Previous Article in Journal
Random Transitions of a Binary Star in the Canonical Ensemble
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Cooperative Jamming-Based Physical-Layer Group Secret and Private Key Generation

by
Shiming Fu
1,
Tong Ling
2,
Jun Yang
2 and
Yong Li
3,*
1
School of Artificial Intelligence, Chongqing University of Education, Chongqing 400065, China
2
School of Communications and Information Engineering, Chongqing University of Posts and Telecommunications, Chongqing 400065, China
3
College of Computer Science, Chongqing University, Chongqing 400044, China
*
Author to whom correspondence should be addressed.
Submission received: 30 May 2024 / Revised: 15 August 2024 / Accepted: 3 September 2024 / Published: 4 September 2024
(This article belongs to the Section Information Theory, Probability and Statistics)

Abstract

:
This paper explores physical layer group key generation in wireless relay networks with a star topology. In this setup, the relay node plays the role of either a trusted or untrusted central node, while one legitimate node (Alice) acts as the reference node. The channel between the relay and Alice serves as the reference channel. To enhance security during the channel measurement stage, a cooperative jamming-based scheme is proposed in this paper. This scheme allows the relay to obtain superimposed channel observations from both the reference channel and other relay channels. Then, a public discussion is utilized to enable all nodes to obtain estimates of the reference channel. Subsequently, the legitimate nodes can agree on a secret key (SK) that remains secret from the eavesdropper (Eve), or a private key (PK) that needs to be secret from both the relay and Eve. This paper also derives the lower and upper bounds of the SK/PK capacity. Notably, it demonstrates that there exists only a small constant difference between the SK/PK upper and lower bounds in the high signal-to-noise ratio (SNR) regime. Simulation results confirm the effectiveness of the proposed scheme for ensuring security and efficiency of group key generation.

1. Introduction

With the widespread application of wireless devices, the demand for information sharing and communication among multiple devices is increasing, making ensuring information security especially crucial. Physical layer key generation (PLKG), based on information theory, has gained extensive attention as an effective approach for safeguarding wireless communication [1,2,3,4,5,6,7,8]. Most of the existing studies focus on PLKG for two legitimate users. However, the generation of a group key for secure group communications is essential in various scenarios, such as corporate meetings, military operations, healthcare teams, family or personal groups, and more. For example, in a business environment, a team of employees working on a confidential project may require secure communication. The generation of a group key ensures that only authorized team members can access sensitive information and discussions. Military units often rely on secure communication channels to share strategic information, where a group key guarantees that only authorized personnel can access and exchange mission-critical data. Medical professionals engaged in patient care or research may need a secure communication channel to exchange patient data and medical information, ensuring privacy and compliance with regulations. Similarly, a group of travelers may wish to share travel plans and photos exclusively within their group, ensuring that this information remains private and inaccessible to individuals outside the group [9].
Compared to the key generation involving just two parties, the key generation among multiple terminals faces more challenges. These challenges primarily stem from two main reasons. First, due to the large number of users in the group and varying distances between them, the efficiency of protocols for secure group communication is of greater concern. Second, the presence of numerous random channels among group users adds complexity to ensure that only authorized users within the group can obtain the final group key. Ref. [10] first studied the problem of group key generation for multiple users, considering a scenario where a group of users generate keys shared by all users within the group with the assistance of other users. Since then, refs. [11,12,13,14] investigated pairwise key generation schemes to generate keys shared within the group. These schemes first generate pairwise keys between two users and then generate the final group key by exploiting these pairwise keys. Additionally, ref. [15] studied the collaborative secret key generation scheme based on received signal strength, applicable to both star and chain network typologies. Ref. [16] investigated the cooperative group key generation based on secure network coding (SNC) via star topology. Moreover, ref. [17] introduced an efficient scheme for group key generation utilizing multiple-input multiple-output (MIMO) technology, which can improve the overall efficiency of key generation.
Most of the studies mentioned above have focused on the generation of keys with a single security level [9,11,12,13,14,15,16,17]. However, in practice, the generation of keys with different security levels is also important. For example, in a group of terminals, each terminal may have a different security clearance level, and access to confidential information is based on individual clearance levels. Terminals with the same clearance level should share a common key while remaining unaware of keys at higher levels. Several studies have addressed the generation of multiple keys with different security levels [10,18,19,20,21,22,23,24]. Refs. [18,19,20] investigated schemes for generating a secret key (SK) and a private key (PK) among three terminals. In these schemes, the three terminals aim to share an SK that remains secret from an eavesdropper (Eve), while two legitimate terminals aim to generate a PK that is also concealed from the third terminal. Since then, refs. [22,23,24] extended the three-terminal model to a four-terminal model with the assistance of helper nodes. These studies explored the issue of generating two keys with different security levels over a four-terminal system.
In large-scale dynamic wireless networks, it is crucial to consider both the efficiency and security in group key generation to ensure the reliable implementation of secure group communication. However, most existing schemes are based on pairwise key generation [11,12,13,14,22], which involves multiple key agreements and results in a low efficiency in key generation. To address this issue, ref. [16] proposed a secure network coding (SNC)-based group key generation scheme that requires only one key agreement phase. However, this scheme did not utilize external relay nodes to enhance the key rates, and only one type of keys was generated. Motivated by this, this paper explores physical layer group key generation in wireless relay networks with a star topology. In this setup, the relay node can act as either a trusted or untrusted central node, while one legitimate node (Alice) serves as the reference node. The channel between Alice and the relay node is considered as the reference channel. The main contributions are summarized as follows:
  • We propose a cooperative jamming (CJ)-based group key generation scheme. This scheme allows the relay to obtain superimposed channel observations from both the reference channel and other relay channels. Then, a public discussion is utilized to enable all nodes to obtain estimates of the reference channel. Subsequently, either an SK or a PK is generated among the group of legitimate nodes, where the PK is secret from both the relay and Eve. This scheme only requires two rounds of key agreement regardless of the increase in the number of users within the group.
  • We derive the lower and upper bounds on the SK/PK capacity within the framework of the corresponding discrete memoryless source (DMS) models. The lower bounds are determined by exploiting the zero forcing (ZF) method. Additionally, enhanced DMS models are constructed to obtain the upper bounds.
  • We demonstrate that the derived lower bounds are close to the corresponding upper bounds. Specifically, at a high signal-to-noise ratio (SNR), for both the SK and PK, there is merely a constant difference of log 2 3 2 bits per channel measurement (BPCM) separating the upper and lower bounds. This difference is negligible as the transmit SNR approaches infinity.

2. System Model

As shown in Figure 1, for the sake of brevity, a group communication network architecture is considered, which consists of three legitimate nodes (As shown later in this paper, the proposed group key generation scheme can be applied to the models with arbitrary number of legitimated nodes in a straightforward manner.): Alice, Bob, and Carlo, along with a relay node and an Eve. Each of these nodes has a single antenna and functions in a time-division duplex (TDD) mode of operation. The relay node can act as either a trusted or untrusted central node. We assume that Eve can intercept information and estimate the channels but cannot interfere with the communication channels or alter any transmitted messages. Moreover, to maintain anonymity, Eve positions himself more than half a wavelength away from group members, leading to the eavesdropping channels remaining independent from the legitimate channels. According to the channel reciprocity, the channel gains between the relay and Alice, Bob, and Carlo are G 1 , G 2 , and G 3 , respectively. Note that channel gains are also used to represent the respective channels, provided that this does not cause any confusion. Moreover, it is assumed that the channels among legitimate nodes cannot be utilized for key generation due to lacking randomness. Key generation relies on the relay channels G 1 , G 2 , and G 3 . Moreover, Alice serves as the reference node. Without loss of generality, the channel between Alice and the relay node, i.e., G 1 , is considered as the reference channel (To generate common randomness, the reference channel, G 1 , needs to be estimated by all legitimate nodes. It is worth noting that any relay channel can be chosen as the reference channel.).
A typical application scenario is Unmanned Aerial Vehicle (UAV) communication, where Alice, Bob, and Carlo are UAVs, and the relay is a ground base station or control console. Since UAVs operate in the air, only line-of-sight (LoS) channels exist among them. However, the channels between the UAVs and the ground base station or control console include non-line-of-sight (NLoS) components; hence, there exists randomness that is suitable for key generation. For simplicity, the wireless channels are assumed to be Rayleigh (The proposed group key generation scheme can also be simply applied to the models with Rician channel assumption, by exploiting the NLoS components.) block fading channels, where the channel gains remain constant during the coherence time. Furthermore, G 1 CN 0 , p A , G 2 CN 0 , p B , and G 3 CN 0 , p C , where p A , p B , and p C represent the variances of the channel gains G 1 , G 2 , and G 3 , respectively. In addition to wireless channels, a noiseless and infinite-capacity public channel where the group members communicate with each other is also considered. The public channel is commonly utilized in the majority of related existing works (e.g., [9,10,11,12,13,14,15,16]). It is important to note that all nodes, including Eve, have access to all the information transmitted over the public channel.
Based on the above star network and model assumptions, the DMS model for group SK/PK generation is shown in Figure 2. The observations of Alice, Bob, and Carlo on random source are Y ˜ A , Y ˜ B , and Y ˜ C , respectively. Moreover, the observations of the relay and Eve on random sources are Y ˜ R ( 1 ) , Y ˜ R ( 2 ) and Y ˜ E , respectively. From their sequence of observations on random sources and information transmitted over the public channel, the legitimate members can generate an SK and a PK shared within the group. The SK is required to be confidential from Eve, whereas both the relay and Eve have no knowledge of the PK. The maximum achievable SK/PK rate is termed as its capacity. Thus, any achievable SK/PK rate naturally serves as a lower bound for its capacity.

3. Group Secret and Private Key Generation Scheme

G 1 is considered to be the reference channel, and the relay enables all the legitimate members to obtain the observations of the reference channel. The proposed CJ-based group SK and PK generation scheme consists of two stages: channel measurement and key agreement.

3.1. Channel Measurement

Channel measurements are repeatedly collected by the group members, based on the sampling of the legitimate communication channels G 1 , G 2 , and G 3 . Each fading block is divided into three time slots with T 1 , T 2 , and T 3 symbol times, where T 1 + T 2 + T 3 = T . Additionally, assume that all transmitters employ a uniform transmit power of P in the training phase, and each receiver experiences a noise power of σ 2 . The details of the training phase for channel measurements are listed as follows.
  • In the first time slot, a predetermined sequence S 1 = [ P , , P T 1 ] is transmitted by the relay; thus, Alice, Bob, and Carlo receive T 1 -sample sequence:
    Y A ( 1 ) = G 1 S 1 + N A ( 1 ) ,
    Y B ( 1 ) = G 2 S 1 + N B ( 1 ) ,
    Y C ( 1 ) = G 3 S 1 + N C ( 1 ) ,
    where N A ( 1 ) , N B ( 1 ) , and N C ( 1 ) are Gaussian noise vectors of size T 1 × 1 . Then, Alice, Bob, and Carlo obtain the estimates of channels G 1 , G 2 , and G 3 , which are given by
    Y ˜ A = G 1 + N A ,
    Y ˜ B = G 2 + N B ,
    Y ˜ C = G 3 + N C ,
    respectively, with N A , N B , N C CN 0 , σ 1 2 and σ 1 2 σ 2 T 1 P .
  • In the second time slot, based on the concept of CJ, Alice and Bob send a known sequence S 2 = [ P , , P T 2 ] at the same time; thus, the relay receives
    Y R ( 2 ) = G 1 S 2 + G 2 S 2 + N R ( 2 ) .
    Then, the relay obtains the superimposed channel estimates regarding G 1 and G 2 :
    Y ˜ R ( 1 ) = G 1 + G 2 + N R ( 1 ) ,
    where N R ( 1 ) CN 0 , σ 2 2 and σ 2 2 σ 2 T 2 P .
  • In the third time slot, based on the concept of CJ, Alice and Carlo simultaneously transmit a known sequence S 3 = [ P , , P T 3 ] ; thus, the relay receives
    Y R ( 3 ) = G 1 S 3 + G 3 S 3 + N R ( 3 ) .
    Then, the relay obtains the superimposed channel estimates regarding G 1 and G 3 :
    Y ˜ R ( 2 ) = G 1 + G 3 + N R ( 2 ) ,
    where N R ( 2 ) CN 0 , σ 3 2 and σ 3 2 σ 2 T 3 P .
Note that during each fading block, each member acquires one random channel measurement. Consequently, for every n fading blocks, Alice, Bob, and Carlo obtain independent and identically distributed (i.i.d.) n-dimensional vectors Y ˜ A , Y ˜ B , and Y ˜ C , respectively. Since the relay can obtain channel measurements in both T 2 and T 3 time slots, the relay obtains n-dimensional sequences Y ˜ R ( 1 ) and Y ˜ R ( 2 ) .

