1. Introduction
Information in networks where the communication means is shared is always at risk, since both authorized and illegitimate users are given physical access to the network. Malicious users have therefore a chance to jeopardize the privacy of other users or, conversely, to send false information throughout the network. Typical examples of networks where such risk is particularly threatening are wireless networks and power line networks (PLNs).
In such physical broadcast (PB) networks, as opposed to classical computer networks, a malicious user can perform attacks on all the stacks of the ISO/OSImodel, including the MAC and physical layer [
1]. In particular, the physical layer (PHY) comes to play an important role in both planning attacks on the network and defensive strategies. In fact, since the physical medium is shared, every input into the network has an effect on the system outputs. If the network system can be modeled, then its properties can be used with both malicious or aiding intent.
The wireless community has extensively relied on the properties of the physical channel to pursue research and identify methods for information security. From an information theoretic point of view, it is possible to guarantee secure transmission when the intended communication channel has higher capacity than the eavesdropper one, by transmitting information at a sufficiently high rate [
2]. However, some eavesdropper channels might have higher capacity than the intended one. For this reason, different techniques to enhance security have been conceived of in the communication theory area, which include secret key generation, prefiltering, and coding techniques [
2,
3,
4]. These techniques rely on different properties of the wireless communication channels to restrict the information leakage to any possible unauthorized receiver. Such properties include the channel randomness both in the time and in the frequency domain and, especially in time-division duplexing systems, its symmetry. In fact, if the channel between two users is symmetric, the randomness of the channel is common to the two users, i.e., they have access to the same information. This property is particularly useful for the secret key generation techniques. The key generation process includes the common information, which is unknown to an eventual eavesdropper, thus drastically enhancing the security of the produced key.
On the other side, in the context of power line transmission and distribution networks, attacks and defensive strategies are normally based on system theory. In this case, the network is modeled as a dynamic system that describes the power flow. Attacks of different kinds aim at altering the perception of the state of the network, which in turn might bring about a network failure [
5]. In any case, informative signals need to circulate through the network; therefore, a resilient communication architecture would enhance the PLN security. However, to our knowledge, there is very limited literature about physical layer secure communications in PLNs, and it focuses almost exclusively on information theoretic analysis [
6,
7,
8,
9].
In this regard, Power Line Communications (PLC) is a well established communication technology in PLNs [
10]. This technology already provides a form of security by the fact that it uses a communication means, the power line cables, that is owned by the utility and therefore not accessible by everybody. However, an unauthorized user might be able to get physical access to the network (see
Figure 1), or the utility might not want to share some information with part of the network users. Therefore, additional security measures have to be provided. Since the PLC physical channel has some properties in common with the wireless channel, it makes sense to explore physical layer security (PLS) techniques developed for wireless communication in the case of PLC. Nevertheless, it has been shown that the PLC channel, opposite the wireless one, is rather deterministic and in general not symmetric [
11,
12], and moreover, it has different statistical properties [
8].
A few recent contributions have considered the application of physical layer key generation techniques in PLC [
13,
14]. The authors propose to generate keys based on a quantized version of the frequency response of the channel, assuming a high symmetry of the channel. The assumption is supported by some measurement results, but the coupling method used is not thoroughly presented. In the following, we will show that the coupler, or better the equivalent impedance of the modem, has a crucial importance in determining the symmetry of the PLC channel. It turns out that the couplers used for half-duplex PLC lead to asymmetrical channels.
In this paper, we propose a thorough analysis of the properties of the PLC channel in order to investigate under what conditions PLS techniques, which exploit common information at the two legitimate users, developed for wireless communications apply also to PLC. However, since the PLC channel is in general non-symmetric, most of the known PLS algorithms cannot be applied to it. In fact, to the authors’ knowledge, very limited work exists on PLS in non-symmetric channels [
15].
In order to overcome this limit, we make use of the fact that the PLC channel is reciprocal to investigate what channel state information (CSI) is known to two legitimate users independently of each other at any given time. In this context, we propose two new methods to retrieve common CSI. The first method involves the analysis of the multipath signal propagation in reciprocal channels. The second method relies on the exchange of a minimal amount of information between the two ends, which is however insufficient for a possible eavesdropper to decrypt the key. The CSI obtained with the proposed methods can be consequently used to generate cryptographic keys separately at the two communication ends. For this purpose, we process the CSI with various quantization techniques and show the reliability of the generated keys. We also analyze the spatial correlation in PLNs, in order to verify the level of security of the obtained CSI against possible eavesdroppers. Although our investigation focuses on PLN, the proposed CSI retrieval methods are common to every reciprocal network, including any kind of passive wired and wireless network.
The rest of the paper is organized as follows. In
Section 2, we briefly summarize the classical approach to PLS, which relies on the symmetry of the channel. In
Section 3, we analyze in what cases the PLC channel can be considered symmetric. The two algorithms for PLS in asymmetric (but reciprocal) channels are proposed in
Section 4, while extended results are presented in
Section 5. Conclusions follow in
Section 6.
2. Channel-Based Security Approaches in Symmetric Channels
Most of the PHY key generation techniques, especially the channel-based ones, rely on the symmetry of the channel [
4], i.e., the fact that for every set of currents and voltages at the two communication ends that satisfies a certain system of relations, the set obtained by exchanging the transmitter and the receiver satisfies the same relations. In short, this means that the CSI is identical for both links. Wireless channels are typical examples of symmetric channels.
In this paper, we model the transmitter with its Thevenin or Norton equivalent with transmit impedance
and the receiver with its receive impedance
. Moreover, we considerthe physical channel to be a system accessible in two ports, Port 1 and Port 2, where the transmitter and the receiver are attached (see
Figure 2). The channel transfer functions (CTFs)
and
defined as (We remark that Equation (
1) and the rest of the equations presented in this paper are a function of the frequency. This dependency is omitted in the notation for simplicity.):
where
is the generated voltage at the transmitter and
is the measured voltage at the receiver (see
Figure 2), which are equal in symmetric channels. Therefore, when the receiver estimates for example
of the forward link, it directly knows also
of the reverse link, without the need for further communication (The wireless literature often refers to this property as due to the reciprocity of the channel. This is technically incorrect, because in reciprocal networks, the CTF is not forcefully the same in the two directions. Although the wireless channel is indeed reciprocal, it is also in most of the cases symmetric, as we will explain in
Section 4). Such a property serves as source of common randomness from which the parties can generate secret keys. An eavesdropper is assumed, at least in the wireless context, to experience a physical channel that is independent of that of the legitimate users. Therefore, the generated keys are intrinsically secure. As we will show in
Section 3 and
Section 4, neither the channel symmetry, nor the independence of the eavesdropper are common in PLC, which brings the problem of finding other sources of common randomness. In the following, we name the two legitimate parties Alice (A) and Bob (B), respectively, and we name the eavesdropper Eve (E). We also assume that Eve is a passive attacker, i.e., she just overhears the channel.
The basic idea of channel-based key generation approaches is for Alice and Bob to obtain very correlated information from the channel via channel training, then to apply key generation methods that rely on the correlated information and public discussion [
16]. From an information-theoretic perspective, the key generation procedure can be described as follows:
Channel sensing: Alice, Bob, and Eve get the observations of length n of the CSI , , and , respectively, where the observations can be performed in the time, frequency, or space domain or a combination of them.
Key reconciliation via public discussion: In order to agree on a secret key, Alice and Bob can communicate through the PB channel and send to each other a deterministic communication sequence as follows. They generate the random variables
and
, respectively, for initialization. Then, they alternatively send to each other the two sequences
and
, respectively, where for each step
i, we have
and
. At the end of the communication step, Alice and Bob determine the respective keys as
and
. Different protocols have been proposed to implement both the reconciliation procedure, implemented either with cascade or error correcting codes, and the privacy amplification. An extended series of references about this can be found in [
16].
