SlideShare a Scribd company logo
International Journal of Electrical and Computer Engineering (IJECE)
Vol. 14, No. 1, February 2024, pp. 451∼456
ISSN: 2088-8708, DOI: 10.11591/ijece.v14i1.pp451-456 ❒ 451
Wireless channel-based ciphering key generation: effect of
aging and treatment
Aqiel Almamori1
, Mohammed Adil Abbas2
1Electronics and Communication Department, Collage of Engineering, University of Baghdad, Baghdad, Iraq
2Continuing Education Center, University of Baghdad, Baghdad, Iraq
Article Info
Article history:
Received Jun 17, 2023
Revised Jul 8, 2023
Accepted Jul 17, 2023
Keywords:
Channel aging
Ciphering
Correlation
Encryption
Key generation
Spectral efficiency
ABSTRACT
Key generation for data cryptography is vital in wireless communications secu-
rity. This key must be generated in a random way so that can not be regenerated
by a third party other than the intended receiver. The random nature of the
wireless channel is utilized to generate the encryption key. However, the ran-
domness of wireless channels deteriorated over time due to channel aging which
casing security threats, particularly for spatially correlated channels. In this pa-
per, the effect of channel aging on the ciphering key generations is addressed.
A proposed method to randomize the encryption key each coherence time is de-
veloped which decreases the correlation between keys generated at consecutive
coherence times. When compared to the conventional method, the randomness
improvement is significant at each time interval. The simulation results show
that the proposed method improves the randomness of the encrypting keys.
This is an open access article under the CC BY-SA license.
Corresponding Author:
Mohammed Adil Abbas
Continuing Education Center, University of Baghdad
Baghdad, Iraq
Email: engimoh87@dcec.uobaghdad.edu.iq
1. INTRODUCTION
Wireless communication has become a mandatory portion of our everyday life. However, this portion
requires gigantic efforts to have the wireless transmission secured. This issue has become significant after the
ever-increasing amount of data transmitted, wirelessly [1]–[3]. Since electromagnetic waves can propagate
anywhere, data transmission is fundamentally fraught with danger. The security and confidentiality of the
transmitted information have therefore consumed a substantial amount of researchers’ time and efforts. In
order to ensure the confidentiality of transmissions, general transmission devices either use symmetric-key
encryption or asymmetric-key encryption. However, neither of these methods is recommended due to the fact
that asymmetric-key encryption necessitates a significant amount of complex processing power, and the second
method necessitates a very secure link to transfer the unique encryption key, which is a crucial concern. Because
sending sensitive information becomes impossible once the secret key is revealed [4], [5]. An alternative
assumption is a keyless or physical layer security scheme was proposed. However, the keyless scheme limits
the resources of wireless transmission. Furthermore, users of public networks face severe restrictions and costly
additional expenses [6]–[10].
The concept of key generation was initially thought of and investigated theoretically in [11], [12]. Key
generation is a crucial component of wireless transmission security. The process of generating a key entails
the creation and distribution of an encryption code that can be used to secure the data at both ends of the
transmission. Using a single code to encrypt the entire transmission is hazardous, however, because if the code
Journal homepage: http://ijece.iaescore.com
452 ❒ ISSN: 2088-8708
is compromised, the entire transmission will be compromised [13], [14].
The improvement in the security of wireless networks is obtained by attaining information-theoretic
secrecy, which provides network security with greater wireless adaptability. In contrast to conventional encryp-
tion key generation methods, a recent security technique exploits the randomness of the wireless channel. This
method of key generation greatly complicates attempts to reveal the transmission by a third party (adversaries)
other than the transmitter and receiver [15]–[17].
Hence, the randomness in wireless channels can be harvested to generate uncorrelated secret codes
to guarantee transmission security [18]. This assumption does not always hold true. Specifically in a static
environment, the wireless channel does not vary enough, resulting in a low level of introduced randomness
in the following time interval. A practical example of this environment is the indoor internet of things (IoT).
Correlated successive channels result in the generation of correlated secret codes which endanger transmission
confidentiality. Due to the high correlation between encryption keys, compromising one key could be used to
easily decrypt the next [18], [19].
Nevertheless, recent work on encryption key generation in the static environment has attracted con-
siderable interest. The capacity of the encryption key was determined and addressed the parameters that affect
the capacity [20]–[22]. However, efforts are directed toward reaping the advantages of randomness through the
application of reconfigurable intelligent surfaces (RIS) [23]–[25]. The current efforts concentrate on reducing
transmission losses and restricting the information leakage to the eavesdroppers in order to maximize link effi-
ciency. So far as we can tell, though, there appears to be little effort to draw attention to the consequences of
utilizing encryption keys correlated to the generated encryption keys at consecutive coherence times.
The contribution of this work addresses the impact of channel aging on the network security level to
propose an alternative solution to overcome the issue of correlated successive encryption keys. This can be
clearly seen in the low randomness environment or in other words, in the static environment when the user
is sitting or moving lowly. Furthermore, the results of this paper show the impact of the proposed scheme
and the speed of the moving user in enhancing network security. This study focuses on the design of a robust
encryption key generation that avoids the correlation of consecutive encryption keys. The remainder of this
paper is organized as follows, section 2 describes the system model of this study. The problem is brought up
and formulated in section 3. The results are shown and discussed in section 4. Finally, section 5 concludes this
study.
2. SYSTEM MODEL
In this paper, the transmitter base station (BS) or access point (AP) ) is equipped with M transmit
antennas and serves multiple users (total number of users is K) each user is equipped with a single antenna,
as shown in Figure 1. Symmetric key encryption is considered that is used to encrypt the data transmission
between the transmitter and each individual user, uk.
