论文标题
在延迟约束的无线系统中进行身份验证的秘密密钥生成
Authenticated Secret Key Generation in Delay Constrained Wireless Systems
论文作者
论文摘要
随着5G低潜伏期应用的出现,例如触觉和V2X,寻求低复杂性和低潜伏期安全机制。如本文所考虑的那样,有前途的轻巧机制包括物理层的物理无统治功能(PUF)和秘密密钥一代(SKG)。在此框架中,我们提出了I)使用SKG进行了新的经过认证的加密; ii)合并的PUF / SKG身份验证,以减少计算开销; iii)0-RTT恢复身份验证协议; iv)SKG管道和加密数据传输。关于后者,我们研究了多载体系统的平行SKG方法,其中一个子集的子集用于SKG,其余用于数据传输。最佳资源分配是在安全,功率和延迟约束下确定的,通过将子载波分配作为子集$ 0-1 $ 0-1 $ napsack优化问题来确定。提出了一种线性复杂性的启发式方法,并证明相对于最佳的动态编程解决方案造成可忽略不计的损失。所有提出的机制都有可能为新的潜伏期意识安全协议铺平道路。
With the emergence of 5G low latency applications, such as haptics and V2X, low complexity and low latency security mechanisms are sought. Promising lightweight mechanisms include physical unclonable functions (PUF) and secret key generation (SKG) at the physical layer, as considered in this paper. In this framework we propose i) a novel authenticated encryption using SKG; ii) a combined PUF / SKG authentication to reduce computational overhead; iii) a 0-RTT resumption authentication protocol; iv) pipelining of the SKG and the encrypted data transfer. With respect to the latter, we investigate a parallel SKG approach for multi-carrier systems, where a subset of the subcarriers are used for SKG and the rest for data transmission. The optimal resource allocation is identified under security, power and delay constraints, by formulating the subcarrier allocation as a subset-sum $0-1$ knapsack optimization problem. A heuristic approach of linear complexity is proposed and shown to incur negligible loss with respect to the optimal dynamic programming solution. All of the proposed mechanisms, have the potential to pave the way for a new breed of latency aware security protocols.