Next Article in Journal
Modulation of Antioxidant Defense Mechanisms and Morpho-Physiological Attributes of Wheat through Exogenous Application of Silicon and Melatonin under Water Deficit Conditions
Next Article in Special Issue
Short-Term Subway Passenger Flow Prediction Based on Time Series Adaptive Decomposition and Multi-Model Combination (IVMD-SE-MSSA)
Previous Article in Journal
The Impact of Entrepreneurship Institutions on Access to Micro-Financing for Sustainable Enterprise in an Emerging Economy
Previous Article in Special Issue
Performance Evaluation and Comparison of Cooperative Frameworks for IoT-Based VDTN
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Wireless Secret Sharing Game for Internet of Things

1
Department of Engineering Technology, Middle Tennessee State University, Murfreesboro, TN 37132, USA
2
School of Information and Communication Engineering, University of Electronic Science and Technology of China, Chengdu 611731, China
*
Author to whom correspondence should be addressed.
Current address: Department of Engineering Technology, College of Basic and Applied Sciences, Middle Tennessee State University, Box 19, 1301 E Main St., Murfreesboro, TN 37132, USA.
These authors contributed equally to this work.
Sustainability 2023, 15(9), 7427; https://doi.org/10.3390/su15097427
Submission received: 30 January 2023 / Revised: 24 April 2023 / Accepted: 26 April 2023 / Published: 30 April 2023
(This article belongs to the Special Issue Advances in Smart City and Intelligent Transportation Systems)

Abstract

:
In the era of Internet of Things (IoT), billions of small but smart wireless devices work together to make our cities more intelligent and sustainable. One challenge is that many IoT devices do not have human interfaces and are very difficult for humans to manage. This creates sustainability and security issues. Enabling automatic secret sharing across heterogeneous devices for cryptography purposes will provide the needed security and sustainability for the underlying IoT infrastructure. Therefore, wireless secret sharing is crucial to the success of smart cities. One secret sharing method is to utilize the effect of the randomness of the wireless channel in the data link layer to generate the common secret between legitimate users. This paper models this secret sharing mechanism from the perspective of game theory. In particular, we formulate a non-cooperative zero-sum game between the legitimate users (Alice and Bob) and an eavesdropper (Eve). Alice and Bob’s strategy is deciding how to exchange packets to protect the secret, and Eve’s strategy is choosing where to stay to better intercept the secret. In a symmetrical game where Eve has the same probability of successfully receiving a packet from Alice and Bob when the transmission distance is the same, we show that both pure and mixed strategy Nash equilibria exist. In an asymmetric game where Eve has different probabilities of successfully receiving a packet from Alice and Bob, a pure strategy may not exist; in this case, we show how a mixed strategy Nash equilibrium can be found. We run simulations to show that our results are better than other approaches.

1. Introduction

Urbanization has brought millions of people to cities and is expected to continue for decades to come. While urbanization creates prosperity and economic growth, it also causes severe sustainability issues due to the increased demand for water, energy, and better infrastructure [1]. Making cities “smart” is an important strategy to combat these issues. One enabling technology for smart cities is the Internet of Things (IoT), where millions of low-cost and yet powerful wireless devices are interconnected to gather information, make decisions, and perform control [2,3]. With the help of IoT, our homes are more energy efficient, transportation systems are more intelligent and have less congestion, and the well-being of senior citizens has been improved [4].
IoT brings us not only opportunities but also challenges. Security and privacy in IoT are especially challenging: (i) network level privacy is hard to guarantee with the presence of heterogeneous mobile edge computing [5]; (ii) the existence of a vast amount of different types of devices makes the credibility and privacy protection harder [6]; and (iii) the broadcast nature of wireless communications creates vulnerability in secure information exchange. In this paper, we discuss strategies to mitigate the risk of having insecure wireless communications in IoT. Most battery powered wireless devices rely on symmetric-key cryptography, which requires pre-established private keys at both the transmitter and the receiver [7]. In the era of IoT where machine to machine (M2M) communications frequently occur with minimum human intervention, the automatic and secure sharing of secrets for the purpose of cryptography is crucial to information security and the sustainability of smart cities. For example, automatic secret sharing helps protect privacy and critical wireless ECG data that monitor heart health [8].
There are various ways to share secrets automatically in wireless networks. One way is physical layer key generation (PLKG) [9], a.k.a., an information-theoretic approach, which exploits the principle of reciprocity [10] in wireless communications and extracts the secret from the common observation between Alice and Bob on the randomly varying wireless channel state. Similarly, there are early theoretical results in [11,12] that derive the secrecy capacity and bounds of a secret key rate. Recent works can be found in [13,14,15] for interference, broadcast, and multiple access channels, respectively. They have also been studied by using cooperation such as cooperative relaying and jamming to enhance wireless secrecy [16].
Mathur et al. [17] developed a practical PLKG algorithm that extracts secrets by sending channel probes between two legitimate users, Alice and Bob. In particular, level-crossings and quantization were used to extract the secret bits, and their results were validated using 802.11a devices in indoor environments. A differential secret sharing mechanism was proposed in [18], where the secret sharing rate is 3–4 times faster than [17] with a higher probability of success. While most PLKG algorithms only focus on the pairwise key generation between two users, Tang et al. [19] took advantage of the MIMO antennas available on newer devices to generate group secret keys. PLKG methods have been used for 5G systems [20,21,22,23,24], low-power LoRa wide-area networks [25,26,27], and sensor networks [28,29]. Another application of PLKG is vehicular scenarios. Zhu et al. [30] extended the existing level crossing techniques to extract secrets from the received signal strength indicator (RSSI) values in packets exchanged between two cars in a noisy vehicular environment. They were able to extract about 5 bits per second in real-world vehicular networks. Recent works for inter-vehicle secret sharing can be found in [31,32]. Although PLKG approaches have attracted lots of attention, they do not work very well when the speed of variation in wireless channels is slow. A recent work [33] tries to improve the performance of PLKG in slowly varying environments by introducing channel obfuscation. However, PLKG in general may require modifications to existing physical layer communication protocols, making it incompatible with legacy devices.
The effect of wireless channel dynamics on the data link layer is utilized to share secrets [34,35,36]. It is based on the fact that packet transmissions over wireless channels are not always reliable [37], and the idea is as follows: Alice and Bob keep sending each other unicast packets without retry, with which the secret is derived; Eve will eventually lose a packet and be unable to extract the secret even if she knows exactly which mechanism Alice and Bob are using. Safaka et al. [38] extended it to the multiple legitimate users case by assuming that broadcast packets can always be delivered reliably with acknowledgments, which may require modifications to the existing wireless protocols. The authors added support for multi-hop networks in [39] and showed that thousands of bits can be extracted per second in real-world scenarios. Another work that shares secrets among multiple nodes can be found in [40] where the authors exploit the benefit of being able to switch among multiple available wireless channels. Their work may also require modifications to existing protocols since channel switching currently takes time and is not designed to happen often. In [41], Bhatti and Saleem acquired a multi-party secret key using bloom filter and tested and verified their approach in real-world IEEE 802.11 wireless setups. Rabiah [42,43] extended the work in [34] further for IoT devices by adding authentication: one master key and an initial session key are provided to all nodes at startup, and the subsequent session keys change over time. Our previous work in [44] discussed optimal secret sharing between Alice and Bob with the presence of Eve. In particular, we assumed that Eve’s location is random, and only Alice and Bob can choose how to generate the secret; we showed that when the probability of successfully transmitting a packet is monotonically decreasing with the transmission distance and Eve’s location is uniformly distributed, the optimal strategy for Alice and Bob to successfully share the secret is to generate half of the packets from each one of them. Ref. [44] also offers a mechanism for sharing secrets among multiple wireless devices.
In real-world eavesdropping scenarios, Eve may intelligently choose her location in order to maximize her probability of receiving all of the packets and extracting the secret. This motivates our work in this paper where we extend the results in [44]. Specifically, we assume that both the legitimate users (Alice and Bob) and the eavesdropper (Eve) do not know each other’s strategy but are both rational. Let P e be the probability of Eve extracting the secret. Then, Alice and Bob’s goal is to minimize P e or maximize   P e , and Eve’s goal is to maximize P e . Therefore, we formulate the problem as a zero-sum game between the legitimate users and the eavesdropper.
Security games have been studied extensively on the interaction between legitimate and malicious users, and game-theoretic approaches have been applied to a wide range of problems, including security at the physical and MAC layers, security at the application layer, and cryptography. For comprehensive reviews, see [45,46,47]. Our secret-sharing game is different from the existing ones in the literature: we study how to share secrets using the effect of the unreliable nature of wireless channels on the data link layer. Our results are based on the probability function of Eve successfully receiving a packet. Nonetheless, our analysis does not rely on a specific form of the probability function; instead, our work would be applicable to any probability function as long as a mild assumption is satisfied.
The main contributions of this paper are as follows:
(i)
To the best of our knowledge, all previous works either do not take the eavesdropper Eve’s location into consideration or simply assume that her location is random. We believe this is the first work in the literature that formulates the optimal secret-sharing problem as a game between two legitimate users and the eavesdropper Eve.
(ii)
We analyze the symmetric game case and identify both pure and mixed strategy Nash equilibria.
(iii)
For the asymmetric game case, we discover two different scenarios that yield a pure and a mixed Nash equilibrium, respectively.
(iv)
We show how the mixed strategy Nash equilibrium can be found when the probabilities of successful packet transmission are known.
The organization of the rest of the paper is as follows: in Section 2, we formulate the secret sharing game; in Section 3, we present the main results of the optimal secret sharing zero-sum game; Section 4 discusses simulation and numeral results; and finally, we conclude and discuss future work in Section 5.