Figure 1. System model
Int J Elec & Comp Eng, Vol. 14, No. 1, February 2024: 451-456
Int J Elec & Comp Eng ISSN: 2088-8708 ❒ 453
The link between each single user and the transmitter is secured with a unique secret code. The
encryption key for each link is derived from the randomness of its acquired channel state information (CSI).
The CSI of all users is gathered by the transmitter. For each coherent time of transmission, the transmitter
creates a new encryption key for each user and conveys it via a confidential channel to all of the active users.
However, when uk is in a static or slowly moving environment, the channel aging of uk may be low, and the
subsequent coherent time may be correlated. In this way, the transmission would operate with correlated secret
codes, and the disclosure of a single transmission’s encryption key would have adverse consequences [26].
Thus, breaking a single transmission’s encryption key would be used by adversaries employing brute-force
attacks to break the next hop’s secret code since they are highly correlated, breaking a single hop’s secret code
is a weakness that could cause a threat. As well, spatially correlated adversaries will have time to brute force
attack.
3. PROBLEM FORMULATION
This paper focuses on capturing the impact of the user in the slow-moving or static environment at the
generated encryption key from the randomness of the wireless channel. The process of encryption key gener-
ation involves three main steps: probing, quantization, information reconciliation, and privacy amplification.
The channel is measured in the first step and converted into binary in the second. The error correction and
secrecy evaluation are done in the last two steps. The comprehensive explanation of each of these stages is de-
tailed in [15]. However, the channel between the transmitter and uk is given in (1) according to the assumptions
in [17].
h[n] = αh[n − 1] + e[n] (1)
where h[n − 1] represents the channel vector for the prior time slots while the effect of channel aging is
represented by the error vector e[n]. The temporal correlation parameter is given by α = J0(2πfDTs). Where
J0() is the zeroth-order Bessel function of the first kind. Ts, and fD are the channel sampling duration and the
maximum Doppler shift, respectively. The value of the Doppler shift is given by (2):
fD =
vfc
c
(2)
where v is the moving velocity of the user uk, c is the speed of light, and fc refers to the carrier frequency.
[17].
For the successive time slots, the successive channel is correlated which leads to generating a cor-
related encryption key. The key to mitigating and improving the quality of encryption keys is to introduce
artificial randomness. The introduced randomness is added to the acquired channel during the process of gen-
eration of the encryption key. For simplicity, the permutations for the required channel vector can be used to
generate uncorrelated successive encryption keys. After permutating the channel vector a decimal-to-binary
conversion has to be done.
h01 = dec2bin(h) (3)
where the vector h01 is binary vector of the length n bit. For a given vector h01 of length n it is simply to
generate a matrix with the dimensions P = n! × n, every single row in matrix P has the same length as v but
with different permutations. The transmitter and receiver are able to use any permutated row vector according
to a pre-decided algorithm.
4. RESULTS AND DISCUSSION
This section shows the simulation results that shows our proposal. The simulations of results were
performed using MATLAB software. All generated simulations were made by averaging out 1,000 trails.
In Figure 2, the correlation of the successive coherent encryption keys for the two schemes was ana-
lyzed and compared. For the conventional scheme, highly correlated encryption keys result from the correlation
between successive time slots. The correlation between the encryption keys decreases as a result of the effects
of aging, However, the correlation between the first six encryption keys is considerably high. In contrast to
the conventional approach, the proposed approach has shown considerable improvements. Hence, comparing
Wireless channel-based ciphering key generation: effect of aging and treatment (Aqiel Almamori)
454 ❒ ISSN: 2088-8708
the first and second-time slots generated keys, the correlation drops from 6.3799 in the conventional scheme to
0.0013 in the proposed scheme. The results reveal that the generated keys are uncorrelated with the encryption
keys that come from the second time slot. Hence, the impact of the permutation of the received channel vector
can be clearly captured. Figure 3, demonstrates the influence of user speed on the correlation between two suc-
cessive encryption keys that come from successive time slots. It can be clearly seen that for the slow-moving
user or the static user, the channel is highly correlated due to the low-level impact of channel aging. Hence, the
generated encryption keys from the highly correlated channel vectors are correlated accordingly. Contrarily,
the correlation level drops for the fast-moving user. Accordingly, the key will be more vulnerable due to this
correlation and a third party can get an advantage.
Eventually, the eavesdropper has to find the permutation index which changes in coordination between
transmitter and receiver before breaking the encryption which requires a huge computation power and time.
The permutation index sharing between transmitter and receiver gives the key high randomness in which high
computational power is needed to find it by the eavesdropper.
1 2 3 4 5 6 7 8 9 10
-1
0
1
2
3
4
5
6
7
8
9
10
Conventional
Proposed
Figure 2. A comparison of the correlation between the successive time slots
0
1
2
3
4
5
6
7
8
0 0.5 1 1.5 2 2.5 3 3.5 4 4.5 5
Figure 3. The correlation between the successive time slot versus the speed of the user
5. CONCLUSION
Security of transmitted data is important in wireless communications. Consequently, data encryption
with the proper key is necessary. The encryption key has to be random and challenging to revoke its regenerate
by a third party. The randomness of the wireless channel has been utilized to generate the encryption key. The
correlation between the generated keys at consecutive intervals of coherence times is high, particularly in slow-
moving mobile phones. This correlation is a weakness in network security and causes a threat. A proposed
Int J Elec & Comp Eng, Vol. 14, No. 1, February 2024: 451-456
Int J Elec & Comp Eng ISSN: 2088-8708 ❒ 455
key generation method to overcome this threat is adding new randomization of binary key bits based on the
bits permutations. This method highly improves the randomness and makes key regeneration by eavesdropper
harder. The proposed method has improved the performance of the key.
REFERENCES
[1] N. M. Mukhammadovich and A. Rakhmatillo Djuraevich, “Working with cryptographic key information,” In-
ternational Journal of Electrical and Computer Engineering (IJECE), vol. 13, no. 1, pp. 911–919, Feb. 2023,
doi: 10.11591/ijece.v13i1.pp911-919.
[2] N. Ibraheem and M. Hasan, “Combining several substitution cipher algorithms using circular queue data structure,”
Baghdad Science Journal, vol. 17, no. 4, Dec. 2020, doi: 10.21123/bsj.2020.17.4.1320.
[3] A. N. Mazher and J. Waleed, “Retina based glowworm swarm optimization for random cryptographic key generation,”
Baghdad Science Journal, vol. 19, no. 1, Feb. 2022, doi: 10.21123/bsj.2022.19.1.0179.
[4] R. Yudistira, “AES (advanced encryption standard) and RSA (Rivest–Shamir–Adleman) encryption on digital sig-
nature document: a literature review,” International Journal of Information Technology and Business, vol. 2, no. 1,
pp. 1–3, 2020.
[5] R. L. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public-key cryptosystems,”
Yudistira Communications of the ACM, vol. 21, no. 2, pp. 120–126, Feb. 1978, doi: 10.1145/359340.359342.
[6] M. A. Abbas, H. Song, and J. P. Hong, “Opportunistic scheduling for average secrecy rate enhancement in fading
downlink channel with potential eavesdroppers,” IEEE Transactions on Information Forensics and Security, vol. 14,
no. 4, pp. 969–980, 2019, doi: 10.1109/TIFS.2018.2868494.
[7] S. A. Mohammed, “Securing physical layer for FHSS communication system using code andphase hopping tech-
niques in CDMA, system design and implementation,” Journal of Engineering, vol. 26, no. 7, pp. 190–205, Jul.
2020, doi: 10.31026/j.eng.2020.07.13.
[8] M. A. Abbas, H. Song, and J.-P. Hong, “Secure wireless communications in broadcast channels with confidential
messages,” IEEE Access, vol. 7, pp. 170525–170533, 2019, doi: 10.1109/ACCESS.2019.2955603.
[9] W. Trappe, “The challenges facing physical layer security,” IEEE Communications Magazine, vol. 53, no. 6,
pp. 16–20, Jun. 2015, doi: 10.1109/MCOM.2015.7120011.
[10] Y. Wu, A. Khisti, C. Xiao, G. Caire, K.-K. Wong, and X. Gao, “A survey of physical layer security techniques for
5G wireless networks and challenges ahead,” IEEE Journal on Selected Areas in Communications, vol. 36, no. 4,
pp. 679–695, Apr. 2018, doi: 10.1109/JSAC.2018.2825560.
[11] R. Ahlswede and I. Csiszar, “Common randomness in information theory and cryptography. I. Secret sharing,” IEEE
Transactions on Information Theory, vol. 39, no. 4, pp. 1121–1132, Jul. 1993, doi: 10.1109/18.243431.
[12] U. M. Maurer, “Secret key agreement by public discussion from common information,” IEEE Transactions on Infor-
mation Theory, vol. 39, no. 3, pp. 733–742, May 1993, doi: 10.1109/18.256484.
[13] Y. Xiao, V. K. Rayi, B. Sun, X. Du, F. Hu, and M. Galloway, “A survey of key management schemes
in wireless sensor networks,” Computer Communications, vol. 30, no. 11–12, pp. 2314–2341, Sep. 2007,
doi: 10.1016/j.comcom.2007.04.009.
[14] M. Masdari, S. Ahmadzadeh, and M. Bidaki, “Key management in wireless body area network: chal-
lenges and issues,” Journal of Network and Computer Applications, vol. 91, pp. 36–51, Aug. 2017,
doi: 10.1016/j.jnca.2017.04.008.
[15] K. Ren, H. Su, and Q. Wang, “Secret key generation exploiting channel characteristics in wireless communications,”
IEEE Wireless Communications, vol. 18, no. 4, pp. 6–12, Aug. 2011, doi: 10.1109/MWC.2011.5999759.
[16] S. Ribouh, K. Phan, A. V. Malawade, Y. Elhillali, A. Rivenq, and M. A. Al Faruque, “Channel state information-based
cryptographic key generation for intelligent transportation systems,” IEEE Transactions on Intelligent Transportation
Systems, vol. 22, no. 12, pp. 7496–7507, Dec. 2021, doi: 10.1109/TITS.2020.3003577.
[17] K. T. Truong and R. W. Heath, “Effects of channel aging in massive MIMO systems,” Journal of Communications
and Networks, vol. 15, no. 4, pp. 338–351, Aug. 2013, doi: 10.1109/JCN.2013.000065.
[18] J. Zhang, T. Q. Duong, A. Marshall, and R. Woods, “Key generation from wireless channels: a review,” IEEE Access,
vol. 4, pp. 614–626, 2016, doi: 10.1109/ACCESS.2016.2521718.
[19] N. Aldaghri and H. Mahdavifar, “Physical layer secret key generation in static environments,” IEEE Transactions on
Information Forensics and Security, vol. 15, pp. 2692–2705, 2020, doi: 10.1109/TIFS.2020.2974621.
[20] J. Zhang, B. He, T. Q. Duong, and R. Woods, “On the key generation from correlated wireless channels,” IEEE
Communications Letters, vol. 21, no. 4, pp. 961–964, Apr. 2017, doi: 10.1109/LCOMM.2017.2649496.
