Explainable Adversarial Learning Framework on Physical Layer Secret Keys Combating Malicious Reconfigurable Intelligent Surface
Abstract: Reconfigurable intelligent surfaces (RIS) can both help and hinder the physical layer secret key generation (PL-SKG) of communications systems. Whilst a legitimate RIS can yield beneficial impacts, including increased channel randomness to enhance PL-SKG, a malicious RIS can poison legitimate channels and crack almost all existing PL-SKGs. In this work, we propose an adversarial learning framework that addresses Man-in-the-middle RIS (MITM-RIS) eavesdropping which can exist between legitimate parties, namely Alice and Bob. First, the theoretical mutual information gap between legitimate pairs and MITM-RIS is deduced. From this, Alice and Bob leverage adversarial learning to learn a common feature space that assures no mutual information overlap with MITM-RIS. Next, to explain the trained legitimate common feature generator, we aid signal processing interpretation of black-box neural networks using a symbolic explainable AI (xAI) representation. These symbolic terms of dominant neurons aid the engineering of feature designs and the validation of the learned common feature space. Simulation results show that our proposed adversarial learning- and symbolic-based PL-SKGs can achieve high key agreement rates between legitimate users, and is further resistant to an MITM-RIS Eve with the full knowledge of legitimate feature generation (NNs or formulas). This therefore paves the way to secure wireless communications with untrusted reflective devices in future 6G.
- H.-M. Wang, X. Zhang, and J.-C. Jiang, “UAV-Involved Wireless Physical-Layer Secure Communications: Overview and Research Directions,” IEEE Wireless Communications, vol. 26, no. 5, pp. 32–39, 2019.
- W. Wang, X. Liu, J. Tang, N. Zhao, Y. Chen, Z. Ding, and X. Wang, “Beamforming and Jamming Optimization for IRS-Aided Secure NOMA Networks,” IEEE Transactions on Wireless Communications, vol. 21, no. 3, pp. 1557–1569, 2022.
- Y. Zhou, P. L. Yeoh, H. Chen, Y. Li, R. Schober, L. Zhuo, and B. Vucetic, “Improving Physical Layer Security via a UAV Friendly Jammer for Unknown Eavesdropper Location,” IEEE Transactions on Vehicular Technology, vol. 67, no. 11, pp. 11 280–11 284, 2018.
- X. Pang, N. Zhao, J. Tang, C. Wu, D. Niyato, and K.-K. Wong, “IRS-Assisted Secure UAV Transmission via Joint Trajectory and Beamforming Design,” IEEE Transactions on Communications, vol. 70, no. 2, pp. 1140–1152, 2022.
- A. Mukherjee, S. A. A. Fakoorian, J. Huang, and A. L. Swindlehurst, “Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey,” IEEE Communications Surveys Tutorials, vol. 16, no. 3, pp. 1550–1573, 2014.
- J. Zhang, T. Q. Duong, A. Marshall, and R. Woods, “Key Generation From Wireless Channels: A Review,” IEEE Access, vol. 4, pp. 614–626, 2016.
- C. Ye, A. Reznik, and Y. Shah, “Extracting Secrecy from Jointly Gaussian Random Variables,” in 2006 IEEE International Symposium on Information Theory, 2006, pp. 2593–2597.
- C. Ye, S. Mathur, A. Reznik, Y. Shah, W. Trappe, and N. B. Mandayam, “Information-Theoretically Secret Key Generation for Fading Wireless Channels,” IEEE Transactions on Information Forensics and Security, vol. 5, no. 2, pp. 240–254, 2010.
- X. Wu, Y. Song, C. Zhao, and X. You, “Secrecy extraction from correlated fading channels: An upper bound,” in 2009 International Conference on Wireless Communications & Signal Processing, 2009, pp. 1–3.
- J. Li, P. Wang, L. Jiao, Z. Yan, K. Zeng, and Y. Yang, “Security analysis of triangle channel-based physical layer key generation in wireless backscatter communications,” IEEE Transactions on Information Forensics and Security, vol. 18, pp. 948–964, 2023.
- J. Li, P. Wang, Z. Yan, Y. Yang, and K. Zeng, “Bgkey: Group key generation for backscatter communications among multiple devices,” IEEE Transactions on Information Forensics and Security, vol. 19, pp. 2470–2486, 2024.
- Y. Peng, P. Wang, W. Xiang, and Y. Li, “Secret Key Generation Based on Estimated Channel State Information for TDD-OFDM Systems Over Fading Channels,” IEEE Transactions on Wireless Communications, vol. 16, no. 8, pp. 5176–5186, 2017.
- K. Moara-Nkwe, Q. Shi, G. M. Lee, and M. H. Eiza, “A Novel Physical Layer Secure Key Generation and Refreshment Scheme for Wireless Sensor Networks,” IEEE Access, vol. 6, pp. 11 374–11 387, 2018.
- S. N. Premnath, S. Jana, J. Croft, P. L. Gowda, M. Clark, S. K. Kasera, N. Patwari, and S. V. Krishnamurthy, “Secret Key Extraction from Wireless Signal Strength in Real Environments,” IEEE Transactions on Mobile Computing, vol. 12, no. 5, pp. 917–930, 2013.
- S. Mathur, W. Trappe, N. Mandayam, C. Ye, and A. Reznik, “Radio-Telepathy: Extracting a Secret Key from an Unauthenticated Wireless Channel,” in Proceedings of the 14th ACM international conference on Mobile computing and networking, 2008, pp. 128–139.
- G. Brassard and L. Salvail, “Secret-Key Reconciliation by Public Discussion,” in Advances in Cryptology — EUROCRYPT ’93, T. Helleseth, Ed. Berlin, Heidelberg: Springer Berlin Heidelberg, 1994, pp. 410–423.
- R. Impagliazzo, L. A. Levin, and M. Luby, “Pseudo-Random Generation from One-Way Functions,” in Proceedings of the twenty-first annual ACM symposium on Theory of computing, 1989, pp. 12–24.
- G. Li, A. Hu, J. Zhang, and B. Xiao, “Security Analysis of a Novel Artificial Randomness Approach for Fast Key Generation,” in GLOBECOM 2017 - 2017 IEEE Global Communications Conference, 2017, pp. 1–6.
- Y. Lou, L. Jin, Z. Zhong, K. Huang, and S. Zhang, “Secret Key Generation Scheme based on MIMO Received Signal Spaces,” Scientia Sinica Informationis, vol. 47, no. 3, pp. 362–373, 2017.
- H. Taha and E. Alsusa, “Secret Key Exchange Using Private Random Precoding in MIMO FDD and TDD Systems,” IEEE Transactions on Vehicular Technology, vol. 66, no. 6, pp. 4823–4833, 2017.
- A. Khisti, “Secret-Key Agreement over Non-Coherent Block-Fading Channels with Public Discussion,” IEEE Transactions on Information Theory, vol. 62, no. 12, pp. 7164–7178, 2016.
- S. Sharifian, F. Lin, and R. Safavi-Naini, “Secret key agreement using a virtual wiretap channel,” in IEEE INFOCOM 2017 - IEEE Conference on Computer Communications, 2017, pp. 1–9.
- S. Zhang, L. Jin, Y. Lou, and Z. Zhong, “Secret Key Generation based on Two-Way Randomness for TDD-SISO System,” China Communications, vol. 15, no. 7, pp. 202–216, 2018.
- G. Wunder, R. Fritschek, and K. Reaz, “RECiP: Wireless Channel Reciprocity Restoration Method for Varying Transmission Power,” in 2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), 2016, pp. 1–5.
- Q. Wu, S. Zhang, B. Zheng, C. You, and R. Zhang, “Intelligent Reflecting Surface-Aided Wireless Communications: A Tutorial,” IEEE Transactions on Communications, vol. 69, no. 5, pp. 3313–3351, 2021.
- Q. Wu and R. Zhang, “Towards smart and reconfigurable environment: Intelligent reflecting surface aided wireless network,” IEEE Communications Magazine, vol. 58, no. 1, pp. 106–112, 2020.
- ——, “Intelligent Reflecting Surface Enhanced Wireless Network via Joint Active and Passive Beamforming,” IEEE Transactions on Wireless Communications, vol. 18, no. 11, pp. 5394–5409, 2019.
- Q. Ma, L. Chen, H. B. Jing, Q. R. Hong, H. Y. Cui, Y. Liu, L. Li, and T. J. Cui, “Controllable and Programmable Nonreciprocity based on Detachable Digital Coding Metasurface,” Advanced Optical Materials, vol. 7, no. 24, p. 1901285, 2019.
- W. Jiang, B. Chen, J. Zhao, Z. Xiong, and Z. Ding, “Joint Active and Passive Beamforming Design for the IRS-Assisted MIMOME-OFDM Secure Communications,” IEEE Transactions on Vehicular Technology, vol. 70, no. 10, pp. 10 369–10 381, 2021.
- S. Hong, C. Pan, H. Ren, K. Wang, and A. Nallanathan, “Artificial-Noise-Aided Secure MIMO Wireless Communications via Intelligent Reflecting Surface,” IEEE Transactions on Communications, vol. 68, no. 12, pp. 7851–7866, 2020.
