Physical Layer Secret Key Generation
Physical Layer Secret Key Generation
15, 2020
Abstract— Two legitimate parties, referred to as Alice and Rivest–Shamir–Adleman (RSA) [3]. Asymmetric-key schemes
Bob, wish to generate secret keys from the wireless channel in are not preferred for devices with limited resources, e.g., as in
the presence of an eavesdropper, referred to as Eve, in order IoT networks, due to their complex mathematical operations.
to use such keys for encryption and decryption. In general,
the secret key rate highly depends on the coherence time of the Instead, symmetric-key cryptographic schemes are desired in
channel. In particular, a straightforward method of generating IoT networks due to their low-complexity implementations [4].
secret keys in static environments results in ultra-low rates. Such schemes require the secret keys for the encryption and
In order to resolve this problem, we introduce a low-complexity decryption to be distributed beforehand between the legiti-
method called induced randomness. In this method, Alice and mate parties. To complement the symmetric-key cryptographic
Bob independently generate local randomness to be used together
with the uniqueness of the wireless channel coefficients in order schemes, physical layer security methods can be deployed to
to enable high-rate secret key generation. In this work, two exchange secret keys between the nodes in order to be used
scenarios are considered: first, when Alice and Bob share a direct in the encryption and the decryption algorithms [5].
communication channel, and second, when Alice and Bob do The fundamental works of [6], [7] established an
not have a direct link and communicate through an untrusted information-theoretic framework to study the use of common
relay. After exchanging the induced randomness, post-processing
is done by Alice and Bob to generate highly-correlated samples randomness for secret key generation. In practice, characteris-
that are used for the key generation. Such samples are then tics of wireless links are shown to provide a great source for
converted into bits, disparities between the sequences generated the common randomness to be used for secret key generation,
by Alice and Bob are mitigated, and the resulting sequences are which have recently received significant attention [8], [9].
then hashed to compensate for the information leakage to the More specifically, the wireless channel has two main fea-
eavesdropper and to allow consistency checking of the generated
key bit sequences. We utilize semantic security measures and tures that are essential for secret key generation, namely,
information-theoretic inequalities to upper bound the probability reciprocity and randomness. The wireless channel is recip-
of successful eavesdropping attack in terms of the mutual rocal over each single coherence time interval [10], and it
information measures that can be numerically computed. Given has inherent randomness due to the variation of the chan-
certain reasonable system parameters this bound is numerically nel coefficients between different coherence time slots [8].
evaluated to be 2−31 and 2−10.57 in the first and the second
scenario, respectively. Note that the former requires an underlying synchronization
mechanism while the latter assumes a dynamic environment.
Index Terms— Information theoretic security, physical layer These features are often assumed to be available to the
security, distributed wireless systems, secret key generation,
semantic security, static environments. wireless nodes, i.e., the legitimate parties, which can then be
utilized in low-complexity secret key generation protocols at
I. I NTRODUCTION the physical layer. The setup for the key generation protocols
is as follows: the legitimate parties Alice and Bob share a
W IRELESS networks are becoming increasingly distrib-
uted in future systems, e.g., the fifth generation of wire-
less networks (5G) and the Internet of Things (IoT), which,
common wireless channel, either directly or indirectly through
a relay node. They communicate through this channel with
consequently, poses a higher risk of malicious attacks against the goal of generating a common secret key bit sequence,
message confidentiality in these systems. In general, commu- while keeping a passive eavesdropper Eve oblivious about
nication devices secure messages using either symmetric-key the generated key. Such protocols often include the following
encryption schemes such as Advanced Encryption Standard steps [9]:
(AES) [2], or asymmetric-key encryption schemes such as 1) Randomness sharing: In this step, the legitimate parties
observe correlated samples from a common source of
Manuscript received August 8, 2019; revised December 18, 2019 and
January 26, 2020; accepted February 1, 2020. Date of publication February 17, randomness, e.g., wireless channel coefficients.
2020; date of current version March 9, 2020. This work was supported in 2) Quantization: This is the process of converting such
part by the National Science Foundation under Grant CCF–1763348 and correlated samples, which are often real-valued, into
Grant CCF–1909771. This article was presented in part at the IEEE Global
Communications Conference in December 2018. The associate editor coor- binary bits.
dinating the review of this manuscript and approving it for publication was 3) Reconciliation: In general, there is a mismatch between
Dr. Yao Liu. (Corresponding author: Nasser Aldaghri.) the binary sequences observed and quantized by Alice
The authors are with the Department of Electrical Engineering and Com-
puter Science, University of Michigan, Ann Arbor, MI 48109 USA (e-mail: and Bob. Reconciliation is the process of mitigating such
[email protected]; [email protected]). mismatch between Alice’s and Bob’s bit sequences using
Digital Object Identifier 10.1109/TIFS.2020.2974621 methods such as cosets of binary linear codes.
1556-6013 © 2020 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See https://www.ieee.org/publications/rights/index.html for more information.
Authorized licensed use limited to: University of Exeter. Downloaded on May 07,2020 at 14:38:13 UTC from IEEE Xplore. Restrictions apply.
ALDAGHRI AND MAHDAVIFAR: PHYSICAL LAYER SKG IN STATIC ENVIRONMENTS 2693
4) Privacy amplification: This is the process of compensat- very-short-range communications due to power constraints for
ing for the information leakage to the eavesdropper Eve implementing coupled dynamics in practice. Moreover, several
during the aforementioned steps. prior works have considered utilizing relays for secret key
generation, as discussed next.