3.2. Key Agreement

After the channel measurement stage, there is still no common randomness among the group members. Slepian–Wolf coding [25] is further employed in the key agreement stage, enabling group members to generate SKs and PKs. The key agreement is based on a two-step public discussion:
  • The first step: The first step involves the relay utilizing Slepian–Wolf coding to transmit specific bits of helper data derived from its observations over the public channel. This process allows Bob and Carlo to independently recover the relay’s observations Y ˜ R ( 1 ) and Y ˜ R ( 2 ) , respectively, and subsequently obtain estimates of the reference channel G 1 .
  • The second step: The second step involves Alice employing Slepian–Wolf coding to send particular bits of helper data based on her observations through the public channel. This allows Bob and Carlo to recover Alice’s observation Y ˜ A by leveraging the correlated estimates from the reference channel G 1 . Subsequently, the legitimate members establish a group SK or PK.
In the following subsections, the details of the aforementioned two public discussion steps are provided.

3.2.1. The First Step of Public Discussion

The i.i.d. n-dimensional sequences Y ˜ R ( 1 ) and Y ˜ R ( 2 ) at the relay are transformed into quantized vectors Y ˜ R ( 1 ) , Δ = Y ˜ R ( 1 ) , Δ ( 1 ) , , Y ˜ R ( 1 ) , Δ ( n ) and Y ˜ R ( 2 ) , Δ = Y ˜ R ( 2 ) , Δ ( 1 ) , , Y ˜ R ( 2 ) , Δ ( n ) , where Y ˜ R ( 1 ) , Δ ( i ) and Y ˜ R ( 2 ) , Δ ( i ) are quantized versions of Y ˜ R ( 1 ) ( i ) and Y ˜ R ( 2 ) ( i ) with quantization interval Δ , respectively. Similarly, Bob and Carlo transform Y ˜ B and Y ˜ C into Y ˜ B Δ = Y ˜ B Δ ( 1 ) , , Y ˜ B Δ ( n ) and Y ˜ C Δ = Y ˜ C Δ ( 1 ) , , Y ˜ C Δ ( n ) , respectively. The relay randomly divides the typical Y ˜ R ( 1 ) , Δ and Y ˜ R ( 2 ) , Δ sequences into non-overlapping bins and then sends the bin number as helper data to Bob and Carlo. Based on Slepian-Wolf coding, the relay needs to, respectively, send H Y ˜ R ( 1 ) , Δ Y ˜ B Δ and H Y ˜ R ( 2 ) , Δ Y ˜ C Δ bits of information through the public channel to Bob and Carlo, where H X Y represents the conditional entropy of a random variable X given Y. By combining the bin number transmitted over the public channel with their own observations, Bob and Carlo can recover Y ˜ R ( 1 ) and Y ˜ R ( 2 ) with the probability being arbitrarily close to 1. After that, combining Y ˜ B and Y ˜ R ( 1 ) , Bob can obtain an estimation sequence of G 1 , denoted by G ^ 1 , B . Combining Y ˜ C and Y ˜ R ( 2 ) , Carlo can obtain an estimation sequence of G 1 , denoted by G ^ 1 , C .

3.2.2. The Second Step of Public Discussion

After the first step, Alice, Bob, and Carlo all obtain the correlated estimates of G 1 , thereby enhancing common randomness. However, due to the presence of noise, further agreement is still required. Alice transforms Y ˜ A into Y ˜ A Δ = Y ˜ A Δ ( 1 ) , , Y ˜ A Δ ( n ) . Similarly, Bob and Carlo transform G ^ 1 , B and G ^ 1 , C into G ^ 1 , B Δ = G ^ 1 , B Δ ( 1 ) , , G ^ 1 , B Δ ( n ) and G ^ 1 , C Δ = G ^ 1 , C Δ ( 1 ) , , G ^ 1 , C Δ ( n ) , respectively. To generate an SK and a PK with different security permission levels, Alice needs to adopt two different sub-bin partitioning methods according to Slepian–Wolf coding.
  • Alice randomly and independently partitions the typical Y ˜ A Δ sequences into 2 n R 31 bins, with each bin having 2 n R 32 S K sub-bins, where
    R 31 = max H Y ˜ A Δ G ^ 1 , B Δ , H Y ˜ A Δ G ^ 1 , C Δ ,
    R 32 S K = H Y ˜ A Δ max H Y ˜ A Δ G ^ 1 , B Δ , H Y ˜ A Δ G ^ 1 , C Δ + .
  • Alice randomly and independently partitions the typical Y ˜ A Δ sequences into 2 n R 31 bins, with each bin having 2 n R 32 P K sub-bins, where
    R 32 P K = H Y ˜ A Δ Y ˜ R ( 1 ) , Δ , Y ˜ R ( 2 ) , Δ max H Y ˜ A Δ G ^ 1 , B Δ , H Y ˜ A Δ G ^ 1 , C Δ + .
Hence, each sequence has two indices: bin number and index within the bin. Alice takes the index within the bin of two different partitioning methods as an SK and a PK, respectively, and then sends the bin number as the helper data to Bob and Carlo. Alice needs to send max H Y ˜ A Δ G ^ 1 , B Δ , H Y ˜ A Δ G ^ 1 , C Δ bits of information through the public channel. By combining their own observations G ^ 1 , B , G ^ 1 , C and helper data, Bob and Carlo can recover Y ˜ A with the probability being arbitrarily close to 1. Thus, Bob and Carlo can both recover the SK and PK.
Remark 1. 
From the channel measurement and key agreement stages, it is evident that the estimates of the reference channel G 1 play a crucial role in enabling all legitimate nodes to share a group key. During the channel measurement stage, Alice obtains an estimation of G 1 , as shown in (4). Bob, on the other hand, only obtains an estimation of G 2 , i.e., Y ˜ B , as shown in (5). However, following the first step of public discussion in the key agreement stage, Bob gains access to the relay’s observation Y ˜ R ( 1 ) . As illustrated in (8), Y ˜ R ( 1 ) encompasses the term G 1 + G 2 , allowing Bob to employ a ZF method to estimate G 1 based on Y ˜ B and Y ˜ R ( 1 ) . Similarly, Carlo can also obtain an estimation of G 1 . Subsequently, during the second step of public discussion, all legitimate nodes can leverage the correlated estimates of G 1 to generate a common randomness as well as a group key.
Remark 2. 
On the other hand, both the relay and Eve can only acquire superimposed channel observations from both the reference channel G 1 and another channel, either G 2 or G 3 . Consequently, they are unable to completely eliminate the influences of channels G 2 and G 3 when estimating G 1 . As a result, the security of the reference channel-based group key generation can be significantly enhanced.
Remark 3. 
Note that the group SK and PK generation scheme can be directly extended to scenarios involving N ( N > 3 ) legitimate nodes, where legitimate members U 1 , U 2 , , U N and the relay collectively form a star network, and the channel gain between U i ( i = 1 , 2 , , N ) and the relay is denoted as G i . In this case, the coherence time T is divided into N time slots, i.e., T 1 , T 2 , , T N . In the channel measurement stage, the legitimate members U 1 , U 2 , , U N obtain their respective observations of the relay channel G 1 , G 2 , , G N , while the relay acquires superimposed channel observations regarding G 1 and G j ( j = 2 , 3 , , N ). In the key agreement stage, U 2 , U 3 , , U N obtain estimates of channel G 1 through the first key agreement. Then, they agree on the same SK and PK as U 1 through the second key agreement.

4. Performance Analysis

This section is dedicated to assessing the upper and lower bounds on the SK/PK capacity. The lower bounds are derived based on the proposed group key generation scheme in the previous section, while the upper bounds are derived by the corresponding formulated enhanced DMS models.

4.1. SK/PK Lower Bound

Based on (11), (13), and the findings in [10], an achievable SK or PK rate is given by
R s = min I Y ˜ A ; G ^ 1 , B , I Y ˜ A ; G ^ 1 , C ,
R p = min I Y ˜ A ; G ^ 1 , B , I Y ˜ A ; G ^ 1 , C I Y ˜ A ; Y ˜ R ( 1 ) , Y ˜ R ( 2 ) + ,
which represents a lower bound on the SK or PK capacity, respectively. Note that I Y ˜ A ; Y ˜ R ( 1 ) , Y ˜ R ( 2 ) denotes the information leaked to the relay.

4.1.1. Derivation of R s

Assuming that Bob and Carlo utilize the ZF method to obtain the observations of the reference channel G 1 , G ^ 1 , B and G ^ 1 , C are given by
G ^ 1 , B = Y ˜ R ( 1 ) Y ˜ B = G 1 + N R ( 1 ) N B ,
G ^ 1 , C = Y ˜ R ( 2 ) Y ˜ C = G 1 + N R ( 2 ) N C ,
respectively. The calculation of the correlation coefficient between Y ˜ A and G ^ 1 , B is given by
ρ Y ˜ A , G ^ 1 , B 2 = Cov 2 Y ˜ A , G ^ 1 , B Var Y ˜ A Var G ^ 1 , B = p A 2 p A + σ 1 2 p A + σ 1 2 + σ 2 2 .
Thus, I Y ˜ A ; G ^ 1 , B is given by
I Y ˜ A ; G ^ 1 , B = log 2 1 ρ Y ˜ A , G ^ 1 , B 2 = log 2 1 + p A 2 p A 2 σ 1 2 + σ 2 2 + σ 1 4 + σ 1 2 σ 2 2 .
Similarly, I Y ˜ A ; G ^ 1 , C is given by
I Y ˜ A ; G ^ 1 , C = log 2 1 + p A 2 p A 2 σ 1 2 + σ 3 2 + σ 1 4 + σ 1 2 σ 3 2
Hence, the expression of R s can be obtained by substituting (19) and (20) into (14).

4.1.2. Derivation of R p

According to (14) and (15), one can observe that R s and R p only differ by one term. Therefore, only the expression of I Y ˜ A ; Y ˜ R ( 1 ) , Y ˜ R ( 2 ) needs to be derived, which is calculated as
I Y ˜ A ; Y ˜ R ( 1 ) , Y ˜ R ( 2 ) = h Y ˜ A + h Y ˜ R ( 1 ) , Y ˜ R ( 2 ) h Y ˜ A , Y ˜ R ( 1 ) , Y ˜ R ( 2 ) = log 2 p A + σ 1 2 C Y ˜ R ( 1 ) Y ˜ R ( 2 ) C Y ˜ A Y ˜ R ( 1 ) Y ˜ R ( 2 ) ,
where the covariance matrices C Y ˜ R ( 1 ) Y ˜ R ( 2 ) and C Y ˜ A Y ˜ R ( 1 ) Y ˜ R ( 2 ) can be given by
C Y ˜ R ( 1 ) Y ˜ R ( 2 ) = p A + p B + σ 2 2 p A p A p A + p C + σ 3 2 ,
C Y ˜ A Y ˜ R ( 1 ) Y ˜ R ( 2 ) = p A + σ 1 2 p A p A p A p A + p B + σ 2 2 p A p A p A p A + p C + σ 3 2 ,
respectively. Hence, the expression of R p can be obtained by substituting (19), (20), and (21) into (15).

4.2. The SK/PK Upper Bound

To derive the SK/PK upper bound, we streamline the DMS model depicted in Figure 2. Assume that Bob and Carlo are colluding and can exchange all of their respective observed information. Thus, Bob and Carlo can be considered to be one node, defined as node CB. The enhanced DMS model with respect to group SK/PK generation is shown in Figure 3.
In the formulated enhanced DMS model for SK generation, the observations of the relay and Eve are known by either Alice or CB. First, we consider the scenario where CB has access to both the observations of the relay and Eve, as illustrated in Figure 3a. As a result, the DMS model presented in Figure 3 reduces to a standard point-to-point DMS model. In this model, Alice, CB, and Eve, respectively, have access to Y ˜ A , the combined set of Y ˜ B , Y ˜ C , Y ˜ R ( 1 ) , Y ˜ R ( 2 ) , Y ˜ E and Y ˜ E . According to [26], the SK capacity is upper bounded by I Y ˜ A ; Y ˜ B , Y ˜ C , Y ˜ R ( 1 ) , Y ˜ R ( 2 ) , Y ˜ E Y ˜ E = I Y ˜ A ; Y ˜ B , Y ˜ C , Y ˜ R ( 1 ) , Y ˜ R ( 2 ) . Second, assuming that the observations of the relay and Eve are known by Alice, the SK capacity is upper bounded by I Y ˜ A , Y ˜ R ( 1 ) , Y ˜ R ( 2 ) , Y ˜ E ; Y ˜ B , Y ˜ C Y ˜ E = I Y ˜ A , Y ˜ R ( 1 ) , Y ˜ R ( 2 ) ; Y ˜ B , Y ˜ C .
For the enhanced DMS model for PK generation, assume that the relay and Eve are colluding, and thus the relay and Eve can be considered to be one node, defined as node ER. Additionally, assuming CB has access to the observations of the relay and Eve, as depicted in Figure 3b, the subsequent observations made by Alice, CB, and ER are Y ˜ A , Y ˜ B , Y ˜ C , Y ˜ R ( 1 ) , Y ˜ R ( 2 ) , Y ˜ E and Y ˜ R ( 1 ) , Y ˜ R ( 2 ) , Y ˜ E , respectively. Therefore, according to [26], the upper bound on PK capacity is I Y ˜ A ; Y ˜ B , Y ˜ C , Y ˜ R ( 1 ) , Y ˜ R ( 2 ) , Y ˜ E Y ˜ R ( 1 ) , Y ˜ R ( 2 ) , Y ˜ E = I Y ˜ A ; Y ˜ B , Y ˜ C Y ˜ R ( 1 ) , Y ˜ R ( 2 ) .
According to the above analysis, the upper bounds on SK and PK capacities can be given by
C s U = min I Y ˜ A ; Y ˜ B , Y ˜ C , Y ˜ R ( 1 ) , Y ˜ R ( 2 ) , I Y ˜ A , Y ˜ R ( 1 ) , Y ˜ R ( 2 ) ; Y ˜ B , Y ˜ C
C p U = I Y ˜ A ; Y ˜ B , Y ˜ C Y ˜ R ( 1 ) , Y ˜ R ( 2 )

