Key Generation Method Based on Multi-Satellite Cooperation and Random Perturbation
Abstract
:1. Introduction
- Traditional Cryptography: Traditional cryptography generates secret keys through a cryptographic algorithm, and then distributes them to legitimate users to encrypt the plaintext. This method uses the computational complexity of cryptographic algorithms to ensure the security of cipher text. Actually, encryption and decryption calculations in this method require a lot of computing resources. Additionally, key management and distribution rely on complex protocol architecture. So, it is not suitable for LEO satellite communication systems with limited computing resources, rapid changes in network topology, and massive access to users. Further, with the rapid development of advanced computing technology, this method based on computational complexity faces challenges in terms of reliability and robustness [9].
- Physical Layer Security (PLS): Physical layer security uses the endogenous characteristics of the wireless channel, such as time varying, randomness and uniqueness, to directly extract the secret key. This method has the advantages of simple cryptographic calculations and no additional overhead on key management and distribution [10,11], which is suitable for LEO satellite communication systems. Therefore, the use of PLS technology to solve the security problems in LEO satellite communication has attracted great attention from many scholars.
- Security Performance Analysis: For example, ref. [12] analyzed the security performance of a satellite-to-ground communication network with a legitimate user and eavesdropper. This paper also proposed the closed expressions of confidential capacity probability, confidential interruption probability and average confidentiality probability.
- Transmission Power Optimization: For example, ref. [13] proposed a transmission power optimization method for multi-antenna satellite communication based on PLS, which can effectively prevent eavesdroppers from wiretapping communication signals.
- Security Rate Maximum: For example, ref. [14] used the PLS method to optimize the beamforming vector by combining the uplink and downlink time allocation according to the requirements of different target receivers for different speeds and data transmission rates, which can maximize the system security rate.
- The Insecurity of Satellite Trajectory: Different from the electromagnetic wave propagation conditions of the ground scenario, satellite-to-ground communication includes two parts: the space segment and the telephone segment. The CSI of the satellite-to-earth channel is directly related to the position of satellites and ground receivers [3,15]. Due to the openness of satellite motion parameters, satellite orbits are predictable, which means eavesdroppers can directly obtain the position of satellites and ground receivers. This leads to the revelation of the legal channel’s CSI and insecurity of physical layer key sources.
- The Insecurity of Satellite Signals: Due to the limited size, satellite antennae always have a small equivalent aperture and a wide signal beam in long-distance satellite-to-ground communication. When satellite signals reach the ground, they can be regarded as far-field parallel lights [16]. Therefore, each satellite signal can cover numerous ground receivers within a range of hundreds of kilometers, and each satellite-to-ground channel is highly correlated with another. This means eavesdroppers can easily obtain the CSI of the legal channel by estimating relevant channels. In this case, the physical layer key generation method is impractical.
- We proposed a multi-satellite coordination model to solve the problem that the channels between a single satellite and multiple ground receivers have strong correlations.
- We introduced a satellite perturbation factor into the channel model to restore the endogenous randomness of the satellite-to-ground channel, which can improve the randomness of the channel and prevent eavesdroppers from predicting the satellite position precisely.
- Based on the above model, we proposed a key generation method to generate secret keys from the satellite-to-ground channel, which includes four parts: channel estimation, quantify, information negotiation and privacy magnification.
- To verify the feasibility of the proposed method, we simulated and analyzed the randomness and safety of the generated key. The simulation results show that the proposed model has endogenous randomness and the proposed key generation method is feasible.
2. System Model
- 1.
- Space Segment
- 2.
- Ground Segment
3. Secret Key Generation Method
3.1. Channel Estimation
3.1.1. Channel Estimation of Bob
3.1.2. Channel Estimation of Satellites
3.2. Quantify
3.3. Information Negotiation
3.4. Privacy Magnification
4. Theoretical Analysis
4.1. Equivalent Near-Field Model Analysis
4.2. Security Analysis
4.2.1. Influence of Satellite Number
4.2.2. Influence of the Perturbation Factor
5. Simulation Analysis
- The number of LEO satellites is .
- Signal-to-noise ratio is .
- , .
- The satellites are evenly distributed on a circular arc centered on Bob with a radius of 2000 km, the distance between adjacent satellites is 110 km.
- The satellite-to-ground communication frequency is 29.3 GHz (ka band).
5.1. Randomness Analysis
5.2. Security Analysis
6. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
Appendix A
Appendix B
References
- Qu, Z.; Zhang, G.; Cao, H.; Xie, J. LEO Satellite Constellation for Internet of Things. IEEE Access 2017, 5, 18391–18401. [Google Scholar] [CrossRef]
- Liu, C.; Kirchengast, G.; Sun, Y.; Du, Q.; Bai, W.; Proschek, V.; Wang, X.; Xia, J.; Meng, X.; Wang, D.; et al. Study on LEO-LEO microwave occultation. In Proceedings of the 2017 IEEE International Geoscience and Remote Sensing Symposium (IGARSS), Fort Worth, TX, USA, 23–28 July 2017; pp. 538–541. [Google Scholar] [CrossRef]
- Deng, R.; Di, B.; Zhang, H.; Song, L. Ultra-Dense LEO Satellite Constellation Design for Global Coverage in Terrestrial-Satellite Networks. In Proceedings of the GLOBECOM 2020—2020 IEEE Global Communications Conference, Taipei, China, 7–11 December 2020; pp. 1–6. [Google Scholar] [CrossRef]
- Wu, C.; Sun, Y.; Wang, X.; Liu, C.; Du, Q.; Bai, W.; Wang, D.; Meng, X.; Cai, Y.; Liu, C.; et al. A Leo-Leo Occultation System Using Microwave Signals. In Proceedings of the IGARSS 2018—2018 IEEE International Geoscience and Remote Sensing Symposium, Valencia, Spain, 22–27 July 2018; pp. 3147–3148. [Google Scholar] [CrossRef]
- Liang, H.; Chen, F.; Ji, X.; Lu, P.; Gao, Y. The development of world-earth integrated information network and the application of mimicry technology. Sci. China Inf. Sci. 2019, 49, 799–818. [Google Scholar]
- Ji, X.; Tao, X.; Huang, K.; Wu, H. Introduction to the topic of B5G network security. Sci. China Inf. Sci. 2021, 51, 171–172. [Google Scholar]
- Wang, Y.; Gu, L.; Liu, H. Status and future development of low-orbit satellite mobile communications. Commun. Technol. 2020, 53, 103–109. [Google Scholar]
- Ji, X.; Liang, H.; Hu, H. Thoughts on the Security Protection Technology of World-Ground Integration Information Network. Tele-Commun. Sci. 2017, 33, 24–35. [Google Scholar]
- Li, B.; Fei, Z.; Zhou, C.; Zhang, Y. Physical-Layer Security in Space Information Networks: A Survey. IEEE Internet Things J. 2019, 7, 33–52. [Google Scholar] [CrossRef]
- Jin, L.; Hu, X.; Sun, X.; Lou, Y.; Huang, K.; Zhong, Z.; Xu, X. Native Security Scheme Based on Physical Layer Chain Key for Encryption and Authentication. In Proceedings of the 2021 IEEE Wireless Communications and Networking Conference Workshops (WCNCW), Nanjing, China, 29 March 2021; pp. 1–7. [Google Scholar] [CrossRef]
- Jin, L.; Wang, X.; Lou, Y.; Xu, X. Achieving one-time pad via endogenous secret keys in wireless communication. In Proceedings of the 2020 IEEE/CIC International Conference on Communications in China (ICCC), Chongqing, China, 9–11 August 2020; pp. 1092–1097. [Google Scholar] [CrossRef]
- Guo, K.; Zhang, B.; Huang, Y.; Guo, D. Secure performance analysis of satellite communication networks in Shadowed Rician Channel. In Proceedings of the 2016 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT), Limassol, Cyprus, 12–14 December 2016; pp. 156–159. [Google Scholar] [CrossRef]
- Gao, Y.; Ao, H.; Zhou, Q.; Feng, Z.; Zhou, W.; Li, Y.; Li, X. Modeling of satellite communication systems design with physical layer security. In Proceedings of the 2017 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), Chennai, India, 22–24 March 2017; pp. 1680–1683. [Google Scholar] [CrossRef]
- Kalantari, A.; Zheng, G.; Gao, Z.; Han, Z.; Ottersten, B. Secrecy Analysis on Network Coding in Bidirectional Multibeam Satellite Communications. IEEE Trans. Inf. Forensics Secur. 2015, 10, 1862–1874. [Google Scholar] [CrossRef] [Green Version]
- Fu, Q.-Y.; Feng, Y.-H.; Wang, H.-M.; Liu, P. Initial Satellite Access Authentication Based on Doppler Frequency Shift. IEEE Wirel. Commun. Lett. 2020, 10, 498–502. [Google Scholar] [CrossRef]
- Jin, L.; Lou, Y.; Xu, X.; Zhong, Z.; Wang, H. Separating Multi-Stream Signals Based on Space-Time Isomerism. In Proceedings of the 2020 International Conference on Wireless Communications and Signal Processing (WCSP), Nanjing, China, 21–23 October 2020; pp. 418–423. [Google Scholar] [CrossRef]
- Nie, X.; Mi, H.; Wu, X. Research on satellite-to-ground channel performance based on integrated channel model. Spacecr. Eng. 2012, 21, 48–52. [Google Scholar] [CrossRef]
- Huang, K.; Jin, L.; Chen, Y.; Lou, Y.; Zhou, Y.; Ma, K.; Xu, X.; Zhong, Z.; Zhang, S. Development and new challenges of wireless physical layer key generation technology. J. Electron. Inf. 2020, 42, 2330–2341. [Google Scholar]
- Li, X.; Jin, L.; Zhong, Z.; Lou, Y. A Physical-Layer Message Encryption and Authentication Scheme. In Proceedings of the 2018 IEEE 4th International Conference on Computer and Communications (ICCC), Chengdu, China, 7–10 December 2018; pp. 1893–1898. [Google Scholar] [CrossRef]
- Jin, L.; Cai, A.; Huang, K.; Zhong, Z.; Lou, Y. Key generation scheme based on multiple random signal streams. J. Electron. Inf. Technol. 2019, 41, 1405–1412. [Google Scholar]
- Wang, H.-M.; Bai, J.; Dong, L. Intelligent Reflecting Surfaces Assisted Secure Transmission without Eavesdropper’s CSI. IEEE Signal Process. Lett. 2020, 27, 1300–1304. [Google Scholar] [CrossRef]
- Li, Z.; Wang, S.; Mu, P.; Wu, Y.-C. Sum Rate Maximization of Secure NOMA Transmission with Imperfect CSI. In Proceedings of the ICC 2020—2020 IEEE International Conference on Communications (ICC), Dublin, Ireland, 7–11 June 2020; pp. 1–6. [Google Scholar] [CrossRef]
- Wanga, H.-M.; Jiang, J.-C.; Wang, Y.-N. Model Refinement Learning and an Example on Channel Estimation with Universal Noise Model. IEEE J. Sel. Areas Commun. 2020, 39, 31–46. [Google Scholar] [CrossRef]
- Zhan, F.; Yao, N.; Gao, Z.; Yu, H. Efficient key generation leveraging wireless channel reciprocity for MANETs. J. Netw. Comput. Appl. 2018, 104, 18–28. [Google Scholar] [CrossRef]
- Bennett, C.H.; Brassard, G.; Crepeau, C.; Maurer, U.M. Generalized privacy amplification. IEEE Trans. Inf. Theory 1995, 41, 1915–1923. [Google Scholar] [CrossRef] [Green Version]
- Yan, S.; Li, Q. Optimizing Array Signal Processing (Volumes 1 and 2). Acta Acoust. 2018, 43, 728. [Google Scholar]
- Hu, X. Research on Physical Layer Key Generation Technology under the Conditions of Eavesdropping Channel. Master’s Thesis, Information Engineering University, Zhengzhou, China, 2018. [Google Scholar]
- Jin, H.; Huang, K.; Jin, L.; Zhong, Z.; Chen, Y. Physical-Layer Secret Key Generation with Correlated Eavesdropping Channel. In Proceedings of the 2018 IEEE 4th International Conference on Computer and Communications (ICCC), Chengdu, China, 7–10 December 2018; pp. 226–231. [Google Scholar] [CrossRef]
- Zhang, J.; Marshall, A.; Woods, R.; Duong, T.Q. Secure key generation from OFDM subcarriers’ channel responses. In Proceedings of the 2014 IEEE Globecom Workshops (GC Wkshps), Austin, TX, USA, 8–12 December 2014; pp. 1302–1307. [Google Scholar] [CrossRef]
- Bassham, L.; Rukhin, A.; Soto, J.; Nechvatal, J.; Smid, M.; Leigh, S.; Levenson, M.; Vangel, M.; Heckert, N.; Banks, D. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications; Special Publication (NIST SP); National Institute of Standards and Technology; Gaithersburg, MD, USA. 2010. Available online: https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=906762 (accessed on 4 December 2021).
- Xiao, S.; Guo, Y.; Huang, K.; Jin, L. Cooperative Group Secret Key Generation Based on Secure Network Coding. IEEE Commun. Lett. 2018, 22, 1466–1469. [Google Scholar] [CrossRef]
- Xu, Q.; Ren, P. Channel-Aware Key Generation under Wireless Fading Environment. IEEE Commun. Lett. 2020, 24, 1636–1640. [Google Scholar] [CrossRef]
- Hu, X.; Jin, L.; Huang, K.; Sun, X.; Zhou, Y. Secret Key Generation Assisted by Intelligent Reflecting Surface with Discrete Phase Shift in Static Environment. IEEE Wirel. Commun. Lett. 2021, 10, 1867–1870. [Google Scholar] [CrossRef]
Environment | Pass Ratio | p-Value |
---|---|---|
Frequency | 1.00000 | 0.911413 |
Block Frequency | 0.96972 | 0.719747 |
Cumulative Sums(Fwd) | 1.00000 | 0.419021 |
Cumulative Sums(Rev) | 1.00000 | 0.595549 |
Runs | 0.97731 | 0.289667 |
Longest Run | 0.99651 | 0.798139 |
FFT | 0.99892 | 0.213309 |
Serial | 1.00000 | 0.616305, 0.41902 |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Hao, Y.; Mu, P.; Wang, H.; Jin, L. Key Generation Method Based on Multi-Satellite Cooperation and Random Perturbation. Entropy 2021, 23, 1653. https://doi.org/10.3390/e23121653
Hao Y, Mu P, Wang H, Jin L. Key Generation Method Based on Multi-Satellite Cooperation and Random Perturbation. Entropy. 2021; 23(12):1653. https://doi.org/10.3390/e23121653
Chicago/Turabian StyleHao, Yinuo, Pengcheng Mu, Huiming Wang, and Liang Jin. 2021. "Key Generation Method Based on Multi-Satellite Cooperation and Random Perturbation" Entropy 23, no. 12: 1653. https://doi.org/10.3390/e23121653
APA StyleHao, Y., Mu, P., Wang, H., & Jin, L. (2021). Key Generation Method Based on Multi-Satellite Cooperation and Random Perturbation. Entropy, 23(12), 1653. https://doi.org/10.3390/e23121653