Intelligent Reflecting Surface-Assisted Physical Layer Key Generation with Deep Learning in MIMO Systems
Abstract
:1. Introduction
- We introduce an IRS into scenarios where blockages exist between legitimate communication parties to assist PLKG. Then, we construct the hybrid channel function and achieve an optimal achievable rate by adjusting phase shifts.
- We design the IRS-CRNet that can efficiently learn the reciprocity from the channel state information (CSI). Without any prior knowledge and much computational overhead, IRS-CRNet trained with a hybrid loss function can extract the channel features with high reciprocity, which can be used for generating the initial key directly.
- Based on the IRS-CRNet, we propose a novel IRS-assisted PLKG scheme for TDD systems. Experimental simulation results show that the performance of this scheme is excellent in terms of three metrics, including key generation rate, key error rate and randomness.
2. Related Work
2.1. PLKG without IRS
2.2. PLKG with IRS
3. Materials and Methods
3.1. Channel Model
3.2. Channel Reciprocal Features Extraction Model
3.3. PLKG Process
- Channel probing: Conventionally, two legitimate communication parties, i.e., Alice and Bob, send a pilot signal synchronously, and then we can estimate the channel state information (CSI). However, after introducing an IRS, we need to consider the reflecting channel. According to Equation (1), the combined channel response can be expressed as
- Reciprocal Channel Features Extraction: Though we adopted the TDD system, the actual reciprocity is not great enough to be used directly to generate the key. We need to extract the reciprocal channel features from the estimated CSI after combining the reflecting and direct channel according to Equation (12). Because of the significant amount of prior knowledge required, it is difficult to extract the reciprocity by theoretical equations. Therefore, we exploit the IRS-CRNet to extract the reciprocal channel features.
- Quantization: We intend to convert the channel features to a binary bit sequence with high key generation rate, low key error rate and sufficient randomness. First, we need to preprocess the original channel matrix over each subcarrier with the method below
- Information Reconciliation and Privacy Amplifying: The mismatched bits in the initial key can be corrected by information reconciliation to reduce KER. Information reconciliation can be realized by many protocols, i.e., BCH code [36], ECC [37], Cascade [38], and Golay code [39]. The privacy amplifying phase mostly exploits the hash function to convert the corrected key sequence with the information reconciliation to a shorter secret key, which can be used directly.
Algorithm 1 The multi-level quantization algorithm based on PPF |
Input: The normalized feature vector ; the quantization factor with a default value: 10 Output: The quantized bit sequence ;
|
4. Experimental Results
4.1. Simulation Setup
4.2. Performance Metrics of PLKG
- Key generation rate (KGR): In this paper, this metric is slightly different from mentioned in other works. We define as
- Key error rate (KER): It is defined as the number of error bits divided by the number of total bits [3].
- Randomness: The randomness of the initial key generated based on the PLKG scheme is important to maintain security. We use a test suit based on The National Institute of Standards and Technology (NIST) [42] to evaluate the randomness of the initial key.
4.3. Performance of Achievable Rate
4.4. Performance of IRS-CRNet
- AutoEncoder [21]: It is a simple autoencoder model which consists of an encoder and a decoder. It inspires a new way of thinking as an end-to-end reconstruction optimization task.
- DNN [43]: It is designed for channel calibration in generic massive MIMO systems. It has the potential in many parameter estimation problems for communications. It has the multilayer structure with three hidden fully connected layers.
- KGNet [3]: It is designed for frequency band feature mapping to construct reciprocal channel features between legitimate communication parties in SISO FDD systems. It has a multilayer structure with four hidden, fully connected layers.