4.2.1. Upper Bound on SK Capacity

For (24), its first term can be calculated as
I Y ˜ A ; Y ˜ B , Y ˜ C , Y ˜ R ( 1 ) , Y ˜ R ( 2 ) = h Y ˜ A + h Y ˜ B , Y ˜ C , Y ˜ R ( 1 ) , Y ˜ R ( 2 ) h Y ˜ A ; Y ˜ B , Y ˜ C , Y ˜ R ( 1 ) , Y ˜ R ( 2 ) = log 2 p A + σ 1 2 C Y ˜ B Y ˜ C Y ˜ R ( 1 ) Y ˜ R ( 2 ) C Y ˜ A Y ˜ B Y ˜ C Y ˜ R ( 1 ) Y ˜ R ( 2 ) ,
where the covariance matrices C Y ˜ B Y ˜ C Y ˜ R ( 1 ) Y ˜ R ( 2 ) and C Y ˜ A Y ˜ B Y ˜ C Y ˜ R ( 1 ) Y ˜ R ( 2 ) can be given by
C Y ˜ B Y ˜ C Y ˜ R ( 1 ) Y ˜ R ( 2 ) = p B + σ 1 2 0 p B 0 0 p C + σ 1 2 0 p C p B 0 p A + p B + σ 2 2 p A 0 p C p A p A + p C + σ 3 2 ,
C Y ˜ A Y ˜ B Y ˜ C Y ˜ R ( 1 ) Y ˜ R ( 2 ) = p A + σ 1 2 0 0 p A p A 0 p B + σ 1 2 0 p B 0 0 0 p C + σ 1 2 0 p C p A p B 0 p A + p B + σ 2 2 p A p A 0 p C p A p A + p C + σ 3 2 ,
respectively.
Likewise, the computation of the second term in (24) is given by
I Y ˜ A , Y ˜ R ( 1 ) , Y ˜ R ( 2 ) ; Y ˜ B , Y ˜ C = h Y ˜ A , Y ˜ R ( 1 ) , Y ˜ R ( 2 ) + h Y ˜ B , Y ˜ C h Y ˜ A , Y ˜ B , Y ˜ C , Y ˜ R ( 1 ) , Y ˜ R ( 2 ) = log 2 C Y ˜ A Y ˜ R ( 1 ) Y ˜ R ( 2 ) C Y ˜ B Y ˜ C C Y ˜ A Y ˜ B Y ˜ C Y ˜ R ( 1 ) Y ˜ R ( 2 ) ,
where C Y ˜ A Y ˜ R ( 1 ) Y ˜ R ( 2 ) and C Y ˜ A Y ˜ B Y ˜ C Y ˜ R ( 1 ) Y ˜ R ( 2 ) are given in (23) and (28), respectively, and C Y ˜ B Y ˜ C can be expressed as
C Y ˜ B Y ˜ C = p B + σ 1 2 0 0 p C + σ 1 2 .

4.2.2. Upper Bound on PK Capacity

The expression of C p U in (25) can be calculated as
I Y ˜ A ; Y ˜ B , Y ˜ C Y ˜ R ( 1 ) , Y ˜ R ( 2 ) = I Y ˜ A ; Y ˜ B , Y ˜ C , Y ˜ R ( 1 ) , Y ˜ R ( 2 ) I Y ˜ A ; Y ˜ R ( 1 ) , Y ˜ R ( 2 ) = h Y ˜ A , Y ˜ R ( 1 ) , Y ˜ R ( 2 ) + h Y ˜ B , Y ˜ C , Y ˜ R ( 1 ) , Y ˜ R ( 2 ) h Y ˜ R ( 1 ) , Y ˜ R ( 2 ) h Y ˜ A , Y ˜ B , Y ˜ C , Y ˜ R ( 1 ) , Y ˜ R ( 2 ) = log 2 C Y ˜ A Y ˜ R ( 1 ) Y ˜ R ( 2 ) C Y ˜ B Y ˜ C Y ˜ R ( 1 ) Y ˜ R ( 2 ) C Y ˜ R ( 1 ) Y ˜ R ( 2 ) C Y ˜ A Y ˜ B Y ˜ C Y ˜ R ( 1 ) Y ˜ R ( 2 ) ,
where C Y ˜ A Y ˜ R ( 1 ) Y ˜ R ( 2 ) , C Y ˜ B Y ˜ C Y ˜ R ( 1 ) Y ˜ R ( 2 ) and C Y ˜ A Y ˜ B Y ˜ C Y ˜ R ( 1 ) Y ˜ R ( 2 ) are given in (23), (27), and (28), respectively, and C Y ˜ R ( 1 ) Y ˜ R ( 2 ) can be given by
C Y ˜ R ( 1 ) Y ˜ R ( 2 ) = p A + p B + σ 2 2 p A p A p A + p C + σ 3 2 .
Theorem 1. 
In the high SNR scenario, when T 1 = T 2 = T 3 , the upper and lower bounds maintain a fixed gap of log 2 3 2 BPCM for both the SK and PK.
Proof of Theorem 1. 
Please refer to Appendix A. □