2. The Secret Sharing Game

The summary of system symbols and their definitions can be found in Table 1. In our system model, the two legitimate users Alice and Bob are at two different locations that are D meters away, and they are trying to exchange N packets { P k t 1 , P k t 2 , , P k t N } , using which the secret is calculated. See the illustration in Figure 3 in [44] for a packet-exchange process. One simple way to obtain the secret is to exclusive-OR all N packets together: s e c r e t = P k t 1 P k t 2 P k t N . Due to the unreliable nature of wireless communications, Eve will have a high probability of losing one or more packets when N is large so that she will not be able to extract the secret. Without loss of generality, we let N be an even number. For ease of notation, we assume that each of the two game players, i.e., the legitimate users and the eavesdropper, has three strategies. For Alice and Bob, there are totally N + 1 strategies, which can be represented by (1) S A , n : Alice sends N n , n { 0 , 1 , , N 2 1 } packets to Bob, and Bob sends n packets to Alice; (2)  S B , n : Bob sends N n , n { 0 , 1 , , N 2 1 } packets to Alice, and Alice sends n packets to Bob; and (3) S A B : each one of them sends N / 2 packets to the other. Eve chooses to stay somewhere between Alice and Bob, and she has three different strategies: staying close to Alice, staying close to Bob, and staying in the exact middle. We use L A , L B , and L M to denote these three locations/strategies, respectively. We further assume that locations L A and L B are ϵ , ϵ ( 0 , D 2 ) meters away from Alice and Bob, respectively; location L M is D 2 meters away from both Alice and Bob. Thus, P A ( ϵ ) , P A ( D ϵ ) , and P A ( D 2 ) are the probabilities of Eve successfully receiving a packet from Alice when Eve’s strategy is L A , L B , and L M , respectively. Similarly, P B ( ϵ ) , P B ( D ϵ ) , and P B ( D 2 ) are the probabilities of Eve successfully receiving a packet from Bob when Eve’s strategy is L B , L A , and L M , respectively.
Let P A ( d ) and P B ( d ) be the probability of Eve successfully receiving a packet from Alice or Bob, respectively, when the transmission distance is d. We have the following assumption about P A ( d ) and P B ( d ) .
Assumption 1.
(i) Each packet transmission is independent from each other; (ii) P A ( d ) and P B ( d ) are time-invariant; (iii) P A ( ϵ ) > P A ( D 2 ) > P A ( D ϵ ) and P B ( ϵ ) > P B ( D 2 ) > P B ( D ϵ ) ; and (iv) P A ( D 2 ) > 1 2 [ P A ( D ϵ ) + P A ( ϵ ) ] and P B ( D 2 ) > 1 2 [ P B ( D ϵ ) + P B ( ϵ ) ] .
The assumptions above are generic and do not require the exact form of functions P A ( d ) and P B ( d ) . Parts (i) and (ii) above are valid in slow-fading environments where the coherence time of the wireless channel is long and the channel state is stable during the period of secret sharing. Part (iii) states that the key factor that determines the probability of successful packet transmission is the distance, which is especially true in long-distance wireless communications. An example of P A ( d ) and P B ( d ) supporting the monotonicity assumption in VANET (vehicular ad hoc networks) environments can be found in [48], in which Killat et al. simulate and verify a theoretical probability of a successful transmission function of distance inferred from the Nakagami-m distribution of RF wave propagation. It is well known that in free space, the path loss of RF signals is proportional to the square of distance. Part (iv) above reflects this: in spite of random factors such as channel fading, the signal’s power and the probability of successful transmission attenuates faster when the distance is larger; there is evidence in the literature showing that the probability is a concave function of distance, especially for short-distance wireless communications (see Figure 1 in [48], Figure 12 in [49], Figure 9 and 10 in [50], Figure 6b in [51], and Figure 10 in [52]).

3. Optimal Secret Sharing as a Zero-Sum Game

Let s L and s E be the strategies of the legitimate users, i.e., Alice and Bob, and the eavesdropper, Eve, respectively. We have s L { S A , n , S B , n , S A B } , and s E { L A , L B , L M } We use U L ( s L , s E ) = P e and U E ( s L , s E ) = P e to denote the utility functions of the legitimate users and Eve, respectively. Essentially, Alice and Bob would like to minimize the probability of Eve figuring out the secret, and Eve would like to maximize that same probability.
Definition 1.
A strategy profile ( s L * , s E * ) is a Nash equilibrium if U L ( s L * , s E * ) U L ( s L , s E * ) for each feasible strategy s L and U E ( s L * , s E * ) U E ( s L * , s E ) for each feasible strategy s E .

