当前位置: X-MOL 学术arXiv.cs.CR › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Authenticated Secret Key Generation in Delay Constrained Wireless Systems
arXiv - CS - Cryptography and Security Pub Date : 2020-01-20 , DOI: arxiv-2001.07162
Miroslav Mitev, Arsenia Chorti, Martin Reed, Leila Musavian

With the emergence of 5G low latency applications, such as haptics and V2X, low complexity and low latency security mechanisms are sought. Promising lightweight mechanisms include physical unclonable functions (PUF) and secret key generation (SKG) at the physical layer, as considered in this paper. In this framework we propose i) a novel authenticated encryption using SKG; ii) a combined PUF / SKG authentication to reduce computational overhead; iii) a 0-RTT resumption authentication protocol; iv) pipelining of the SKG and the encrypted data transfer. With respect to the latter, we investigate a parallel SKG approach for multi-carrier systems, where a subset of the subcarriers are used for SKG and the rest for data transmission. The optimal resource allocation is identified under security, power and delay constraints, by formulating the subcarrier allocation as a subset-sum $0-1$ knapsack optimization problem. A heuristic approach of linear complexity is proposed and shown to incur negligible loss with respect to the optimal dynamic programming solution. All of the proposed mechanisms, have the potential to pave the way for a new breed of latency aware security protocols.

中文翻译:

延迟受限无线系统中的认证密钥生成

随着触觉和V2X等5G低延迟应用的出现,人们寻求低复杂度和低延迟的安全机制。正如本文所考虑的那样,有希望的轻量级机制包括物理层的物理不可克隆功能 (PUF) 和密钥生成 (SKG)。在这个框架中,我们提出了 i) 一种使用 SKG 的新型认证加密;ii) 联合 PUF/SKG 认证以减少计算开销;iii) 0-RTT 恢复认证协议;iv) SKG 的流水线和加密的数据传输。对于后者,我们研究了多载波系统的并行 SKG 方法,其中子载波的子集用于 SKG,其余用于数据传输。在安全、功率和延迟约束下确定最优资源分配,通过将子载波分配公式化为子集和 $0-1$ 背包优化问题。提出了一种线性复杂度的启发式方法,并证明其对最优动态规划解决方案的损失可以忽略不计。所有提议的机制都有可能为新型延迟感知安全协议铺平道路。
更新日期:2020-03-27
down
wechat
bug