Skip to main content

Abstract

In this paper, we propose and analyze a secret key agreement (SKA) protocol designed for multiple-input multiple-output (MIMO) scenarios, in which a legitimate transmitter estimates the amount of information that can be leaked to potentially hazardous legitimate receivers in the network, generates a secret key, and transmits the generated key to a specific legitimate receiver. For the latter key transmission step, a new beamforming method is proposed that regards other legitimate receivers in the network as untrustworthy nodes and show the attack algorithm they can perform. The proposed protocol requires only one-way transmission and no mutual interaction to share the secret key. Through numerical simulations, we evaluate two scenarios for malicious users, where a part of them are other legitimate receivers. Namely, we evaluate the information leakage risk of our model under two conditions: a disadvantage for them, where the malicious user is unaware of the existence of beamforming, and an advantage, where the user can jam directly to the beamformer. Finally, to demonstrate the practicality of the protocol, we demonstrate that the beamforming advantage dramatically reduces the computational complexity requirement at the legitimate receiver.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    In our future work, we consider the case where \(N_\textrm{E}\) is large.

References

  1. Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978)

    Article  MathSciNet  MATH  Google Scholar 

  2. Shor, P.: Algorithms for quantum computation: discrete logarithms and factoring. In: 35th Annual Symposium on Foundations of Computer Science, pp. 124–134, November 1994

    Google Scholar 

  3. Mucchi, L., et al.: Physical-layer security in 6G networks. IEEE Open J. Commun. Soc. 2, 1901–1914 (2021)

    Article  Google Scholar 

  4. Khisti, A., Wornell, G., Wiesel, A., Eldar, Y.: On the gaussian MIMO wiretap channel. In: IEEE International Symposium on Information Theory, pp. 2471–2475, June 2007

    Google Scholar 

  5. Maurer, U.M.: Secret key agreement by public discussion from common information. IEEE Trans. Inf. Theory 39(3), 733–742 (1993)

    Article  MathSciNet  MATH  Google Scholar 

  6. Sharifian, S., Poostindouz, A., Safavi-Naini, R.: A capacity-achieving one-way key agreement with improved finite blocklength analysis. In: International Symposium on Information Theory and Its Applications, pp. 407–411, October 2020

    Google Scholar 

  7. Dean, T.R., Goldsmith, A.J.: Physical-layer cryptography through massive MIMO. IEEE Trans. Inf. Theory 63(8), 5419–5436 (2017)

    Article  MathSciNet  MATH  Google Scholar 

  8. Gallager, R.: Low-density parity-check codes. IRE Trans. Inf. Theory 8(1), 21–28 (1962)

    Article  MathSciNet  MATH  Google Scholar 

  9. Muramatsu, J., Miyake, S.: Construction of codes for the wiretap channel and the secret key agreement from correlated source outputs based on the hash property. IEEE Trans. Inf. Theory 58(2), 671–692 (2012)

    Article  MathSciNet  MATH  Google Scholar 

  10. Wang, L., Bashar, S., Wei, Y., Li, R.: Secrecy enhancement analysis against unknown eavesdropping in spatial modulation. IEEE Commun. Lett. 19(8), 1351–1354 (2015)

    Article  Google Scholar 

Download references

Acknowledgement

This work was partially supported by JST SICORP Grant Number JPMJSC20C1, Japan.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Naoki Ishikawa .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Otsuka, S., Iimori, H., Ando, K., de Abreu, G.T.F., Ishibashi, K., Ishikawa, N. (2023). Analysis of Secret Key Agreement Protocol for Massive MIMO Systems. In: García Bringas, P., et al. International Joint Conference 15th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2022) 13th International Conference on EUropean Transnational Education (ICEUTE 2022). CISIS ICEUTE 2022 2022. Lecture Notes in Networks and Systems, vol 532. Springer, Cham. https://doi.org/10.1007/978-3-031-18409-3_9

Download citation

Publish with us

Policies and ethics