1. Introduction
Integrated ground–air–space global networks will rely heavily on the use of multi-hop wireless networking, e.g., using drones, in order to expand the performance and capabilities of future generations of wireless systems. In order to deliver the promised performance, various challenges need to be addressed, e.g., meeting aggressive latency requirements, enabling massive connectivity with low energy consumption and computational effort, jointly with the provision of explicit security guarantees. Another crucial concern arises from the widespread deployment of low-end Internet of Things (IoT) devices. These devices, often manufactured through non-uniform production processes and expected to remain operational for over 10 years, raise important questions about future security architectures. Furthermore, the extensive utilization of artificial intelligence (AI), machine learning (ML), and quantum computing advancements will increase the vulnerability of 6G systems to attacks.
Today’s security architecture of connected devices mainly relies on public key infrastructure (PKI) [
1] for authentication and key distribution. Such architecture has proven reliable and useful for a vast range of applications and has proven instrumental in securing both the core network as well as 5G networks incorporating TLS-based protocols. However, upcoming quantum computers are said to on one hand be able to break standard public key-encryption-based handshakes, while on the other hand post-quantum-based asymmetric cryptography can still be computationally expensive for simple, low-end IoT devices such as wireless sensors [
2]. Hence, alternative methods for authentication and key distribution must be found.
Here, Physical layer security (PLS) can be a promising candidate to overcome this key distribution problem [
3]. In particular, applying secret-key generation (SKG) algorithms that extract the keys from the shared physical channel between the communicating devices [
4] presents a light-weight alternative to the complex logistics of PKI, especially when billions of small embedded IoT devices are deployed. In many 5G and 6G scenarios with wide-band communication, the dynamic frequency selectivity of the wireless channel between the pairing devices can be used as a common source of entropy to generate a common secret key [
5]. Unfortunately, in static line-of-sight (LOS) scenarios such as those encountered in drone-enabled multi-hop wireless networks, the wireless channels become frequency flat and less dynamic and hence another source of entropy needs to be found.
Despite these difficulties, the use of SKG in LOS conditions can be important for use cases such as drone communications and is motivated by many factors:
Drones are expected to have widespread use in applications including surveillance, delivery services, and critical infrastructure inspections. These applications often involve the exchange of sensitive and often confidential data that need to be secure against unauthorized access. SKG emerges thus as a viable option for the ad hoc generation of secret keys between drones and critical infrastructure. These can be used in hybrid PLS-crypto systems to establish secure communication channels, ensuring that the transmitted information remains confidential and protected from eavesdropping, while respecting very strict delay constraints by avoiding conventional PKI-based key distribution.
Secondly, drones operate in wireless environments that are susceptible to other types of malicious attacks, e.g., jamming, spoofing and tampering. Recent works on SKG robustness against such attacks provide the grounds for using such technologies in a trustworthy manner. We note in passing that jamming attacks have been analyzed in [
6], tampering during pilot exchange in [
7], spoofing during side information exchange in [
8], while generalized channel probing has been covered in [
9].
Additionally, drones often operate in dynamic and unpredictable environments, making them vulnerable to both physical and cyber attacks. SKG provides an infrastructureless setting for enabling secure communications in such demanding scenarios.
Moreover, SKG can lend itself to zero-touch solutions, especially when combined with location and RF-fingerprint-based authentication protocols. Protocols building on these PLS solutions have been proposed for fast authentication of IoT devices [
8].
In summary, the use of SKG in drone communications can be instrumental to protect sensitive data, secure wireless communication channels, mitigate risks of physical and cyber attacks, and enable secure interactions within the IoT ecosystem. It can be used in hybrid PLS-crypto systems to ensure the confidentiality of the transmitted data, enhancing the overall security and reliability of drone operations.
Due to the frequency flatness in LOS scenarios, in [
10] the authors proposed to use the phase shift of a LOS multiple-input multiple-output (MIMO) channel as the common randomness between devices. In particular, with small wave lengths, small fluctuations in the position of transmitting and receiving antennas can already have a large effect on the channel phase and hence serve as a source of entropy. Moreover, such small changes in the position are hardly visible to malicious observers and hence the channel phase cannot be predicted. The authors in [
10] numerically analyzed the mutual information (MI)
between the pairing devices, Alice and Bob. Moreover, they also simulated the conditional MI between Alice and Bob given the observer, Eve, to understand the available key generation rate for a specific geometric constellation.