A. Related Work 2) Secret Key Generation With the Help of a Relay: In this
This section provides an overview of related work on secret case, there exists a relay node that assists Alice and Bob to
key generation using characteristics of wireless channel under generate the shared secret keys. The wireless characteristics
two main scenarios; the first scenario where the legitimate used for the randomness sharing in the first scenario, e.g., CSI
parties Alice and Bob have a direct communication channel and RSSI, can be similarly applicable here. Various methods
as the only means of communication, and the second scenario have been proposed in the literature to utilize relays in order
where their communication is helped by a relay node. to improve the key generation rate when Alice and Bob have a
1) Secret Key Generation Over Direct Communication direct communication link as well [33], [34]. The use of relays
Channels: In this case, different characteristics of the wireless in generating secret keys when Alice and Bob do not have a
channel can be utilized as the source of common randomness direct communication link is studied in [35]–[37]. A major
in secret key generation protocols. This includes the channel arguable assumption in these related works is that the relay
state information (CSI), the received signal strength (RSS), nodes are trusted. However, the wireless nodes, especially
and the channel phase, just to name a few [11]. As mentioned when they are considered low-complex and low-cost as in
earlier, there are two main underlying assumptions in such IoT networks, are susceptible to hacking, even after the key
protocols. First, the assumption on reciprocity of the wireless generation process is done. Hence, it is highly desirable to
channel guarantees the reliability of such protocols. Second, ensure that limited information about the generated secret
the randomness of the key is guaranteed by the assumptions key is leaked to the relay throughout the process. This is
on temporal decorrelation [12]. The resulting secret key gen- the motivation behind several other related works which
eration protocols, e.g., [8], [10], [13]–[17], where orthogonal assumed the relay nodes are untrusted. For instance, a method
frequency division multiplexing (OFDM) is utilized to increase to accommodate this case by utilizing friendly jamming is
the key rate in [17], often require dynamic environments in introduced in [38]. Another method that requires a moving
order to satisfy the second assumption and to enable secret relay to generate secret bits is proposed in [39]. Also, a novel
key generation at non-zero rates. It is worth noting that some method to resolve the issue of untrusted relays using a MIMO
imperfections of the channel measurements may occur due to architecture is suggested in [40]. Such methods, however,
mismatched hardware and synchronization errors [18]. require dynamic environments. As mentioned before, these
Wireless channels can be naturally assumed to be dynamic protocols are not appealing for applications where nodes are
assuming a certain level of mobility by users and/or in the resource-constrained and the environment is static.
surrounding environment. However, such assumptions do not
hold in static environments such as indoor IoT networks. B. Our Contributions
Consequently, the aforementioned protocols result in ultra- Our main contribution in this work is a solution, based on
low/zero secret key rates in such environments. This issue low-complexity methods, for resolving the issue of low/zero
has been studied in the literature and various solutions have rate secret key generation between two legitimate nodes in sta-
been proposed. Solutions include utilizing multiple-input- tic environments. In the proposed solution, we utilize induced
multiple-output (MIMO) antennas systems [19]–[21], beam- randomness generated by the legitimate parties and exchanged
forming [22], deploying friendly jamming [23] where the users between them. More specifically, Alice and Bob independently
act as jammers to confuse the eavesdropper, and using artificial generate a certain number of random bits. Then, they map
noise to confuse the eavesdropper [24]. In another line of these bits to quadrature amplitude modulation (QAM) symbols
work, some user-introduced randomness is utilized for various which they exchange using the direct communication channel
purposes [18], [25]–[28]. For instance, the user’s randomness (the first considered scenario) or through an untrusted relay
is used to counter certain types of attacks by the eavesdropper (the second considered scenario). After the exchange of the
in [18]. However, the use of induced randomness for key generated randomness, Alice and Bob process their received
generation, and more specifically to increase the key rate in sequences, which are the generated randomness by the other
static scenarios, is not discussed in [18]. In general, prior party and passed through the channel, using their own random
schemes that use some user-introduced randomness require sequences. The reciprocity of the channel/channels ensures
complex underlying architectures, e.g., MIMO transceivers, that they obtain highly correlated sequences. Such common
or unconstrained sources of randomness, i.e., continuous noisy randomness is then used to extract shared secret keys
sources whose Shannon entropy is infinity, which are expen- by following quantization, reconciliation, and privacy ampli-
sive to implement [29]. This, in turn, makes them unappealing fication steps. The reliability and the security of the proposed
for applications where nodes experience a static environ- protocols are analyzed by upper bounding the probability of
ment and have limited resources, e.g., IoT networks, sensor falsely accepting a mismatched secret key and the probability
networks, etc. Also, solutions based on utilizing coupled of a successful eavesdropping attack by Eve, respectively.
dynamics existing in synchronization mechanisms [30], [31] While most of prior works on designing physical layer secret
and based on full-duplex communications [32] are proposed key generation protocols rely on spatial decorrelation assump-
for low-complexity IoT networks, which are often limited to tions to guarantees the security of the key, we provide, to the
Authorized licensed use limited to: University of Exeter. Downloaded on May 07,2020 at 14:38:13 UTC from IEEE Xplore. Restrictions apply.
2694 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 15, 2020
Authorized licensed use limited to: University of Exeter. Downloaded on May 07,2020 at 14:38:13 UTC from IEEE Xplore. Restrictions apply.
ALDAGHRI AND MAHDAVIFAR: PHYSICAL LAYER SKG IN STATIC ENVIRONMENTS 2695
Authorized licensed use limited to: University of Exeter. Downloaded on May 07,2020 at 14:38:13 UTC from IEEE Xplore. Restrictions apply.
2696 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 15, 2020
TABLE I
N OTATION S UMMARY FOR THE i - TH SKG S ESSION
is defined as
def RQ
ER = , (9)
H (S) + H (V )
where H (S) and H (V ) are the entropy of Alice’s and Bob’s
sources of randomness, respectively.
III. P ROPOSED P ROTOCOLS Fig. 3. Direct secret key generation protocol overview of a single session.
The proposed protocols for both scenarios, i.e., secret key
generation using a direct channel and relay-based secret key
generation, can be partitioned into four stages: induced ran- A. Induced Randomness Exchange
domness exchange, quantization, reconciliation, and privacy In this stage we aim at creating highly correlated yet random
amplification together with consistency checking. The first observations at Alice and Bob. We discuss this stage separately
stage, i.e., induced randomness exchange, is done differently for the two considered scenarios as follows:
in the two considered scenarios, while the remaining stages 1) Direct Induced Randomness Exchange: In this stage,
are similar. Alice and Bob exchange randomly generated symbols with
In the first stage, the randomness is induced by Alice and each other. In the i -th session, Alice chooses a vector si of
Bob at each of the N OFDM subcarriers, provided that each length N and Bob also chooses a vector vi of length N.
two-way exchange is done within the same coherence time Each element of the vectors si and vi is chosen independently
interval. After the exchange of induced randomness, Alice and and uniformly at random from a set of M symbols in a
Bob process what they receive by performing quantization fol- M-QAM constellation. Then, the symbols are multiplied by
lowed by reconciliation to correct the disparities between their a pulse/carrier signal for transmission. The reason behind
bit sequences. As a result, they obtain, with high probability, choosing the symbols from M-QAM constellation is that the
identical bit sequences. Then, they use privacy amplification hardware for transmitting and receiving QAM symbols is
to improve the security of the generated bit sequences. Finally, readily available in many wireless devices. After the exchange
they check whether their keys are consistent or not. If the keys of random symbols, Alice and Bob multiply what they sent
are not consistent, they re-initiate a new session. The notations with what they received. This results in random sequences
for various vectors in the protocol are summarized in Table I. wi,ab and wi,ab available at Alice and Bob, respectively,
Also, Figure 3 shows an overview of a single session of the key as follows:
generation protocol for the scenario involving a direct channel,
and Figure 4 shows a single session of the relay-based secret wi,ab = si ◦ vi ◦
hi,ab + si ◦ ni,a , (10)
key generation protocol. For ease of notation, we remove wi,ab = si ◦ vi ◦ hi,ab + vi ◦ ni,b .
(11)
the time index t from the functions while keeping in mind
that the exchanges are done within the same coherence time. These two vectors are random and highly correlated, as will
Next, detailed descriptions of various stages of the proposed be shown, which makes them suitable for extracting shared
protocols are discussed. secret keys between Alice and Bob.
Authorized licensed use limited to: University of Exeter. Downloaded on May 07,2020 at 14:38:13 UTC from IEEE Xplore. Restrictions apply.
ALDAGHRI AND MAHDAVIFAR: PHYSICAL LAYER SKG IN STATIC ENVIRONMENTS 2697
way that the received SNRs at the relay with respect to the
received sequences from Alice and Bob are the same, and
equal to a predetermined value. The relay receives
yi,2,r = si ◦ hi + vi ◦ gi + ni,2,r . (14)
Then, it amplifies yi,2,r with an amplification factor α, which is
chosen to meet a specific SNR at Alice and Bob, and forwards
the amplified signal to Alice and Bob who receive yi,3,a and
yi,3,b , respectively, as follows:
yi,3,a = α(si ◦ hi + vi ◦ gi + ni,2,r ) ◦
hi + ni,3,a , (15)
yi,3,b = α(si ◦ hi + vi ◦ gi + ni,2,r ) ◦
gi + ni,3,b . (16)
The value of the amplification factor α is assumed to be
publicly known. Alice and Bob utilize what they receive
from the relay together with their locally generated vectors,
their channel estimates, and α in order to construct highly
correlated samples. More specifically, the self-interference
terms αsi ◦ hi ◦
hi and αvi ◦ gi ◦ gi are cancelled at Alice
and Bob, respectively, using their local randomness and the
channel estimates. The results are normalized by α and then
multiplied by the local randomness, which results in wi,ab and
wi,ab at Alice and Bob, respectively, as follows:
wi,ab = si ◦ vi ◦ gi ◦
hi +
ni,3,a , (17)
wi,ab = si ◦ vi ◦
gi ◦ hi +
ni,3,b , (18)
where
ni,3,a = s◦2
i ◦ zi,a + si ◦ ni,2,r ◦ hi + si ◦ ni,3,a /α, (19)
ni,3,b = v◦2
i ◦ zi,b + vi ◦ ni,2,r ◦
gi + vi ◦ ni,3,b /α, (20)
are the noise terms. The two vectors wi,ab and
wi,ab observed
by Alice and Bob are highly correlated and random at each
session, which makes them suitable for extracting secret keys.
Fig. 4. Relay-based secret key generation protocol overview of a single
session.
B. Quantization
In this stage, the complex-valued shared sequences wi,ab
2) Relay-Based Induced Randomness Exchange: First, and wi,ab are turned into bit streams. We use a similar
the relay transmits a known probing vector p to Alice and quantization method as suggested in [13]. A brief description
Bob, who receive yi,1,a and yi,1,b , respectively, specified as of the quantization scheme is included next. After collecting
follows: the complex-valued measurements wi,ab and wi,ab , they are
sorted as shown in Figure 5. Then, Alice and Bob find the
yi,1,a = p ◦
hi + ni,1,a , (12)
range of sorted data, which is defined as the difference between
yi,1,b = p ◦
gi + ni,1,b . (13) the maximum value and the minimum value of the sorted
Alice and Bob then estimate the channels between them- vectors. Then, using the range and the quantization resolution
selves and the relay, i.e.,
hi and
gi , respectively, using their δ, they identify = 2δ uniform quantization intervals, and
observations. Their estimates are denoted by hi and gi with assign a Gray-code sequence to each interval. Finally, they
◦2 map each sample to its quantized bit sequence based on the
estimation errors defined as zi,a = (hi ◦ hi − hi ) and
interval it belongs to. The resulting bit sequences for Alice
zi,b = (gi ◦
gi − g◦2
i ), respectively, where (.)
◦2 denotes the
and Bob are denoted by qi,a and qi,b , respectively.
element-wise square operation. Alice and Bob utilize their
respective channel estimates together with their respective
local randomness to eliminate the self-interference terms and C. Reconciliation
to generate the correlated samples, to be described next. The aim of this stage is to mitigate disagreements between
Alice and Bob generate, independently and uniformly at Alice’s and Bob’s quantized bit sequences. To this end, var-
random, vectors of length N consisting of M-QAM symbols. ious methods, such as error-correcting codes, can be used.
Let si and vi denote Alice’s and Bob’s vectors, respectively. In our protocols we use error-correcting code-based secure
They use the probing vector p also for synchronization and, sketch [41], while picking a convolutional code as the under-
simultaneously, transmit their vectors to the relay in such a lying code. The reason to pick convolutional codes is due to
Authorized licensed use limited to: University of Exeter. Downloaded on May 07,2020 at 14:38:13 UTC from IEEE Xplore. Restrictions apply.
2698 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 15, 2020
sequence over the noiseless public channel, either directly as in h qi,1 (qi,2 ) = qi,1,k qi,2,k mod p. (24)
the first scenario or through the relay as in the second scenario, k=1
to Bob. Then, Bob takes the addition modulo 2 of SS and qi,b , Next, the randomness of qi is discussed. In our protocol,
feeds it to the Viterbi decoder to get r, and re-encodes r to si and vi are chosen uniformly at random for each key genera-
get Enc( r). He computes the final sequence as tion session. Hence, the value of qi is also random. Therefore,
the hash function is randomized during each session, which
qi,a = SS ⊕ Enc(Dec(SS ⊕ qi,b ))
will be verified in the numerical results section. The output
= SS ⊕ Enc(
r). (22) of the aforementioned described hash function is the key
Remark: A binary linear code of length n and dimension bit sequences Ki,ab for Alice and K i,ab for Bob, which are
k with minimum distance 2t + 1 can be used to build matched with high probability given the reconciliation step.
an (F n , m 1 , m 1 − (n − k), t)-secure sketch scheme, where Before Alice and Bob are able to use the key sequences for
F = {0, 1} for binary codes [47]. The error correction capa- encryption and decryption, they need to verify the consistency
bility of the linear code is related to the underlying rate of the of their keys. To this end, Alice and Bob hash their key
code. This introduces a trade-off between the error correction sequences Ki,ab and K i,ab again similar to the previously
capability and the security, as higher rates provide better described process. The output of this step is their respective
security but can correct less errors, and vice versa. Alice and check sequences Ci,ab and Ci,ab , which they use to verify
Bob should start with an initial high rate code and then reduce whether or not their keys are consistent. It is worth noting
it accordingly if they observe several consecutive unsuccessful that, in our protocol, the length of the check sequences,
attempts of the protocol. Ci,ab and Ci,ab , is half the length of the key.
