedphysics
AT libin graphlayersecurityencryptinginformationviacommonnetworkedphysics
AT guoweisi graphlayersecurityencryptinginformationviacommonnetworkedphysics