[go: up one dir, main page]

EP4627753A1 - Procédé de génération de clé basé sur un retard-doppler pour une communication sans fil sécurisée - Google Patents

Procédé de génération de clé basé sur un retard-doppler pour une communication sans fil sécurisée

Info

Publication number
EP4627753A1
EP4627753A1 EP23898460.3A EP23898460A EP4627753A1 EP 4627753 A1 EP4627753 A1 EP 4627753A1 EP 23898460 A EP23898460 A EP 23898460A EP 4627753 A1 EP4627753 A1 EP 4627753A1
Authority
EP
European Patent Office
Prior art keywords
delay
doppler
devices
domain
acquiring
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
EP23898460.3A
Other languages
German (de)
English (en)
Inventor
Mohammad Sohaib Jamal SOLAIJA
Salah Eddine ZEGRAR
Haji Muhammad Furqan Ahmed MADNI
Huseyin Arslan
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Istanbul Medipol Universitesi
Original Assignee
Istanbul Medipol Universitesi
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Istanbul Medipol Universitesi filed Critical Istanbul Medipol Universitesi
Publication of EP4627753A1 publication Critical patent/EP4627753A1/fr
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/041Key generation or derivation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0875Generation of secret information including derivation or calculation of cryptographic keys or passwords based on channel impulse response [CIR]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L5/00Arrangements affording multiple use of the transmission path
    • H04L5/003Arrangements for allocating sub-channels of the transmission path
    • H04L5/0048Allocation of pilot signals, i.e. of signals known to the receiver

Definitions

  • the invention is related to a computer implemented key generation method for secure wireless communication between at least two devices.
  • PLS Physical layer security
  • CIR channel impulse response
  • CFR channel frequency response
  • RSS received signal strength
  • TDD time-division duplex
  • FDD frequency -division duplex
  • Frequency-division duplex (FDD) systems have a clear advantage compared to time-division duplex (TDD) systems in terms of latency, but it comes at the cost of increased complexity in terms of channel estimation.
  • TDD systems leverage the reciprocity of the channel in uplink (UL) and downlink (DL) so that channel estimation overhead is reduced.
  • UL uplink
  • DL downlink
  • this is only valid as long for channels with long (so that both UL and DL transmissions are carried out within this duration) coherence time.
  • FDD systems do not experience reciprocal channel response. Therefore, in order to generate shared keys, they rely either on the combined UL and DL channels (which requires the same coherence time as TDD systems) or on parameters that are observed similarly at both communicating nodes. Examples of the latter include using delay and angle between the nodes to generate identical keys. Delay, while reciprocal, requires a large bandwidth to provide sufficient resolution while using angle necessitates the presence of multiple antennas at the communicating nodes.
  • Angle of arrival (AoA) method in both elevation and azimuth dimensions is used to generate key [6]
  • UAV unmanned aerial vehicle
  • MIMO multiple-input multiple-output
  • the eigenvalue reciprocity of the channel’s covariance matrix [7] is also used, while a reciprocal channel [8] is constructed, which is then used to generate keys.
  • Another objection of the invention is providing security key generation method that does not require high number of antennas at the devices/communicating nodes at FDD and TDD systems.
  • a secure key generation method is disclosed.
  • the security keys are generated based on Delay-Doppler domain. More specifically, the keys are generated based on indices of Delay and Doppler bins and quantized fractional Delay and Doppler values.
  • FIG. 1 Schematic view of the devices communicates with each other.
  • FIG. 2a Flowchart illustrates steps of the invention in TDD systems.
  • the invention is related to a computer implemented a key generation method for secure wireless communication between at least two devices and a communication method uses said security key, a system carries out said key generation method or communication method and a program comprising instructions which causes a computer, e.g. said system, execute said methods.
  • a device A (10a) and a device B (10b) in Fig. 1 Two devices are illustrated as a device A (10a) and a device B (10b) in Fig. 1.
  • the device A (10a) is shown as a base station and the device B (10b) is shown as a device positioned in a moving vehicle that moves in direction of the arrow.
  • the vehicle shown with dotted line represent prior position of the vehicle.
  • illegitimate user (I) is shown in Fig 1 and the illegitimate user (I) is a person or a system that causes security threats such as eavesdropping, jamming, and spoofing.
  • Delay-Doppler grid is designed, and location of the pilot symbol is decided in said grid. Location of the pilot signal on the grid is known by both device A (10a) and device B (10b).
  • dimensions of the Delay-Doppler grid in both directions are calculated in accordance with at least one of the available bandwidths, number of available subcarriers, subcarrier spacing and transmission duration, preferably accordance with all.
  • the time-domain pilot signals are converted at the device A (10a) and the device B (10b) to Delay-Doppler domain again and Delay and Doppler values are obtained from said signals at both the device A (10a) and the device B (10b).
  • channel estimation framework method or framework is used for obtaining Delay and Doppler values.
  • the conversion is carried out by using a Wigner transform followed by symplectic Fourier transform (SFT).
  • indices of the Delay and Doppler bins for the shared wireless channels (WC) are acquired and fractional Delay and Doppler values are obtained by calculation or checking the system wherein indices are first part of the shared secret.
  • fractional Delay and Doppler values are quantized wherein quantized values are second part of the shared secret.
  • the indices of Delay and Doppler bins and quantized fractional Delay and Doppler values are converted to a binary representation.
  • the decimal representation base 10
  • binary scale base 2
  • the fractional parts of delay and Doppler shifts the value is first converted divided by a quantization interval and the resultant is converted to a binary number similar to the integer parts. It is also possible to directly divide the complete (integer and fractional) delay and Doppler values by the quantization intervals and convert to binary representation.
  • a security key generation method for secure wireless communication between at least two devices comprising steps of designing a Delay-Doppler grid and deciding location of a pilot symbol, converting the Delay-Doppler pilot signals to time-domain on both devices, transmitting time-domain pilot signals to each other by the devices and converting pilot signals back to Delay-Doppler domain by the devices, acquiring Delay-Doppler values at both devices, acquiring indices of the Delay-Doppler values at both devices, acquiring and quantizing fractional Delay-Doppler values at both devices.
  • a determination phase determines if the system is frequency division duplexing (FDD) or time-division duplex system (TDD).
  • FDD frequency division duplexing
  • TDD time-division duplex system
  • the method may be configured to only work with is frequency division duplexing or time-division duplex systems. For both frequency division duplexing (FDD) or time-division duplex system (TDD), the method is carried out same steps however order of steps can be different.
  • both devices transmits the converted pilot signals to each other is carried out, simultaneously. After that, each of device A (10a) and device B (10b) converts signals to Delay-Doppler domain and obtains Delay and Doppler values from said signals.
  • FDD frequency-division duplex system
  • the device A(10a) transmits the pilot signal converted to the device B (10b).
  • the device B (10b) converts received signal to Delay-Doppler domain and obtains Delay and Doppler values from said signals.
  • the device B (10b) transmits the pilot signal converted to time-domain to the device A (10a).
  • the device A (10a) converts back signal to Delay-Doppler domain to obtains Delay and Doppler values from said signals.
  • Fig 2a and 2b for both time-division duplex system (TDD) and frequency-division duplex system (FDD), the pilot signals are transmitted between the devices and received signals are converted to Delay-Doppler domain to obtains Delay and Doppler values from said signals. Only difference here is transmission’s order. Transmission is carried out between devices are simultaneous in time-division duplex systems however same transmission is carried out in order in frequency-division duplex systems.
  • TDD time-division duplex system
  • FDD frequency-division duplex system
  • TDD time-division duplex system
  • FDD frequency-division duplex system
  • an information reconciliation is carried out after above steps. This step is used to remove the key mismatch. In present invention, it is primarily used to take care of the Doppler shifts for both nodes particularly for FDD scenario where the Doppler is not reciprocal but related to the specific carrier frequency of the uplink/downlink transmissions.
  • a privacy amplification is carried out after above steps. This step is used to enhance randomness of the generated key Said method executed by a computer or below-mentioned system.
  • the program comprises instructions for executing method on said computer or below-mentioned system.
  • the program may be stored on a computer readable medium.
  • a system is configured to carry out same above-mentioned method.
  • the system comprises at least two devices (device A (10a) and device B (10b)) and both devices comprise at least one antenna (A) for communicate each other on a wireless channel (WC).
  • Both devices comprise at least one processing unit (PU) for carrying out steps of same above- mentioned method.
  • PU processing unit
  • processing units are configured to perform specific steps of the method of the present invention.
  • the device A (10a) comprises processing unit (PU) configured to design delay-Doppler grid and pilot assignment and transform a delay- Doppler to time domain signal.
  • the device B (10b) comprises processing unit (PU) configured to transform time-domain to delay-Doppler domain and estimate delay and Doppler value and index and quantize the estimated delay/Doppler values.
  • one specific processing unit (PU) can be used for each function separately.
  • both devices comprise processing units (PU) configured to carry all steps and functions.
  • processing units (PU) of both devices are identical.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Un procédé de génération de clé basé sur un domaine à retard-Doppler mis en œuvre par ordinateur pour une communication sans fil sécurisée entre au moins deux dispositifs.
EP23898460.3A 2022-12-02 2023-11-07 Procédé de génération de clé basé sur un retard-doppler pour une communication sans fil sécurisée Pending EP4627753A1 (fr)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
TR2022018412 2022-12-02
TR2022021085 2022-12-28
PCT/TR2023/051262 WO2024118025A1 (fr) 2022-12-02 2023-11-07 Procédé de génération de clé basé sur un retard-doppler pour une communication sans fil sécurisée

Publications (1)

Publication Number Publication Date
EP4627753A1 true EP4627753A1 (fr) 2025-10-08

Family

ID=91324634

Family Applications (1)

Application Number Title Priority Date Filing Date
EP23898460.3A Pending EP4627753A1 (fr) 2022-12-02 2023-11-07 Procédé de génération de clé basé sur un retard-doppler pour une communication sans fil sécurisée

Country Status (2)

Country Link
EP (1) EP4627753A1 (fr)
WO (1) WO2024118025A1 (fr)

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009051733A2 (fr) * 2007-10-15 2009-04-23 University Of Connecticut Systèmes et procédés de génération de clé dans des systèmes de communication sans fil
US10129022B1 (en) * 2016-02-22 2018-11-13 The Regents Of The University Of California Secret key for wireless communication in cyber-physical automotive systems
KR102333796B1 (ko) * 2018-12-04 2021-12-03 (주)이노알에스 보안 무선 통신을 위한 비밀키 생성 시스템 및 방법

Also Published As

Publication number Publication date
WO2024118025A1 (fr) 2024-06-06

Similar Documents

Publication Publication Date Title
US20220322101A1 (en) Sharing Resources Between Wireless Networks
US20200259697A1 (en) Precoding in wireless systems using orthogonal time frequency space multiplexing
Chuang et al. High-resolution AoA estimation for hybrid antenna arrays
US8260208B2 (en) Radio channel estimator
US10833855B2 (en) Establishing secured communication over a wireless channel
Furqan et al. Secret key generation using channel quantization with SVD for reciprocal MIMO channels
EP3576339A1 (fr) Appareil et procédé de génération d'une clé de sécurité dans un système de communications sans fil
Wang et al. Wideband mmWave channel estimation for hybrid massive MIMO with low-precision ADCs
JP6112257B2 (ja) ユーザ固有の参照信号送信方法および装置
US11063724B1 (en) Reduced channel-sounding in MU-MIMO WLANS
CN112583501B (zh) 信道测量方法和通信装置
You et al. Massive MIMO transmission with pilot reuse in single cell
Luo et al. A channel frequency response-based secret key generation scheme in in-band full-duplex MIMO-OFDM systems
Sandoval et al. Sum-rate maximization and leakage minimization for multi-user cell-free massive MIMO systems
US9351156B2 (en) Physical layer encryption for MIMO communication networks
CN114982146B (zh) 信号发送方法及装置
Solaija et al. Delay-doppler-based key generation using OTFS
Liu et al. Artificial noise-assisted beamforming and power allocation for secure D2D-enabled V2V communications
CN113765556A (zh) 数据传输方法及相关设备
WO2024118025A1 (fr) Procédé de génération de clé basé sur un retard-doppler pour une communication sans fil sécurisée
JP2025541754A (ja) セキュア・ワイヤレス通信のための遅延ドップラー・ベース鍵生成方法
Abubaker et al. High-speed OFDM physical-layer key exchange
Gao et al. Random pilot and data access for massive MIMO spatially correlated Rayleigh fading channels
TR2022021085A1 (tr) Güvenli̇ kablosuz i̇leti̇şi̇m i̇çi̇n geci̇kme-doppler tabanli şi̇fre üreti̇m yöntemi̇
CN118119010A (zh) 通信方法及装置

Legal Events

Date Code Title Description
STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE INTERNATIONAL PUBLICATION HAS BEEN MADE

PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE

17P Request for examination filed

Effective date: 20250630

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC ME MK MT NL NO PL PT RO RS SE SI SK SM TR