Channel Reciprocity-based Key Generation (CRKG) exploits reciprocal channel randomness to establish shared secret keys between wireless terminals. This new security technique is expected to complement existing cryptographic techniques for secret key distribution of future wireless networks. In this paper, we present a new attack, reconfigurable intelligent surface (RIS) jamming, and show that an attacker can prevent legitimate users from agreeing on the same key by deploying a malicious RIS to break channel reciprocity. Specifically, we elaborate on three examples to implement the RIS jamming attack: Using active nonreciprocal circuits, performing time-varying controls, and reducing the signal-to-noise ratio. The attack effect is then studied by formulating the secret key rate with a relationship to the deployment of RIS. To resist such RIS jamming attacks, we propose a countermeasure that exploits wideband signals for multipath separation. The malicious RIS path is distinguished from all separated channel paths, and thus the countermeasure is referred to as contaminated path removal-based CRKG(CRP-CRKG). We present simulation results, showing that legitimate users under RIS jamming are still able to generate secret keys from the remaining paths. We also experimentally demonstrate the RIS jamming attack by using commodity Wi-Fi devices in conjunction with a fabricated RIS prototype. In our experiments, we were able to increase the average bit disagreement ratio (BDR) of raw secret keys by 20%. Further, we successfully demonstrate the proposed CRP-CRKG countermeasure to tackle RIS jamming in wideband systems as long as the source of randomness and the RIS propagation paths are separable.
翻译:以频道为对等基础的密钥生成( CRKG) 利用对等通道随机性来建立无线终端之间的共享秘密密钥。 这种新的安全技术预计将补充用于未来无线网络秘密密钥分布的现有加密技术。 在本文中, 我们展示了一种新的攻击性、 可重新配置智能表面干扰功能, 并显示攻击者可以通过部署恶意的RIS来打破对等通道, 防止合法用户同意同一密钥。 具体地说, 我们详细介绍了实施RIS干扰攻击的三个例子: 使用活跃的非对等电路, 执行时间变化控制, 并降低信号对音比比比率。 然后, 我们通过制定与RIS部署关系的秘密密钥来研究攻击效果。 为了抵抗这类RIS干扰攻击, 我们提议了一种对应措施, 利用宽频信号信号信号进行多路隔断。 恶意的RIS路径与所有分离的频道路径不同, 因此, 对应措施被称为被污染的路径为基于 CRKG(CRP- CRKG- CRKG) 。 我们的模拟结果显示, 合法用户在持续使用静态的路径中, 我们的静点的静核定位中, 也显示我们正在使用静核变动的静变动的静变动的轨道, 。</s>