Huici Wu;Yi Fang;Na Li;Xin Yuan;Zhiqing Wei;Guoshun Nan;Xiaofeng Tao
{"title":"使用不可信的内部窃听器生成密钥:基于令牌的反窃听","authors":"Huici Wu;Yi Fang;Na Li;Xin Yuan;Zhiqing Wei;Guoshun Nan;Xiaofeng Tao","doi":"10.1109/TIFS.2025.3542959","DOIUrl":null,"url":null,"abstract":"Physical layer (PHY) secret key generation (SKG) has been widely studied as a promising approach to achieving One-Time-Pad security. The improvement of SKG rate is quite a huge challenge, especially in scenarios with untrusted internal helpers or eavesdroppers that aim to wiretap the negotiated secret keys between legitimate parties. In this paper, we propose a token-based SKG scheme to deal with the problem of information leakage with internal eavesdropping attacks. The basic idea is to cover random pilots with protective tokens to confuse eavesdroppers. Three scenarios including passive external eavesdropping, active internal eavesdropping with a reconfigurable intelligent surface (RIS)-assisted untrusted helper, and active internal eavesdropping with an untrusted relay are considered and analyzed to evaluate the performance of the proposed anti-eavesdropping scheme. Theoretical analysis shows that the proposed token-based SKG scheme can perfectly secure the key negotiation, achieving zero information leakage even in the untrusted relaying scenario without a direct link between Alice and Bob. Moreover, closed-form expressions for secret key capacity (SKC) are obtained. Finally, numerical results indicate that the proposed scheme outperforms the state-of-the-art methods. Using a token-generation mapping function with greater diversity in amplitude and phase, our approach achieves enhanced SKC performance across various scenarios, including those with a passive eavesdropper, a RIS-assisted untrusted helper, and an untrusted relay.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"20 ","pages":"2523-2537"},"PeriodicalIF":8.0000,"publicationDate":"2025-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Secret Key Generation With Untrusted Internal Eavesdropper: Token-Based Anti-Eavesdropping\",\"authors\":\"Huici Wu;Yi Fang;Na Li;Xin Yuan;Zhiqing Wei;Guoshun Nan;Xiaofeng Tao\",\"doi\":\"10.1109/TIFS.2025.3542959\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Physical layer (PHY) secret key generation (SKG) has been widely studied as a promising approach to achieving One-Time-Pad security. The improvement of SKG rate is quite a huge challenge, especially in scenarios with untrusted internal helpers or eavesdroppers that aim to wiretap the negotiated secret keys between legitimate parties. In this paper, we propose a token-based SKG scheme to deal with the problem of information leakage with internal eavesdropping attacks. The basic idea is to cover random pilots with protective tokens to confuse eavesdroppers. Three scenarios including passive external eavesdropping, active internal eavesdropping with a reconfigurable intelligent surface (RIS)-assisted untrusted helper, and active internal eavesdropping with an untrusted relay are considered and analyzed to evaluate the performance of the proposed anti-eavesdropping scheme. Theoretical analysis shows that the proposed token-based SKG scheme can perfectly secure the key negotiation, achieving zero information leakage even in the untrusted relaying scenario without a direct link between Alice and Bob. Moreover, closed-form expressions for secret key capacity (SKC) are obtained. Finally, numerical results indicate that the proposed scheme outperforms the state-of-the-art methods. Using a token-generation mapping function with greater diversity in amplitude and phase, our approach achieves enhanced SKC performance across various scenarios, including those with a passive eavesdropper, a RIS-assisted untrusted helper, and an untrusted relay.\",\"PeriodicalId\":13492,\"journal\":{\"name\":\"IEEE Transactions on Information Forensics and Security\",\"volume\":\"20 \",\"pages\":\"2523-2537\"},\"PeriodicalIF\":8.0000,\"publicationDate\":\"2025-02-18\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE Transactions on Information Forensics and Security\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://ieeexplore.ieee.org/document/10891617/\",\"RegionNum\":1,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, THEORY & METHODS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Information Forensics and Security","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10891617/","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, THEORY & METHODS","Score":null,"Total":0}
Secret Key Generation With Untrusted Internal Eavesdropper: Token-Based Anti-Eavesdropping
Physical layer (PHY) secret key generation (SKG) has been widely studied as a promising approach to achieving One-Time-Pad security. The improvement of SKG rate is quite a huge challenge, especially in scenarios with untrusted internal helpers or eavesdroppers that aim to wiretap the negotiated secret keys between legitimate parties. In this paper, we propose a token-based SKG scheme to deal with the problem of information leakage with internal eavesdropping attacks. The basic idea is to cover random pilots with protective tokens to confuse eavesdroppers. Three scenarios including passive external eavesdropping, active internal eavesdropping with a reconfigurable intelligent surface (RIS)-assisted untrusted helper, and active internal eavesdropping with an untrusted relay are considered and analyzed to evaluate the performance of the proposed anti-eavesdropping scheme. Theoretical analysis shows that the proposed token-based SKG scheme can perfectly secure the key negotiation, achieving zero information leakage even in the untrusted relaying scenario without a direct link between Alice and Bob. Moreover, closed-form expressions for secret key capacity (SKC) are obtained. Finally, numerical results indicate that the proposed scheme outperforms the state-of-the-art methods. Using a token-generation mapping function with greater diversity in amplitude and phase, our approach achieves enhanced SKC performance across various scenarios, including those with a passive eavesdropper, a RIS-assisted untrusted helper, and an untrusted relay.
期刊介绍:
The IEEE Transactions on Information Forensics and Security covers the sciences, technologies, and applications relating to information forensics, information security, biometrics, surveillance and systems applications that incorporate these features