Information-Theoretic Secure Key Sharing for Wide-Area Mobile Applications

01/04/2023
by   Guyue Li, et al.
0

With the rapid growth of handheld devices in the internet of things (IoT) networks, mobile applications have become ubiquitous in everyday life. As technology is developed, so do also the risks and threats associated with it, especially in the forthcoming quantum era. Existing IoT networks, however, lack a quantum-resistant secret key sharing scheme to meet confidential message transmission demands in wide-area mobile applications. To address this issue, this article proposes a new scheme, channel reciprocity (CR) based quantum key distribution (QKD) CR-QKD, which accomplishes the goal of secret key sharing by combining emerging techniques of QKD and CR-based key generation (CRKG). Exploiting laws of quantum physics and properties of wireless channels, the proposed scheme is able to ensure the secrecy of the key, even against computationally unbounded adversaries. The basic mechanism is elaborated for a single-user case and it is extended into a multi-user case by redesigning a multi-user edge forwarding strategy. In addition, to make CR-QKD more practical, some enhancement strategies are studied to reduce the time delay and to improve the secret key generation rate in a secure manner. A prototype of CR-QKD is demonstrated in a metropolitan area network, where secret keys are shared between two remote IoT devices that are roughly fifteen kilometers apart from each other. The experimental results have verified that CR-QKD allows a secret key rate of 424 bits per second with a retransmission rate of 2.1

READ FULL TEXT

page 1

page 5

page 6

research
11/27/2019

A Secure and Robust Scheme for Sharing Confidential Information in IoT Systems

In Internet of Things (IoT) systems with security demands, there is ofte...
research
12/08/2019

Universal limitations on quantum key distribution over a network

Entanglement is an intriguing quantum phenomenon with crucial implicatio...
research
02/22/2021

InaudibleKey: Generic Inaudible Acoustic Signal based Key Agreement Protocol for Mobile Devices

Secure Device-to-Device (D2D) communication is becoming increasingly imp...
research
01/29/2018

Secure Massive IoT Using Hierarchical Fast Blind Deconvolution

The Internet of Things and specifically the Tactile Internet give rise t...
research
01/15/2020

Network Information Theoretic Security

Shannon showed that to achieve perfect secrecy in point-to-point communi...
research
10/17/2021

Novel Secret-Key-Assisted Schemes for Secure MISOME-OFDM Systems

We propose a new secure transmission scheme for uplink multiple-input si...
research
10/18/2018

Channel-Envelope Differencing Eliminates Secret Key Correlation: LoRa-Based Key Generation in Low Power Wide Area Networks

This paper presents automatic key generation for long-range wireless com...

Please sign up or login with your details

Forgot password? Click here to reset