4.5. Performance of PLKG Scheme Based on IRS-CRNet
4.6. Overhead Analysis
5. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Ahmad, I.; Shahabuddin, S.; Kumar, T.; Okwuibe, J.; Gurtov, A.; Ylianttila, M. Security for 5G and beyond. IEEE Commun. Surv. Tutorials 2019, 21, 3682–3722. [Google Scholar] [CrossRef]
- Khan, R.; Kumar, P.; Jayakody, D.N.K.; Liyanage, M. A survey on security and privacy of 5G technologies: Potential solutions, recent advancements, and future directions. IEEE Commun. Surv. Tutorials 2019, 22, 196–248. [Google Scholar] [CrossRef] [Green Version]
- Zhang, X.; Li, G.; Zhang, J.; Hu, A.; Hou, Z.; Xiao, B. Deep-Learning-Based Physical-Layer Secret Key Generation for FDD Systems. IEEE Internet Things J. 2021, 9, 6081–6094. [Google Scholar] [CrossRef]
- Ren, K.; Su, H.; Wang, Q. Secret key generation exploiting channel characteristics in wireless communications. IEEE Wirel. Commun. 2011, 18, 6–12. [Google Scholar] [CrossRef]
- Zeng, K. Physical layer key generation in wireless networks: Challenges and opportunities. IEEE Commun. Mag. 2015, 53, 33–39. [Google Scholar] [CrossRef]
- Zhang, J.; Duong, T.Q.; Marshall, A.; Woods, R. Key generation from wireless channels: A review. IEEE Access 2016, 4, 614–626. [Google Scholar] [CrossRef] [Green Version]
- Liu, H.; Wang, Y.; Yang, J.; Chen, Y. Fast and practical secret key extraction by exploiting channel response. In Proceedings of the 2013 Proceedings IEEE INFOCOM, Turin, Italy, 14–19 April 2013; pp. 3048–3056. [Google Scholar]
- Zhang, J.; Marshall, A.; Woods, R.; Duong, T.Q. Efficient key generation by exploiting randomness from channel responses of individual OFDM subcarriers. IEEE Trans. Commun. 2016, 64, 2578–2588. [Google Scholar] [CrossRef] [Green Version]
- Zhao, J.; Xi, W.; Han, J.; Tang, S.; Li, X.; Liu, Y.; Gong, Y.; Zhou, Z. Efficient and secure key extraction using CSI without chasing down errors. arXiv 2012, arXiv:1208.0688. [Google Scholar]
- Zhan, F.; Yao, N. On the using of discrete wavelet transform for physical layer key generation. Ad Hoc Netw. 2017, 64, 22–31. [Google Scholar] [CrossRef]
- Aldaghri, N.; Mahdavifar, H. Fast secret key generation in static environments using induced randomness. In Proceedings of the 2018 IEEE Global Communications Conference (GLOBECOM), Abu Dhabi, United Arab Emirates, 9–13 December 2018; pp. 1–6. [Google Scholar]
- Aldaghri, N.; Mahdavifar, H. Physical layer secret key generation in static environments. IEEE Trans. Inf. Forensics Secur. 2020, 15, 2692–2705. [Google Scholar] [CrossRef] [Green Version]
- Taha, A.; Alrabeiah, M.; Alkhateeb, A. Deep learning for large intelligent surfaces in millimeter wave and massive MIMO systems. In Proceedings of the 2019 IEEE Global communications conference (GLOBECOM), Waikoloa, HI, USA, 9–13 December 2019; pp. 1–6. [Google Scholar]
- Liu, Y.; Wang, M.; Xu, J.; Gong, S.; Hoang, D.T.; Niyato, D. Boosting secret key generation for IRS-assisted symbiotic radio communications. In Proceedings of the 2021 IEEE 93rd Vehicular Technology Conference (VTC2021-Spring), Helsinki, Finland, 25–28 April 2021; pp. 1–6. [Google Scholar]
