Introduction
Internet of Things (IoT) is envisioned to expand Internet connectivity and fuse the digital and physical world [1]–[5]. To enhance the resource-constrained IoT devices, the cloud vendors and the mobile operators are converging at the mobile edge computing environment [6]–[10]. The performance of IoT applications depends on the following four categories of system-wide information [11]–[19]: 1) static cloud resource configuration parameters (e.g., the storage capacity of edge cloud and communications resources of an IoT device) specified by the existing public standardization or protocols; 2) dynamic resource utilization status (e.g., the number of occupied resource blocks of a wireless access point and the buffer occupancy of a video streaming device); 3) status of the data pipeline, including the channel state of the wireless medium and the bandwidth measurement of the wired medium; 4) information of the data flow being transmitted in the pipeline.
With full knowledge of the system information, the quality of service (QoS) can be optimized by designing various resource provisioning schemes, such as deployment, association, allocation, and load balancing algorithms. The majority of the existing resource provisioning schemes rely on the trusted centralized controller to collect and exchange large scale system information, which is summarized as the input states (aforementioned static configurations or instantaneous parameters) in Fig. 1. This is a strong assumption for the cloud-enabled IoT infrastructure because of the public nature of the cloud resources and wireless channels.
The intuition from the perspective of system security, however, is to avoid any public sharing of system information and remove the dependency on semi-trusted remote resources, i.e., guaranteeing the locality of both information and resource. Understanding the benefits brought by the local information exchange will not only better balance the tradeoff between performance and security, but also present opportunities to engineer the privately-owned information to extract lightweight keys and achieve previously inconceivable security properties.
This paper focuses on the following fundamental question about performance improvement and information leakage caused by information exchange in the cloud enhanced IoT networks. With limited information exchange, the physical (PHY) layer key generation pipeline can potentially enable two nodes to agree on a common key, such as extracting a common key based on the reciprocity of the wireless channel characteristics. How can one rigorously define and derive the security metrics for such a key generation pipeline?
Since system information exchange (channel state information) can in some cases cause security breach (physical layer key exposure), the information locality is engineered into the PHY layer key generation pipeline as illustrated in Fig. 2. Given the channel reciprocity of a point-to-point wireless link, there is a strong correlation between the probing signals received by Alice and Bob. Consequently, at the end of each key generation procedure, without publicly reporting or sharing channel information through the system, the two users can agree on a common key based on their respectively received time-varying signals. To theoretically measure the security performance of the generated key with multiple malicious users eavesdropping the broadcasted probing signals, we propose to leverage a probabilistic graphical model named Dynamic Bayesian Network (DBN).
By treating the channel statuses experienced by different users in the system as random variables, the DBN model structure becomes a directed acyclic graph that can encode the conditional dependence between any pair of variables as a directed edge, where the starting vertex of the edge is the parent variable, and the ending vertex is the child variable. To quantify the information leakage caused by passive eavesdropping during the probing period, all the users’ received signals will be fed into the DBN model as time series. The correlation among consecutive signals can also be incorporated into the network structure of DBN, i.e., by flexibly adding the edges to encode the conditional dependence of variables in different time slots. The time series input and the conditional dependence edges allow DBN to adapt to the dynamic wireless channels.
With the proposed DBN model structure and the input data, we can 1) estimate the model parameters, i.e., the conditional probability of each random variable given its parents (such as the probability distribution of Alice’s received signal given Bob’s received signal), and 2) infer the corresponding conditional min-entropy to measure the uncertainty remaining in the key given the eavesdroppers’ observations. As demonstrated by the data collected from the real-world experiments, extracting the common key from the local information can reduce the security vulnerabilities of the IoT applications deployed on cloud platforms.
