Skip to Main content Skip to Navigation
Journal articles

Authenticated Secret Key Generation in Delay Constrained Wireless Systems

Abstract : With the emergence of 5G low latency applications , such as haptics and V2X, low complexity and low latency security mechanisms are needed. Promising lightweight mechanisms include physical unclonable functions (PUF) and secret key generation (SKG) at the physical layer, as considered in this paper. In this framework we propose i) a zero-round-trip-time (0-RTT) resumption authentication protocol combining PUF and SKG processes; ii) a novel authenticated encryption (AE) using SKG; iii) pipelining of the AE SKG and the en-crypted data transfer in order to reduce latency. Implementing the pipelining at PHY, we investigate a parallel SKG approach for multi-carrier systems, where a subset of the subcarriers are used for SKG and the rest for data transmission. The optimal solution to this PHY resource allocation problem is identified under security, power and delay constraints, by formulating the sub-carrier scheduling as a subset-sum 0 − 1 knapsack optimization. A heuristic algorithm of linear complexity is proposed and shown to incur negligible loss with respect to the optimal dynamic programming solution. All of the proposed mechanisms, have the potential to Correspondence: M. Mitev pave the way for a new breed of latency aware security protocols.
Complete list of metadatas

Cited literature [97 references]  Display  Hide  Download
Contributor : Arsenia Chorti <>
Submitted on : Thursday, June 25, 2020 - 10:14:27 AM
Last modification on : Thursday, July 2, 2020 - 3:46:06 AM


Files produced by the author(s)




Miroslav Mitev, Arsenia Chorti, Martin Reed, Leila Musavian. Authenticated Secret Key Generation in Delay Constrained Wireless Systems. EURASIP Journal on Wireless Communications and Networking, SpringerOpen, 2020, ⟨10.1186/s13638-020-01742-0⟩. ⟨hal-02880603⟩



Record views


Files downloads