使用不可信的内部窃听器生成密钥:基于令牌的反窃听

IF 8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS IEEE Transactions on Information Forensics and Security Pub Date : 2025-02-18 DOI:10.1109/TIFS.2025.3542959
Huici Wu;Yi Fang;Na Li;Xin Yuan;Zhiqing Wei;Guoshun Nan;Xiaofeng Tao
{"title":"使用不可信的内部窃听器生成密钥:基于令牌的反窃听","authors":"Huici Wu;Yi Fang;Na Li;Xin Yuan;Zhiqing Wei;Guoshun Nan;Xiaofeng Tao","doi":"10.1109/TIFS.2025.3542959","DOIUrl":null,"url":null,"abstract":"Physical layer (PHY) secret key generation (SKG) has been widely studied as a promising approach to achieving One-Time-Pad security. The improvement of SKG rate is quite a huge challenge, especially in scenarios with untrusted internal helpers or eavesdroppers that aim to wiretap the negotiated secret keys between legitimate parties. In this paper, we propose a token-based SKG scheme to deal with the problem of information leakage with internal eavesdropping attacks. The basic idea is to cover random pilots with protective tokens to confuse eavesdroppers. Three scenarios including passive external eavesdropping, active internal eavesdropping with a reconfigurable intelligent surface (RIS)-assisted untrusted helper, and active internal eavesdropping with an untrusted relay are considered and analyzed to evaluate the performance of the proposed anti-eavesdropping scheme. Theoretical analysis shows that the proposed token-based SKG scheme can perfectly secure the key negotiation, achieving zero information leakage even in the untrusted relaying scenario without a direct link between Alice and Bob. Moreover, closed-form expressions for secret key capacity (SKC) are obtained. Finally, numerical results indicate that the proposed scheme outperforms the state-of-the-art methods. Using a token-generation mapping function with greater diversity in amplitude and phase, our approach achieves enhanced SKC performance across various scenarios, including those with a passive eavesdropper, a RIS-assisted untrusted helper, and an untrusted relay.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"20 ","pages":"2523-2537"},"PeriodicalIF":8.0000,"publicationDate":"2025-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Secret Key Generation With Untrusted Internal Eavesdropper: Token-Based Anti-Eavesdropping\",\"authors\":\"Huici Wu;Yi Fang;Na Li;Xin Yuan;Zhiqing Wei;Guoshun Nan;Xiaofeng Tao\",\"doi\":\"10.1109/TIFS.2025.3542959\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Physical layer (PHY) secret key generation (SKG) has been widely studied as a promising approach to achieving One-Time-Pad security. The improvement of SKG rate is quite a huge challenge, especially in scenarios with untrusted internal helpers or eavesdroppers that aim to wiretap the negotiated secret keys between legitimate parties. In this paper, we propose a token-based SKG scheme to deal with the problem of information leakage with internal eavesdropping attacks. The basic idea is to cover random pilots with protective tokens to confuse eavesdroppers. Three scenarios including passive external eavesdropping, active internal eavesdropping with a reconfigurable intelligent surface (RIS)-assisted untrusted helper, and active internal eavesdropping with an untrusted relay are considered and analyzed to evaluate the performance of the proposed anti-eavesdropping scheme. Theoretical analysis shows that the proposed token-based SKG scheme can perfectly secure the key negotiation, achieving zero information leakage even in the untrusted relaying scenario without a direct link between Alice and Bob. Moreover, closed-form expressions for secret key capacity (SKC) are obtained. Finally, numerical results indicate that the proposed scheme outperforms the state-of-the-art methods. Using a token-generation mapping function with greater diversity in amplitude and phase, our approach achieves enhanced SKC performance across various scenarios, including those with a passive eavesdropper, a RIS-assisted untrusted helper, and an untrusted relay.\",\"PeriodicalId\":13492,\"journal\":{\"name\":\"IEEE Transactions on Information Forensics and Security\",\"volume\":\"20 \",\"pages\":\"2523-2537\"},\"PeriodicalIF\":8.0000,\"publicationDate\":\"2025-02-18\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE Transactions on Information Forensics and Security\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://ieeexplore.ieee.org/document/10891617/\",\"RegionNum\":1,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, THEORY & METHODS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Information Forensics and Security","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10891617/","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, THEORY & METHODS","Score":null,"Total":0}
引用次数: 0

摘要

物理层(PHY)密钥生成(SKG)作为一种很有前途的实现一次性密钥安全的方法得到了广泛的研究。SKG率的提高是相当大的挑战,特别是在不受信任的内部助手或窃听者旨在窃听合法各方之间协商的密钥的情况下。在本文中,我们提出了一种基于令牌的SKG方案来处理内部窃听攻击导致的信息泄露问题。其基本思想是用保护令牌覆盖随机飞行员,以迷惑窃听者。考虑并分析了被动外部窃听、主动内部窃听与可重构智能表面(RIS)辅助的不可信助手、主动内部窃听与不可信中继三种场景,以评估所提防窃听方案的性能。理论分析表明,提出的基于令牌的SKG方案可以很好地保护密钥协商,即使在不可信中继场景下,在没有Alice和Bob之间的直接链接的情况下,也可以实现零信息泄漏。此外,还得到了密钥容量(SKC)的封闭表达式。最后,数值结果表明,该方案优于现有的方法。使用具有更大幅度和相位多样性的令牌生成映射函数,我们的方法在各种场景中实现了增强的SKC性能,包括那些具有被动窃听器、ris辅助的不可信助手和不可信中继的场景。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Secret Key Generation With Untrusted Internal Eavesdropper: Token-Based Anti-Eavesdropping
Physical layer (PHY) secret key generation (SKG) has been widely studied as a promising approach to achieving One-Time-Pad security. The improvement of SKG rate is quite a huge challenge, especially in scenarios with untrusted internal helpers or eavesdroppers that aim to wiretap the negotiated secret keys between legitimate parties. In this paper, we propose a token-based SKG scheme to deal with the problem of information leakage with internal eavesdropping attacks. The basic idea is to cover random pilots with protective tokens to confuse eavesdroppers. Three scenarios including passive external eavesdropping, active internal eavesdropping with a reconfigurable intelligent surface (RIS)-assisted untrusted helper, and active internal eavesdropping with an untrusted relay are considered and analyzed to evaluate the performance of the proposed anti-eavesdropping scheme. Theoretical analysis shows that the proposed token-based SKG scheme can perfectly secure the key negotiation, achieving zero information leakage even in the untrusted relaying scenario without a direct link between Alice and Bob. Moreover, closed-form expressions for secret key capacity (SKC) are obtained. Finally, numerical results indicate that the proposed scheme outperforms the state-of-the-art methods. Using a token-generation mapping function with greater diversity in amplitude and phase, our approach achieves enhanced SKC performance across various scenarios, including those with a passive eavesdropper, a RIS-assisted untrusted helper, and an untrusted relay.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Forensics and Security 工程技术-工程:电子与电气
CiteScore
14.40
自引率
7.40%
发文量
234
审稿时长
6.5 months
期刊介绍: The IEEE Transactions on Information Forensics and Security covers the sciences, technologies, and applications relating to information forensics, information security, biometrics, surveillance and systems applications that incorporate these features
期刊最新文献
Polar Coding for the Multiple Access Wiretap Channel with Partial Rate-Limited Feedback via Rate-Splitting LVMark: Robust Watermark for Latent Video Diffusion Models Machine Learning Validation of a Physical Prime Random Number Generator Closing the Proof-of-Stake Security Gap: A Signature-Based Defense Against Malicious Validators in Long-Range Attacks ESCM: A Toolkit for Efficient and Secure Outsourced Computation with Multiple Keys
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1