As the novelty, and in contrast to the work in [
10] this paper provides analytic expressions for the MI between Alice and Bob given different counts of antennas and signal-to-noise ratios (SNRs). Analytic results are important in order to understand the underlying characteristics of a system and potentially allow to generalize results beyond scenarios that where simulated numerically. In particular, the results presented in this paper are valid for single- and dual-antenna systems and provide a theoretical reasoning on the behaviour of the MI for different SNRs at Alice and Bob. We show that the results match the numeric simulations. In particular, the contributions of this paper are three-fold:
We analyze the properties of the noise of the channel phase and provide analytic expressions for the probability density function (PDF) of the channel phase under rotating antennas. Here, we build upon the system model from [
10], but introduce a geometric approximation in order to make the expressions mathematically tractable. The obtained PDF serves as a basis for the subsequent analysis of
.
We derive a tight upper-bound expression for the MI between Alice and Bob which is valid for different SNRs and antenna constellations. This is particularly novel, as the model under consideration has previously only been studied via numeric simulations.
Using the derived analytic results we show that the orientation distribution of Alice and Bob can be optimized such that reaches the provided upper bound. The obtained expression of the optimal rotation is a direct consequence of the previously derived expressions and is therefore a direct application of our results.
All results are verified with numeric simulations to corroborate their validity. The shown results can serve as a basis for subsequent performance analysis of LOS SKG algorithms in different scenarios, e.g., in drone-aided communications. The remainder of this paper is structured as follows.
Section 2 describes the system model in terms of signal and geometry and derives the PDF for the channel phase between Alice and Bob. Analytic expressions for MI between Alice and Bob are derived in
Section 3.
Section 4 verifies the analytic results with numeric simulations. Finally, concluding remarks are provided in
Section 5.
3. Mutual Information
For calculating the mutual information we assume , since a constant angle offset does not influence the mutual information between Alice and Bob. Moreover, in the sequel we assume that if Alice or Bob have two antennas, then and , i.e., the antennas at both Alice and Bob have an angle offset of 180 degree. In this case, and .
3.1. Single-Antenna Case
In the most basic
-case, where Alice and Bob have one antenna each and only Bob rotates their antenna, the measurement model can be written as
where both summations are performed
. Here, we consider
since
is constant and any constant angle will not influence
. We substract both equations and get
and therefore
where
is the sum of the measurement noise at Alice’s and Bob’s antenna.
In (
17) it was shown that the distribution of
is already nearly uniform. Since additive noise results equalizes the distribution more, we assume
to be nearly uniformly distributed. Therefore, the first component of the mutual information can be approximated (and upper bounded) by the entropy of the uniform distribution on
:
For the second part,
we consider that both
are independent and, for higher SNR, nearly Gaussian distributed. Hence, the difference of both is also distributed according to a Gaussian with variance
. However, before we saw that the periodice von-Mises distribution approximates the real phase distribution better for lower SNRs, and therefore we assume that
n is von-Mises distributed with
Note, that this expression does not hold exactly for lower SNR, since in this case the variances do not add completely due to the summation
. The deviation will be pointed out in the simulation results. Hence,
can be calculated by
where
is the differential entropy of a von-Mises distributed random variable with parameter
.
3.2. System
The case with multiple antennas can be directly derived from the fundamental single-antenna case. First, we consider a
system where Bob has 2 antennas, and Alice has 1 antenna, and only Bob rotates their antennas, the measurement equations become:
Essentially, now Bob and Alice have two independent noisy observations of the same underlying random variable
. Therefore, the mutual information can be calculated from the fundamental case by a simple SNR shift:
3.3. System
Eventually, the
-case where both Alice and Bob have two antennas each, and both Alice and Bob rotate their antennas yields the following measurement equations for Alice,
and similar equations can be formulated for Bob’s reception. Compared to the case where only Bob rotated their antennas, the system now has two degrees of freedom, namely
and
. Therefore, we expect the mutual information to be double compared to the case with a single degree of freedom. At the same time, each side has four measurements to estimate two parameters. Compared to the single-antenna case, where each side had one measurement to estimate one parameter, the SNR is again doubled. Consequently, the mutual information in the multi-antenna case is given by
3.4. Optimal Rotation Distribution
Before, we saw that (
25) is maximized, if
and
are uniformly distributed. Hence, finding a distribution for
that yields a uniform channel phase will maximize
. When Alice and Bob have no preferred orientation and hence
are uniformly distributed,
is distributed according to (
17). On the other hand, for
, if
is inserted into (
16) it becomes apparent that
is uniformly distributed for the given optimal rotation distribution in (
41).
4. Simulation Results
This section shows simulated MI between Alice and Bob along with the analytic results from above. The results were obtained in Python by simulating (
6) and then taking the phase according to (
7). We assume ideal synchronization and no hardware impairments like phase noise of the oscillators. The distances
that are used to generate
have been obtained by using the exact geometry expression from (
4) for random rotations of the antennas at Alice and Bob. The distribution of the rotation angle of Alice and Bob was uniform except for the optimized rotation distribution described in the previous section. The mutual information was estimated using the Python NPEET package [
13]. For each SNR point, sufficiently many samples were obtained until the curves became smooth and the upper bound of calculatable mutual information imposed by the NPEET algorithm [
14] was not reached. In particular, this corresponded to 500.000 angle realizations per SNR point. The source code used for obtaining the results is contained in the
supplementary material of this paper.
Figure 4 shows the
for the single-antenna system with different
. The distance between Alice and Bob was set to
. As mentioned before, with increasing
, the distribution of
nears the uniform distribution and the uniform distribution of
maximizes the obtained mutual information.
Figure 4 also shows the simulated MI curve, when
is truly uniformly distributed. For
these curves are reasonably close and they virtually overlap for
. Moreover, we show that for SNR > 5 dB the curve for uniform
overlaps the theoretic curve
.
Figure 5 shows the simulated MI for the single and multi-antenna systems with
along with the theoretic curves. As can be seen, for SNR > 5 dB the simulated curves are closely upper bounded by the theory, whereas for the lower SNR the theoretic curves estimate the mutual information too low. This is due to the fact that in lower SNR
because the noise samples are added
and their entropy is upper bounded by the uniform distribution. Therefore,
in (
25) is estimated too high. However, the approximation is still very close.
Figure 6 shows the measured and theoretic mutual information for single and multi-antenna systems where the SNR at Alice and Bob is different. This can, e.g., happen in a non-symmetric scenario like in an up- and downlink of a celluar system. Naturally, when the SNR of Bob is fixed,
approaches a finite limit for high
. The theoretic and simulated curves match well, and still the theoretic curve is an upper bound for
for
.
Figure 5 also shows the simulated curves for
when Alice and Bob distribute their orientation according to (
41). As can be seen, in this case
is above that of a uniform orientation of Alice and Bob. Moreover, the simulated curves overlap the curves for the analytic upper bound and hence prove that the MI between Alice and Bob indeed has been maximized.
5. Conclusions
In this paper, we derive analytic expressions for the mutual information between two communicating devices, where the shared information is the phase of the reciprocal line-of-sight MIMO channel between both devices. Using randomly moving antennas, the channel phase becomes a random variable that is estimated at both sides. Such commonly estimated information can be used for example as an entropy source for key-generation in physical-layer-based security schemes.
The derived expressions match well with the simulation results, proving their validity. The results can be calculated much faster and more flexibly compared to running tedious numerical simulations for different SNR combinations. Moreover, we derived an antenna rotation scheme which maximizes the mutual information and proved the validity with simulation results. The results are valid for one or two transmit antennas only, and cannot be straightforwardly extended to four or more antennas. Another open point is the extension of the geometry to the three-dimensional space, where Alice and Bob have two degrees of freedom in their rotation, respectively.
The obtained results indicate that the channel phase of an LOS MIMO channel contains sufficient information to synchronously generate random keys. At a high SNR, which can be well assumed in LOS scenarios, each antenna can provide up to five bits of entropy per measurement under ideal conditions. The obtained results help engineers estimate the required SNR for real-world experiments and the presented derivations enable researchers to elaborate on more sophisticated system models including higher dimensions and more antennas.
Future Works
In future works, the presented results shall be verified with real-world measurements to validate the obtained expressions. Here, a solution using software-defined radios and offline signal processing shall be the first step to compare theoretic and simulated results with real-world measurements.
On the theoretical side, it is of utmost importance to derive expressions when an eavesdropper “Eve” enters the stage, because a secret key generation algorithm needs to not only consider common information between Alice and Bob but also what information is available to an eavesdropper [
4]. Here, the position of Eve relative to Alice and Bob will have a major influence on the dropped information, because, as this paper has shown, some rotation angles exhibit more information than others. Hence, expressions involving the position of Alice, Bob and Eve need to be developed.
Finally, an actual key generation algorithm that exploits the channel phase between devices should be designed, theoretically and numerically evaluated and eventually validated with real measurements. Here, a multi-step approach as described in [
15] consisting of Randomness Extraction, Quantization, Information Reconciliation and Privacy Amplication can be a promising solution.
PLSPhysical layer security SKGsecret-key generation IoTInternet of Things PKIpublic key infrastructure LOSline-of-sight SNRsignal-to-noise ratio MImutual information PDFprobability density function MIMOmultiple-input multiple-output