Half-duplex mode-based secure key generation method for resource-constrained IoT devices

Research output: Journal Publications and ReviewsRGC 21 - Publication in refereed journalpeer-review

3 Scopus Citations
View graph of relations


  • Yupeng Hu
  • Wenjia Li
  • Hongbo Jiang
  • Zheng Qin

Related Research Unit(s)


Original languageEnglish
Pages (from-to)1326-1338
Journal / PublicationIEEE Internet of Things Journal
Issue number2
Online published7 Jun 2021
Publication statusPublished - 15 Jan 2022


The physical layer secret key generation scheme is a preferred solution designed for resource-constrained Internet of Things (IoT) devices. But it suffers from a severe attack, the signal manipulating attack, which aims at controlling the generated key. The existing solutions either cannot prevent all kinds of signal manipulation attacks or require working in full-duplex mode, which is not suitable for resource-constrained IoT devices. In this article, we introduce a secret key generation scheme with the help of an untrusted relay to address this dilemma. Also, our method can protect the privacy of legitimate users from the untrusted relay. We conclude a general signal manipulation attack model from existing practical signal manipulation attacks and analyze the security strength and privacy preserving ability of our scheme based on this model. Finally, we compare our method with existing signal manipulation attack solutions. The result shows that our method is the best solution for resource-constrained IoT systems.

Research Area(s)

  • Physical layer security, key management, privacy preserving