Authorized licensed use limited to: University of Exeter. Downloaded on May 07,2020 at 14:38:13 UTC from IEEE Xplore. Restrictions apply.
ALDAGHRI AND MAHDAVIFAR: PHYSICAL LAYER SKG IN STATIC ENVIRONMENTS 2699
Theorem 1: The probability of accepting a mismatched key This can be calculated in each subcarrier as stated in the next
as consistent by the described protocol with hash table size p lemma.
for the check sequence is upper bounded as follows: Lemma 1: Let h bk and h ek denote the fading coefficients
of Bob’s and Eve’s channels at the k-th subcarrier. Also,
Pr(Ci,ab = i,ab ) ≤ 1 .
Ci,ab |Ki,ab = K (25) let ρ denote the correlation coefficient between h bk and h ek ,
p
specified in (30). Then, the mutual information between h bk
Proof: This follows directly from the definition of uni- and h ek is given by
versal hash functions, specified in (23), where the output hash
table size is p. I (h bk ; h ek ) = − log(1 − ρ 2 ) bits. (31)
Proof: We have h bk = h bk,I + j h bk,Q , and h ek =
IV. ATTACKER M ODEL AND THE R ESILIENCE h ek,I + j h ek,Q . h bk,I , h bk,Q are independent and identically
OF P ROPOSED P ROTOCOLS distributed as N (0, σb2 /2) and h ek,I , h ek,Q are independent
In this section we discuss eavesdropping strategies by the and identically distributed as N (0, σe2 /2). The real parts of
passive eavesdropper Eve in both scenarios, i.e., whether the Bob’s and Eve’s channel coefficients are correlated with the
communication is through a direct communication channel or parameter ρ, and the imaginary parts are also correlated
through a relay, and provide an upper bound on the probability with ρ. Then, we have the following covariance matrices:
of a successful eavesdropping attack. 2 2
σb /2 0 σe /2 0
1 = ,
2 = , (32)
0 σb2 /2 0 σe2 /2
A. Direct Secret Key Generation ⎡ ρσb σe ⎤
σb2 /2 0 0
In this scenario, Eve’s best strategy is to acquire si , vi and ⎢ 2 ρσb σe ⎥
⎢ 0 σb2 /2 ⎥
hi,ab . When Alice and Bob exchange signals, Eve receives ⎢ 0 ⎥
3 = ⎢ ⎢ ρσb σe
2 ⎥.
⎥ (33)
ei,1 = si ◦ hi,ae + ni,e1 , (26) ⎢ 0 σe /2
2
0 ⎥
⎣ 2 ρσb σe ⎦
ei,2 = vi ◦ hi,be + ni,e2 . (27) 0 0 σe2 /2
2
If Eve is able to estimate both si and vi from her observations Then, the following series of equalities holds:
in (26) and (27) perfectly, she can create samples of the
following form: I (h bk ; h ek ) = I (h bk,I + j h bk,Q ; h ek,I + j h ek,Q )
(a)
= I (h bk,I , h bk,Q ; h ek,I , h ek,Q )
wi,ed ,1 = si ◦ vi ◦ hi,ae + ni,e3 , (28)
(b)
wi,ed ,2 = si ◦ vi ◦ hi,be + ni,e4 . (29) = Hd (h bk,I , h bk,Q ) + Hd (h ek,I , h ek,Q )
− Hd (h bk,I , h bk,Q , h ek,I , h ek,Q )
Note that she still needs to know hi,ab at all different sub-
(c) 1 1
carriers in order to obtain wi,ab and/or wi,ab , as described in = log(det(2πe
1 )) + log(det(2πe
2 ))
(10) and (11). Luckily, this is, almost, not possible for Eve as 2 2
1
discussed next. − log(det(2πe
3 ))
In general, the Pearson correlation coefficient ρ of the 2
(d)
channel fading coefficients at locations separated by distance = log(πeσb2 ) + log(πeσe2 )
d can be computed as follows [12]: − log((πeσb σe )2 (1 − ρ 2 ))
(e)
ρ = [ J0 (kd)]2 , (30) = − log(1 − ρ 2 ), (34)
where J0 (.) is the Bessel function of first kind, and k is the where:
wavenumber. Therefore, if the distance between Alice/Bob and (a) holds due to having a one-to-one mapping;
Eve is larger than half of the wavelength λ/2, e.g., 5 cm (b) is the expansion of the mutual information expression
in 3GHz band, they will experience almost uncorrelated fad- in terms of differential entropy;
ing channels. Therefore, the leaked information about the (c) holds by using the well-known expression that the
generated secret key to Eve is small and is often assumed differential entropy of multivariate Gaussian random variables
to be negligible in the literature. However, it is fundamen- Xn = (X 1 , X 2 , . . . , X n ) with covariance matrix
i is
tally important to quantitatively measure the security level. Hd (Xn ) = 12 log(det(2πe
i )); and (d) and (e) are simplifi-
An information-theoretic measure of security is the mutual cation steps.
information between the shared random sequence, from which Note that as ρ goes to zero, the mutual information, given
the secure key will be generated, and what Eve observes. by Lemma 1, also goes to zero.
If we assume that the effect of quantization is negligible and The next question, which also applies to any physical layer
also assume that Eve can perfectly recover si and vi , this security scheme that utilizes information-theoretic measures
mutual information is equal to the mutual information between of security, is how to quantitatively characterize the chances
hi,ab and the pair (hi,ae , hi,be ). One can assume that Eve is of a successful eavesdropping attack by Eve, i.e., guessing the
closer to Bob than Alice and hence, only consider the mutual key, given the leaked information? The latter is often measured
information between hi,ab and hi,ae as the dominating term. in terms of semantic security, which is a classical notion of
Authorized licensed use limited to: University of Exeter. Downloaded on May 07,2020 at 14:38:13 UTC from IEEE Xplore. Restrictions apply.
