Abstract
Physical Layer Security (PLS) has emerged as a promising solution for small and resource-limited wireless communications devices, to reduce the overhead associated with the required security resources and latency. In contrast to traditional security schemes, PLS relies on and benefits from the random nature of physical channels. However, the majority of PLS schemes in the literature lack the notion of secrecy and dynamicity, and employ static keys to generate fixed cipher primitives. In this paper, a dynamic key generation scheme that combines a pre-shared/stored secret key with a dynamic nonce extracted from channel information (for each new session) is proposed. The main advantage of this approach is that it achieves a high-security level with minimal overhead. Moreover, the obtained dynamic key can be changed frequently upon any change in channel parameters. Using the produced dynamic keys, cipher primitives are generated (permutation operations), which get updated for each frame symbol. This process ensures different and unique encryption layers for each new input frame and for each symbol in the input frame. Equally important, the proposed encryption algorithm operates at the modulation symbol level in order to attain performance by limiting the effect of error propagation and by realizing parallel encryption/decryption for each frame symbol. In addition, a preamble encryption scheme is also proposed to prevent unauthorized synchronization or channel estimation by illegitimate users. The security level of the proposed cipher scheme mainly depends on a secret key and the dynamicity of the channel to update the cipher primitives used for each frame symbol. Finally, security and performance analyses validate the efficiency and the robustness of the proposed approach.














Similar content being viewed by others
References
Zhang X et al (2018) Compressive sensing based multiuser detection via iterative reweighed approach in M2M communications. IEEE Wireless Commun Lett
Chen B et al (2017) A dynamic module deployment framework for M2M platforms. In: IEEE Proc Int Symp Cloud and Service Computing (SC2). IEEE, pp 194–200
Akitaya T, Saba T (2015) Energy efficient artificial fast fading for MISO-OFDM systems. In: Proc IEEE Global Commun Conf (GLOBECOM), San Diego, CA, USA, pp 1–6
Zhang J et al (2017) Design of an OFDM physical layer encryption scheme. IEEE Trans Veh Technol 66 (3):2114–2127
Lampinen K, Westman T, Haikola V Method and apparatus for physical layer link adaptation based on traffic properties, Mar. 14 2017, uS Patent 9,596,057
Hussein S, Noura H, Martin S, Boukhatem L, Agha KA (2013) ERCA: Efficient and robust cipher algorithm for LTE data confidentiality. In: Proceedings of the 16th ACM international conference on modeling, analysis & simulation of wireless and mobile systems. ACM, pp 299–308
Noura H, Hussein S, Martin S, Boukhatem L, Agha KA (2015) ERDIA: An efficient and robust data integrity algorithm for mobile and wireless networks. In: IEEE Proc. Wireless Commun Net. Conf. (WCNC). IEEE, pp 2103–2108
Huo F, Gong G (2014) A new efficient physical layer OFDM encryption scheme. In: Proc IEEE Int Conf Computer Commun (INFOCOM), Toronto, ON, Canada, pp 1024–1032
Akitaya T, Asano S, Saba T (2014) Time-domain artificial noise generation technique using time-domain and frequency-domain processing for physical layer security in MIMO-OFDM systems. In: Proc IEEE Int Conf Commun (ICC), Sydney, NSW, Australia, pp 807–812
Wu X et al (2016) Artificial-noise-aided physical layer phase challenge-response authentication for practical OFDM transmission. IEEE Trans Wirel Commun 15(10):6611–6625
Cao Y, Jiang T, Han Z (2016) A survey of emerging M2M systems: Context, task, and objective. IEEE Internet of Things Journal 3(6):1246–1258
Atzori L, Iera A, Morabito G (2010) The internet of things: a survey. Comput Netw 54(15):2787–2805
Asadi A, Wang Q, Mancuso V (2014) A survey on device-to-device communication in cellular networks. IEEE Commun Surv Tutorials 16(4):1801–1819. Fourthquarter
Chen S, et al. (2017) Vehicle-to-everything (v2x) services supported by LTE-based systems and 5G. IEEE Commun Standards Mag 1(2):70–76
Adame T, Bel A, Bellalta B, Barcelo J, Oliver M (2014) IEEE 802.11 Ah: the WiFi approach for M2M communications. IEEE Wireless Commun 21(6):144–152
Huo F, Gong G (2014) A new efficient physical layer OFDM encryption scheme. In: Proc IEEE Int Conf Computer Commun (INFOCOM), Toronto, ON, Canada, pp 1024–1032
Noura H, Melki R, Chehab A, Mansour M, Martin S (2018) Efficient and secure physical encryption scheme for Low-Power wireless M2M devices. In: IWCMC 2018 Security Symposium (IWCMC-security 2018), Limassol, Cyprus
Tsai Y-R, Tai C-W, Yang K-J (2014) Effective channel perturbation based on cyclic delay for physical layer security in OFDM systems. In: Proc Int Conf Inf science, Electronics Electrical Eng’g (ISEEE), vol 2, pp 823–827
Hamamreh J, Arslan H (2017) Secure orthogonal transform division multiplexing (OTDM) waveform for 5G and beyond. IEEE Commun Lett 21(5):1191–1194
Zhang J, Duong TQ, Marshall A, Woods R (2016) Key generation from wireless channels: a review. IEEE Access 4:614–626
Zhang J, Marshall A, Woods R, Duong TQ (2016) Efficient key generation by exploiting randomness from channel responses of individual ofdm subcarriers. IEEE Trans Commun 64(6):2578–2588
Zhang J, He B, Duong TQ, Woods R (2017) On the key generation from correlated wireless channels. IEEE Commun Lett 21(4):961–964
Rahbari H, Krunz M (2017) Exploiting frame preamble waveforms to support new physical-layer functions in OFDM-based 802.11 systems. IEEE Trans Wirel Commun 16(6):3775–3786
Zhang J, Marshall A, Woods R, Duong TQ (2017) Design of an ofdm physical layer encryption scheme. IEEE Trans Veh Technol 66(3):2114–2127
Badawy A et al (2016) Unleashing the secure potential of the wireless physical layer: Secret key generation methods. Phys Commun 19:1–10
Noura H, Chehab A, Sleem L, Noura M, Couturier R, Mansour M (2018) One round cipher algorithm for multimedia IoT devices. Multimed Tools Appl 77(14):18383–18413
Bassham L et al (2010) A statistical test suite for random and pseudorandom number generators for cryptographic applications, NIST NIST Pubs 800-22 Rev 1a
Lee Rodgers J, Nicewander WA (1988) Thirteen ways to look at the correlation coefficient. Amer Statist 42(1):59–66
Massoudi A et al (2008) Overview on selective encryption of image and video: challenges and perspectives. EURASIP J Inf Secur 2008(1):1–18
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Noura, H.N., Melki, R., Chehab, A. et al. A Physical Encryption Scheme for Low-Power Wireless M2M Devices: a Dynamic Key Approach. Mobile Netw Appl 24, 447–463 (2019). https://doi.org/10.1007/s11036-018-1151-7
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11036-018-1151-7