By definition [
17], a secret key rate
is achievable if for every
and sufficiently large
n, there exists a public communication strategy such that:
where
and
denote the entropy and mutual information operators and
is the key alphabet. Equation (
2a) means that
and
are equal; Equation (
2b) ensures that no information is leaked to Eve; Equation (
2c) grants a minimum key generation rate
; and Equation (
2d) indicates that the generated key is uniformly distributed. It is clear from Equation (2) that the possibility of generating at least one or multiple keys is based on three characteristics of the PB medium: the temporal variation (i.e., the randomness), the correlation of the CSI between Alice and Bob, and the spatial decorrelation of Eve. These three characteristics are fulfilled in many wireless scenarios, where the channel varies frequently, it is symmetric, and the users typically experience uncorrelated multipath fading. This practically means, respectively, that
n (considering observations in time) is low,
and
are very correlated, which guarantees a fast convergence for the condition Equation (
2a), and they are both uncorrelated with
, which guarantees the convergence of Equation (
2b).
In the following, we analyze how the characteristics of the power line medium can be used to retrieve highly correlated CSI among Alice and Bob. Moreover, we discuss the physical constraints that limit the achievable
in PLN. Considering the system model introduced in
Figure 2, we assume Alice to be branched at Port 1 and Bob or Eve to be branched at Port 2, depending on which CTF is of interest.
3. Symmetries of the Power Line Channel
In this section, we present under which conditions the power line channel is symmetric. Under these conditions, the existing PLS techniques developed for wireless communications can be similarly applied to PLNs.
It has been shown in [
11] that the power line channel is symmetric, with reference to the classical voltage transfer functions as in Equation (
1), if the output impedance
at the transmission side is equal to the load impedance
(see
Figure 2). Similarly, this condition applies to the wireless channel and to any other kinds of passive networks. However, while in wireless systems, both
and
are set to the same value (usually 50
) to maximize the power transmitted and received, the situation is different in PLC.
In classical half-duplex PLC systems, the maximum communication rate is obtained by maximizing the transferred voltage or, more in general, the SNR at the receiver [
18]. Therefore, PLMs are usually equipped with
,
k
, and a switch that selects the correct impedance based on the link status [
19]. This renders the channel highly non-symmetric.
In the recently proposed full-duplex PLC systems, some front-end transceiver architectures deploy circulators [
20]. Thanks to these devices, the output and the receiving impedances at a single port can be tuned to be the same. Consequently, if the two communication ends are equipped with similar modems, we have
, and the channel is symmetric.
A third communication architecture, which has not yet been proposed in the context of PLC, can be considered. It relies on the fact that the PLC channel is reciprocal [
12] to get symmetric CSI. What is symmetric in this case is not the voltage transfer function as in the full-duplex one, but the trans-impedance Equation (
3) or from the trans-admittance Equation (
4), as explained below. In fact, in any reciprocal two-port network, the following holds true [
21]:
When the current
is applied to any of the two ports, the open circuit voltage measured at the other port is the same. Referring to
Figure 3a, this means that the ratios:
obtained when the two ports are inverted, are equal under the condition
.
When the voltage
is applied to any of the two ports, the short circuit current measured at the other port is the same. Referring to
Figure 3b, this means that the ratio:
obtained when the two ports are inverted is equal under the condition that
.
Therefore, it is possible to obtain symmetric transmission of signals considering the trans-impedance
Z or the trans-admittance
Y of the network instead of the classical voltage transfer function (see
Figure 3). However, the values of the transmit and receive impedances under which this property strictly holds are ideal (
and
in the
Z and
Y cases, respectively) and far from the common values of
and
.
We now consider less ideal conditions, taking the trans-impedance case as an example. We name
the trans-impedance obtained from transmission from Port 2 to Port 1 and
the opposite one. We also fix
to
k
, as is usual in PLM receivers, and modify the value of
.
Figure 4, which was obtained from a dataset as discussed in
Section 5, shows that for low values of
, the trans-impedance is highly asymmetric. The symmetry increases with the value of
, and when
reaches
k
, the trans-impedance is essentially symmetric. This condition would be practically implementable in power line modems, by driving the line with a current instead of a voltage [
22] and using a classical voltage receiver. Even though not shown, a similar result is obtained in the trans-admittance case when
and
are close to or less then 1
. Implementing this solution in power line modems would imply sending a voltage signal using a classical transmitter and receiving a current signal over a very small impedance.
We further consider an even more general case, where
and
can be fixed arbitrarily. This includes the classical case in PLC where
and
k
. Referring to the trans-impedance case, we assume that a circuit is adopted to measure the PLN input impedance
at the port
k defined as:
Then, relying on the voltage and current divider equations, we can write:
for the transmission from Port 1 and Port 2, respectively.
is the actual current entering the network, and
is the open circuit voltage at the receiver. These two new quantities are the equivalent of the injected current and received voltage if the transmit and receive impedance would have had a value of
∞. Similarly, in the trans-admittance case, we have:
where
and
are the equivalent of the injected current and received voltage if the transmit and receive impedance would have had a value of zero. This means that Equations (
6)–(
9) allow us to reproduce the conditions for symmetry in the respective systems. In fact, the resulting trans-impedances
and
, as well as the trans-admittances
and
are respectively equal, independent of the actual values of
and
used.
In conclusion, a symmetrical CSI can be derived as explained above also using classical values of output and load impedances in PLMs. A possible drawback of this method is that the receiver needs to know both
and
. Hence, the value of
or
needs to be transmitted through the public channel with the risk of eavesdropping. However, a possible eavesdropper would not have access to the values of
or
in the trans-impedance case or
or
in the trans-admittance case, which is a trait of the intended receiver. Therefore, sharing information about the channel input impedance at the transmitter and at the receiver does not directly enable an eventual eavesdropper to estimate for example
. This approach is further elaborated and discussed in
Section 4.2, where we do not limit to trans-impedance or trans-admittance architectures, but we generalize this method to any kind of communication architecture.
4. Key Generation in Half-Duplex PLC
In this section, we propose two techniques to get common CSI at the transmitter and the receiver with minimal exchange of data. Conversely, as in the previous section, we do not assume the use of particular transceiver architectures, and we rely only on an estimation of the voltage transfer functions Equation (
1) and, in
Section 4.2, of the input impedance Equation (
5). Since in this case, the channel is not symmetric, both techniques rely just on the fact that the PLC channel is reciprocal.
4.1. Time Domain Symmetry Technique
Considering a generic two port network, which in our case represents the PLN, the transmission matrix is defined as [
21]:
where the subscripts 1 and 2 stand for the relative port. When the system is reciprocal, which is always the case in passive networks, the following relation holds true:
With this condition, the transmission matrix in the opposite direction becomes:
As shown in
Appendix A, the time domain response of Equations (
10) and (
12) is not strictly symmetric, but wide-sense symmetric. This means that the multipath response of the channel is characterized by peaks that are in the same position both when the signal travels from Port 1 to Port 2 and vice versa. However, the amplitude of the peaks and their shape are in general different; thus, the PLC channel is not strictly symmetric. As an example,
Figure 5 shows the frequency and time domain response of a typical PLC channel in the two communication directions. The frequency domain response is far from symmetric, even though a certain degree of correlation still exists. The wide-sense symmetry in the time domain appears clearly in
Figure 5b. Even though the amplitude of the peaks in the two cases is rather different, we see that their position is the same. The mismatches are due mainly to two reasons. On the one hand, high peaks might render lower peaks that are close to undetectable. On the other hand, the peak detection algorithm and the bandwidth of the signal deeply influence the estimation of the peak presence and position.