2700 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 15, 2020
security in cryptosystems [48]. Direct connections between and/or wi,ab , as described in (17) and (18). Her best strategy
metrics for the information-theoretic security, based on the is to find si , vi , gi and hi . When Alice and Bob transmit their
mutual information, and cryptographic measures of security, induced randomness, Eve receives
including semantic security, are provided in [49]. We use
these connections to arrive at the following theorem which wi,e,1 = si ◦ hi,ae + vi ◦ gi,be + ni,e5 . (36)
characterizes the security of the proposed protocol from the
However, when Carol, the relay, amplifies and forwards the
aforementioned perspective:
signal from Alice and Bob, Eve receives
Theorem 2: Let N denote the number of subcarriers used in
the proposed protocol and δ denote the quantization resolution. ei,3 = α(si ◦ hi + vi ◦ gi + ni,2,r ) ◦ fi,ce + ni,e6 . (37)
Then, the probability of a successful eavesdropping attack by
Eve is upper bounded as follows: Since Eve can estimate the channel coefficients fi,ce from
N the relay’s transmission when it transmits the known probing
Pr(Successful attack) < 2−2δ + 2I (h b ; h e ) + 2−δ N , vector and, also, she knows the value of α from the messages
(35) over the public channel, she can successfully estimate
where h b and h e denote the fading coefficients of wi,e,2 = si ◦ hi + vi ◦ gi + ni,2,r . (38)
Bob’s and Eve’s channels at a subcarrier.
Proof: [49, Theorem 5] relates the mutual information In a worst-case scenario from the legitimate parties’ perspec-
between Bob’s and Eve’s observations to the increase in the tive, Eve has as much information as the relay has, in addition
probability of a successful eavesdropping attack by Eve given to her own observations. Note that this coincides with the
her observations. More specifically, the increase in the latter problem of securing the shared key against the untrusted
probability is quantified in terms of the mutual information relay Carol when Eve is at Carol’s location. In the remaining
between Bob’s and Eve’s observations [49, Theorem 5]. Note of this section, we analyze the probability of a successful
that the probability that Eve successfully guesses the bits, with eavesdropping attack assuming that the eavesdropper Eve has
no observations, at a single subcarrier is 2−2δ . In addition to all the information available to Carol, in addition to her own
that, by [49, Theorem 5], the probability that Eve can guess observations.
the shared random bits in a single subcarrier, given Note that the computations involving the spatial correlation
√ her obser-
vations in this subcarrier, is increased by at most 2 I (h b ; h e ) parameter of the wireless channels do not help in ensuring
compared to the case where she does not have any observation. the security in this scenario as they do in the first scenario
Therefore, Eve’s probability of successfully guessing these with a direct communication channel. Also, the mutual infor-
√
quantized key bits is upper bounded by 2−2δ + 2 I (h b ; h e ). mation between wi,ab , as described in (17), and the pair
The probability that Eve can recover the shared randomness (wi,e,1 , wi,e,2 ), as described in (36) and (38), respectively,
√ N
over all subcarriers is then given by 2−2δ + 2I (h b ; h e ) . is expected not to be very small as it was in the first scenario.
Note that I (h b ; h e ) is the same across all the subcarriers and For instance, if this mutual information is greater than 0.5, then
is actually computed in terms of ρ in Lemma 1. If Eve cannot using [49, Theorem 5], same as in the proof of Theorem 2,
recover all the shared randomness, the probability that she does not yield a non-trivial upper bound on the probabil-
can guess the secret key correctly, by the property of hash ity of a successful eavesdropping attack. Hence, instead of
functions in the privacy amplification part of our protocol, is at utilizing semantic security, we need to use an alternative
most 2−δ N , when using a key sequence of half the quantized approach to relate I (wi,ab ; wi,e,1 , wi,e,2 ) to the probability of
bit sequence length. Utilizing these together with the union a successful eavesdropping attack. To this end, we use Fano’s
bound completes the proof. inequality to bound the probability of successful estimation
Note that Theorem 2 together with Lemma 1 can be used of the quantized bits qi,a by the eavesdropper in terms of
to provide a numerical upper bound on the probability of a the conditional entropy of the quantized bits qi,a given the
successful eavesdropping attack given a lower bound on the eavesdropper’s observations (wi,e,1 , wi,e,2 ). Note that the latter
distance between Eve and both Alice and Bob. For instance, can be bounded in terms of I (wi,ab ; wi,e,1 , wi,e,2 ). The details
suppose that the distance between Eve and Bob is at least half of this analysis are given next in the proof of Theorem 3.
of a wavelength, i.e., d = λ/2 and is less than the distance To simplify the expressions in the next theorem, let us
between Eve and Alice. Then, the correlation coefficient ρ is consider an arbitrary subcarrier and denote the corresponding
at most 0.09 and by Lemma 1 the resulting mutual information entries of the vectors wi,ab , wi,e,1 , wi,e,2 , and qi,a as wab , we,1 ,
I (h b ; h e ) is at most 0.01 bits at any of the subcarriers. Suppose we,2 , and qa , respectively. Note that the result of Theorem 3
that N = 16 and δ = 2, which are also used in the numerical does not depend on the choice of the subcarrier.
results provided in the next section. Then, by Theorem 2, Theorem 3: Let N denote the number of subcarriers used in
the probability of a successful attack by Eve given such the proposed protocol and δ denote the quantization resolution.
parameters is at most 2−37 + 2−32 < 2−31 . Then, the probability of a successful eavesdropping attack by
Eve is upper bounded as follows:
B. Relay-Based Secret Key Generation H (qa ) − Iab,e − 1 N
Pr(Successful attack) < 1 − + 2−δ N ,
In this scenario, Eve tries to use her observations and the log2 (|Q A |)
messages transmitted over the public channel to guess wi,ab (39)
Authorized licensed use limited to: University of Exeter. Downloaded on May 07,2020 at 14:38:13 UTC from IEEE Xplore. Restrictions apply.
ALDAGHRI AND MAHDAVIFAR: PHYSICAL LAYER SKG IN STATIC ENVIRONMENTS 2701
where Iab,e denotes I (wab ; we,1 , we,2 ), Q A denotes the sup- results in a realistic environment, a certain number of channel
port of qa , and |Q A | denotes its cardinality. coefficients is generated by the NYUSIM Channel Simula-
Proof: Let C denote the event of correct estimation of qa tor [44]. The simulator is used to generate channel coefficients
and E denote the event of erroneous estimation of qa by the for realistic 5G mmWave channels from measurement-based
eavesdropper. Then, we have the following models. A description of the three setups is discussed next,
followed by numerical results shown for all the considered
Pr(C) = 1 − Pr(E) (40)
setups.
