Random Shifting Intelligent Reflecting Surface For OTP Encrypted Data Transmission
Random Shifting Intelligent Reflecting Surface For OTP Encrypted Data Transmission
6, JUNE 2021
Abstract—In this letter, we propose a novel encrypted data artificial noise vectors, whilst IRS based secret key generation
transmission scheme using an intelligent reflecting surface (IRS) remains unexplored.
to generate secret keys in wireless communication networks. We Physical layer secret key generation is an alternative security
show that perfectly secure one-time pad (OTP) communications approach to computational complexity based encryption [7],
can be established by using a simple random phase shifting of where secret keys are generated by legitimate transceivers
the IRS elements. To maximize the secure transmission rate,
we design an optimal time slot allocation algorithm for the
using their reciprocal time-variant channels, while preventing
IRS secret key generation and the encrypted data transmission eavesdroppers from inferring the generated keys through its
phases. Moreover, a theoretical expression of the key genera- own wireless channel observations due to spatial decorrela-
tion rate is derived based on Poisson point process (PPP) for the tion. Notably, the key generation rate (KGR) is limited by the
practical scenario when eavesdroppers’ channel state information movement speed of the legitimate transceivers, which makes
(CSI) is unavailable. Simulation results show that employing our it impractical for stationary or slow-moving wireless devices.
IRS-based scheme can significantly improve the encrypted data To achieve secure one-time pad (OTP) [8], artificial random-
transmission performance for a wide-range of wireless channel ness is introduced to boost the KGR. In [9], a method to
gains and system parameters. induce randomness was proposed by selecting different local
Index Terms—Intelligent reflecting surface, one-time pad, pilot constellations. In [10], private random precoding vec-
physical layer security, reconfigurable intelligent surface, secret tors were designed to induce randomness in multiple-input
key generation. multiple-output (MIMO) systems. The authors in [11] utilized
artificial noise to scramble eavesdropping channels. We note
that all the above contributions focused on increasing ran-
I. I NTRODUCTION domness at transceiver ends, rather than increasing the rate
NTELLIGENT reflecting surface (IRS) is a promising can- of channel randomness in the wireless environment.
I didate technology for future mobile communication systems
due to its low-cost deployment and high spectral and energy
In this letter, we consider the use of IRS to induce virtual
fast fading channels, where artificial randomness is introduced
efficiency [1], [2]. By adaptively adjusting phase shifts of in the propagation environment. Compared to the beamform-
large-scale passive reflecting elements, IRS can reconfigure the ing based scheme [12] which requires high IRS hardware
electromagnetic propagation environment of wireless devices, accuracy, we propose a simpler random phase shifting scheme
thereby improving their communication performance [3]. for secret key generation, which only relies on the fast phase
Recently, physical layer security in IRS assisted networks has switching to support OTP encrypted data transmission. To pro-
also attracted extensive attention [4]–[6]. However, most of vide detailed insights, we derive the secure transmission rate
these contributions focused on designing beamforming and and KGR of our proposed scheme. Based on the maximum
transmission rate, we develop an optimal time slot alloca-
Manuscript received December 29, 2020; revised February 17, 2021; tion algorithm for the key generation and data transmission
accepted February 20, 2021. Date of publication February 23, 2021; date phases. For randomly distributed eavesdroppers whose chan-
of current version June 9, 2021. This work was supported in part by nel state information (CSI) is unknown, we further consider
the National Key Research and Development Program of China under
Grant 2020YFB1804901; in part by the National Natural Science Foundation the use of a Poisson point process (PPP) model to derive
of China under Grant 61871035; in part by the China Scholarship Council the KGR that is only related to the distribution intensity of
Scholarship; and in part by Ericsson Company. The associate editor coordinat- eavesdroppers. Finally, the advantages of our scheme and the
ing the review of this article and approving it for publication was J. Harshan. validity of the analysis is verified through simulations. We
(Corresponding author: Yan Zhang.)
Zijie Ji, Yan Zhang, and Zunwen He are with the School of Information and
show that the secure transmission rate is enhanced signifi-
Electronics, Beijing Institute of Technology, Beijing 100081, China (e-mail: cantly by random phase shifted IRS compared with no IRS and
[email protected]; [email protected]; [email protected]). IRS with fixed phase shifts. The impacts of important system
Phee Lep Yeoh and Yonghui Li are with the School of Electrical and design parameters including the length of coherence interval,
Information Engineering, University of Sydney, Sydney, NSW 2006, Australia the number of IRS elements, signal-to-noise ratio (SNR), the
(e-mail: [email protected]; [email protected]).
Gaojie Chen is with the Department of Engineering, University of Leicester, distribution intensity and distribution radius of eavesdroppers,
Leicester LE1 7RH, U.K. (e-mail: [email protected]). are highlighted in the simulation results.
Cunhua Pan is with the School of Electronic Engineering and Computer
Science, Queen Mary University of London, London E1 4NS, U.K. (e-mail:
[email protected]). II. S YSTEM M ODEL
Hao Yin is with the Institute of China Electronic System Engineering
Corporation, Beijing 100141, China (e-mail: [email protected]). Our proposed system model consists of a single-antenna
Digital Object Identifier 10.1109/LWC.2021.3061549 base station (Alice) and a single-antenna user (Bob) wanting
2162-2345
c 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See https://www.ieee.org/publications/rights/index.html for more information.
Authorized licensed use limited to: Jaypee Insituite of Information Technology-Noida Sec 128 (L3). Downloaded on December 10,2021 at 17:50:53 UTC from IEEE Xplore. Restrictions apply.
JI et al.: RANDOM SHIFTING IRS FOR OTP ENCRYPTED DATA TRANSMISSION 1193
Authorized licensed use limited to: Jaypee Insituite of Information Technology-Noida Sec 128 (L3). Downloaded on December 10,2021 at 17:50:53 UTC from IEEE Xplore. Restrictions apply.
1194 IEEE WIRELESS COMMUNICATIONS LETTERS, VOL. 10, NO. 6, JUNE 2021
where det(·) is the matrix determinant, and Algorithm 1 Proposed Optimal Time Slot Allocation
⎧⎛ ⎞ ⎫ 1: Let Rose be in the receiving mode. Alice and Bob alternatively send pilot
⎪ (q) ⎪ signals so that Rose can estimate har and hH
⎪ h̃
⎨⎜ A ⎟ ⎪
⎬ rb . Alice estimates hab and
(q) ⎟ (q)∗ (q)∗ (q)∗ sends its phase to Rose, then Θ and RMRT can be calculated based
⎜
WAAEk BEk = E ⎝ h̃AE ⎠ h̃A h̃AE h̃BE on (10).
⎪
⎪ k k k ⎪
⎪ 2: Initialize Q (t) = Qth .
⎩ h̃ (q) ⎭ (t)
BEk
⎡ ⎤ 3: repeat (Observation accumulation for RSKG )
KAA KAAEk KABEk 4: For given Q (t) , let Rose be in the reflecting mode with randomly
= ⎣ KAEk A KAEk AEk KAEk BEk ⎦. (7) (q) (q)
selected Θ(q) . Alice and Bob collect channel observations hA , hB ,
KBEk A KBEk AEk KBEk BEk (q) (t)
and hBE and normalize them. The corresponding RSKG can be
k
computed according to (5).
(q) (q)∗ Initialize Qmin = Q (t) and Qmax = L/2 − 1.
KIJ = E{h̃I h̃J }, I , J ∈ {A, B, AEk , BEk } is the 5:
correlation function. When two nodes are more than half- 6: repeat (Bisection search for Q (t) )
7: Set Q = (Qmin + Qmax )/2, and calculate ΔR =
wavelength apart, their observed channels can be deemed (t)
QRSKG −(L−2Q)RMRT . If ΔR ≤ 0, update Qmin = Q; otherwise
uncorrelated [9]. Hence, here we only consider ρEk and ρL for update Qmax = Q.
simplicity. Since the channel observations of two nodes sepa- 8: until (Qmax − Qmin ) ≤ 1. Record this Q as Q (t) .
rated by more than half of the wavelength can be considered 9: Update Q (t) = Q (t) + 1.
uncorrelated [9], [13] and all channels have been normalized, 10: until Q (t) ≥ Q (t−1) . Finally, we obtain Q = Q (t−1) .
we have
1 0 ρEk
det WAAEk BEk = det 0 1 0 = 1 − ρ2Ek . (8) remaining (L − 2Q) time slots is used for encrypted data trans-
ρEk 0 1 mission. We observe that there exists a tradeoff between the
two phases: if Q is too small, the generated keys will be insuf-
Similarly, the determinants of other matrices in (6) can be
ficient to encrypt all the data to be transmitted; whereas if Q is
given as det(WBAEk BEk ) = 1 − ρ2Ek , det(WAEk BEk ) = 1, too large, the remaining time slots for data transmission will
and det(WABAEk BEk ) = 1 + 2ρL ρ2Ek − 2ρ2Ek − ρ2L . In addi- be insufficient and thus some generated keys will be wasted.
tion, since the phase shift coefficients are randomly selected, Therefore, the secure transmission throughput in our proposed
the autocorrelation between two channels sampled in different scheme depends on the minimum of the generated key bits and
(q ) (q ) the transmitted data bits, where the secure transmission rate is
rounds denoted as h̃I 1 and h̃I 2 is expressed as
derived as
N
(q1 ,q2 )
σh2ij + σh2rj σh2ir n=1 E{e j θn,q1 }E{e −j θn,q2 } RSKG Q/L, if α ≤ (L − 2Q)/Q,
ρI = 2 2 2
, (9) REDT =
RMRT (L − 2Q)/L, otherwise,
(11)
σh + N σh σh
ij rj ir
where α = RSKG /RMRT is the rate ratio. To achieve the
where σh2ij , σh2rj , and σh2ir are the average power of hij , hrj ,n , highest secure transmission rate, Q should be optimized so that
and hir,n (the nth element of hrj and hir ), i , j ∈ {a, b,ek }, the length of generated keys and the length of transmitted data
respectively. Since θn,q ∼ U(0, 2π), E{e j θn,q } = 0. If N are closest to each other, i.e., Q = arg minQ∈Q |QRSKG −
(q ,q ) (L − 2Q)RMRT |, where Q = {Qth , . . . , L/2 − 1} is the set
σh2ij /(σh2rj σh2ir ), it shows that ρI 1 2 → 0. This condition
always holds under our assumption on N, especially when the of Q, and Qth is the threshold to ensure a sufficient number of
IRS reflected channels are strong. Thus, the channel samples samples,2 and thereby the capacity of the proposed scheme can
in different rounds can be deemed as independent RVs, and be expressed as CEDT = REDT (Q ). In practice, because Q
the maximum achievable KGR can be computed by (5) based is an integer, given the expression of RSKG and RMRT , we can
on the weak law of large numbers. find Q by using the optimization approach in Algorithm 1.
Based on (5), Alice and Bob can determine relevant param- All channel knowledge related to calculation is acquired and
eters and generate keys. We note that standard key generation processed at the IRS end as described in Step 1 of Algorithm 1,
processing such as equally likely quantization, reconciliation while Alice and Bob only need to generate keys based on their
and privacy amplification should be considered as in [7]. channel observations and the value of Q sent from the IRS.
After key generation, the data to be transmitted is encrypted
by XORing with the generated keys using the OTP approach, IV. P ERFORMANCE A NALYSIS FOR R ANDOMLY
and then we consider that the ciphertext is transmitted at D ISTRIBUTED E AVESDROPPERS
the maximum rate for the IRS-assisted system using maxi- (k )
We find that RSKG in (5) depends on the minimum RSKG ,
mum rate transmission (MRT) as considered in [1]. We note (q) (q)
that since the keys have been shared between Alice and which is computed based on knowledge of h̃A , h̃B , and
(q) (q)
Bob, this encrypted data transmission stage can be either h̃BE , where h̃BE is typically assumed to be known at Alice
k k
uplink or downlink. Taking the downlink for an example, the and Bob when the untrusted nodes are other users in the same
transmission rate is given by network. However, we note that the CSI of passive and mali-
1 cious Eves may be challenging to estimate and may not be
RMRT = log2 1 + γb |hab + hH
rb Θ har |2 , (10) perfectly known at Alice and Bob. To this end, in this section
ΔT
2 Although infinite samples are required to achieve R
where γb = P /σb2 is the reference SNR and Θ is the optimal SKG theoreti-
cally [14], in practice we only need to ensure the number of samples is
IRS phase shift matrix defined in [1, (19)]. Let L denote the sufficiently large to obtain reliable statistics according to the weak law of
total number of symbols in each coherence interval, thus the large numbers.
Authorized licensed use limited to: Jaypee Insituite of Information Technology-Noida Sec 128 (L3). Downloaded on December 10,2021 at 17:50:53 UTC from IEEE Xplore. Restrictions apply.
JI et al.: RANDOM SHIFTING IRS FOR OTP ENCRYPTED DATA TRANSMISSION 1195
Authorized licensed use limited to: Jaypee Insituite of Information Technology-Noida Sec 128 (L3). Downloaded on December 10,2021 at 17:50:53 UTC from IEEE Xplore. Restrictions apply.
1196 IEEE WIRELESS COMMUNICATIONS LETTERS, VOL. 10, NO. 6, JUNE 2021
VI. C ONCLUSION
We investigated the confidential transmission in IRS assisted
wireless networks with multiple passive eavesdroppers. A new
Fig. 3. Impact of time slot allocation Q on encrypted transmission rate encrypted data transmission scheme was designed, where the
REDT for different coherence interval L and transmit power P. OTP secret keys were provided by random IRS phase shifting.
The KGR was derived based on the assumption that all Eves
were located near Alice, and an optimal time slot allocation
algorithm was proposed to maximize the secure transmission
rate. For practical implementations, we further analyzed the
impact of randomly distributed Eves whose CSI is unavailable.
The effectiveness of the proposed scheme and correctness of
our analysis were validated by the simulation and theoretical
results.
R EFERENCES
[1] Q. Wu and R. Zhang, “Intelligent reflecting surface enhanced wireless
network via joint active and passive beamforming,” IEEE Trans. Wireless
Commun., vol. 18, no. 11, pp. 5394–5409, Nov. 2019.
Fig. 4. Impact of randomly distributed Eves on secret key generation rate [2] S. Gong et al., “Toward smart wireless communications via intelligent
RSKG for different distribution radius R and intensity λE . reflecting surfaces: A contemporary survey,” IEEE Commun. Surveys
Tuts., vol. 22, no. 4, pp. 2283–2314, 4th Quart., 2020.
[3] C. Pan et al., “Multicell MIMO communications relying on intelligent
reflecting surfaces,” IEEE Trans. Wireless Commun., vol. 19, no. 8,
of quantization bits for phase shifts B basically does not affect pp. 5218–5233, Aug. 2020.
CEDT , which indicates that our scheme can still provide good [4] S. Fang, G. Chen, and Y. Li, “Joint optimization for secure intelli-
performance when equipping low-resolution hardware at the gent reflecting surface assisted UAV networks,” IEEE Wireless Commun.
Lett., vol. 10, no. 2, pp. 276–280, Feb. 2021.
IRS.
[5] X. Guan, Q. Wu, and R. Zhang, “Intelligent reflecting surface assisted
Fig. 3 depicts the impact of time slot allocation on REDT as secrecy communication: Is artificial noise helpful or not?” IEEE Wireless
discussed in Section III. At first, as more keys are generated, Commun. Lett., vol. 9, no. 6, pp. 778–782, Jun. 2020.
REDT increases with Q, then as Q further increases, REDT [6] S. Hong, C. Pan, H. Ren, K. Wang, and A. Nallanathan, “Artificial-noise-
decreases due to insufficient time slots assigned for encrypted aided secure MIMO wireless communications via intelligent reflecting
data transmission. The Q corresponding to each peak is Q , surface,” IEEE Trans. Commun., vol. 68, no. 12, pp. 7851–7866,
Dec. 2020.
which can be found by applying Algorithm 1, and the value of [7] J. Zhang, G. Li, A. Marshall, A. Hu, and L. Hanzo, “A new frontier for
each peak pointed by the arrow is CEDT . Under the same P, IoT security emerging from three decades of key generation relying on
Q /L basically remains unchanged and the slight performance wireless channels,” IEEE Access, vol. 8, pp. 138406–138446, 2020.
improvement comes from the increased accuracy of allocation [8] G. Li, Z. Zhang, J. Zhang, and A. Hu, “Encrypting wireless communica-
tions on the fly using one-time pad and key generation,” IEEE Internet
proportion. This demonstrates that our scheme can be applied Things J., vol. 8, no. 1, pp. 357–369, Jan. 2021.
to various scenarios with a wide range of coherence intervals [9] N. Aldaghri and H. Mahdavifar, “Physical layer secret key generation
L. When P decreases, the achievable REDT reduces as well, in static environments,” IEEE Trans. Inf. Forensics Security, vol. 15,
which is consistent with the analysis in Fig. 2. Meanwhile, we pp. 2692–2705, Feb. 2020.
note that Q becomes larger because the SNR impacts more on [10] H. Taha and E. Alsusa, “Secret key exchange using private random
secret key generation, which compromises reciprocity between precoding in MIMO FDD and TDD systems,” IEEE Trans. Veh. Technol.,
vol. 66, no. 6, pp. 4823–4833, Jun. 2017.
legitimate channels and thereby decreases ρL and RSKG . [11] Y. Chen, K. Huang, Y. Zhou, K. Ma, H. Jin, and X. Xu, “Physical layer
Fig. 4 investigates the impact of randomly distributed Eves key generation scheme through scrambling the correlated eavesdropping
and their distribution parameters. We can see that no matter channel,” IEEE Access, vol. 8, pp. 48982–48990, 2020.
how Eves are distributed, RSKG almost increases linearly with [12] Z. Ji et al., “Secret key generation for intelligent reflecting surface
the number of IRS elements N. Moreover, when the radius of assisted wireless communication networks,” IEEE Trans. Veh. Technol.,
vol. 70, no. 1, pp. 1030–1034, Jan. 2021.
ΦE is R = 0.1 m, a lower λE (less Eves) also improves RSKG , [13] C. D. T. Thai, J. Lee, and T. Q. S. Quek, “Physical-layer secret key gen-
which is consistent with our analysis in Section IV. However, eration with colluding untrusted relays,” IEEE Trans. Wireless Commun.,
this improvement becomes negligible when R is increased to vol. 15, no. 2, pp. 1517–1530, Feb. 2016.
1 m. This confirms the conclusion that Eves beyond several [14] C. T. Li and V. Anantharam, “One-shot variable-length secret key
wavelengths can be ignored in secret key generation. Finally, agreement approaching mutual information,” in Proc. Allerton Conf.,
Monticello, IL, USA, 2018, pp. 259–266.
simulation results given by (5) coincide well with theoretical [15] G. Chen and J. P. Coon, “Secrecy outage analysis in random wire-
results obtained from (16), which shows the correctness of our less networks with antenna selection and user ordering,” IEEE Wireless
analysis. Commun. Lett., vol. 6, no. 3, pp. 334–337, Jun. 2017.
Authorized licensed use limited to: Jaypee Insituite of Information Technology-Noida Sec 128 (L3). Downloaded on December 10,2021 at 17:50:53 UTC from IEEE Xplore. Restrictions apply.