5. Numerical Results

To verify the security performance of the proposed CJ-based key generation scheme, we numerically analyze the analytical results presented in previous sections. In this section, we consider a scenario with a group size of N ( 3 ) . Especially, when N = 3 , U 1 , U 2 , and U 3 represent Alice, Bob, and Carlo, respectively. Moreover, the channel G i ( i = 1 , 2 , , N ) is modeled as G i = g i d G i l / 2 , where g i C N ( 0 , 1 ) , d G i is the distance between the relay and U i , and l is the pass-loss exponent. Therefore, G i C N ( 0 , d G i l ) . Additionally, to more accurately portray the influence of the parameter T, the metric unit utilized for measuring the key rate in this section is “bits per symbol time” (BPST). For brevity, the coherence time is divided into N time slots, each with a duration of T 0 = 5 ; all nodes have the same transmit power P; the distances between the group members U i ( i = 1 , 2 , , N ) and the relay are assumed to be equal, denoted by d in meters, with a path loss coefficient of l = 3 . The distance value is within the range of 10 to 100 m, and the noise power is set as σ 2 = 50 dBm [27].
Figure 4 shows the achievable SK/PK rate of the proposed group key generation scheme versus the distance d, with a transmit power of P = 10 dBm and N = 3 or 5. As depicted in the figure, both the SK and PK rates decrease as d increases, as longer distances result in lower received SNR at each receiver during the channel measurement process. For the scenario where N = 3 and d = 10 m, the achievable SK and PK rates are approximately 0.7 and 0.6 BPST, respectively. Furthermore, with N = 5 and d = 10 m, the SK and PK rates decrease to around 0.33 and 0.43 BPST, respectively. This indicates a difference of about 0.1 BPST in the achievable SK and PK rates for small values of d.
Figure 5 showcases the SK and PK rates versus the transmit power P, with d = 10 m and N = 3 or 5. As shown in Figure 5, when N = 3 and P = 10 dBm, the SK and PK rates are 0.275 BPST and 0.174 BPST, respectively. In addition, when N = 3 and P = 0 dBm, the SK and PK rates become 0.493 BPST and 0.387 BPST, respectively. One can observe that the achievable rates of the SK and PK increase as the transmit power P increases. This is because high transmit power improves the accuracy of channel measurement. Furthermore, when N = 3 or 5, a noticeable difference of about 0.1 BPST exists between the SK and PK rates, illustrating the amount of information revealed to the relay, as described in (21).
Figure 6 shows the impact of the group size on the achievable SK/PK rate, where d = 10 m and P = 0 or 10 dBm. As shown in this figure, when P = 0 dBm, the SK and PK rates with N = 3 are 0.493 BPST and 0.387 BPST, respectively. Furthermore, the achievable SK and PK rates with N = 6 are 0.246 BPST and 0.161 BPST, respectively. One can observe that as the group size increases, both the SK and PK rates decrease. This decline can be attributed to the necessity for more time slots for channel measurement as the group size grows. Specifically, when N = 3 , the coherence time required is T = 15 . However, when N = 6 , the coherence time extends to T = 30 .
Figure 7 shows the SK/PK upper and lower bounds as they vary with the transmit power P, considering N = 3 and d = 10 m. The representation clearly shows that both these capacity bounds increase as the transmit power P increases. Furthermore, in scenarios characterized by high transmit power (i.e., high transmit SNR), a consistent gap of around 1 15 log 2 3 2 BPST is maintained between the SK/PK upper and lower bounds. This observation aligns with Theorem 1 through the transformation of the metric unit. One can observe that the key rates of SK and PK are notably large in the high SNR regime, which makes the gap negligible at high SNRs. Therefore, the proposed CJ-based physical layer group SK and PK generation scheme has a performance that is close to optimal bound.
Figure 8 compares the security performance among the proposed CJ-based, SNC-based [16] key generation (KG) schemes, and the traditional pairwise KG scheme [11,12,13,14,22], where d = 100 m and P = 30 dBm. As depicted in the figure, the SK rate of the CJ-based scheme equals that of the SNC-based scheme, both surpassing the pairwise scheme. Additionally, as the group size increases, the disparity in SK rates among the three schemes decreases gradually. This trend stems from the fact that when the group size is N, both the CJ-based and SNC-based schemes require a coherence time of N T 0 , whereas the pairwise scheme necessitates ( N + 1 ) T 0 . Consequently, the SK rates of the CJ-based and SNC-based schemes are N + 1 N times that of the pairwise scheme, with the rate gap narrowing as N increases. However, as the group size expands, the number of key agreements for the pairwise scheme also increases, leading to diminished key generation efficiency. Conversely, the key agreement times of the CJ-based and SNC-based schemes remain unaffected by group size expansion. Specifically, the CJ-based scheme requires two key agreements, while the SNC-based scheme requires only one key agreement. Moreover, the first key agreement stage of the CJ-based scheme plays a similar role to the secret sharing stage in the SNC-based scheme; thus, the key generation efficiency of the two schemes is similar. However, the distinction lies in the fact that the second key agreement stage of the CJ-based scheme can generate both an SK and a PK, while the key agreement of the SNC-based scheme solely generates SK. Similarly, the pairwise scheme can only generate the SK. Therefore, the PK rate of the SNC-based scheme and the pairwise scheme is always 0.

6. Conclusions

In this paper, we investigated the CJ-based group secret and private key generation scheme. The legitimate nodes within the group agree on an SK that is only kept secret from Eve, or a PK that is kept secret from both the relay and Eve. We constrained the SK and PK capacities by establishing their lower and upper bounds. The lower bounds were determined based on the ZF method, while the upper bounds were attained by analyzing the formulated enhanced DMS models. Moreover, we confirmed that these bounds closely align with each other, indicating their correlation. Particularly, in high SNR scenarios, a consistent difference of log 2 3 2 BPCM is evident between the SK/PK upper and lower bounds. Moreover, we also demonstrated that the proposed scheme significantly improves the security and efficiency of group key generation.

Author Contributions

Conceptualization, S.F., T.L. and J.Y.; Methodology, S.F., T.L. and J.Y.; Software, S.F., T.L. and J.Y.; Validation, S.F., T.L. and J.Y.; Formal analysis, T.L. and J.Y.; Investigation, J.Y.; Writing—original draft, S.F., T.L. and J.Y.; Writing—review & editing, S.F., T.L., J.Y. and Y.L.; Visualization, Y.L.; Supervision, Y.L.; Project administration, Y.L.; Funding acquisition, Y.L. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported in part by the Chongqing Electronics Engineering Technology Research Center for Interactive Learning, in part by the Chongqing key discipline of electronic information, and in part by Chongqing Municipal Education Commission Science and Technology Research Project under Grants KJQN202201630 and KJZD-K202401604.

Institutional Review Board Statement

Not applicable.

Data Availability Statement

The original contributions presented in the study are included in the article, further inquiries can be directed to the corresponding author.

Conflicts of Interest

The authors declare no conflicts of interest.