As compared to the existing theoretical security analysis frameworks, the contributions of this work are summarized as follows. 1) The proposed probabilistic graphical model will scale well to multiple passive eavesdroppers and be much less demanding in terms of the probing sequence length needed to estimate the security measurement of the generated key. 2) With prior knowledge of the instantaneous channel fading distribution and white noise parameters, the information flow in DBN can be estimated with less complexity [20], [21]. 3) DBN also comprehensively includes all of the signals transmitted and received in the channel probing step, including information leakage caused by eavesdropping.
The remaining of the paper is organized as follows. Section II introduces the existing experimental and theoretical works on the physical layer key generation. Section III explains the proposed system model and the corresponding security metric. Section IV covers the detailed security quantification algorithms and the corresponding performance with the real world data, and Section VI presents the conclusion.
Related Works
The physical layer has been used for autonomous key generation by exploiting the physical communication channels or hardware-imperfection based attributes for the authentication process [22]–[26].
A. Physical Layer-Based Key Generation Pipeline
As illustrated in Fig. 2, current physical layer-based key generation schemes are largely based on the 4-step pipeline performed by two devices named Alice and Bob.
Step 1:
Pairwise channel probing for
time slots. With probing sequence{\mathbf {T}}=\{1,\ldots, T\} , Alice and Bob have their corresponding received signals\{x^{t}|t\in {\mathbf {T}}\} and\{y_{A}^{t}|t\in {\mathbf {T}}\} , respectively.\{y_{B}^{t}|t\in {\mathbf {T}}\} Step 2:
Quantization scheme
to generate bit strings:\tau for Alice and\rho _{A} for Bob.\rho _{B} Step 3:
Reconciliation to eliminate the discrepancy between two bit strings: Bob recovers
by using its own measurement\rho _{A} and error information\rho _{B} . Since Bob’s stringe can be treated as a noisy (fuzzy) version of Alice’s string\rho _{B} , the error information\rho _{A} can be decoded based one , which is generated by the secure sketch schemes [27].Ske Step 4:
Privacy amplification to increase the randomness of the generated common key
, where randomness extractork can derive a uniformly random stringExt fromk and an\rho _{A} -bit random seedR [28], [23].r
Owing to the wireless channel reciprocity between Alice and Bob, channel impulse responses or received signal strengths derived from
B. Security Analysis for Physical Layer Key Generation
Empirical Security Analysis — In terms of security analysis for the generated key, the majority of the existing evaluations are performed using empirical methods. 1) For a two-node system with Alice and Bob, the following metrics have been measured in different phases of the pipeline: bit disagreement rate (BDR) before and after Step 3 [23], [30], secret mutual information shared via probing sequence in Step 1 [23], average min-entropy on each bit of the bit string in Step 2 to measure the lower bound of the randomness of the key [31], and secret bit rate to measure the average number of secret bits extracted from each reconciled channel response (Step 3) [32]. 2) For the multi-node system with passive/active attacker Eve, leaked information has been adopted to measure the mutual information among Alice, Bob, and Eve of the probing sequences in Step 1 [23].
Channel Modeling — The theoretical security performance of the physical layer-based key depends on randomness inherent in the wireless channel model. Channel modeling has laid the foundation for the first generation of wireless cellular technology over 40 years ago. As illustrated in Fig. 3, the relationship between the signal received by Alice
Theoretical Security Analysis — In the limited amount of theoretical frameworks, based on different wireless channel models, there are two directions on the security analysis.
With the assumption that
andh_{A}^{t} in Step 1 are independent and identically distributed (i.i.d.), i.e., no Markov property, the mutual information between Alice’s channel estimation (h_{A}^{t+1} ) and Bob’s channel approximation (\tilde { h}_{A} ) has been derived using an information theoretic approach [36]–[38], where the time index\tilde {h}_{B} is dropped because of the stationary and memoryless assumption. It has been found that the mutual informationt will decrease with the key coherence time, which can be approximated as the duration of one time slot because when the time interval between the ping signal and pong signal in one time slot is bigger than a certain threshold, the reciprocity between channelsI(\tilde { h}_{A},\tilde {h}_{B}) and{h}_{A} cannot be guaranteed [39]. To obtain high secrecy capacity (mutual information over coherence time), the key generation system prefers shorter time slots. The short time slot will invalidate the i.i.d. assumption for both{h}_{B} andh_{A}^{t} , and render the derived security performance measurement inaccurate.h_{B}^{t} With channel fading
being kept in a black-box, Edman et al. [40] assumed the first order Markov property for Alice’s received signalh_{A}^{t} , and they subsequently adopted the hidden Markov model (HMM) to derive the conditional min-entropy, which measures the uncertainty remained in Alice’s private sequential channel measurements{{\mathbf {Y}}_{A}}=\{y_{A}^{t}|t\in \bf {T}\} given Eve’s passive sequential observation sequence, where 0–255 is the standard range of the received signal strength indicator (RSSI) [41]. Wang et al. [42] extended the scenario to the case with multiple passive eavesdroppersy_{A}^{t}\in \{s_{0},\ldots, s_{j},\ldots, s_{255}\} . As illustrated in Fig. 4, at time{\mathbf {M}}=\{1,\ldots, M\} , the eavesdroppers’ measurements aret , with{{\mathbf {Y}}_{E}^{t}}=\{y_{i}^{t}|i\in \bf {M}\} being the ping signal transmitted by Bob and received by they_{i}^{t} -th eavesdropper. However, it is found that HMM cannot scale well with multiple eavesdroppers because the state space (i possible states) of eavesdroppers’ joint observation grows exponentially with256^{M} and the corresponding HMM parameters cannot be estimated accurately with the limited probing sequence given in Step 1.M
Eavesdropping: (a) wiretap channel model with
System Model
To answer the question “Is it possible to obtain the physical layer key with provable security?”, we will design the security metrics for the common keys obtained from local channel state information. Given the fact that the keys are derived from the wireless channel between nodes, it is essential to prevent the system from revealing such information using the network. To theoretically quantify the information leakage occurred in the key generation pipeline, a probabilistic graphical model will be adopted to flexibly model the information flow caused by public channel probings and subsequent eavesdropping. The detailed signal model, channel model, and information flow model are given below.
A. Signal Model
As shown in Fig. 5, the wiretap channel model is adopted to evaluate the performance of the secret key extracted from the physical properties of the wireless channel between two legitimate wireless devices: Alice
Signal probing with multiple eavesdroppers: (a) Ping signal received by Alice and
In the \begin{equation*} \begin{cases} y_{A}^{t}=h_{A}^{t}x^{t}+n_{0},\\ y_{B}^{t}=h_{B}^{t}x^{t}+n_{0},\\ \end{cases}\tag{1}\end{equation*}
Each eavesdropper \begin{equation*} \begin{cases} y_{i}^{t}=h_{i}^{t} x^{t}+n_{0},\\ y_{i'}^{t}=h_{i'}^{t} x^{t}+n_{0},\\ \end{cases}\tag{2}\end{equation*}
B. Channel Model
We denote
The instantaneous channel fading amplitude is assumed to be a Gaussian mixture model (GMM) with multiple components [43], [44]. With a sufficient number of mixing Gaussian components, it is mathematically convenient to adopt GMM as a universal approximator of densities. For instance, at time \begin{equation*} h_{A}^{t}\sim \sum \limits _{j=1}^{N_{A}} w_{A,j}^{t}\mathcal {N}\left ({\mu _{A,j}^{t},\,\left ({\sigma _{A,j}^{t}}\right)^{2}}\right),\tag{3}\end{equation*}
The time variation of the wireless fading channels is assumed to satisfy the first order Markov property. Namely, \begin{equation*} h_{A}^{t+1}\perp h_{A}^{t-1}|h_{A}^{t},\tag{4}\end{equation*}
C. Information Flow Model
To provision practical and provable security, fundamental methods are needed to bridge the gap between information theory and engineering solutions. We will adopt a general dynamic Bayesian network (DBN) model, which can represent the probabilistic relationships among interacting variables (nodes) using a parameterized directed acyclic graph. The directed edge encodes the conditional dependence of the child node on one or more parent nodes, where the starting vertex of the directed edge is the parent, and the ending vertex is the child.