- Lu, X.; Lei, J.; Shi, Y.; Li, W. Intelligent reflecting surface assisted secret key generation. IEEE Signal Process. Lett. 2021, 28, 1036–1040. [Google Scholar] [CrossRef]
- Ji, Z.; Yeoh, P.L.; Zhang, D.; Chen, G.; Zhang, Y.; He, Z.; Yin, H. Secret key generation for intelligent reflecting surface assisted wireless communication networks. IEEE Trans. Veh. Technol. 2020, 70, 1030–1034. [Google Scholar] [CrossRef]
- Jorswieck, E.A.; Wolf, A.; Engelmann, S. Secret key generation from reciprocal spatially correlated MIMO channels. In Proceedings of the 2013 IEEE Globecom Workshops (GC Wkshps), Atlanta, GA, USA, 9–13 December 2013; pp. 1245–1250. [Google Scholar]
- Furqan, H.M.; Hamamreh, J.M.; Arslan, H. Secret key generation using channel quantization with SVD for reciprocal MIMO channels. In Proceedings of the 2016 international symposium on wireless communication systems (ISWCS), Poznan, Poland, 20–23 September 2016; pp. 597–602. [Google Scholar]
- Jiao, L.; Tang, J.; Zeng, K. Physical layer key generation using virtual AoA and AoD of mmWave massive MIMO channel. In Proceedings of the 2018 IEEE Conference on Communications and Network Security (CNS), Beijing, China, 30 May 2018–1 June 2018; pp. 1–9. [Google Scholar]
- Li, G.; Sun, C.; Jorswieck, E.A.; Zhang, J.; Hu, A.; Chen, Y. Sum secret key rate maximization for TDD multi-user massive MIMO wireless networks. IEEE Trans. Inf. Forensics Secur. 2020, 16, 968–982. [Google Scholar] [CrossRef]
- O’shea, T.; Hoydis, J. An introduction to deep learning for the physical layer. IEEE Trans. Cogn. Commun. Netw. 2017, 3, 563–575. [Google Scholar] [CrossRef] [Green Version]
- Qin, Z.; Ye, H.; Li, G.Y.; Juang, B.H.F. Deep learning in physical layer communications. IEEE Wirel. Commun. 2019, 26, 93–99. [Google Scholar] [CrossRef] [Green Version]
- Lin, Y.; Tu, Y.; Dou, Z.; Chen, L.; Mao, S. Contour stella image and deep learning for signal recognition in the physical layer. IEEE Trans. Cogn. Commun. Netw. 2020, 7, 34–46. [Google Scholar] [CrossRef]
- Ma, W.; Qi, C.; Zhang, Z.; Cheng, J. Sparse channel estimation and hybrid precoding using deep learning for millimeter wave massive MIMO. IEEE Trans. Commun. 2020, 68, 2838–2849. [Google Scholar] [CrossRef] [Green Version]
- Ye, H.; Gao, F.; Qian, J.; Wang, H.; Li, G.Y. Deep learning-based denoise network for CSI feedback in FDD massive MIMO systems. IEEE Commun. Lett. 2020, 24, 1742–1746. [Google Scholar] [CrossRef] [Green Version]
- Wu, Q.; Zhang, R. Beamforming optimization for wireless network aided by intelligent reflecting surface with discrete phase shifts. IEEE Trans. Commun. 2019, 68, 1838–1851. [Google Scholar] [CrossRef] [Green Version]
- Basar, E.; Di Renzo, M.; De Rosny, J.; Debbah, M.; Alouini, M.S.; Zhang, R. Wireless communications through reconfigurable intelligent surfaces. IEEE Access 2019, 7, 116753–116773. [Google Scholar] [CrossRef]
- Mathur, S.; Trappe, W.; Mandayam, N.; Ye, C.; Reznik, A. Radio-telepathy: Extracting a secret key from an unauthenticated wireless channel. In Proceedings of the 14th ACM International Conference on Mobile Computing and Networking, San Francisco, CA, USA, 14–19 September 2008; pp. 128–139. [Google Scholar]
- Mitev, M.; Chorti, A.; Belmega, E.V.; Poor, H.V. Protecting physical layer secret key generation from active attacks. Entropy 2021, 23, 960. [Google Scholar] [CrossRef] [PubMed]
- He, H.; Chen, Y.; Huang, X.; Xing, M.; Li, Y.; Xing, B.; Chen, L. Deep Learning-Based Channel Reciprocity Learning for Physical Layer Secret Key Generation. Secur. Commun. Netw. 2022, 2022, 1844345. [Google Scholar] [CrossRef]
- Zhou, J.; Zeng, X. Physical Layer Secret Key Generation for Spatially Correlated Channels Based on Multi-Task Autoencoder. In Proceedings of the 2022 7th International Conference on Intelligent Computing and Signal Processing (ICSP), Xi’an, China, 15–17 April 2022; pp. 144–150. [Google Scholar]
- Gong, S.; Lu, X.; Hoang, D.T.; Niyato, D.; Shu, L.; Kim, D.I.; Liang, Y.C. Toward smart wireless communications via intelligent reflecting surfaces: A contemporary survey. IEEE Commun. Surv. Tutor. 2020, 22, 2283–2314. [Google Scholar] [CrossRef]
- Lu, T.; Chen, L.; Zhang, J.; Cao, K.; Hu, A. Reconfigurable Intelligent Surface Assisted Secret Key Generation in Quasi-Static Environments. IEEE Commun. Lett. 2021, 26, 244–248. [Google Scholar] [CrossRef]
- Ji, Z.; Yeoh, P.L.; Chen, G.; Pan, C.; Zhang, Y.; He, Z.; Yin, H.; Li, Y. Random shifting intelligent reflecting surface for OTP encrypted data transmission. IEEE Wirel. Commun. Lett. 2021, 10, 1192–1196. [Google Scholar] [CrossRef]
- Li, G.; Sun, C.; Xu, W.; Di Renzo, M.; Hu, A. On maximizing the sum secret key rate for reconfigurable intelligent surface-assisted multiuser systems. IEEE Trans. Inf. Forensics Secur. 2021, 17, 211–225. [Google Scholar] [CrossRef]
- Dodis, Y.; Reyzin, L.; Smith, A. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In International Conference on the Theory and Applications of Cryptographic Techniques; Springer: Berlin/Heidelberg, Germany, 2004; pp. 523–540. [Google Scholar]
- Bloch, M.; Barros, J.; Rodrigues, M.R.; McLaughlin, S.W. Wireless information-theoretic security. IEEE Trans. Inf. Theory 2008, 54, 2515–2534. [Google Scholar] [CrossRef]
- Zhu, X.; Xu, F.; Novak, E.; Tan, C.C.; Li, Q.; Chen, G. Extracting secret key from wireless link dynamics in vehicular environments. In Proceedings of the 2013 Proceedings IEEE INFOCOM, Turin, Italy, 14–19 April 2013; pp. 2283–2291. [Google Scholar]
- Liu, H.; Yang, J.; Wang, Y.; Chen, Y. Collaborative secret key extraction leveraging received signal strength in mobile wireless networks. In Proceedings of the 2012 Proceedings IEEE Infocom, Orlando, FL, USA, 25–30 March 2012; pp. 927–935. [Google Scholar]
- Alkhateeb, A. DeepMIMO: A generic deep learning dataset for millimeter wave and massive MIMO applications. arXiv 2019, arXiv:1902.06435. [Google Scholar]
- Kingma, D.P.; Ba, J. Adam: A method for stochastic optimization. arXiv 2014, arXiv:1412.6980. [Google Scholar]
- Rukhin, A.; Soto, J.; Nechvatal, J.; Smid, M.; Barker, E. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications; Technical report; Booz-Allen and Hamilton Inc.: Mclean VA, USA, 2001. [Google Scholar]
- Huang, C.; Alexandropoulos, G.C.; Zappone, A.; Yuen, C.; Debbah, M. Deep learning for UL/DL channel calibration in generic massive MIMO systems. In Proceedings of the ICC 2019—2019 IEEE International Conference on Communications (ICC), Shanghai, China, 20–24 May 2019; pp. 1–6. [Google Scholar]
Layer | Type | Kernel Size | Stride | Padding |
---|---|---|---|---|
1 | Conv | (3,3) | 1 | 0 |
2 | Max Pooling | (2,2) | 1 | 1 |
3 | Conv | (3,3) | 1 | 0 |
4 | Max Pooling | (2,2) | 1 | 1 |
5 | Conv | (3,3) | 1 | 0 |
6 | Max Pooling | (2,2) | 1 | 1 |
7 | Conv | (3,3) | 1 | 0 |
8 | Max Pooling | (2,2) | 1 | 1 |
Layer | Type | Kernel Size | Stride | Padding |
---|---|---|---|---|
1 | TransConv | (4,4) | 1 | 1 |
2 | TransConv | (3,3) | 1 | 0 |
3 | TransConv | (2,2) | 1 | 0 |
DeepMIMO Dataset Parameters | Value |
---|---|
Active base stations (BSs) | 6, 16 |
Active users (training) | from R551 to R1100 |
Active users (testing) | from R1101 to R1200 |
Number of BS antennas | |
Antennas spacing | 0.5 |
Operating frequency | 3.4 GHz |
Number of OFDM subcarriers | 512 |
OFDM limit | 64 |
OFDM sampling factor | 1 |
Number of paths | 10 |
Parameter | Value |
---|---|
Optimization | ADAM [41] |
Exponential decay rates for ADAM: | (0.9, 0.999) |
Learning rate | 10 |
Batch size | 64 |
Number of epochs | 100 |
Number of training samples | 99,550 |
Number of testing samples | 18,100 |
Different Models | KGR | KER |
---|---|---|
AutoEncoder [21] | 0.9437 | 5.3457 × 10 |
KGNet [3] | 0.9735 | 6.7642 × 10 |
DNN [43] | 0.9880 | 9.5565 × 10 |
IRS-CRNet | 0.9936 | 1.8265 × 10 |
Test Type | p-Value | Result |
---|---|---|
Approximate Entropy | 0.8562 | Random |
Block Frequency | 0.7172 | Random |
Cumulative Sums | 0.9969 | Random |
Discrete Fourier Transform | 0.9668 | Random |
Frequency | 0.7172 | Random |
Ranking | 0.8014 | Random |
Runs | 0.3585 | Random |
Serial | 0.4990 | Random |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Liu, S.; Wei, G.; He, H.; Wang, H.; Chen, Y.; Hu, D.; Jiang, Y.; Chen, L. Intelligent Reflecting Surface-Assisted Physical Layer Key Generation with Deep Learning in MIMO Systems. Sensors 2023, 23, 55. https://doi.org/10.3390/s23010055
Liu S, Wei G, He H, Wang H, Chen Y, Hu D, Jiang Y, Chen L. Intelligent Reflecting Surface-Assisted Physical Layer Key Generation with Deep Learning in MIMO Systems. Sensors. 2023; 23(1):55. https://doi.org/10.3390/s23010055
Chicago/Turabian StyleLiu, Shengjie, Guo Wei, Haoyu He, Hao Wang, Yanru Chen, Dasha Hu, Yuming Jiang, and Liangyin Chen. 2023. "Intelligent Reflecting Surface-Assisted Physical Layer Key Generation with Deep Learning in MIMO Systems" Sensors 23, no. 1: 55. https://doi.org/10.3390/s23010055
APA StyleLiu, S., Wei, G., He, H., Wang, H., Chen, Y., Hu, D., Jiang, Y., & Chen, L. (2023). Intelligent Reflecting Surface-Assisted Physical Layer Key Generation with Deep Learning in MIMO Systems. Sensors, 23(1), 55. https://doi.org/10.3390/s23010055