(a) H (qa |we,1 , we,2 ) − 1
≤ 1− (41)
log2 (|Q A |)
A. Setup
(b) H (q a ) − I (qa ; we,1 , we,2 ) − 1
= 1− (42) 1) Direct Secret Key Generation: In this scenario, it is
log2 (|Q A |)
assumed that Alice and Bob communicate over a direct and
(c) H (qa ) − I (wab ; we,1 , we,2 ) − 1
≤ 1− (43) reciprocal wireless channel. The constellation size for each
log2 (|Q A |) subcarrier is M = 16, i.e., the set of 16-QAM symbols
(d) H (qa ) − Iab,e − 1 are used as the set from which local randomness is chosen
= 1− , (44)
log2 (|Q A |) and transmitted by Alice and Bob. Also, N = 16 OFDM
where: subcarriers are assumed to be available in the channel between
(a) holds by Fano’s inequality [50]; Alice and Bob. The quantization is done with δ = 2, i.e., the
(b) is the expansion of conditional entropy; real and imaginary parts of the received symbol in each
(c) follows from the data processing inequality because qa is subcarrier are quantized into one of the four possibilities
a deterministic function of wab and hence, (we,1 , we,2 ), wab , as discussed in Section III-B. Finally, the remaining steps
and qa form a Markov chain; including secure sketch, hashing, and consistency checking are
(d) is a change of the notation of I (wab ; we,1 , we,2 ) to Iab,e . performed as discussed in Section III.
Note that the probability of correctly estimating every bit of 2) NYUSIM-Based Secret Key Generation: In this scenario,
qa , denoted by Pr(CN ), is equal to the probability of correctly it is assumed that Alice and Bob have a direct reciprocal
estimating qa over all the N subcarriers, since the computation wireless channel where the coefficients are generated by the
of mutual information is the same over all subcarriers. Hence, NYUSIM Channel Simulator [44]. They operate in a non-line-
by using the independence of such events across the N of-sight (NLOS) urban micro-cellular environment at 20◦ C,
subcarriers, we have the operating frequency is 28 GHz, and the distance between
H (qa ) − Iab,e − 1 N
Alice and Bob and Alice and Eve is 10 meters. The path
Pr(CN ) ≤ 1 − . (45) contains 1 meter of foliage, and there is an outdoor-to-indoor
log2 (|Q A |) low loss. Channel coefficients between Alice and Bob and
If Eve cannot recover all the shared randomness bits in a channel coefficients between Alice and Eve are generated by
single session, the probability that she correctly guesses the the NYUSIM Channel Simulator over N = 16 subcarriers.
secret key, by the property of hash functions in the privacy Alice and Bob choose their induced randomness from the set
amplification part of our protocol, is at most 2−δ N . This, of 16-QAM symbols, and the quantization is done with δ = 2.
together with (45), and using the union bound complete the The remaining steps follow as in the first scenario.
proof. 3) Relay-Based Secret Key Generation: In this scenario, it is
Next, we illustrate how Theorem 3 can be used in a numer- assumed that Alice and Bob have direct and reciprocal wireless
ical setup to upper bound the probability of a successful channels with the relay, which can be perfectly estimated.
eavesdropping attack by Eve. Suppose that Alice and Bob Also, a scenario is considered for eavesdropping, as discussed
use 64-QAM constellation points to transmit their induced in Section IV-B, where Eve uses the relay’s observations. Alice
randomness, the received SNR is 23 dB at Alice and Bob and Bob choose their induced randomness from the set of
in (15), the quantization parameter δ is 2, and the number 64-QAM symbols, and set their power levels in such a way
of subcarriers N is 16. Eve is located close to Carol, but that the average received SNRs at the relay from both Alice
at least λ/2 away from her. Given these parameters the and Bob are equal. Then, the amplification vector α is chosen
mutual information Iab,e = I (wab ; we,1 , we,2 ) is numerically such that the average SNR, which is considered in the results,
estimated as Iab,e ≈ 1.39 bits, and the entropy of the generated of Alice and Bob’s correlated observations, (17) and (18),
key bits is numerically estimated as H (qa ) ≈ 3.86 bits. Then, respectively, is the same. The remaining parameters and steps
by Theorem 3, the probability of successful eavesdropping are similar to the previous scenarios.
attack is upper bounded, approximately, by 2−10.57 .
B. Results
V. N UMERICAL R ESULTS 1) Bit Generation Rate: For all the setups described above,
In this section we consider numerical setups with reasonable Alice and Bob exchange their induced randomness over
parameters and evaluate the proposed protocols for the two N = 16 subcarriers, with quantization resolution δ = 2 for
described scenarios, i.e., when a direct channel exists, and the real and imaginary parts separately. Note that 16 × 2 ×
when a relay is used for the key generation, using the metrics 2 = 64 bits are generated by Alice and Bob during each
described in Section II. Also, in order to provide numerical session of the protocol. Hence, the bit generation rate (BGR)
Authorized licensed use limited to: University of Exeter. Downloaded on May 07,2020 at 14:38:13 UTC from IEEE Xplore. Restrictions apply.
2702 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 15, 2020
Fig. 6. The bit mismatch rate (BMR) between Alice’s sequence and Bob’s Fig. 7. The bit error rate (BER) between Alice’s sequence and Bob’s and
and Eve’s sequences versus the signal to noise ratio. Eve’s sequences versus the signal to noise ratio.
Authorized licensed use limited to: University of Exeter. Downloaded on May 07,2020 at 14:38:13 UTC from IEEE Xplore. Restrictions apply.
ALDAGHRI AND MAHDAVIFAR: PHYSICAL LAYER SKG IN STATIC ENVIRONMENTS 2703
Fig. 8. The cumulative distribution function of the BER at Eve for the direct, Fig. 9. The average number of sessions until key agreement versus the signal
relay-based, and NYUSIM-based SKG setups. The compared sequences are to noise ratio.
the modulo 2 addition of the outputs of four successful key generation
sessions. The universal hash function is supposed to generate a uniformly
random output, hence the similarity of the curves.
of SNR is compared for all three setups. Note that the length
of final secret key is 32, which is obtained by adding modulo 2
TABLE II
the outputs of the protocol in four successful sessions. Hence,
NIST S TATISTICAL T EST R ESULTS
the average number of sessions required to generate a key
approaches 4 as SNR grows large. The number of required
sessions for the relay-based scenario is higher due to a more
severe effect of the noise on the shared randomness. This,
consequently, affects how often Alice and Bob obtain the
same key sequence resulting in a successful session of the
protocol. Figure 9 shows the average number of sessions for
all considered setups.