Appendix A. Proof of Theorem 1

When T 1 = T 2 = T 3 , we can infer that σ 1 2 = σ 2 2 = σ 3 2 = 3 σ 2 / P T . For simplicity, we denote μ = Δ 1 1 σ 1 2 σ 1 2 = 1 1 σ 2 2 σ 2 2 = 1 1 σ 3 2 σ 3 2 . At high SNRs, P / δ 2 and μ are sufficiently large. Moreover, we denote β 1 = Δ C Y ˜ A Y ˜ R ( 1 ) Y ˜ R ( 2 ) , β 2 = Δ C Y ˜ B Y ˜ C Y ˜ R ( 1 ) Y ˜ R ( 2 ) and β 3 = Δ C Y ˜ A Y ˜ B Y ˜ C Y ˜ R ( 1 ) Y ˜ R ( 2 ) . Therefore, according to (23), (27), and (28), β 1 , β 2 and β 3 can be calculated as
β 1 = p A p B p C + μ 1 ( 2 p A p B + 2 p A p C + p B p C ) + μ 2 ( 3 p A + p B + p C ) + μ 3
β 2 = 4 μ 1 p A p B p C + μ 2 ( 3 p A p B + 3 p A p C + 4 p B p C ) + 2 μ 3 ( p A + p B + p C ) + μ 4
β 3 = 8 μ 2 p A p B p C + μ 3 ( 5 p A p B + 5 p A p C + 4 p B p C ) + μ 4 ( 3 p A + 2 p B + 2 p C ) + μ 5

Appendix A.1. The SK Lower and Upper Bounds

To derive R s , I Y ˜ A ; G ^ 1 , B in (19) is approximated as
I Y ˜ A ; G ^ 1 , B = log 2 1 + p A 2 3 μ 1 p A + 2 μ 2 log 2 μ p A 3 .
Since σ 1 2 = σ 2 2 = σ 3 2 , it can be observed that I Y ˜ A ; G ^ 1 , C = I Y ˜ A ; G ^ 1 , B by comparing (19) and (20). Therefore, based on the expression of R s in (14), we can further infer that in the high SNR regime,
R s log 2 μ p A 3 .
For the derivation of C s U , I Y ˜ A ; Y ˜ B , Y ˜ C , Y ˜ R ( 1 ) , Y ˜ R ( 2 ) in (26) is approximated as
I Y ˜ A ; Y ˜ B , Y ˜ C , Y ˜ R ( 1 ) , Y ˜ R ( 2 ) = log 2 ( p A + μ 1 ) β 2 β 3 log 2 μ p A 2 .
Similarly, I Y ˜ A , Y ˜ R ( 1 ) , Y ˜ R ( 2 ) ; Y ˜ B , Y ˜ C in (29) is approximated as
I Y ˜ A , Y ˜ R ( 1 ) , Y ˜ R ( 2 ) ; Y ˜ B , Y ˜ C = log 2 β 1 [ p B p C + μ 1 ( p B + p C ) + μ 2 ] β 3 log 2 μ 2 p B p C 8 .
Therefore, based on the expression of C s U in (24), we can further infer that in the high SNR regime,
C s U log 2 μ p A 2 .
Consequently, combining (A5) and (A8), the difference between C s U and R s is
C s U R s log 2 3 2 .

Appendix A.2. The PK Lower and Upper Bounds

For the derivation of R p , I Y ˜ A ; Y ˜ R ( 1 ) , Y ˜ R ( 2 ) in (21) is approximated as follows:
I Y ˜ A ; Y ˜ R ( 1 ) , Y ˜ R ( 2 ) log 2 1 + p A p B + p A p C p B p C .
Therefore, the approximate expression of R p can be obtained by substituting (A4) and (A10) into (15):
R p log 2 μ p A p B p C 3 ( p A p B + p A p C + p B p C ) .
For the derivation of C p U , I Y ˜ A ; Y ˜ B , Y ˜ C Y ˜ R ( 1 ) , Y ˜ R ( 2 ) in (31) is approximated as
I Y ˜ A ; Y ˜ B , Y ˜ C Y ˜ R ( 1 ) , Y ˜ R ( 2 ) = log 2 β 1 β 2 [ ( p A p B + p A p C + p B p C ) + μ 1 ( 2 p A + p B + p C ) + μ 2 ] β 3 log 2 μ p A p B p C 2 ( p A p B + p A p C + p B p C ) .
Therefore, based on the expression of C p U in (25), we can further obtain that in the high SNR regime,
C p U log 2 μ p A p B p C 2 ( p A p B + p A p C + p B p C ) .
Consequently, combining (A11) and (A13), the difference between C p U and R p is
C p U R p log 2 3 2 .