As shown in Fig. 6, at each time slot
DBN = graph structure + local conditional distribution of each node given its parents. A colored node denotes a continuous observable variable, a shaded node indicates a latent continuous variable, and a square node means a discrete control variable.
The probabilistic model for the graph is a joint probability over all random variables. Since each variable is conditionally independent of all its non-descendants in the graph given the value of all its parents, joint distributions can be encoded as a product of local conditional distributions. The joint probability of the system is expressed as follows.\begin{align*}&\Pr \left ({{\mathbf {Y}}_{A},{\mathbf {H}}_{A},n_{0},{\mathbf {Y}}_{B},{\mathbf {H}}_{B},{\mathbf {Y}}_{E},{\mathbf {Y}}_{E'},{\mathbf {H}}_{E},{\mathbf {H}}_{E'}}\right) \\&\;={\Pr \left [{y_{A}^{1}|x^{1},h_{A}^{1},n_{0}}\right]}\times \Pr [h_{A}^{1}]\times \Pr [n_{0}] \\&\;\times {\Pr \left [{y_{B}^{1}|x^{1},h_{B}^{1},n_{0}}\right]}\times \Pr \left [{h_{B}^{1}|h_{A}^{1}}\right] \\&\;\times \prod \limits _{i=1}^{M}\left \{{{\Pr \left [{y_{i}^{1}|x^{1},h_{i}^{1},n_{0}}\right]}\times {\Pr [h_{i}^{1}|h_{A}^{1}]}}\right \} \\&\times \;\prod \limits _{i=1}^{M}\left \{{{\Pr \left [{y_{i'}^{1}|x^{1},h_{i'}^{1},n_{0}}\right]}\times {\Pr [h_{i'}^{1}|h_{B}^{1}]}}\right \} \\&\;\times \left \{{\prod \limits _{t=2}^{T}\left \{{{\Pr \left [{y_{A}^{t}|x^{t},h_{A}^{t},n_{0}}\right]}\times \Pr \left [{{h_{A}^{t}|h_{A}^{t-1}} }\right]\times \Pr [n_{0}]}\right \}}\right \} \\&\;\times \left \{{\prod \limits _{t=2}^{T}\left \{{{\Pr \left [{y_{B}^{t}|x_{t},h_{B}^{t},n_{0}}\right]} \Pr \left [{{h_{B}^{t}|h_{B}^{t-1}}}\right]\Pr \left [{{h_{B}^{t}|h_{A}^{t}}}\right]}\right \}}\right \} \\&\;\times \left \{{\prod \limits _{t=2}^{T}\prod \limits _{i=1}^{M}\left \{{{\Pr \left [{y_{i}^{t}|x^{t},h_{i}^{t},n_{0}}\right]}{\Pr [h_{i}^{t}|h_{i}^{t-1}]}{\Pr [h_{i}^{t}|h_{A}^{t}]}}\right \}}\right \} \\&\;\times \left \{{\prod \limits _{t=2}^{T}\prod \limits _{i=1}^{M}\left \{{{\Pr \left [{y_{i'}^{t}|x^{t},h_{i'}^{t},n_{0}}\right]}{\Pr [h_{i'}^{t}|h_{i'}^{t-1}]}{\Pr [h_{i'}^{t}|h_{B}^{t}]}}\right \}}\right \}\tag{5}\end{align*}
D. Security Evaluation for the Probing Phase of the Key Generation Pipeline
The security strength of a pre-shared key between Alice and Bob can be measured as the number of bits (Shannon entropy) in the key, that is, to break any “\begin{align*} H_{\infty }(K)=&\min \limits _{k\in \mathcal {K}}-\log \Pr [K=k] \\=&- \log \left ({\max \limits _{k\in {\mathbf {{\mathcal {K}}}}} \Pr [K=k]}\right),\tag{6}\end{align*}
Suppose the adversary can eavesdrop some information \begin{equation*} 2^{-{H_{\infty } }(K|O=o)}=\max \limits _{k\in {\mathbf {{\mathcal {K}}}}} \Pr [K=k|{O} = o].\tag{7}\end{equation*}
\begin{align*}&{H_{\infty } }({K}|{O}) = - \log \left ({{\mathop {\mathbb {E}}\limits _{o \leftarrow {O}}[{2^{ - {H_{\infty } }({K}|{O} = o)}}]}}\right) \\&\;- \log \left ({\sum \limits _{o \in {O}}\Pr [{O} = o] \left ({\max \limits _{k\in {\mathcal {K}}} \Pr [K=k|O = o]}\right)}\right),\tag{8}\end{align*}
As shown in Fig. 2, during the key generation procedure, adversaries can eavesdrop the channel probing signal, the secure sketch, and the random seed. In this paper, we primarily focus on the information leakage incurred during the probing phase. That is, the observation \begin{align*}&2^{-{H_{\infty } }\left ({{\mathbf {Y}}_{A}|{\mathbf {Y}}_{E},{\mathbf {Y}}_{E'}}\right)} \\&\;=\sum \limits _{\left \{{y_{(1:M)}^{(1:T)},y_{(1':M')}^{(1:T)}}\right \}}\left \{{\vphantom {\max \limits _{y_{A}^{(1:T)}} \Pr \left [{{\mathbf {Y}}_{A}=y_{A}^{(1:T)}|{\mathbf {Y}}_{E}=y_{(1:M)}^{(1:T)},{\mathbf {Y}}_{E'}=y_{(1':M')}^{(1:T)}}\right]}\Pr \left [{{\mathbf {Y}}_{E}=y_{(1:M)}^{(1:T)},{\mathbf {Y}}_{E'}=y_{(1':M')}^{(1:T)}}\right]}\right. \\&\;\quad \times \left.{\max \limits _{y_{A}^{(1:T)}} \Pr \left [{{\mathbf {Y}}_{A}=y_{A}^{(1:T)}|{\mathbf {Y}}_{E}=y_{(1:M)}^{(1:T)},{\mathbf {Y}}_{E'}=y_{(1':M')}^{(1:T)}}\right]}\right \}. \\\tag{9}\end{align*}
Conditional Min-Entropy Quantification
The objective of a key generation system is to maximize the conditional min-entropy, i.e., minimizing
Task 1) DBN learning learns the parameters based on the known structure and partially observed data in Fig. 6. In particular, based on the collected signals
Task 2) Marginal inference calculates the marginal probability of eavesdroppers’ observation.\begin{equation*} \Pr \left [{{\mathbf {Y}}_{E}=y_{(1:M)}^{(1:T)},{\mathbf {Y}}_{E'}=y_{(1':M')}^{(1:T)}}\right].\tag{10}\end{equation*}
Task 3) Maximum a Posteriori (MAP) inference decodes the most likely signal received by Alice given Eve’s observations, and returns the corresponding posteriori probability.\begin{align*}&\max \limits _{y_{A}^{(1:T)}} \Pr \left [{{\mathbf {Y}}_{A}=y_{A}^{(1:T)}|{\mathbf {Y}}_{E}=y_{(1:M)}^{(1:T)},{\mathbf {Y}}_{E'}=y_{(1':M')}^{(1:T)}}\right] \\&\;=\frac {\max \limits _{y_{A}^{(1:T)}} \Pr \left [{{\mathbf {Y}}_{A}=y_{A}^{(1:T)},{\mathbf {Y}}_{E}=y_{(1:M)}^{(1:T)},{\mathbf {Y}}_{E'}=y_{(1':M')}^{(1:T)}}\right]} {\Pr \left [{{\mathbf {Y}}_{E}=y_{(1:M)}^{(1:T)},{\mathbf {Y}}_{E'}=y_{(1':M')}^{(1:T)}}\right]},\tag{11}\end{align*}
A. Model Structure Simplification
DBN learning aims to learn the parameters based on the known structure and partially observed data in Fig. 6. In particular, based on the collected signals
One challenge for conducting parameter learning is designing a general framework applicable to the various probability distribution for the instantaneous wireless channel behaviors. Another issue is that the mixed template model has discrete input variable
With the above two assumptions, a latent variable is introduced to indicate which Gaussian component is chosen, and the DBN in Fig. 6 can be simplified to Fig. 7. For instance, GMM for \begin{equation*} \begin{cases} \Pr [z_{A}^{t}=j]=w_{A,j}^{t},j\in \{1,\ldots, N_{A}\},\\ \Pr [h_{A}^{t}]=\sum \limits _{j=1}^{N_{A}}\Pr [h_{A}^{t}|z_{A}^{t}=j]\Pr [z_{A}^{t}=j]\\ \qquad \quad \mathrel {\mathrel {\mathop:}\hspace {-0.0672em}=}\sum \limits _{j=1}^{N_{A}} w_{A,j}^{t}\mathcal {N}\left ({\mu _{A,j}^{t},\,{(\sigma _{A,j}^{t}})^{2}}\right),\\ \Pr [y_{A}^{t}]=\Pr [h_{A}^{t}+n_{0}]\\ \qquad \quad \mathrel {\mathrel {\mathop:}\hspace {-0.0672em}=}\sum \limits _{j=1}^{N_{A}} w_{A,j}^{t} \mathcal {N}\left ({\mu _{A,j}^{t},\,(\sigma _{A,j}^{t})^{2}+\sigma ^{2}}\right), \end{cases}\tag{12}\end{equation*}
B. Algorithms for Tasks 1–3
Parameter Learning: To learn the network parameters (conditional probability distribution of each variable), the expectation–maximization (EM) algorithm is adopted to iteratively improve the maximum likelihood of the latent variables [47]. 1) Assume the latent variable follows the multinomial distributions. 2) Expectation (E) step creates a function for the expectation of the log-likelihood evaluated using the current estimate for the parameters. 3) The maximization (M) step computes parameters that maximize the expected log-likelihood found on the E step, and these parameter-estimates are then used to determine the distribution of the latent variables in the next E step. The EM iteration alternates between performing the E step and M step until convergence.
Marginal Inference: The junction tree algorithm will make probabilistic inference. The intuition is to use independence properties of the graph to decompose a global calculation on a joint probability into a linked set of local computations. The inference data structure named junction tree will elicit the relationship between locality and probabilistic inference. This algorithm will work with any probabilistic graphical model by generalizing variable elimination.
MAP Inference: The Annealed MAP algorithm [48] can find the most likely configuration of values of a set of nodes given observations of another subset of nodes. The Annealed MAP algorithm approximates the most probable sequence of states by simulated annealing [49]. While the solution is approximate, it performs well in practice and it gives an idea of the order of magnitude of the true maximum. The Annealed MAP algorithm drastically extends the class of MAP problems that can be solved.
Security Performance Evaluation
For the point-to-point system with
To better visualize each node’s RSSI, Fig. 9 (a) presents the average of the RSSI points on either side of time
A. Assumption Verification of the Real-World Data
To quantify the security performance of the physical layer key generated form the real-world RSSI sequences, the following properties have been verified so that they can fit the proposed DBN model.
Assumption 1 (Stationary distribution):
Since RSSI collected by each node can be treated as a time series, the Augmented Dickey-Fuller (ADF) test has been conducted to determine how strongly a time series is defined by a trend. There are a number of unit root tests and ADF is one of the more widely used. It uses an autoregressive model and optimizes an information criterion across multiple different lag values. The results show that each node’s RSSI is a stationary process.
Assumption 2 (Mixture Gaussian distribution):
To verify the mixture Gaussian distribution of RSSI, the EM algorithm has been applied to Alice’s received signal. The result has shown a one-dimensional Gaussian mixture model with seven components. The first panel of Fig. 10 shows the model selection criteria, Bayesian information criterion (BIC), as a function of the number of components. The BIC curve has an elbow point at the 7-component model. The second panel shows a histogram of the data, along with the best-fit model for a mixture with seven components. The third panel shows the probability that a given point is drawn from each class (component) as a function of its position, and the last panel shows the weight of each Gaussian component. Similar Gaussian mixture model can be applied to other nodes’ RSSI measurements.
Assumption 3 (Markov property):
To test the Markov assumption of each user’s received RSSI sequence, the conditional characteristic function (CCF) of the current measurements given those taken in the past should be estimated. By dividing the Alice’s RSSI sequence into multiple chunks, each chunk consists of 100 measurements. Using these chunks as learning data, the CCF test [50] conclude that Alice’s RSSI measurement follows the 4-th order Markov property. For probabilistic graphical models, when the Markov assumption is not satisfied, the foundation of algorithms for the three tasks may be violated, thus leading to deterioration of their performance to different degrees. Consequently, in the following section when evaluating the minimum conditional entropy, the order of Markov property will be considered.
B. Model Comparisons
The three tasks for the conditional min-entropy estimation are conducted using the GeNIe Modeler and SMILE Engine,1 which provides artificial intelligence modeling and machine learning software based on Bayesian networks. The performance of the proposed DBN model is compared with two existing models illustrated in Fig. 11: 1) the Hidden Markov model with Alice and one eavesdropper [40]; 2) the Hidden Markov model with Alice and five eavesdroppers [42].
Parameter Learning Accuracy: Suppose each user’s RSSI sequence has been divided into chunks, each with
The validation and training accuracy for
For the HMM model, the learning accuracy decreases with the number of eavesdroppers
As we can see, the proposed DBN model outperforms the two existing HMM based models, because the test accuracy is up to 48%. This shows that the physical layer-key generation pipeline is not as secure as though by previous works. When
Minimum Conditional Entropy Estimation: For the system with Alice and one eavesdropper, among the collected 9755 user-specific RSSI chunks, each unique eavesdropper’s sequence of length
For the DBN model, instead of using RSSI measurement as evidence,
C. The DBN-Based Security Quantification for IoT Networks
For IoT networks, the security performance of the physical layer-based key depends on the randomness inherent in the wireless channel. If the key generation pipeline is deployed in the stationary wireless sensor network, the slowly changing wireless channel characteristics will increase the order of the Markov property, because the consecutive probing signals received by each user, such as Alice, can be highly correlated, even identical. In this case, the proposed DBN model can still measure the security performance of the generated key because an edge between correlated vertices (from
For the IoT system with high order Markov property, to guarantee the conditional min-entropy, one approach is downsampling the probing sequence [40], which can increase the time interval of time series being fed into the DBN model. The second approach relies on the privacy amplification scheme designed in Step 4 of Fig. 2. The first approach will take longer to generate one key, and the second approach requires the computing resources of the IoT devices. Nonetheless, the proposed model can guide whether the security enhancement schemes have reached the desired performance level.
Conclusion
For IoT applications, there has been essentially very little understanding of the security level in the physical layer attribute-based keys, and yet they appear to be a promising authentication tool for security-sensitive applications with resource-constrained IoT devices. The fundamental to engineering/deploying IoT applications with security requirements may lie in understanding the security level along the key generation pipeline. In this paper, by rigorously quantifying the security metric of the physical layer key, we have taken various information leakage into consideration. As compared with the existing HMM based security performance evaluation models, the proposed DBN model can better quantify the information leakage with more flexibility and less data.
ACKNOWLEDGMENT
The authors thank Dr. Qiang Tang (The University of Sydney) for providing the real-world data and for useful discussions.