3.1. Symmetric Game

We first consider a symmetric game scenario in which the following hold:
P A ( L A ) = P B ( L B ) = P ( ϵ ) , P A ( L B ) = P B ( L A ) = P ( D ϵ ) , and P A ( L M ) = P B ( L M ) = P ( D / 2 ) .
We show the utility matrix in Table 2, where the utility functions of Eve are positive and the ones of Alice and Bob are negative. Next, let us first introduce an auxiliary lemma.
Lemma 1.
P N 2 ( ϵ ) P N 2 ( D ϵ ) < P N ( D 2 ) .
Proof. 
Because P ( ϵ ) ( 0 , 1 ) , P ( D ϵ ) ( 0 , 1 ) , and P ( D 2 ) ( 0 , 1 ) , we only need to show that P ( ϵ ) P ( D ϵ ) < P 2 ( D 2 ) . Because ϵ ( 0 , D 2 ) , D ϵ ϵ . From part (iii) of Assumption 1, we have
[ P ( D ϵ ) P ( ϵ ) ] 2 = P 2 ( D ϵ ) + P 2 ( ϵ ) 2 P ( D ϵ ) P ( ϵ ) > 0 ,
i.e.,
1 4 [ P 2 ( D ϵ ) + P 2 ( ϵ ) ] > 1 2 [ P ( D ϵ ) P ( ϵ ) ] .
From part (iv) of Assumption 1, we have
P 2 ( D 2 ) = P 2 ( 1 2 ( D ϵ ) + 1 2 ϵ ) > [ 1 2 P ( D ϵ ) + 1 2 P ( ϵ ) ] 2 = 1 4 [ P 2 ( D ϵ ) + P 2 ( ϵ ) ] + 1 2 [ P ( D ϵ ) P ( ϵ ) ]
Invoking (1), we have P 2 ( D 2 ) > P ( D ϵ ) P ( ϵ ) .    □
We are now ready to discuss the pure strategy result of the symmetric game.
Lemma 2.
Strategy profile ( S A B , L M ) is a pure strategy Nash equilibrium.
Proof. 
It can be seen from the utility matrix that U L ( S A B , L M ) = U L ( S A , n , L M ) = U L ( S B , n , L M ) = P N ( D 2 ) . Invoking Lemma 1, we have
U E ( S A B , L M ) = P N ( D 2 ) > P N 2 ( ϵ ) P N 2 ( D ϵ ) = U E ( S A B , L A ) = U E ( S A B , L B ) .
From Definition 1, it follows that strategy profile ( S A B , L M ) is a pure strategy Nash equilibrium.    □
Lemma 2 indicates that in the pure strategy Nash equilibrium, Alice and Bob each generate half of the packets and Eve stays in the middle location L M . We now turn our attention to a mixed strategy Nash equilibrium, in which Eve has probabilities p 1 , p 2 , and p 3 = 1 p 1 p 2 to use strategies L A , L M , and L B , respectively; similarly, Alice and Bob have probabilities q A , n , q A B , and q B , n , the sum of which is 1, to use strategies S A , n , S A B , and S B , n , respectively.
Lemma 3.
In a mixed strategy Nash equilibrium, Eve’s strategy is to stay at L M with probability 1; Alice and Bob should have positive probabilities on all strategies S A , n , S B , n , and S A B so that:
n = 0 N 2 1 q A , n P N n ( ϵ ) P n ( D ϵ ) + q A B P N 2 ( ϵ ) P N 2 ( D ϵ ) + n = 0 N 2 1 q B , n P n ( ϵ ) P N n ( D ϵ ) < P N ( D 2 )
and
n = 0 N 2 1 q A , n P N n ( D ϵ ) P n ( ϵ ) + q A B P N 2 ( D ϵ ) P N 2 ( ϵ ) + n = 0 N 2 1 q B , n P N n ( ϵ ) P n ( D ϵ ) < P N ( D 2 )
Proof. 
Suppose that 0 < q A , n < 1 , 0 < q A B < 1 , and 0 < q B , n < 1 , n { 0 , 1 , , N 2 1 } . In a mixed strategy Nash equilibrium, we have:
p 1 P N n ( ϵ ) P n ( D ϵ ) p 2 P N ( D 2 ) p 3 P N n ( D ϵ ) P n ( ϵ ) = p 1 P N 2 ( ϵ ) P N 2 ( D ϵ ) p 2 P N ( D 2 ) p 3 P N 2 ( ϵ ) P N 2 ( D ϵ ) = p 1 P n ( ϵ ) P N n ( D ϵ ) p 2 P N ( D 2 ) p 3 P N n ( ϵ ) P n ( D ϵ )
where the equations above are utility functions of Alice and Bob’s strategies.
Solving the above equations, we obtain p 1 = p 3 = 0 , and p 2 = 1 . If it is the case in the mixed strategy Nash equilibrium, we must also have (2) and (3).
Next, we verify that when (2) and (3) hold, ∃ 0 < q A , n < 1 , 0 < q A B < 1 , and 0 < q B , n < 1 , n { 0 , 1 , , N 2 1 } . Let q A , n = q B , n , and (2) and (3) become one inequality:
n = 0 N 2 1 q A , n [ P N n ( ϵ ) P n ( D ϵ ) + P n ( ϵ ) P N n ( D ϵ ) ] + q A B P N 2 ( ϵ ) P N 2 ( D ϵ ) < P N ( D 2 ) = 2 n = 0 N 2 1 q A , n P N ( D 2 ) + q A B P N ( D 2 )
Invoking Lemma 1, we have q A B P N 2 ( ϵ ) P N 2 ( D ϵ ) < q A B P N ( D 2 ) . We now consider two cases.
Case 1:  P N n ( ϵ ) P n ( D ϵ ) + P n ( ϵ ) P N n ( D ϵ ) 2 P N ( D 2 ) , for all n. In this case, (4) always holds as long as q A , n are nonzero probabilities.
Case 2:  P N n ( ϵ ) P n ( D ϵ ) + P n ( ϵ ) P N n ( D ϵ ) > 2 P N ( D 2 ) , for some n. In this case, we can always pick small enough positive q A , n values so that (4) holds.    □

3.2. Asymmetric Game

We now consider an asymmetric game scenario in which P A ( d ) > P B ( d ) , i.e., when the transmission distance is the same, Eve has higher probability of successfully receiving a packet from Alice than from Bob. For example, if Alice has higher transmission power than Bob or Bob is closer to a noise source, then the signal to noise ratio between Alice and Eve may be higher than that between Bob and Eve, causing the asymmetric game scenario described above. We have the following utility matrix shown in Table 3.
Lemma 4.
If P A ( d ) > P B ( d ) , and P B ( ϵ ) P A ( D ϵ ) , then strategy profile ( S B , 0 , L B ) is a pure strategy Nash equilibrium.
Proof. 
When n = 0 , we invoke part (iii) of Assumption 1 and obtain
P B N ( ϵ ) > P B N ( D 2 ) > P B N ( D ϵ ) , i . e . ,
U E ( S B , 0 , L B ) > U E ( S B , 0 , L M ) > U E ( S B , 0 , L A ) .
By assumption P B ( ϵ ) P A ( D ϵ ) , we obtain
P B N ( ϵ ) P B N n ( ϵ ) P A n ( D ϵ ) , n { 1 , 2 , , N 2 1 }
and
P B N ( ϵ ) P B N 2 ( ϵ ) P A N 2 ( D ϵ ) P A N n ( D ϵ ) P B n ( ϵ ) , n { 0 , 1 , , N 2 1 }
Combining (6) and (7), we obtain:
U L ( S B , 0 , L B ) U L ( S A B , L B ) U L ( S A , 0 , L B ) .
From (5) and (8), it follows that strategy profile ( S B , 0 , L B ) is a pure strategy Nash equilibrium.    □
The intuition behind Lemma 4 is that if P B ( d ) is so much smaller than P A ( d ) so that P B ( ϵ ) P A ( D ϵ ) , then the best strategy of the legitimate users is to always let Bob send the packets; conversely, the best strategy of Eve is to stay close to Bob so that she could maximize the probability of receiving all of the packets.
Lemma 5.
If P A ( d ) > P B ( d ) and P B ( ϵ ) > P A ( D ϵ ) , then there is no pure strategy Nash equilibrium.
Proof. 
By assumption, we have P A ( ϵ ) > P B ( ϵ ) > P A ( D ϵ ) > P B ( D ϵ ) . We discuss the three rows of the utility matrix individually.
(1)
In the first row, we have the largest utility function U L ( S B , 0 , L A ) = P B N ( D ϵ ) , which is greater than all of the other ones in the same row. Now, let us look at the column of U L ( S B , 0 , L A ) . Due to part (iii) of Assumption 1, we have U E ( S B , 0 , L A ) = P B N ( D ϵ ) < U E ( S B , 0 , L M ) = P B N ( D / 2 ) . Therefore, there is no pure strategy Nash equilibrium in the first row of the utility matrix.
(2)
In the second row, we have the largest utility function U L ( S B , 0 , L M ) = P B N ( D / 2 ) , which is greater than all other ones in the same row. Now, let us look at the column of U L ( S B , 0 , L M ) . Due to part (iii) of Assumption 1, we have U E ( S B , 0 , L M ) = P B N ( D / 2 ) < U E ( S B , 0 , L B ) = P B N ( ϵ ) . Therefore, there is no pure strategy Nash equilibrium in the second row of the utility matrix.
(3)
In the third row, we have the largest utility function U L ( S A , 0 , L B ) = P A N ( D ϵ ) , which is greater than all of the other ones in the same row. Now, let us look at the column of U L ( S A , 0 , L B ) . Due to part (iii) of Assumption 1, we have U E ( S A , 0 , L B ) = P A N ( D ϵ ) < U E ( S A , 0 , L M ) = P A N ( D / 2 ) < U E ( S A , 0 , L A ) = P A N ( ϵ ) . Therefore, there is no pure strategy Nash equilibrium in the third row of the utility matrix.
Lemma 5 shows that when P B ( ϵ ) > P A ( D ϵ ) , i.e., P B ( d ) is not that much smaller than P A ( d ) , no pure strategy Nash equilibrium exists. According to [53], at least one mixed strategy Nash equilibrium always exists in this case. In what follows, we present the procedure to find such a mixed-strategy equilibrium. For notation use, we let Alice and Bob have only three strategies: S A , 0 , S A B , a n d S B , 0 . The utility functions are:
( q 1 ):
        p 1 P A N ( ϵ ) p 2 P A N ( D 2 ) p 3 P A N ( D ϵ )
( q 2 ):
        p 1 P A N 2 ( ϵ ) P B N 2 ( D ϵ ) p 2 P A N 2 ( D 2 ) P B N 2 ( D 2 ) p 3 P B N 2 ( ϵ ) P A N 2 ( D ϵ )
( q 3 ):
        p 1 P B N ( D ϵ ) p 2 P B N ( D 2 ) p 3 P B N ( ϵ )
( p 1 ):
        q 1 P A N ( ϵ ) + q 2 P A N 2 ( ϵ ) P B N 2 ( D ϵ ) + q 3 P B N ( D ϵ )
( p 2 ):
        q 1 P A N ( D 2 ) + q 2 P A N 2 ( D 2 ) P B N 2 ( D 2 ) + q 3 P B N ( D 2 )
( p 3 ):
        P A N ( D ϵ ) + q 2 P B N 2 ( ϵ ) P A N 2 ( D ϵ ) + q 3 P B N ( ϵ )
where ( q 1 ), ( q 2 ), and ( q 3 ) are the payoffs of the legitimate users when strategies S A , 0 , S A B , and S B , 0 are used, respectively; ( p 1 ), ( p 2 ), and ( p 3 ) are the payoffs of Eve when strategies L A , L M , and L B are used, respectively. The procedure of finding the mixed strategy Nash equilibrium involves two steps: proposition and verification. In the first step, we make an assumption about either { p 1 , p 2 , p 3 } or { q 1 , q 2 , q 3 } and use the utilization functions to solve for the other set of probabilities. If the solution is feasible and we are able to use it in the second step to verify that the proposition provided in Step 1 is indeed true, the Nash equilibrium is found. The formal procedure can be found in Algorithm 1, where we only show the propositions about { p 1 , p 2 , p 3 } ; the pseudo code of making propositions about { q 1 , q 2 , q 3 } is very similar.
Algorithm 1 Finding mixed strategy Nash equilibrium in an asymmetric game when P B ( ϵ ) > P A ( D ϵ )
1:
Proposition: enumerate the following assumptions.
2:
p 1 , p 2 , and p 3 are all non-zero probabilities; solve ( p 1 )=( p 2 )=( p 3 ) for q 1 , q 2 , q 3 and go to Verification.
3:
For any two probabilities p and p { p 1 , p 2 , p 3 } , assume they are non-zero and use p to denote the remaining probability. Solve ( p ) = ( p ) > ( p ) for q 1 , q 2 , q 3 and go to Verification.
4:
Verification:
5:
if the solution is infeasible then
6:
    Continue to the next assumption
7:
else
8:
    if  q 1 , q 2 , and q 3 are all positive then
9:
        Solve ( q 1 )=( q 2 )=( q 3 ) for p 1 , p 2 , p 3 .
10:
    end if
11:
    if two probabilities q and q { q 1 , q 2 , q 3 } are positive, and the remaining probability q is 0 then
12:
        Solve ( q ) = ( q ) > ( q ) for p 1 , p 2 , p 3 .
13:
    end if
14:
    if  q { q 1 , q 2 , q 3 } is 1, and the other two probability q and q are 0 then
15:
        Solve ( q ) > ( q ) and ( q ) > ( q ) for p 1 , p 2 , p 3 .
16:
    end if
17:
    if the solution of p 1 , p 2 , p 3 matches with the proposition then
18:
        Nash equilibrium is found and exit
19:
    else
20:
        Continue to the next assumption
21:
    end if
22:
end if