References

  1. Ahmad, I.; Shahabuddin, S.; Kumar, T.; Okwuibe, J.; Gurtov, A.; Ylianttila, M. Security for 5G and beyond. IEEE Commun. Surv. Tuts. 2019, 21, 3682–3722. [Google Scholar] [CrossRef]
  2. Nguyen, V.-L.; Lin, P.-C.; Cheng, B.-C.; Hwang, R.-H.; Lin, Y.-D. Security and privacy for 6G: A survey on prospective technologies and challenges. IEEE Commun. Surv. Tuts. 2021, 23, 2384–2428. [Google Scholar] [CrossRef]
  3. Porambage, P.; Gür, G.; Osorio, D.P.M.; Liyanage, M.; Gurtov, A.; Ylianttila, M. The roadmap to 6G security and privacy. IEEE Open J. Commun. Soc. 2021, 2, 1094–1122. [Google Scholar] [CrossRef]
  4. Halbouni, A.; Ong, L.-Y.; Leow, M.-C. Wireless security protocols WPA3: A systematic literature review. IEEE Access. 2023, 11, 112438–112450. [Google Scholar] [CrossRef]
  5. Du, H.; Wang, J.; Niyato, D.; Kang, J.; Xiong, Z.; Guizani, M.; Kim, D.I. Rethinking wireless communication security in semantic Internet of Things. IEEE Wirel. Commun. 2023, 30, 36–43. [Google Scholar] [CrossRef]
  6. Günlü, O.; Schaefer, R.F. An optimality summary: Secret key agreement with physical unclonable functions. Entropy 2021, 23, 16. [Google Scholar] [CrossRef]
  7. Lin, P.-H.; Janda, C.R.; Jorswieck, E.A.; Schaefer, R.F. Stealthy secret key generation. Entropy 2020, 22, 679. [Google Scholar] [CrossRef]
  8. Li, G.; Sun, C.; Zhang, J.; Jorswieck, E.; Xiao, B.; Hu, A. Physical layer key generation in 5G and beyond wireless communications: Challenges and opportunities. Entropy 2019, 21, 497. [Google Scholar] [CrossRef]
  9. Truyen Thai, C.D.; Lee, J.; Quek, T.Q.S. Secret group key generation in physical layer for mesh topology. In Proceedings of the 2015 IEEE Global Communications Conference (GLOBECOM), San Diego, CA, USA, 6–10 December 2015; pp. 1–6. [Google Scholar]
  10. Csiszar, I.; Narayan, P. Secrecy capacities for multiple terminals. IEEE Trans. Inf. Theory 2004, 50, 3047–3061. [Google Scholar] [CrossRef]
  11. Ye, C.; Reznik, A. Group secret key generation algorithms. In Proceedings of the 2007 IEEE International Symposium on Information Theory (ISIT), Nice, France, 24–29 June 2007; pp. 2596–2600. [Google Scholar]
  12. Nitinawarat, S.; Ye, C.; Barg, A.; Narayan, P.; Reznik, A. Secret key generation for a pairwise independent network model. IEEE Trans. Inf. Theory 2010, 56, 6482–6489. [Google Scholar] [CrossRef]
  13. Xu, P.; Cumanan, K.; Ding, Z.; Dai, X.; Leung, K.K. Group secret key generation in wireless networks: Algorithms and rate optimization. IEEE Trans. Inf. Forensics Secur. 2016, 11, 1831–1846. [Google Scholar] [CrossRef]
  14. Nitinawarat, S.; Narayan, P. Perfect omniscience, perfect secrecy, and steiner tree packing. IEEE Trans. Inf. Theory 2010, 56, 6490–6500. [Google Scholar] [CrossRef]
  15. Liu, H.; Yang, J.; Wang, Y.; Chen, Y.; Koksal, C.E. Group secret key generation via received signal strength: Protocols, achievable rates, and implementation. IEEE Trans. Mob. Comput. 2014, 13, 2820–2835. [Google Scholar] [CrossRef]
  16. Xiao, S.; Guo, Y.; Huang, K.; Jin, L. Cooperative group secret key generation based on secure network coding. IEEE Commun. Lett. 2018, 22, 1466–1469. [Google Scholar] [CrossRef]
  17. Tang, J.; Wen, H.; Song, H.-H.; Jiao, L.; Zeng, K. Sharing secrets via wireless broadcasting: A new efficient physical layer group secret key generation for multiple IoT devices. IEEE Int. Things J. 2022, 9, 15228–15239. [Google Scholar] [CrossRef]
  18. Ye, C.; Narayan, P. The secret key private key capacity region for three terminals. In Proceedings of the 2005 IEEE International Symposium on Information Theory (ISIT), Adelaide, SA, USA, 4–9 September 2005; pp. 2142–2146. [Google Scholar]
  19. Zhang, H.; Lai, L.; Liang, Y.; Wang, H. The capacity region of the source-type model for secret key and private key generation. IEEE Trans. Inf. Theory 2014, 60, 6389–6398. [Google Scholar] [CrossRef]
  20. Xu, P.; Yang, J.; Chen, G.; Yang, Z.; Li, Y.; Win, M.Z. Physical-layer secret and private key generation in wireless relay networks with correlated eavesdropping channels. IEEE Trans. Inf. Forensics Secur. 2024, 19, 985–1000. [Google Scholar] [CrossRef]
  21. Ye, C.; Narayan, P. Secret key and private key constructions for simple multiterminal source models. IEEE Trans. Inf. Theory 2012, 58, 639–651. [Google Scholar] [CrossRef]
  22. Xu, P.; Ding, Z.; Dai, X.; Karagiannidis, G.K. Simultaneously generating secret and private keys in a cooperative pairwise-independent network. IEEE Trans. Inf. Forensics Secur. 2016, 11, 1139–1150. [Google Scholar] [CrossRef]
  23. Zhang, H.; Liang, Y.; Lai, L.; Shamai Shitz, S. Multi-key generation over a cellular model with a helper. IEEE Trans. Inf. Theory 2017, 63, 3804–3822. [Google Scholar] [CrossRef]
  24. Gong, S.; Tao, X.; Li, N.; Wang, H.; Han, Z. Secure secret key and private key generation in source-type model with a trusted helper. IEEE Access 2020, 8, 34611–34628. [Google Scholar] [CrossRef]
  25. Ahlswede, R.; Csiszar, I. Common randomness in information theory and cryptography, part I: Secret sharing. IEEE Trans. Inf. Theory 1993, 39, 1121–1132. [Google Scholar] [CrossRef]
  26. Maurer, U.M.; Wolf, S. Unconditionally secure key agreement and the intrinsic conditional information. IEEE Trans. Inf. Theory 1999, 45, 499–514. [Google Scholar] [CrossRef]
  27. Mao, W.; Xiong, K.; Lu, Y.; Fan, P.; Ding, Z. Energy consumption minimization in secure multi-antenna UAV-assisted MEC networks with channel uncertainty. IEEE Trans. Wirel. Commun. 2023, 22, 7185–7200. [Google Scholar] [CrossRef]
Figure 1. The model of group key generation and the process of training.
Figure 1. The model of group key generation and the process of training.
Entropy 26 00758 g001
Figure 2. Group SK or PK generation in the DMS model.
Figure 2. Group SK or PK generation in the DMS model.
Entropy 26 00758 g002
Figure 3. Group SK and PK generation in the enhanced DMS models. (a) SK. (b) PK.
Figure 3. Group SK and PK generation in the enhanced DMS models. (a) SK. (b) PK.
Entropy 26 00758 g003
Figure 4. The achievable key rates of SK and PK versus the distance d.
Figure 4. The achievable key rates of SK and PK versus the distance d.
Entropy 26 00758 g004
Figure 5. The achievable key rates of SK and PK versus the transmit power P.
Figure 5. The achievable key rates of SK and PK versus the transmit power P.
Entropy 26 00758 g005
Figure 6. The achievable key rates of SK and PK as functions of group size N.
Figure 6. The achievable key rates of SK and PK as functions of group size N.
Entropy 26 00758 g006
Figure 7. The SK/PK upper and lower bounds versus the transmit power P.
Figure 7. The SK/PK upper and lower bounds versus the transmit power P.
Entropy 26 00758 g007
Figure 8. Performance comparison under three different key generation schemes.
Figure 8. Performance comparison under three different key generation schemes.
Entropy 26 00758 g008
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Fu, S.; Ling, T.; Yang, J.; Li, Y. Cooperative Jamming-Based Physical-Layer Group Secret and Private Key Generation. Entropy 2024, 26, 758. https://doi.org/10.3390/e26090758

AMA Style

Fu S, Ling T, Yang J, Li Y. Cooperative Jamming-Based Physical-Layer Group Secret and Private Key Generation. Entropy. 2024; 26(9):758. https://doi.org/10.3390/e26090758

Chicago/Turabian Style

Fu, Shiming, Tong Ling, Jun Yang, and Yong Li. 2024. "Cooperative Jamming-Based Physical-Layer Group Secret and Private Key Generation" Entropy 26, no. 9: 758. https://doi.org/10.3390/e26090758

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop