Scalable Secret Key Generation for Wireless Sensor Networks


Altun U., Tedik Başaran S., Karabulut Kurt G. Z., Özdemir E.

IEEE SYSTEMS JOURNAL, cilt.16, ss.6031-6041, 2022 (SCI-Expanded) identifier identifier identifier

  • Yayın Türü: Makale / Tam Makale
  • Cilt numarası: 16
  • Basım Tarihi: 2022
  • Doi Numarası: 10.1109/jsyst.2022.3198521
  • Dergi Adı: IEEE SYSTEMS JOURNAL
  • Derginin Tarandığı İndeksler: Science Citation Index Expanded (SCI-EXPANDED), Scopus, Compendex, INSPEC
  • Sayfa Sayıları: ss.6031-6041
  • Anahtar Kelimeler: Wireless sensor networks, Receivers, Channel estimation, Time-frequency analysis, Security, Bandwidth, Broadcasting, Analog function computation, key agreement, key generation, physical layer, prime integers, security, wireless sensor networks (WSNs), THE-AIR COMPUTATION, ANALOG FUNCTION COMPUTATION, PHYSICAL-LAYER, TRANSMISSION
  • İstanbul Teknik Üniversitesi Adresli: Evet

Özet

Future sensor networks require energy and bandwidth efficient designs to support the growing number of nodes. The security aspect is often neglected due to the extra computational burden imposed on the sensor nodes. In this article, we propose a secret key generation method for wireless sensor networks by using the physical layer features. This key generation method is based on the superposition property of wireless channels. The proposed method exploits the multiple access property of the wireless channel with simultaneous transmissions as in the analog function computation technique to solve the latency and scarce bandwidth problems of highly populated dense networks. All nodes use the same time and frequency block to provide scalability that is linearly proportional to the number of nodes. The proposed method also benefits from the network density to provide security against eavesdroppers that aim to sniff the secret key from the channel. The security of the proposed method against eavesdroppers is analytically studied. Moreover, their application in multiple layers is investigated. The presented results have shown that there is a tradeoff between the total power consumption and total used bandwidth for secret key generation. Lastly, the error probability of the generated keys due to thermal noise and channel estimation error is investigated with computer simulations and compared with broadcasting-based benchmark model.