One way to compensate these errors and to construct a key is to divide the time domain response
h (or part of it) in
blocks, each with duration
(white and gray stripes in
Figure 5b). A binary key with
elements is generated at each node, with all values initially set to zero. After channel estimation and peak detection, every key element is set to one if at least one peak is detected within its time block, so that the binary key
K is generated. The principle of this method is similar to that proposed in [
13,
14] for the quantization of the frequency domain response with the assumption of almost symmetrical channels. Conversely from that, however, the proposed method is valid in general for every reciprocal channel. The time domain symmetry technique (TDST) method can be further refined by limiting the peak search to the first
M blocks set to one. The limit is set because, due to the multipath and the smoothing effect of the channel, the density of the peaks tends to increase, and their granularity tends to decrease with the time index, respectively. This means that every possible
K would have many peaks towards the end of the sequence, which results in high similarity between different keys. Conversely, when the limit to the first
M ones is applied, there are higher chances that the position of the ones in keys generated from Alice and Eve are in different positions. Finally, key reconciliation procedures, such as Slepian–Wolf coding [
4], can be run as presented in
Section 2 to agree on the final key.
A drawback of the TDST is the generation rate of new keys, which is very low or even zero. This is because the position of the peaks in the time domain response is due to the topological structure of the network. Thus, the key would change only when a topology variation occurs. Small physical variations of the channel, due for example to its periodic time variant nature [
23] or to impedance changes at the terminations, do not in generally affect the presence or the position of peaks in the time domain channel response. The topology is only modified when a power switch is activated to route the power flow to a different section of the grid or when an anomaly like a fault or a strong impedance change occurs [
24].
In the case of transmission and medium voltage distribution networks, topological variations might occur from hours to weeks one from another. In the case of indoor or low voltage distribution networks, the topology of PLNs is fixed unless an anomaly occurs; therefore, each communication pair can generate just one code. Since frequent channel changes are needed to prevent eventual eavesdroppers to retrieve the communication key, this key generation technique is prone to be decrypted over a long time period. Increased security could be obtained, for example, by combining the TDST with classical cryptographic methods to refresh the key periodically.
4.2. Transmission Matrix Technique
Taking as a starting point the normalization procedure presented in
Section 3 (see Equations (
6)–(
9)), we can extend it to derive the full transmission matrix of the communication link. For this purpose, we assume the power line modems to be enabled to provide an estimate
of the frequency response
H and
of the channel input impedance
, respectively [
25].
Since the parameters
A,
B,
C, and
D of the transmission matrix are the same in the two directions, their estimation at one communication end would enable the complete electrical characterization of the channel in both directions. Relying on Equations (
1), (
5), (
10) and (
12) we can write the following equations:
The four complex unknowns
A,
B,
C, and
D can be found by solving a system made with these four complex equations [
26]. However, solving this system at each communication end requires information about
,
,
, and
to be shared on the PB channel. This would allow also any potential eavesdropper to solve the system, resulting in no secrecy.
On the other hand, relying on Equation (
11), another system of equations can be written. Considering for example the user connected at Port 2, he/she can directly estimate
, by relying on classical pilot signals used in communication systems [
27], and
with an impedance sensor. At this point, considering also Equation (
11), only one equation is missing to derive the transmission matrix. Therefore, the value of either
or
has to be sent through the PB channel. If, for example, the information about
is shared, then the user can solve the system:
With the estimated values of the transmission matrix, the user connected at Port 2 can estimate
using Equation (
16). At this point, all the PLS techniques presented in
Section 2 can be applied. The same procedure applies to the user connected at Port 1, with the transmission of information about
.
Since with this method, the transmission matrix is estimated by both legitimate users, the key can be generated from any of the transmission matrix parameters or from a function of them. Even though some information is shared through the PB channel, a possible eavesdropper will not be able to estimate the transmission matrix correctly between the legitimate users, since it will at maximum have three equations available. When the cryptographic key is based on the degree of freedom left to the legitimate users, then the eavesdropper has no means to retrieve the key.
Regarding the estimation procedure, since
,
, and
are constant as long as the transmission matrix is constant, their best estimates
,
, and
are given by averaging over time, assuming zero mean noise [
28].
,
,
, and
, are then simply derived by directly solving Equation (
17). When the channel state changes, the estimation procedure can be repeated, and a new cryptographic key is generated.
Different methods can be proposed to quantize and arrange the selected CSI. First of all, we consider the absolute value of the magnitude of the selected CSI to be linearly quantized over levels for every frequency bin. Then, we consider two ways of arranging the data:
Binary: The quantized data are converted to binary sequences with Gray encoding to minimize the distance between symbols that are close to each other. Each binary symbol is used as a symbol of the key.
Coded: The key is defined over an -ary alphabet, and each symbol is made by the quantized value of the CSI at one frequency bin. One symbol at the end of the key sequence accounts for the actual value of the least significant bit. The actual key is generated by multiplying the values of all the symbols by the last one. This method is used to avoid data with a similar shape, but different amplitudes to produce similar keys.
These two methods will be compared in
Section 5, where we consider as an example the key to be derived from
. We remark that other quantization methods are possible. However, a thorough comparison of quantization methods is out of the scope of this paper.
As mentioned before, the PLC channel is typically cyclostationary with a period equal to the main semi-circle and can be roughly subdivided into a series of slots in which it is considered static. Such intervals typically are in the order of some hundreds of microseconds [
23]. Hence, the number of cryptographic keys that can be generated for a given node pair using the proposed method is equal to the number of time slots in the particular scenario. Since the state variations are much higher at frequencies below 5 MHz than above, a higher number of and less correlated keys are likely to be generated using narrow-band PLC, which uses the spectrum 3-500 kHz, than broad-band PLC, which uses the spectrum 2-86 MHz. Therefore, the proposed method for key generation is expected to have the best performance when applied to distribution networks, where PLC are used mainly within the narrow-band spectrum.
4.3. Computational Complexity
The computational complexity of the transmission matrix technique (TMT) method is rather straightforward to compute. We assume that, due to power allocation and equalization purposes, each PLC modem already performs the estimation of the channel impedance
and the channel transfer function
H. The overload due to the TMT method to get common CSI consists only of solving the system Equation (
17) for the four unknown parameters.
Regarding the TDST method, we assume that the time domain response has already been estimated, via direct analysis of the incoming time domain trace or spectral analysis of the OFDM symbols. At this point, the computational complexity of this method is
, if a set of
N blocks is considered. However, the complexity is less than linearly proportional to
M if only the first
M peaks are considered since, as explained in
Section 4.1, the density of peaks tends to increase with the time index.
6. Conclusions
In this paper, we presented different ways of enhancing physical layer security in power line networks exploiting the channel properties. On the one hand, the power line channel was symmetric when either full-duplex, transresistance, or transconductance communication architectures were used. In this case, the existing methods for physical layer security in symmetric networks, or those explicitly tailored for symmetric PLC networks, could be applied. On the other hand, when the classical half-duplex architecture was used, the power line channel was not symmetric, but just reciprocal. We showed some fundamental properties of reciprocal channels that enabled the generation of secret keys with minimal exchange of information between the two legitimate users. In particular, the wide-sense symmetry of reciprocal channels was used to propose a CSI-based key generation method that relied on peak analysis and generated highly correlated information at the two communication ends with no exchange of key information. Another CSI-based key generation method was proposed, which relied on the estimation of the transmission matrix of the link at the two ends with minimal exchange of information about it through the broadcast channel.
We also presented an analysis of the spatial correlation in power line networks based on a measurement dataset. The results showed that the power line channels had low spatial correlation, which was even lower when complex valued CSI was considered.
We finally generated secret keys by quantizing with different methods the gathered CSI and assessed their reliability by computing a specifically formulated distance between the different keys. The results showed that the distance between the keys generated by Alice and Bob was on average much lower than the distance between the keys generated by Alice and Eve. This guaranteed a good level of security of the generated keys.
This paper opens a path for new research efforts in physical layer security for reciprocal networks. Further developments might include key agreement protocols, the incorporation of other common information at the two communication ends, and the combination of the proposed techniques with classical cryptographic methods.