4. Simulation and Numerical Results

In this section, we run a simulation and present a numerical example to verify the results in Section 3. For ease of presentation, we assume that Alice and Bob have only three strategies: S A , 0 , S A B , and S B , 0 . We first consider the symmetric case where P A ( ϵ ) = P B ( ϵ ) = 0.99 , P A ( D / 2 ) = P B ( D / 2 ) = 0.9 , and P A ( D ϵ ) = P B ( D ϵ ) = 0.8 . As shown in Figure 1, the number of exchanged packets between Alice and Bob is from 10 to 100 with increment of 10 at a time. For each data point, we run the simulation 1 million times, and the probability of Eve receiving all of the packets is calculated by using the number of times that Eve receives all of the packets to divide 1 million. The vertical axis in Figure 1 is the logarithm of that probability, and five strategies are compared: (1) Equilibrium: This is the pure Nash equilibrium ( S A B , L M ) specified in Lemma 2, i.e., Alice and Bob each send half of the packets, and Eve stays in the middle; (2) Alice sends all of the packets, and Eve stays in the middle; (3) Bob sends all of the packets, and Eve stays in the middle; (4) Eve stays near Alice, and Alice and Bob each send half of the packets; and (5) Eve stays near Bob, and Alice and Bob each send half of the packets. We have two observations on the simulation result. First, ( S A B , L M ) is indeed the Nash equilibrium because both players have no motivation to deviate from it: when Eve leaves the middle, her probability of receiving all of the packets goes down; when Alice or Bob send all of the packets, the probability stays unchanged. Second, Eve’s probability of receiving all of the packets decreases exponentially with the increase in the number of packets exchanged between Alice and Bob. This shows that when N is large, the proposed method is very effective at preventing Eve from knowing the secret.
Next, we consider the asymmetric case where it is easier for Eve to receive packets from Alice than from Bob: P A ( ϵ ) = 0.99 > P B ( ϵ ) = 0.7 , P A ( D / 2 ) = 0.9 > P B ( D / 2 ) = 0.6 , P A ( D ϵ ) = 0.8 > P B ( D ϵ ) = 0.5 , and P B ( ϵ ) < P A ( D ϵ ) . As shown in Figure 2, the number of exchanged packets between Alice and Bob is from 2 to 20 with increment 2 at a time. For each data point, we run the simulation 1 million times, and the probability of Eve receiving all of the packets is calculated the same way as in Figure 1. The vertical axis in Figure 2 is the logarithm of that probability, and five strategies are compared: (1) Equilibrium: This is the pure Nash equilibrium ( S B , 0 , L B ) specified in Lemma 4, i.e., Bob sends all of the packets, and Eve stays near Bob; (2) Bob sends all of the packets, and Eve stays near Alice; (3) Bob sends all of the packets, and Eve stays in the middle; (4) Eve stays near Bob, and Alice sends all of the packets; and (5) Eve stays near Bob, and Alice and Bob each send half of the packets. It can be observed that ( S B , 0 , L B ) is indeed the Nash equilibrium because both players have no motivation to deviate from it: when Eve stays in the middle or be close to Alice, her probability of receiving all of the packets goes down; when Bob does not send all of the packets, the probability of Eve receiving all of the packets rises.
In what follows, we use a numerical example to demonstrate how to find a mixed strategy Nash equilibrium. For ease of calculation, we let N = 2 , and the probabilities are P A ( ϵ ) = 0.99 , P A ( D 2 ) = 0.94 , P A ( D ϵ ) = 0.80 , P B ( ϵ ) = 0.90 , P B ( D 2 ) = 0.84 , and P B ( D ϵ ) = 0.70 . Invoking Lemma 5, there is no pure strategy Nash equilibrium. The mixed strategy utility functions corresponding to ( q 1 ) through ( p 3 ) are:
0.3401 p 1 0.2364 p 2 0.64
0.072 p 1 0.0696 p 2 0.72
0.32 p 1 + 0.1044 p 2 0.81
0.4901 q 1 + 0.203 q 2 + 0.49
0.178 q 1 + 0.084 q 2 + 0.7056
0.17 q 1 0.09 q 2 + 0.81
We start out by assuming that p 1 ( 0 , 1 ) , p 2 ( 0 , 1 ) , and 1 p 1 p 2 ( 0 , 1 ) . Under this proposition, we have ( 12 ) = ( 13 ) = ( 14 ) , whose solution is q 1 = 1.946 , q 2 = 3.292 , and 1 q 1 q 2 = 2.346 . This is infeasible, meaning that p 1 , p 2 , and 1 p 1 p 2 cannot be all positive and less than 1. Next, we discuss three cases of p 1 , p 2 , and 1 p 1 p 2 .
Case 1:
p 1 ( 0 , 1 ) , p 2 ( 0 , 1 ) , and 1 p 1 p 2 = 0 . It yields that ( 12 ) = ( 13 ) > ( 14 ) . There are two solutions that ensure q 1 , q 2 , and 1 q 1 q 2 are not all positive and less than 1. Therefore, we have two subcases:
Case 1.1:
q 1 = 0.6908 , q 2 = 0 , and 1 q 1 q 2 = 0.3092 . It implies that at equilibrium, we must have ( 9 ) = ( 11 ) > ( 10 ) , which has no solution between 0 and 1 for p 1 and p 2 .
Case 1.2:
q 1 = 0.5469 , q 2 = 0.4531 , and 1 q 1 q 2 = 0 . It implies that at equilibrium, we must have ( 9 ) = ( 10 ) > ( 11 ) , which has solutions of p 1 and p 2 so that p 1 + p 2 ( 0 , 1 ) . It implies that 1 p 1 p 2 ( 0 , 1 ) , which is impossible.
Case 2:
p 1 ( 0 , 1 ) , p 2 = 0 , and 1 p 1 p 2 ( 0 , 1 ) . It yields that ( 12 ) = ( 14 ) > ( 13 ) . There are no solutions.
Case 3:
p 1 = 0 , p 2 ( 0 , 1 ) , and 1 p 1 p 2 ( 0 , 1 ) . In this last case, we have ( 13 ) = ( 14 ) > ( 12 ) . The only feasible solution to it is q 1 = 0 , q 2 = 0.6 , and 1 q 1 q 2 = 0.4 . If this solution is also the one in equilibrium, we need to have ( 10 ) = ( 11 ) > ( 9 ) , which also has a feasible solution: p 1 = 0 , p 2 = 0.5172 , and 1 p 1 p 2 = 0.4828 . It completes the numerical example, and the mixed Nash equilibrium is: ( p 1 , p 2 , 1 p 1 p 2 ) = ( 0 , 0.5172 , 0.4828 ) and ( q 1 , q 2 , 1 q 1 q 2 ) = ( 0 , 0.6 , 0.4 ) . The utility functions’ values are: ( 9 ) = 0.7623 ,   ( 10 ) = ( 11 ) = 0.7560 ,   ( 12 ) = 0.6118 ,   ( 13 ) = ( 14 ) = 0.7560 .
In Figure 3, we show the simulation result of the numerical example above regarding Alice and Bob’s strategies. The horizontal axis is the number of runs that goes from 1 M to 10 M with increment 1 M. The vertical axis is the probability of Eve receiving both packets. Four curves are plotted: (1) Alice and Bob’s strategy at equilibrium; (2) Alice and Bob each send one packet; (3) Alice sends both packets; and (4) Bob sends both packets. We have two observations: (i) Alice and Bob’s strategy at equilibrium converges to utility function value 0.7560 and (ii) all other strategies are not better than the strategy at equilibrium.
In Figure 4, we show the simulation result of the numerical example above regarding Eve’s strategies. The horizontal axis is the number of runs that goes from 1 M to 10 M with increment 1 M. The vertical axis is the probability of Eve receiving both packets. Five curves are plotted: (1) Eve’s strategy at equilibrium; (2) Eve has an equal chance of appearing at the three locations; (3) Eve has a 50% chance to be close to Alice, a 25% chance to be close to the middle, and a 25% chance to be close to Bob; (4) Eve has a 25% chance to be close to Alice, a 25% chance to be close to the middle, and a 50% chance to be close to Bob; and (5) Eve has a 25% chance to be close to Alice, a 50% chance to be close to the middle, and a 25% chance to be close to Bob. We have two observations: (i) Eve’s strategy at equilibrium converges to utility function value 0.7560 and (ii) all other strategies are not better than the strategy at equilibrium.
Combining the results in Figure 3 and Figure 4, we have verified the numerical example above. Note that the simulation parameters, i.e., P A ( ϵ ) , P B ( ϵ ) , P A ( D / 2 ) , P B ( D / 2 ) , P A ( D ϵ ) , and P B ( D ϵ ) affect the utility function. Nonetheless, our results in Section 3 hold for any simulation parameters as long as they satisfy Assumption 1.