6) Impact of Non-Reciprocity: The perfect channel reci-
procity feature is assumed to hold throughout the paper;
however, in some practical scenarios, different factors such as
mismatched hardware and synchronization errors may cause
the channel coefficients experienced at Alice and Bob to not
being perfectly reciprocal [14], [18], [51]. Such imperfections
can be taken into account using the Pearson correlation
coefficient, denoted by ζ , between such channel coefficients
explained as follows. In general, under perfect channel reci-
4) Randomness Efficiency: This is computed according procity conditions, we have ζ = 1, while imperfections reduce
to (9). For the direct and NYUSIM-based SKG setups, Alice the value of ζ . As suggested in [51], a model to describe the
and Bob randomly choose induced randomness bit sequences relation between the channel coefficients at a subcarrier during
of length 64, and therefore, H (S) = H (V ) = 64. Note that the session i observed at Alice, i.e., h i,ab , and Bob, i.e., h i,ab ,
length of the quantized bit sequence is 64, therefore, R Q = 64. when they observe the same SNR is as follows:
This implies that the randomness efficiency is 50%. On the σh
other hand, for the relay-based SKG setup, Alice and Bob h i,ab = ζ
h i,ab + 1 − |ζ |2 √ i n i , (46)
2
separately induce 96 random bits during each round, resulting
in H (S) = H (V ) = 96, while the length of the quantized bit where ζ is the correlation coefficient, σh2i /2 is the dimen-
sequence is R Q = 64. The resulting randomness efficiency sion variance of h i,ab and h i,ab , and n i denotes the
of the relay-based SKG setup is 33%. Roughly speaking, circularly-symmetric Gaussian-distributed independent noise
the remaining part of the available randomness is used to component with mean 0 and unit dimension variance. In order
provide security. The exact trade-off between randomness to illustrate the effect of imperfect reciprocity in the direct
efficiency and security is an interesting problem. SKG setup, the bit mismatch rate for different values of the
5) Average Number of Sessions Required to Generate Keys: correlation coefficient ζ is shown in Figure 10. It can be
In this part, the average number of sessions Alice and Bob observed that as the correlation coefficient between the channel
need to generate their final secret key given different values coefficients decreases, the BMR between Alice’s and Bob’s
Authorized licensed use limited to: University of Exeter. Downloaded on May 07,2020 at 14:38:13 UTC from IEEE Xplore. Restrictions apply.
2704 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 15, 2020
Authorized licensed use limited to: University of Exeter. Downloaded on May 07,2020 at 14:38:13 UTC from IEEE Xplore. Restrictions apply.
ALDAGHRI AND MAHDAVIFAR: PHYSICAL LAYER SKG IN STATIC ENVIRONMENTS 2705
[17] J. Zhang, A. Marshall, R. Woods, and T. Q. Duong, “Secure key [41] A. Juels and M. Wattenberg, “A fuzzy commitment scheme,” in Proc.
generation from OFDM subcarriers’ channel responses,” in Proc. IEEE 6th ACM Conf. Comput. Commun. Secur. (CCS), 1999, pp. 28–36.
Globecom Workshops (GC Wkshps), Dec. 2014, pp. 1302–1307. [42] T. H. Cormen, Introduction to Algorithms. Cambridge, MA, USA: MIT
[18] K. Zeng, “Physical layer key generation in wireless networks: Chal- Press, 2009.
lenges and opportunities,” IEEE Commun. Mag., vol. 53, no. 6, [43] A. Rukhin, J. Soto, J. Nechvatal, M. Smid, and E. Barker, “A statistical
pp. 33–39, Jun. 2015. test suite for random and pseudorandom number generators for cryp-
[19] M. Zorgui, Z. Rezki, B. Alomair, E. A. Jorswieck, and M.-S. Alouini, tographic applications,” Booz-Allen and Hamilton Inc., McLean, VA,
“On the ergodic secret-key agreement over spatially correlated multiple- USA, Special Publication 800-22, 2001.
antenna channels with public discussion,” IEEE Trans. Signal Process., [44] S. Sun, G. R. MacCartney, and T. S. Rappaport, “A novel millimeter-
vol. 64, no. 2, pp. 495–510, Jan. 2016. wave channel simulator and applications for 5G wireless communica-
[20] E. A. Jorswieck, A. Wolf, and S. Engelmann, “Secret key generation tions,” in Proc. IEEE Int. Conf. Commun. (ICC), May 2017, pp. 1–7.
from reciprocal spatially correlated MIMO channels,” in Proc. IEEE [45] M. O. Hasna and M.-S. Alouini, “End-to-end performance of transmis-
Globecom Workshops (GC Wkshps), Dec. 2013, pp. 1245–1250. sion systems with relays over Rayleigh-fading channels,” IEEE Trans.
[21] L. Jiao, N. Wang, and K. Zeng, “Secret beam: Robust secret key Wireless Commun., vol. 2, no. 6, pp. 1126–1131, Nov. 2003.
agreement for mmWave massive MIMO 5G communication,” in Proc. [46] A. J. Viterbi, “Error bounds for convolutional codes and an asymptoti-
IEEE Global Commun. Conf. (GLOBECOM), Dec. 2018, pp. 1–6. cally optimum decoding algorithm,” IEEE Trans. Inf. Theory, vol. IT-13,
[22] M. G. Madiseh, S. W. Neville, and M. L. McGuire, “Applying no. 2, pp. 260–269, Apr. 1967.
beamforming to address temporal correlation in wireless channel [47] Y. Dodis, L. Reyzin, and A. Smith, “Fuzzy extractors: How to generate
characterization-based secret key generation,” IEEE Trans. Inf. Forensics strong keys from biometrics and other noisy data,” in Proc. Int. Conf.
Security, vol. 7, no. 4, pp. 1278–1287, Aug. 2012. Theory Appl. Cryptograph. Techn. Berlin, Germany: Springer, 2004,
pp. 523–540.
[23] S. Gollakota and D. Katabi, “Physical layer wireless security made
[48] S. Goldwasser and S. Micali, “Probabilistic encryption,” J. Comput. Syst.
fast and channel independent,” in Proc. IEEE INFOCOM, Apr. 2011,
Sci., vol. 28, no. 2, pp. 270–299, Apr. 1984.
pp. 1125–1133.
[49] M. Bellare, S. Tessaro, and A. Vardy, “Semantic security for the wiretap
[24] S. Goel and R. Negi, “Guaranteeing secrecy using artificial noise,” IEEE channel,” in Advances Cryptology. Berlin, Germany: Springer, 2012,
Trans. Wireless Commun., vol. 7, no. 6, pp. 2180–2189, Jun. 2008. pp. 294–311.
[25] Q. Wang, H. Su, K. Ren, and K. Kim, “Fast and scalable secret key [50] T. M. Cover and J. A. Thomas, Elements of Information Theory.
generation exploiting channel phase randomness in wireless networks,” Hoboken, NJ, USA: Wiley, 2012.
in Proc. IEEE INFOCOM, Apr. 2011, pp. 1422–1430. [51] S. Primak, K. Liu, and X. Wang, “Secret key generation using physical
[26] P. Huang and X. Wang, “Fast secret key generation in static wireless channels with imperfect CSI,” in Proc. IEEE 80th Veh. Technol. Conf.
networks: A virtual channel approach,” in Proc. IEEE INFOCOM, (VTC-Fall), Sep. 2014, pp. 1–5.
Apr. 2013, pp. 2292–2300. [52] M. Soleymani and H. Mahdavifar, “Distributed multi-user secret
[27] G. Li, A. Hu, J. Zhang, and B. Xiao, “Security analysis of a novel sharing,” in Proc. IEEE Int. Symp. Inf. Theory (ISIT), Jun. 2018,
artificial randomness approach for fast key generation,” in Proc. IEEE pp. 1141–1145.
Global Commun. Conf., Dec. 2017, pp. 1–6.
[28] S. Fang, I. Markwood, and Y. Liu, “Manipulatable wireless key estab-
lishment,” in Proc. IEEE Conf. Commun. Netw. Secur. (CNS), Oct. 2017,
pp. 1–9.
[29] B. Sunar, W. Martin, and D. Stinson, “A provably secure true random
number generator with built-in tolerance to active attacks,” IEEE Trans.
Comput., vol. 56, no. 1, pp. 109–119, Jan. 2007.
[30] N. Ebrahimi, H. Mahdavifar, and E. Afshari, “A novel approach to secure Nasser Aldaghri (Student Member, IEEE) received
communication in physical layer via coupled dynamical systems,” in the B.S. degree in electrical engineering from King
Proc. IEEE Global Commun. Conf. (GLOBECOM), Dec. 2018, pp. 1–7. Saud University, Riyadh, Saudi Arabia, in 2014, and
[31] H. Mahdavifar and N. Ebrahimi, “Secret key generation via pulse- the M.S. degree in electrical and computer engineer-
coupled synchronization,” in Proc. IEEE Int. Symp. Inf. Theory (ISIT), ing from the University of Michigan, Ann Arbor, MI,
Jul. 2019, pp. 3037–3041. USA, in 2017, where he is currently pursuing the
[32] N. Ebrahimi, B. Yektakhah, K. Sarabandi, H. S. Kim, D. Wentzloff, and Ph.D. degree. His research interests include infor-
D. Blaauw, “A novel physical layer security technique using master- mation theoretic security, physical layer security, and
slave full duplex communication,” in IEEE MTT-S Int. Microw. Symp. coding theory.
Dig., Jun. 2019, pp. 1096–1099.
[33] L. Lai, Y. Liang, and W. Du, “Cooperative key generation in wireless
networks,” IEEE J. Sel. Areas Commun., vol. 30, no. 8, pp. 1578–1588,
Sep. 2012.
[34] Q. Wang, K. Xu, and K. Ren, “Cooperative secret key generation from
phase estimation in narrowband fading channels,” IEEE J. Sel. Areas
Commun., vol. 30, no. 9, pp. 1666–1674, Oct. 2012.
[35] L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, “Improving wireless
physical layer security via cooperating relays,” IEEE Trans. Signal Hessam Mahdavifar (Member, IEEE) received the
Process., vol. 58, no. 3, pp. 1875–1888, Mar. 2010. B.Sc. degree from the Sharif University of Tech-
[36] T. Shimizu, H. Iwai, and H. Sasaoka, “Physical-layer secret key agree- nology, Tehran, Iran, in 2007, and the M.Sc. and
ment in two-way wireless relaying systems,” IEEE Trans. Inf. Forensics Ph.D. degrees from the University of California San
Security, vol. 6, no. 3, pp. 650–660, Sep. 2011. Diego (UCSD), La Jolla, in 2009 and 2012, respec-
[37] H. Zhou, L. M. Huie, and L. Lai, “Secret key generation in the two-way tively, all in electrical engineering. He was a Staff
relay channel with active attackers,” IEEE Trans. Inf. Forensics Security, Research Engineer with the Samsung U.S. Research
vol. 9, no. 3, pp. 476–488, Mar. 2014. and Development, San Diego, USA, from 2012 to
[38] R. Zhang, L. Song, Z. Han, and B. Jiao, “Physical layer security for 2016. He is currently an Assistant Professor with the
two-way untrusted relaying with friendly jammers,” IEEE Trans. Veh. Department of Electrical Engineering and Computer
Technol., vol. 61, no. 8, pp. 3693–3704, Oct. 2012. Science, University of Michigan, Ann Arbor. His
[39] R. Guillaume, S. Ludwig, A. Muller, and A. Czylwik, “Secret key main area of research is coding and information theory with applications
generation from static channels with untrusted relays,” in Proc. IEEE to wireless communications, storage systems, security, and privacy.
11th Int. Conf. Wireless Mobile Comput., Netw. Commun.(WiMob), Dr. Mahdavifar received the NSF career award in 2020. He also received
Oct. 2015, pp. 635–642. the Best Paper Award in 2015 IEEE International Conference on RFID and
[40] C. D. T. Thai, J. Lee, and T. Q. S. Quek, “Physical-layer secret the 2013 Samsung Best Paper Award. He also received two Silver Medals at
key generation with colluding untrusted relays,” IEEE Trans. Wireless International Mathematical Olympiad in 2002 and 2003, and two Gold Medals
Commun., vol. 15, no. 2, pp. 1517–1530, Feb. 2016. at Iran National Mathematical Olympiad in 2001 and 2002.
Authorized licensed use limited to: University of Exeter. Downloaded on May 07,2020 at 14:38:13 UTC from IEEE Xplore. Restrictions apply.