[21] J. Li, P. Wang, L. Jiao, Z. Yan, K. Zeng, and Y. Yang, “Security analysis of triangle channel-based physical layer key
generation in wireless backscatter communications,” IEEE Transactions on Information Forensics and Security, vol.
18, pp. 948–964, 2023, doi: 10.1109/TIFS.2022.3224852.
[22] A. Almamori and M. A. Abbas, “Channel state information estimation for reconfigurable intelligent surfaces based
on received signal analysis,” International Journal of Electrical and Computer Engineering (IJECE), vol. 13, no. 2,
Wireless channel-based ciphering key generation: effect of aging and treatment (Aqiel Almamori)
456 ❒ ISSN: 2088-8708
pp. 1599–1605, Apr. 2023, doi: 10.11591/ijece.v13i2.pp1599-1605.
[23] V. Shahiri, H. Behroozi, and A. Kuhestani, “Intelligent reflecting surface assisted secret key generation under spatially
correlated channels in quasi-static environments,” Dec. 2022, arXiv:2212.01563.
[24] Z. Wei and W. Guo, “Random matrix based physical layer secret key generation in static channels,” Oct. 2021,
arXiv:2110.12785.
[25] Z. Wei, B. Li, and W. Guo, “Adversarial reconfigurable intelligent surface against physical layer key
generation,” IEEE Transactions on Information Forensics and Security, vol. 18, pp. 2368–2381, 2023,
doi: 10.1109/TIFS.2023.3266705.
[26] A. Almamori and S. Mohan, “Estimation of channel state information for massive MIMO based on received data
using Kalman filter,” in 2018 IEEE 8th
Annual Computing and Communication Workshop and Conference (CCWC),
Jan. 2018, pp. 665–669, doi: 10.1109/CCWC.2018.8301698.
BIOGRAPHIES OF AUTHORS
Aqiel Almamori received the B.Sc. degree in electronics and communications engineer-
ing and the M.Sc. degree in communications engineering from Nahrain University in Baghdad, Iraq
in 1999, 2002, respectively. He received a Ph.D. in telecommunications and networking from the
University of Arkansas at Little Rock, USA, in 2018. In 2005–2013, he joined Motorola Solutions
as a radio frequency engineer. He has been working as a lecturer in the Electronics and Communi-
cation Department, College of Engineering, University of Baghdad. He can be contacted at email:
a.eced@coeng.uobaghdad.edu.iq.
Mohammed Adil Abbas received the B.Sc. degree from the Department of Electronics
and Communications, University of Baghdad, Baghdad, Iraq, in 2009, and the M.S. degree from
the Department of Information and Communications, Pukyong National University, Busan, South
Korea, in 2017. He is currently a lecturer with the Development and Continuing Education Center,
University of Baghdad. He can be contacted at email: engimoh87@dcec.uobaghdad.edu.iq.
Int J Elec & Comp Eng, Vol. 14, No. 1, February 2024: 451-456

More Related Content

PDF
KEY GENERATION FRAMEWORK FOR MULTIPLE WIRELESS DEVICES USING MULTIPATH ROUTING
PDF
Secured key exchange by information reconciliation
PDF
The key providing system for wireless
PPT
Swing07 day1 buttyan
PDF
Wireless Security Needs For Enterprises
PDF
Implement a novel symmetric block
PPT
Wireless security
PDF
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
KEY GENERATION FRAMEWORK FOR MULTIPLE WIRELESS DEVICES USING MULTIPATH ROUTING
Secured key exchange by information reconciliation
The key providing system for wireless
Swing07 day1 buttyan
Wireless Security Needs For Enterprises
Implement a novel symmetric block
Wireless security
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM

Similar to Wireless channel-based ciphering key generation: effect of aging and treatment (20)

PDF
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
PDF
Secret key extraction from wireless signal strength in real environments
PDF
Secret key extraction from wireless signal strength in real environments
PDF
Secret key extraction from wireless signal strength in real environments
PDF
Secret key extraction from wireless signal strength in real environments
PDF
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin Algorithm
PPT
ch07.ppt
PDF
Skyriver Communications – Fixed Wireless Security
PDF
A review on distributed beam forming techniques an approach in wireless rela...
PDF
Attack Robustness and Security Enhancement with Improved Wired Equivalent Pro...
PDF
Improved Image Encryption for Real-Time Application over Wireless Communicati...
PDF
SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...
PDF
Dn36682688
PPT
Wpmc2004 phy protection
PDF
Working with cryptographic key information
PDF
Framework for wireless network security using quantum cryptography
PDF
An Enhanced Encryption Technique using BCD and Bit Complementation
PDF
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
Secret key extraction from wireless signal strength in real environments
Secret key extraction from wireless signal strength in real environments
Secret key extraction from wireless signal strength in real environments
Secret key extraction from wireless signal strength in real environments
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin Algorithm
ch07.ppt
Skyriver Communications – Fixed Wireless Security
A review on distributed beam forming techniques an approach in wireless rela...
Attack Robustness and Security Enhancement with Improved Wired Equivalent Pro...
Improved Image Encryption for Real-Time Application over Wireless Communicati...
SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...
Dn36682688
Wpmc2004 phy protection
Working with cryptographic key information
Framework for wireless network security using quantum cryptography
An Enhanced Encryption Technique using BCD and Bit Complementation
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...
Ad

More from IJECEIAES (20)

PDF
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
PDF
Embedded machine learning-based road conditions and driving behavior monitoring
PDF
Advanced control scheme of doubly fed induction generator for wind turbine us...
PDF
Neural network optimizer of proportional-integral-differential controller par...
PDF
An improved modulation technique suitable for a three level flying capacitor ...
PDF
A review on features and methods of potential fishing zone
PDF
Electrical signal interference minimization using appropriate core material f...
PDF
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
PDF
Bibliometric analysis highlighting the role of women in addressing climate ch...
PDF
Voltage and frequency control of microgrid in presence of micro-turbine inter...
PDF
Enhancing battery system identification: nonlinear autoregressive modeling fo...
PDF
Smart grid deployment: from a bibliometric analysis to a survey
PDF
Use of analytical hierarchy process for selecting and prioritizing islanding ...
PDF
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...
PDF
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...
PDF
Adaptive synchronous sliding control for a robot manipulator based on neural ...
PDF
Remote field-programmable gate array laboratory for signal acquisition and de...
PDF
Detecting and resolving feature envy through automated machine learning and m...
PDF
Smart monitoring technique for solar cell systems using internet of things ba...
PDF
An efficient security framework for intrusion detection and prevention in int...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Embedded machine learning-based road conditions and driving behavior monitoring
Advanced control scheme of doubly fed induction generator for wind turbine us...
Neural network optimizer of proportional-integral-differential controller par...
An improved modulation technique suitable for a three level flying capacitor ...
A review on features and methods of potential fishing zone
Electrical signal interference minimization using appropriate core material f...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Bibliometric analysis highlighting the role of women in addressing climate ch...
Voltage and frequency control of microgrid in presence of micro-turbine inter...
Enhancing battery system identification: nonlinear autoregressive modeling fo...
Smart grid deployment: from a bibliometric analysis to a survey
Use of analytical hierarchy process for selecting and prioritizing islanding ...
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...
Adaptive synchronous sliding control for a robot manipulator based on neural ...
Remote field-programmable gate array laboratory for signal acquisition and de...
Detecting and resolving feature envy through automated machine learning and m...
Smart monitoring technique for solar cell systems using internet of things ba...
An efficient security framework for intrusion detection and prevention in int...
Ad

Recently uploaded (20)

PPTX
OOP with Java - Java Introduction (Basics)
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PPTX
Sustainable Sites - Green Building Construction
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PPTX
Geodesy 1.pptx...............................................
PDF
PPT on Performance Review to get promotions
PPTX
Internet of Things (IOT) - A guide to understanding
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PPT
Mechanical Engineering MATERIALS Selection
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
DOCX
573137875-Attendance-Management-System-original
PDF
Well-logging-methods_new................
OOP with Java - Java Introduction (Basics)
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
Sustainable Sites - Green Building Construction
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
Geodesy 1.pptx...............................................
PPT on Performance Review to get promotions
Internet of Things (IOT) - A guide to understanding
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
R24 SURVEYING LAB MANUAL for civil enggi
Mechanical Engineering MATERIALS Selection
CYBER-CRIMES AND SECURITY A guide to understanding
UNIT-1 - COAL BASED THERMAL POWER PLANTS
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
573137875-Attendance-Management-System-original
Well-logging-methods_new................

Wireless channel-based ciphering key generation: effect of aging and treatment

  • 1. International Journal of Electrical and Computer Engineering (IJECE) Vol. 14, No. 1, February 2024, pp. 451∼456 ISSN: 2088-8708, DOI: 10.11591/ijece.v14i1.pp451-456 ❒ 451 Wireless channel-based ciphering key generation: effect of aging and treatment Aqiel Almamori1 , Mohammed Adil Abbas2 1Electronics and Communication Department, Collage of Engineering, University of Baghdad, Baghdad, Iraq 2Continuing Education Center, University of Baghdad, Baghdad, Iraq Article Info Article history: Received Jun 17, 2023 Revised Jul 8, 2023 Accepted Jul 17, 2023 Keywords: Channel aging Ciphering Correlation Encryption Key generation Spectral efficiency ABSTRACT Key generation for data cryptography is vital in wireless communications secu- rity. This key must be generated in a random way so that can not be regenerated by a third party other than the intended receiver. The random nature of the wireless channel is utilized to generate the encryption key. However, the ran- domness of wireless channels deteriorated over time due to channel aging which casing security threats, particularly for spatially correlated channels. In this pa- per, the effect of channel aging on the ciphering key generations is addressed. A proposed method to randomize the encryption key each coherence time is de- veloped which decreases the correlation between keys generated at consecutive coherence times. When compared to the conventional method, the randomness improvement is significant at each time interval. The simulation results show that the proposed method improves the randomness of the encrypting keys. This is an open access article under the CC BY-SA license. Corresponding Author: Mohammed Adil Abbas Continuing Education Center, University of Baghdad Baghdad, Iraq Email: engimoh87@dcec.uobaghdad.edu.iq 1. INTRODUCTION Wireless communication has become a mandatory portion of our everyday life. However, this portion requires gigantic efforts to have the wireless transmission secured. This issue has become significant after the ever-increasing amount of data transmitted, wirelessly [1]–[3]. Since electromagnetic waves can propagate anywhere, data transmission is fundamentally fraught with danger. The security and confidentiality of the transmitted information have therefore consumed a substantial amount of researchers’ time and efforts. In order to ensure the confidentiality of transmissions, general transmission devices either use symmetric-key encryption or asymmetric-key encryption. However, neither of these methods is recommended due to the fact that asymmetric-key encryption necessitates a significant amount of complex processing power, and the second method necessitates a very secure link to transfer the unique encryption key, which is a crucial concern. Because sending sensitive information becomes impossible once the secret key is revealed [4], [5]. An alternative assumption is a keyless or physical layer security scheme was proposed. However, the keyless scheme limits the resources of wireless transmission. Furthermore, users of public networks face severe restrictions and costly additional expenses [6]–[10]. The concept of key generation was initially thought of and investigated theoretically in [11], [12]. Key generation is a crucial component of wireless transmission security. The process of generating a key entails the creation and distribution of an encryption code that can be used to secure the data at both ends of the transmission. Using a single code to encrypt the entire transmission is hazardous, however, because if the code Journal homepage: http://ijece.iaescore.com
  • 2. 452 ❒ ISSN: 2088-8708 is compromised, the entire transmission will be compromised [13], [14]. The improvement in the security of wireless networks is obtained by attaining information-theoretic secrecy, which provides network security with greater wireless adaptability. In contrast to conventional encryp- tion key generation methods, a recent security technique exploits the randomness of the wireless channel. This method of key generation greatly complicates attempts to reveal the transmission by a third party (adversaries) other than the transmitter and receiver [15]–[17]. Hence, the randomness in wireless channels can be harvested to generate uncorrelated secret codes to guarantee transmission security [18]. This assumption does not always hold true. Specifically in a static environment, the wireless channel does not vary enough, resulting in a low level of introduced randomness in the following time interval. A practical example of this environment is the indoor internet of things (IoT). Correlated successive channels result in the generation of correlated secret codes which endanger transmission confidentiality. Due to the high correlation between encryption keys, compromising one key could be used to easily decrypt the next [18], [19]. Nevertheless, recent work on encryption key generation in the static environment has attracted con- siderable interest. The capacity of the encryption key was determined and addressed the parameters that affect the capacity [20]–[22]. However, efforts are directed toward reaping the advantages of randomness through the application of reconfigurable intelligent surfaces (RIS) [23]–[25]. The current efforts concentrate on reducing transmission losses and restricting the information leakage to the eavesdroppers in order to maximize link effi- ciency. So far as we can tell, though, there appears to be little effort to draw attention to the consequences of utilizing encryption keys correlated to the generated encryption keys at consecutive coherence times. The contribution of this work addresses the impact of channel aging on the network security level to propose an alternative solution to overcome the issue of correlated successive encryption keys. This can be clearly seen in the low randomness environment or in other words, in the static environment when the user is sitting or moving lowly. Furthermore, the results of this paper show the impact of the proposed scheme and the speed of the moving user in enhancing network security. This study focuses on the design of a robust encryption key generation that avoids the correlation of consecutive encryption keys. The remainder of this paper is organized as follows, section 2 describes the system model of this study. The problem is brought up and formulated in section 3. The results are shown and discussed in section 4. Finally, section 5 concludes this study. 2. SYSTEM MODEL In this paper, the transmitter base station (BS) or access point (AP) ) is equipped with M transmit antennas and serves multiple users (total number of users is K) each user is equipped with a single antenna, as shown in Figure 1. Symmetric key encryption is considered that is used to encrypt the data transmission between the transmitter and each individual user, uk. Figure 1. System model Int J Elec & Comp Eng, Vol. 14, No. 1, February 2024: 451-456
  • 3. Int J Elec & Comp Eng ISSN: 2088-8708 ❒ 453 The link between each single user and the transmitter is secured with a unique secret code. The encryption key for each link is derived from the randomness of its acquired channel state information (CSI). The CSI of all users is gathered by the transmitter. For each coherent time of transmission, the transmitter creates a new encryption key for each user and conveys it via a confidential channel to all of the active users. However, when uk is in a static or slowly moving environment, the channel aging of uk may be low, and the subsequent coherent time may be correlated. In this way, the transmission would operate with correlated secret codes, and the disclosure of a single transmission’s encryption key would have adverse consequences [26]. Thus, breaking a single transmission’s encryption key would be used by adversaries employing brute-force attacks to break the next hop’s secret code since they are highly correlated, breaking a single hop’s secret code is a weakness that could cause a threat. As well, spatially correlated adversaries will have time to brute force attack. 3. PROBLEM FORMULATION This paper focuses on capturing the impact of the user in the slow-moving or static environment at the generated encryption key from the randomness of the wireless channel. The process of encryption key gener- ation involves three main steps: probing, quantization, information reconciliation, and privacy amplification. The channel is measured in the first step and converted into binary in the second. The error correction and secrecy evaluation are done in the last two steps. The comprehensive explanation of each of these stages is de- tailed in [15]. However, the channel between the transmitter and uk is given in (1) according to the assumptions in [17]. h[n] = αh[n − 1] + e[n] (1) where h[n − 1] represents the channel vector for the prior time slots while the effect of channel aging is represented by the error vector e[n]. The temporal correlation parameter is given by α = J0(2πfDTs). Where J0() is the zeroth-order Bessel function of the first kind. Ts, and fD are the channel sampling duration and the maximum Doppler shift, respectively. The value of the Doppler shift is given by (2): fD = vfc c (2) where v is the moving velocity of the user uk, c is the speed of light, and fc refers to the carrier frequency. [17]. For the successive time slots, the successive channel is correlated which leads to generating a cor- related encryption key. The key to mitigating and improving the quality of encryption keys is to introduce artificial randomness. The introduced randomness is added to the acquired channel during the process of gen- eration of the encryption key. For simplicity, the permutations for the required channel vector can be used to generate uncorrelated successive encryption keys. After permutating the channel vector a decimal-to-binary conversion has to be done. h01 = dec2bin(h) (3) where the vector h01 is binary vector of the length n bit. For a given vector h01 of length n it is simply to generate a matrix with the dimensions P = n! × n, every single row in matrix P has the same length as v but with different permutations. The transmitter and receiver are able to use any permutated row vector according to a pre-decided algorithm. 4. RESULTS AND DISCUSSION This section shows the simulation results that shows our proposal. The simulations of results were performed using MATLAB software. All generated simulations were made by averaging out 1,000 trails. In Figure 2, the correlation of the successive coherent encryption keys for the two schemes was ana- lyzed and compared. For the conventional scheme, highly correlated encryption keys result from the correlation between successive time slots. The correlation between the encryption keys decreases as a result of the effects of aging, However, the correlation between the first six encryption keys is considerably high. In contrast to the conventional approach, the proposed approach has shown considerable improvements. Hence, comparing Wireless channel-based ciphering key generation: effect of aging and treatment (Aqiel Almamori)
  • 4. 454 ❒ ISSN: 2088-8708 the first and second-time slots generated keys, the correlation drops from 6.3799 in the conventional scheme to 0.0013 in the proposed scheme. The results reveal that the generated keys are uncorrelated with the encryption keys that come from the second time slot. Hence, the impact of the permutation of the received channel vector can be clearly captured. Figure 3, demonstrates the influence of user speed on the correlation between two suc- cessive encryption keys that come from successive time slots. It can be clearly seen that for the slow-moving user or the static user, the channel is highly correlated due to the low-level impact of channel aging. Hence, the generated encryption keys from the highly correlated channel vectors are correlated accordingly. Contrarily, the correlation level drops for the fast-moving user. Accordingly, the key will be more vulnerable due to this correlation and a third party can get an advantage. Eventually, the eavesdropper has to find the permutation index which changes in coordination between transmitter and receiver before breaking the encryption which requires a huge computation power and time. The permutation index sharing between transmitter and receiver gives the key high randomness in which high computational power is needed to find it by the eavesdropper. 1 2 3 4 5 6 7 8 9 10 -1 0 1 2 3 4 5 6 7 8 9 10 Conventional Proposed Figure 2. A comparison of the correlation between the successive time slots 0 1 2 3 4 5 6 7 8 0 0.5 1 1.5 2 2.5 3 3.5 4 4.5 5 Figure 3. The correlation between the successive time slot versus the speed of the user 5. CONCLUSION Security of transmitted data is important in wireless communications. Consequently, data encryption with the proper key is necessary. The encryption key has to be random and challenging to revoke its regenerate by a third party. The randomness of the wireless channel has been utilized to generate the encryption key. The correlation between the generated keys at consecutive intervals of coherence times is high, particularly in slow- moving mobile phones. This correlation is a weakness in network security and causes a threat. A proposed Int J Elec & Comp Eng, Vol. 14, No. 1, February 2024: 451-456
  • 5. Int J Elec & Comp Eng ISSN: 2088-8708 ❒ 455 key generation method to overcome this threat is adding new randomization of binary key bits based on the bits permutations. This method highly improves the randomness and makes key regeneration by eavesdropper harder. The proposed method has improved the performance of the key. REFERENCES [1] N. M. Mukhammadovich and A. Rakhmatillo Djuraevich, “Working with cryptographic key information,” In- ternational Journal of Electrical and Computer Engineering (IJECE), vol. 13, no. 1, pp. 911–919, Feb. 2023, doi: 10.11591/ijece.v13i1.pp911-919. [2] N. Ibraheem and M. Hasan, “Combining several substitution cipher algorithms using circular queue data structure,” Baghdad Science Journal, vol. 17, no. 4, Dec. 2020, doi: 10.21123/bsj.2020.17.4.1320. [3] A. N. Mazher and J. Waleed, “Retina based glowworm swarm optimization for random cryptographic key generation,” Baghdad Science Journal, vol. 19, no. 1, Feb. 2022, doi: 10.21123/bsj.2022.19.1.0179. [4] R. Yudistira, “AES (advanced encryption standard) and RSA (Rivest–Shamir–Adleman) encryption on digital sig- nature document: a literature review,” International Journal of Information Technology and Business, vol. 2, no. 1, pp. 1–3, 2020. [5] R. L. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public-key cryptosystems,” Yudistira Communications of the ACM, vol. 21, no. 2, pp. 120–126, Feb. 1978, doi: 10.1145/359340.359342. [6] M. A. Abbas, H. Song, and J. P. Hong, “Opportunistic scheduling for average secrecy rate enhancement in fading downlink channel with potential eavesdroppers,” IEEE Transactions on Information Forensics and Security, vol. 14, no. 4, pp. 969–980, 2019, doi: 10.1109/TIFS.2018.2868494. [7] S. A. Mohammed, “Securing physical layer for FHSS communication system using code andphase hopping tech- niques in CDMA, system design and implementation,” Journal of Engineering, vol. 26, no. 7, pp. 190–205, Jul. 2020, doi: 10.31026/j.eng.2020.07.13. [8] M. A. Abbas, H. Song, and J.-P. Hong, “Secure wireless communications in broadcast channels with confidential messages,” IEEE Access, vol. 7, pp. 170525–170533, 2019, doi: 10.1109/ACCESS.2019.2955603. [9] W. Trappe, “The challenges facing physical layer security,” IEEE Communications Magazine, vol. 53, no. 6, pp. 16–20, Jun. 2015, doi: 10.1109/MCOM.2015.7120011. [10] Y. Wu, A. Khisti, C. Xiao, G. Caire, K.-K. Wong, and X. Gao, “A survey of physical layer security techniques for 5G wireless networks and challenges ahead,” IEEE Journal on Selected Areas in Communications, vol. 36, no. 4, pp. 679–695, Apr. 2018, doi: 10.1109/JSAC.2018.2825560. [11] R. Ahlswede and I. Csiszar, “Common randomness in information theory and cryptography. I. Secret sharing,” IEEE Transactions on Information Theory, vol. 39, no. 4, pp. 1121–1132, Jul. 1993, doi: 10.1109/18.243431. [12] U. M. Maurer, “Secret key agreement by public discussion from common information,” IEEE Transactions on Infor- mation Theory, vol. 39, no. 3, pp. 733–742, May 1993, doi: 10.1109/18.256484. [13] Y. Xiao, V. K. Rayi, B. Sun, X. Du, F. Hu, and M. Galloway, “A survey of key management schemes in wireless sensor networks,” Computer Communications, vol. 30, no. 11–12, pp. 2314–2341, Sep. 2007, doi: 10.1016/j.comcom.2007.04.009. [14] M. Masdari, S. Ahmadzadeh, and M. Bidaki, “Key management in wireless body area network: chal- lenges and issues,” Journal of Network and Computer Applications, vol. 91, pp. 36–51, Aug. 2017, doi: 10.1016/j.jnca.2017.04.008. [15] K. Ren, H. Su, and Q. Wang, “Secret key generation exploiting channel characteristics in wireless communications,” IEEE Wireless Communications, vol. 18, no. 4, pp. 6–12, Aug. 2011, doi: 10.1109/MWC.2011.5999759. [16] S. Ribouh, K. Phan, A. V. Malawade, Y. Elhillali, A. Rivenq, and M. A. Al Faruque, “Channel state information-based cryptographic key generation for intelligent transportation systems,” IEEE Transactions on Intelligent Transportation Systems, vol. 22, no. 12, pp. 7496–7507, Dec. 2021, doi: 10.1109/TITS.2020.3003577. [17] K. T. Truong and R. W. Heath, “Effects of channel aging in massive MIMO systems,” Journal of Communications and Networks, vol. 15, no. 4, pp. 338–351, Aug. 2013, doi: 10.1109/JCN.2013.000065. [18] J. Zhang, T. Q. Duong, A. Marshall, and R. Woods, “Key generation from wireless channels: a review,” IEEE Access, vol. 4, pp. 614–626, 2016, doi: 10.1109/ACCESS.2016.2521718. [19] N. Aldaghri and H. Mahdavifar, “Physical layer secret key generation in static environments,” IEEE Transactions on Information Forensics and Security, vol. 15, pp. 2692–2705, 2020, doi: 10.1109/TIFS.2020.2974621. [20] J. Zhang, B. He, T. Q. Duong, and R. Woods, “On the key generation from correlated wireless channels,” IEEE Communications Letters, vol. 21, no. 4, pp. 961–964, Apr. 2017, doi: 10.1109/LCOMM.2017.2649496. [21] J. Li, P. Wang, L. Jiao, Z. Yan, K. Zeng, and Y. Yang, “Security analysis of triangle channel-based physical layer key generation in wireless backscatter communications,” IEEE Transactions on Information Forensics and Security, vol. 18, pp. 948–964, 2023, doi: 10.1109/TIFS.2022.3224852. [22] A. Almamori and M. A. Abbas, “Channel state information estimation for reconfigurable intelligent surfaces based on received signal analysis,” International Journal of Electrical and Computer Engineering (IJECE), vol. 13, no. 2, Wireless channel-based ciphering key generation: effect of aging and treatment (Aqiel Almamori)
  • 6. 456 ❒ ISSN: 2088-8708 pp. 1599–1605, Apr. 2023, doi: 10.11591/ijece.v13i2.pp1599-1605. [23] V. Shahiri, H. Behroozi, and A. Kuhestani, “Intelligent reflecting surface assisted secret key generation under spatially correlated channels in quasi-static environments,” Dec. 2022, arXiv:2212.01563. [24] Z. Wei and W. Guo, “Random matrix based physical layer secret key generation in static channels,” Oct. 2021, arXiv:2110.12785. [25] Z. Wei, B. Li, and W. Guo, “Adversarial reconfigurable intelligent surface against physical layer key generation,” IEEE Transactions on Information Forensics and Security, vol. 18, pp. 2368–2381, 2023, doi: 10.1109/TIFS.2023.3266705. [26] A. Almamori and S. Mohan, “Estimation of channel state information for massive MIMO based on received data using Kalman filter,” in 2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC), Jan. 2018, pp. 665–669, doi: 10.1109/CCWC.2018.8301698. BIOGRAPHIES OF AUTHORS Aqiel Almamori received the B.Sc. degree in electronics and communications engineer- ing and the M.Sc. degree in communications engineering from Nahrain University in Baghdad, Iraq in 1999, 2002, respectively. He received a Ph.D. in telecommunications and networking from the University of Arkansas at Little Rock, USA, in 2018. In 2005–2013, he joined Motorola Solutions as a radio frequency engineer. He has been working as a lecturer in the Electronics and Communi- cation Department, College of Engineering, University of Baghdad. He can be contacted at email: a.eced@coeng.uobaghdad.edu.iq. Mohammed Adil Abbas received the B.Sc. degree from the Department of Electronics and Communications, University of Baghdad, Baghdad, Iraq, in 2009, and the M.S. degree from the Department of Information and Communications, Pukyong National University, Busan, South Korea, in 2017. He is currently a lecturer with the Development and Continuing Education Center, University of Baghdad. He can be contacted at email: engimoh87@dcec.uobaghdad.edu.iq. Int J Elec & Comp Eng, Vol. 14, No. 1, February 2024: 451-456