5. Conclusions and Future Work

We have studied the optimal secret-sharing problem between two legitimate users (Alice and Bob) and an eavesdropper (Eve). The methodology of the secret-sharing mechanism allows Alice and Bob to exchange packets until Eve loses one due to the unreliable nature of wireless communications; Alice and Bob can then use the exchanged packets to establish the secret. To the best of our knowledge, this is the first work in the literature that formulates the problem as a non-cooperative zero-sum game. In the symmetric game case, both pure and mixed strategy Nash equilibria exist. Our results indicate that regardless of the type of the equilibrium, Eve should always stay in the middle of Alice and Bob. In the pure strategy Nash equilibrium, the best strategy of Alice and Bob is to generate half of the packets from each one of them; in a mixed strategy Nash equilibrium, Alice and Bob could generate all of the packets from one user only, but some inequalities involving the probabilities must hold.
In the asymmetric game case that Eve has a higher chance of successfully receiving packets from Alice than from Bob, we show that there are two scenarios: if it is very asymmetrical, then a pure strategy Nash equilibrium exists, in which Bob is the one who generates all of the packets and Eve chooses to stay near Bob; o.w., a mixed-strategy equilibrium exists and can be calculated.
Through extensive simulation and a numerical example, we have verified the correctness of the theoretical results of the secret-sharing game. We have also shown that with the increase in the number of packets exchanged between Alice and Bob, the probability of Eve receiving all of the packets and thus extracting the secret decreases exponentially. Future work includes comparing our approach with PLKG methods in various application scenarios.

Author Contributions

Methodology, L.M. and D.J.; Writing—review & editing, H.Z. All authors have read and agreed to the published version of the manuscript.

Funding

This research was supported in part by a startup funding provided by Middle Tennessee State University.

Institutional Review Board Statement

Not Applicable.

Informed Consent Statement

Not Applicable.

Data Availability Statement

No new data were created or analyzed in this study. Data sharing is not applicable to this article.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Chen, S.; Xu, H.; Liu, D.; Hu, B.; Wang, H. A vision of IoT: Applications, challenges, and opportunities with china perspective. IEEE Internet Things J. 2014, 1, 349–359. [Google Scholar] [CrossRef]
  2. Qu, L.; Xu, G.; Zeng, Z.; Zhang, N.; Zhang, Q. UAV-assisted RF/FSO relay system for space-air-ground integrated network: A performance analysis. IEEE Trans. Wirel. Commun. 2022, 21, 6211–6225. [Google Scholar] [CrossRef]
  3. Hubenko, V.P.; Raines, R.A.; Mills, R.F.; Baldwin, R.O.; Mullins, B.E.; Grimaila, M.R. Improving the global information grid’s performance through satellite communications layer enhancements. IEEE Commun. Mag. 2006, 44, 66–72. [Google Scholar] [CrossRef]
  4. Talari, S.; Shafie-Khah, M.; Siano, P.; Loia, V.; Tommasetti, A.; Catalão, J.P. A review of smart cities based on the internet of things concept. Energies 2017, 10, 421. [Google Scholar] [CrossRef]
  5. Yang, H.; Liang, Y.; Yuan, J.; Yao, Q.; Yu, A.; Zhang, J. Distributed blockchain-based trusted multidomain collaboration for mobile edge computing in 5G and beyond. IEEE Trans. Ind. Inform. 2020, 16, 7094–7104. [Google Scholar] [CrossRef]
  6. Yang, H.; Bao, B.; Li, C.; Yao, Q.; Yu, A.; Zhang, J.; Ji, Y. Blockchain-enabled tripartite anonymous identification trusted service provisioning in industrial IoT. IEEE Internet Things J. 2021, 9, 2419–2431. [Google Scholar] [CrossRef]
  7. Noor, M.b.M.; Hassan, W.H. Current research on Internet of Things (IoT) security: A survey. Comput. Netw. 2019, 148, 283–294. [Google Scholar] [CrossRef]
  8. Sobya, D.; Muruganandham, S.; Nallusamy, S.; Chakraborty, P. Wireless ECG monitoring system using IoT based signal conditioning module for real time signal acquisition. Indian J. Public Health Res. Dev. 2018, 9, 294–299. [Google Scholar] [CrossRef]
  9. Arfaoui, M.A.; Soltani, M.D.; Tavakkolnia, I.; Ghrayeb, A.; Safari, M.; Assi, C.M.; Haas, H. Physical layer security for visible light communication systems: A survey. IEEE Commun. Surv. Tutorials 2020, 22, 1887–1908. [Google Scholar] [CrossRef]
  10. Balanis, C.A. Antenna Theory: Analysis and Design, 2nd ed.; John Wiley and Sons: New York, NY, USA, 1997. [Google Scholar]
  11. Barros, J.; Rodrigues, M.R.D. Secrecy Capacity of Wireless Channels. In Proceedings of the IEEE International Symposium on Information Theory, Seattle, WA, USA, 9–14 July 2006. [Google Scholar]
  12. Maurer, U.M. Secret Key Agreement by Public Discussion from Common Information. IEEE Trans. Inf. Theory 1993, 39, 733–742. [Google Scholar] [CrossRef]
  13. Chen, J. Secure communication over interference channel: To jam or not to jam? IEEE Trans. Inf. Theory 2019, 66, 2819–2841. [Google Scholar] [CrossRef]
  14. Hyadi, A.; Rezki, Z.; Alouini, M.S. Securing Multi-User Broadcast Wiretap Channels with Finite CSI Feedback. IEEE Trans. Inf. Theory 2020, 66, 4468–4488. [Google Scholar] [CrossRef]
  15. Mukherjee, P.; Ulukus, S. Secure degrees of freedom of the multiple access wiretap channel with multiple antennas. IEEE Trans. Inf. Theory 2018, 64, 2093–2103. [Google Scholar] [CrossRef]
  16. Wang, H.M.; Xia, X.G. Enhancing wireless secrecy via cooperation: Signal design and optimization. IEEE Commun. Mag. 2015, 53, 47–53. [Google Scholar] [CrossRef]
  17. Mathur, S.; Trappe, W.; Mandayam, N.; Ye, C.; Reznik, A. Radio-telepathy: Extracting a secret key from an unauthenticated wireless channel. In Proceedings of the 14th ACM International Conference on Mobile Computing and Networking, San Francisco, CA, USA, 14–19 September 2008. [Google Scholar]
  18. Miao, L. Differential Secret Sharing in Wireless Networks. IEEE Wirel. Commun. Lett. 2015, 4, 213–216. [Google Scholar] [CrossRef]
  19. Tang, J.; Wen, H.; Song, H.H.; Jiao, L.; Zeng, K. Sharing secrets via wireless broadcasting: A new efficient physical layer group secret key generation for multiple IoT devices. IEEE Internet Things J. 2022, 9, 15228–15239. [Google Scholar] [CrossRef]
  20. Wang, H.M.; Zheng, T.X.; Yuan, J.; Towsley, D.; Lee, M.H. Physical layer security in heterogeneous cellular networks. IEEE Trans. Commun. 2016, 64, 1204–1219. [Google Scholar] [CrossRef]
  21. Zhang, Y.; Wang, H.M.; Yang, Q.; Ding, Z. Secrecy sum rate maximization in non-orthogonal multiple access. IEEE Commun. Lett. 2016, 20, 930–933. [Google Scholar] [CrossRef]
  22. Jiao, L.; Wang, N.; Wang, P.; Alipour-Fanid, A.; Tang, J.; Zeng, K. Physical layer key generation in 5G wireless networks. IEEE Wirel. Commun. 2019, 26, 48–54. [Google Scholar] [CrossRef]
  23. Jiao, L.; Wang, P.; Wang, N.; Chen, S.; Alipour-Fanid, A.; Le, J.; Zeng, K. Efficient physical layer group key generation in 5G wireless networks. In Proceedings of the 2020 IEEE Conference on Communications and Network Security (CNS), Avignon, France, 29 June–1 July 2020; pp. 1–9. [Google Scholar]
  24. Solaija, M.S.J.; Salman, H.; Arslan, H. Towards a Unified Framework for Physical Layer Security in 5G and Beyond Networks. IEEE Open J. Veh. Technol. 2022, 3, 321–343. [Google Scholar] [CrossRef]
  25. Ruotsalainen, H.; Zhang, J.; Grebeniuk, S. Experimental Investigation on Wireless Key Generation for Low-Power Wide-Area Networks. IEEE Internet Things J. 2019, 7, 1745–1755. [Google Scholar] [CrossRef]
  26. Yang, H.; Liu, H.; Luo, C.; Wu, Y.; Li, W.; Zomaya, A.Y.; Song, L.; Xu, W. Vehicle-key: A secret key establishment scheme for LoRa-enabled IoV communications. In Proceedings of the 2022 IEEE 42nd International Conference on Distributed Computing Systems (ICDCS), Bologna, Italy, 10–13 July 2022; pp. 787–797. [Google Scholar]
  27. Yang, L.; Gao, Y.; Zhang, J.; Camtepe, S.; Jayalath, D. A channel perceiving attack and the countermeasure on long-range IoT physical layer key generation. Comput. Commun. 2022, 191, 108–118. [Google Scholar] [CrossRef]
  28. Moara-Nkwe, K.; Shi, Q.; Lee, G.M.; Eiza, M.H. A novel physical layer secure key generation and refreshment scheme for wireless sensor networks. IEEE Access 2018, 6, 11374–11387. [Google Scholar] [CrossRef]
  29. Altun, U.; Basaran, S.T.; Kurt, G.K.; Ozdemir, E. Scalable Secret Key Generation for Wireless Sensor Networks. IEEE Syst. J. 2022, 16, 6031–6041. [Google Scholar] [CrossRef]
  30. Zhu, J.; Xu, F.; Novak, E.; Tan, C.C.; Li, Q.; Chen, G. Using wireless link dynamics to extract a secret key in vehicular scenarios. IEEE Trans. Mob. Comput. 2016, 16, 2065–2078. [Google Scholar] [CrossRef]
  31. Li, K.; Lu, L.; Ni, W.; Tovar, E.; Guizani, M. Secret key agreement for data dissemination in vehicular platoons. IEEE Trans. Veh. Technol. 2019, 68, 9060–9073. [Google Scholar] [CrossRef]
  32. Bottarelli, M.; Karadimas, P.; Epiphaniou, G.; Ismail, D.K.B.; Maple, C. Adaptive and optimum secret key establishment for secure vehicular communications. IEEE Trans. Veh. Technol. 2021, 70, 2310–2321. [Google Scholar] [CrossRef]
  33. Li, G.; Yang, H.; Zhang, J.; Liu, H.; Hu, A. Fast and secure key generation with channel obfuscation in slowly varying environments. In Proceedings of the IEEE INFOCOM 2022-IEEE Conference on Computer Communications, London, UK, 2–5 May 2022; pp. 1–10. [Google Scholar]
  34. Xiao, S.; Gong, W.; Towsley, D. Secure Wireless Communication with Dynamic Secrets. In Proceedings of the IEEE INFOCOM, San Diego, CA, USA, 14–19 March 2010. [Google Scholar]
  35. Yao, T.; Fukui, K.; Nakashima, J.; Nakai, T. Initial common secret key sharing using random plaintexts for short-range wireless communications. IEEE Trans. Consum. Electron. 2009, 55, 2025–2033. [Google Scholar] [CrossRef]
  36. Safaka, I.; Fragouli, C.; Argyraki, K.; Diggavi, S. Creating shared secrets out of thin air. In Proceedings of the 11th ACM Workshop on Hot Topics in Networks, Redmond, WA, USA, 29–30 October 2012; pp. 73–78. [Google Scholar]
  37. Zedini, E.; Ansari, I.S.; Alouini, M. Performance analysis of mixed Nakagami-m and Gamma–Gamma dual-hop FSO transmission systems. IEEE Photonics J. 2014, 7, 1–20. [Google Scholar] [CrossRef]
  38. Safaka, I.; Fragouli, C.; Argyraki, K.; Diggavi, S. Exchanging pairwise secrets efficiently. In Proceedings of the 2013 Proceedings IEEE INFOCOM, Turin, Italy, 14–19 April 2013; pp. 2265–2273. [Google Scholar]
  39. Safaka, I.; Czap, L.; Argyraki, K.; Fragouli, C. Creating secrets out of packet erasures. IEEE Trans. Inf. Forensics Secur. 2016, 11, 1177–1191. [Google Scholar] [CrossRef]
  40. Ayub, N.; Raja, M.; Saleh, S.; Ilyas, M.U. MuGKeG: Secure multi-channel group key generation algorithm for wireless networks. Wirel. Pers. Commun. 2017, 96, 4799–4818. [Google Scholar] [CrossRef]
  41. Bhatti, D.S.; Saleem, S. Ephemeral Secrets: Multi-Party Secret Key Acquisition for Secure IEEE 802.11 Mobile Ad Hoc Communication. IEEE Access 2020, 8, 24242–24257. [Google Scholar] [CrossRef]
  42. Rabiah, A.B.; Ramakrishnan, K.; Liri, E.; Kar, K. A lightweight authentication and key exchange protocol for IoT. In Proceedings of the Workshop on Decentralized IoT Security and Standards, San Diego, CA, USA, 18 February 2018; Volume 2018, pp. 1–6. [Google Scholar]
  43. Bin Rabiah, A.; Ramakrishnan, K.; Richelson, S.; Bin Rabiah, A.; Liri, E.; Kar, K. Haiku: Efficient Authenticated Key Agreement with Strong Security Guarantees for IoT. In Proceedings of the 22nd International Conference on Distributed Computing and Networking, Nara, Japan, 5–8 January 2021; pp. 196–205. [Google Scholar]
  44. Miao, L.; Jiang, D. Optimal secret sharing for wireless information security in the era of Internet of Things. Pers. Ubiquitous Comput. 2019, 23, 723–738. [Google Scholar] [CrossRef]
  45. Manshaei, M.H.; Zhu, Q.; Alpcan, T.; Bacşar, T.; Hubaux, J.P. Game theory meets network security and privacy. ACM Comput. Surv. (CSUR) 2013, 45, 1–39. [Google Scholar] [CrossRef]
  46. Abdalzaher, M.S.; Seddik, K.; Elsabrouty, M.; Muta, O.; Furukawa, H.; Abdel-Rahman, A. Game theory meets wireless sensor networks security requirements and threats mitigation: A survey. Sensors 2016, 16, 1003. [Google Scholar] [CrossRef]
  47. Do, C.T.; Tran, N.H.; Hong, C.; Kamhoua, C.A.; Kwiat, K.A.; Blasch, E.; Ren, S.; Pissinou, N.; Iyengar, S.S. Game theory for cyber security and privacy. ACM Comput. Surv. (CSUR) 2017, 50, 1–37. [Google Scholar] [CrossRef]
  48. Killat, M.; Hartenstein, H. An empirical model for probability of packet reception in vehicular ad hoc networks. EURASIP J. Wirel. Commun. Netw. 2009, 2009, 12. [Google Scholar] [CrossRef]
  49. Xu, J.; Zhang, Y.; Jiang, J.; Kan, J. An energy balance clustering routing protocol for intra-body wireless nanosensor networks. Sensors 2019, 19, 4875. [Google Scholar] [CrossRef]
  50. Cordeiro, C.D.M.; Agrawal, D.P.; Sadok, D.H. Interference modeling and performance of Bluetooth MAC protocol. IEEE Trans. Wirel. Commun. 2003, 2, 1240–1246. [Google Scholar] [CrossRef]
  51. ElBatt, T.; Goel, S.K.; Holland, G.; Krishnan, H.; Parikh, J. Cooperative collision warning using dedicated short range wireless communications. In Proceedings of the 3rd International Workshop on Vehicular ad Hoc Networks, Los Angeles, CA, USA, 29 September 2006; pp. 1–9. [Google Scholar]
  52. Lau, C.T.; Leung, C. Capture models for mobile packet radio networks. IEEE Trans. Commun. 1992, 40, 917–925. [Google Scholar] [CrossRef]
  53. Nash, J. Non-cooperative games. Ann. Math. 1951, 54, 286–295. [Google Scholar] [CrossRef]
Figure 1. Symmetric case: logarithm of the probability of Eve receiving all of the exchanged packets between Alice and Bob vs. the number of packets.
Figure 1. Symmetric case: logarithm of the probability of Eve receiving all of the exchanged packets between Alice and Bob vs. the number of packets.
Sustainability 15 07427 g001
Figure 2. Asymmetric case: logarithm of the probability of Eve receiving all of the exchanged packets between Alice and Bob vs. the number of packets.
Figure 2. Asymmetric case: logarithm of the probability of Eve receiving all of the exchanged packets between Alice and Bob vs. the number of packets.
Sustainability 15 07427 g002
Figure 3. The Probability of Eve receiving both packets vs. the number of runs.
Figure 3. The Probability of Eve receiving both packets vs. the number of runs.
Sustainability 15 07427 g003
Figure 4. The Probability of Eve receiving both packets vs. the number of runs.
Figure 4. The Probability of Eve receiving both packets vs. the number of runs.
Sustainability 15 07427 g004
Table 1. Summary of symbols and their definitions.
Table 1. Summary of symbols and their definitions.
SymbolsDefinitionSymbolsDefinition
s E The strategy of Eve. L A , L B , L M The possible strategies of Eve: stay close to Alice, stay close to Bob, or stay in the middle.
s L The strategy of the legitimate users (Alice and Bob). S A , n , S B , n , S A B The possible strategies of Alice an Bob: Alice sends N n , n { 0 , 1 , , N 2 1 } packets; Bob sends N n , n { 0 , 1 , , N 2 1 } packets; or each of them sends exactly half: N 2 packets.
P A ( d ) , P B ( d ) The success probability of Eve receiving a packet from Alice or Bob, respectively, as a function of distance d. D , ϵ D: the distance between Alice and Bob. ϵ : a small distance less than D / 2 .
Table 2. Utility matrix of the symmetric game.
Table 2. Utility matrix of the symmetric game.
Alice and Bob
S A , n , q A , n S AB , q AB S B , n , q B , n
L A , p 1 ± P N n ( ϵ ) P n ( D ϵ ) ± P N 2 ( ϵ ) P N 2 ( D ϵ ) ± P n ( ϵ ) P N n ( D ϵ )
Eve L M , p 2 ± P N ( D 2 ) ± P N ( D 2 ) ± P N ( D 2 )
L B , 1 p 1 p 2 ± P N n ( D ϵ ) P n ( ϵ ) ± P N 2 ( ϵ ) P N 2 ( D ϵ ) ± P N n ( ϵ ) P n ( D ϵ )
Table 3. Utility matrix of the asymmetric game.
Table 3. Utility matrix of the asymmetric game.
Alice and Bob
S A , n , q A , n S AB , q AB S B , n , q B , n
L A , p 1 ± P A N n ( ϵ ) P B n ( D ϵ ) ± P A N 2 ( ϵ ) P B N 2 ( D ϵ ) ± P B N n ( D ϵ ) P A n ( ϵ )
Eve L M , p 2 ± P A N n ( D 2 ) P B n ( D 2 ) ± P A N 2 ( D 2 ) P B N 2 ( D 2 ) ± P B N n ( D 2 ) P A n ( D 2 )
L B , 1 p 1 p 2 ± P A N n ( D ϵ ) P B n ( ϵ ) ± P B N 2 ( ϵ ) P A N 2 ( D ϵ ) ± P B N n ( ϵ ) P A n ( D ϵ )
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Miao, L.; Jiang, D.; Zhang, H. Wireless Secret Sharing Game for Internet of Things. Sustainability 2023, 15, 7427. https://doi.org/10.3390/su15097427

AMA Style

Miao L, Jiang D, Zhang H. Wireless Secret Sharing Game for Internet of Things. Sustainability. 2023; 15(9):7427. https://doi.org/10.3390/su15097427

Chicago/Turabian Style

Miao, Lei, Dingde Jiang, and Hongbo Zhang. 2023. "Wireless Secret Sharing Game for Internet of Things" Sustainability 15, no. 9: 7427. https://doi.org/10.3390/su15097427

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop