Control layer security: exploiting unobservable cooperative states of autonomous systems for secret key generation

dc.contributor.authorWei, Zhuangkun
dc.contributor.authorGuo, Weisi
dc.date.accessioned2024-03-14T12:36:15Z
dc.date.available2024-03-14T12:36:15Z
dc.date.issued2024-02-26
dc.description.abstractThe rapid growth of autonomous systems (ASs) with data sharing means new cybersecurity methods have to be developed for them. Existing computational complexity-based cryptography does not have information-theoretical bounds and poses threats to superior computational attackers. This post-quantum cryptography issue indeed motivated the rapid advances in using common physical layer properties to generate symmetrical cipher keys (known as PLS). However, PLS remains sensitive to attackers (e.g., jamming) that destroy its prerequisite wireless channel reciprocity. When ASs are in cooperative tasks (e.g., rescuing searching, and formation flight), they will behave cooperatively in the control layer. Inspired by this, we propose a new security mechanism called control layer security (CLS), which exploits the correlated but unobservable states of cooperative ASs to generate symmetrical cipher keys. This idea is then realized in the linearized UAV cooperative control scenario. The theoretical correlation coefficients between Alice's and Bob's states are computed, based on which common feature selection and key quantization steps are designed. The results from simulation and real UAV experiments show i) an approximately 90% key agreement rate is achieved, and ii) even an Eve with the known observable states and systems fails to estimate the unobservable states and the secret keys relied upon, due to the multiple-to-one mapping from unobservable states (pitch, roll and yaw angles) to the observable states (3D trajectory). This demonstrates CLS as a promising candidate to secure the communications of ASs, especially in the adversarial radio environment with attackers that destroys the prerequisite for current PLS.en_UK
dc.identifier.citationWei Z, Guo W. (2024) Control layer security: exploiting unobservable cooperative states of autonomous systems for secret key generation. IEEE Transactions on Mobile Computing, Available online 26 February 2024en_UK
dc.identifier.issn1536-1233
dc.identifier.urihttps://doi.org/10.1109/TMC.2024.3369754
dc.identifier.urihttps://dspace.lib.cranfield.ac.uk/handle/1826/20992
dc.language.isoenen_UK
dc.publisherIEEEen_UK
dc.rightsAttribution 4.0 International*
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/*
dc.subjectCybersecurityen_UK
dc.subjectcooperative controlen_UK
dc.subjectsecret key generationen_UK
dc.subjectwireless communicationen_UK
dc.subjectautonomous systemsen_UK
dc.titleControl layer security: exploiting unobservable cooperative states of autonomous systems for secret key generationen_UK
dc.typeArticleen_UK
dcterms.dateAccepted2024-02-22

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Control_layer_security-2024.pdf
Size:
1.02 MB
Format:
Adobe Portable Document Format
Description:
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.63 KB
Format:
Item-specific license agreed upon to submission
Description: