论文标题
对抗性重新配置的智能表面与物理层密钥生成
Adversarial Reconfigurable Intelligent Surface Against Physical Layer Key Generation
论文作者
论文摘要
可重新配置的智能表面(RIS)的开发最近推进了物理层安全性研究(PLS)。 RIS的有益影响包括但不限于为无键PLS优化提供新的自由度(DOF),以及增加物理层秘密密钥生成(PL-SKG)的通道随机性。但是,缺乏研究研究如何使用对抗性RI来攻击和获得PL-SKG产生的合法秘密密钥。在这项工作中,我们通过插入合法的频道一个随机和相互的渠道,显示了一个夏娃控制的对抗性RI(EVE-RIS),可以部分重建合法的PL-SKG过程中的秘密密钥。为了实现这一概念,我们针对使用的两种PL-SKG技术设计了EVE-RIS方案:(i)基于CSI的PL-SKG和(ii)基于双向交叉乘法的PL-SKG。 EVE-RIS处的通道探测是通过具有少量射频(RF)链的压缩传感设计来实现的。然后,通过最大化EVE-RIS插入的欺骗通道获得最佳RIS相。我们的分析和结果表明,即使有被动的RI,我们提议的前夕也可以与合法用户达到高关键匹配率,并且对当前大多数防御方法具有抵抗力。这意味着新颖的Eve-ris对PL-SKG提供了新的窃听威胁,该威胁可以刺激新的研究领域来应对对抗性RIS攻击。
The development of reconfigurable intelligent surfaces (RIS) has recently advanced the research of physical layer security (PLS). Beneficial impacts of RIS include but are not limited to offering a new degree-of-freedom (DoF) for key-less PLS optimization, and increasing channel randomness for physical layer secret key generation (PL-SKG). However, there is a lack of research studying how adversarial RIS can be used to attack and obtain legitimate secret keys generated by PL-SKG. In this work, we show an Eve-controlled adversarial RIS (Eve-RIS), by inserting into the legitimate channel a random and reciprocal channel, can partially reconstruct the secret keys from the legitimate PL-SKG process. To operationalize this concept, we design Eve-RIS schemes against two PL-SKG techniques used: (i) the CSI-based PL-SKG, and (ii) the two-way cross multiplication based PL-SKG. The channel probing at Eve-RIS is realized by compressed sensing designs with a small number of radio-frequency (RF) chains. Then, the optimal RIS phase is obtained by maximizing the Eve-RIS inserted deceiving channel. Our analysis and results show that even with a passive RIS, our proposed Eve-RIS can achieve a high key match rate with legitimate users, and is resistant to most of the current defensive approaches. This means the novel Eve-RIS provides a new eavesdropping threat on PL-SKG, which can spur new research areas to counter adversarial RIS attacks.