- X. Hu, L. Jin, K. Huang, X. Sun, Y. Zhou, and J. Qu, “Intelligent Reflecting Surface-Assisted Secret Key Generation With Discrete Phase Shifts in Static Environment,” IEEE Wireless Communications Letters, vol. 10, no. 9, pp. 1867–1870, 2021.
- X. Lu, J. Lei, Y. Shi, and W. Li, “Intelligent Reflecting Surface Assisted Secret Key Generation,” IEEE Signal Processing Letters, vol. 28, pp. 1036–1040, 2021.
- Z. Ji, P. L. Yeoh, G. Chen, C. Pan, Y. Zhang, Z. He, H. Yin, and Y. Li, “Random Shifting Intelligent Reflecting Surface for OTP Encrypted Data Transmission,” IEEE Wireless Communications Letters, vol. 10, no. 6, pp. 1192–1196, 2021.
- P. Staat, H. Elders-Boll, M. Heinrichs, R. Kronberger, C. Zenger, and C. Paar, “Intelligent Reflecting Surface-Assisted Wireless Key Generation for Low-Entropy Environments,” in 2021 IEEE 32nd Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), 2021, pp. 745–751.
- Z. Ji, P. L. Yeoh, D. Zhang, G. Chen, Y. Zhang, Z. He, H. Yin, and Y. li, “Secret Key Generation for Intelligent Reflecting Surface Assisted Wireless Communication Networks,” IEEE Transactions on Vehicular Technology, vol. 70, no. 1, pp. 1030–1034, 2021.
- G. Li, C. Sun, W. Xu, M. D. Renzo, and A. Hu, “On maximizing the sum secret key rate for reconfigurable intelligent surface-assisted multiuser systems,” IEEE Transactions on Information Forensics and Security, vol. 17, pp. 211–225, 2022.
- L. Hu, G. Li, H. Luo, and A. Hu, “On the RIS Manipulating Attack and Its Countermeasures in Physical-layer Key Generation,” in 2021 IEEE 94th Vehicular Technology Conference (VTC2021-Fall), 2021, pp. 1–5.
- G. Li, L. Hu, P. Staat, H. Elders-Boll, C. Zenger, C. Paar, and A. Hu, “Reconfigurable Intelligent Surface for Physical Layer Key Generation: Constructive or Destructive?” IEEE Wireless Communications, vol. 29, no. 4, pp. 146–153, 2022.
- M. Wei, H. Zhao, V. Galdi, L. Li, and T. J. Cui, “Metasurface-enabled smart wireless attacks at the physical layer,” Nature Electronics, vol. 6, no. 8, pp. 610–618, 2023.
- Z. Wei, B. Li, and W. Guo, “Adversarial reconfigurable intelligent surface against physical layer key generation,” IEEE Transactions on Information Forensics and Security, vol. 18, pp. 2368–2381, 2023.
- C. D. T. Thai, J. Lee, and T. Q. Quek, “Physical-Layer Secret Key Generation with Colluding Untrusted Relays,” IEEE Transactions on Wireless Communications, vol. 15, no. 2, pp. 1517–1530, 2015.
- M. Letafati, A. Kuhestani, D. W. K. Ng, and H. Behroozi, “A New Frequency Hopping-Aided Secure Communication in the Presence of an Adversary Jammer and an Untrusted Relay,” in 2020 IEEE International Conference on Communications Workshops (ICC Workshops). IEEE, 2020, pp. 1–7.
- A. K. Kamboj, P. Jindal, and P. Verma, “Machine learning-based physical layer security: techniques, open challenges, and applications,” Wireless Networks, vol. 27, pp. 5351–5383, 2021.
- S. Im, H. Jeon, J. Choi, and J. Ha, “Secret Key Agreement with Large Antenna Arrays under the Pilot Contamination Attack,” IEEE Transactions on Wireless Communications, vol. 14, no. 12, pp. 6579–6594, 2015.
- X. Zhang, G. Li, J. Zhang, A. Hu, Z. Hou, and B. Xiao, “Deep-learning-based physical-layer secret key generation for fdd systems,” IEEE Internet of Things Journal, vol. 9, no. 8, pp. 6081–6094, 2021.
- Z. Wang, Y. Liu, J. Wang, Z. Li, Z. Li, X. Yang, F. Qi, and H. Jia, “A reliable physical layer key generation scheme based on rss and lstm network in vanet,” IEEE Internet of Things Journal, 2023.
- J. Han, X. Zeng, X. Xue, and J. Ma, “Physical layer secret key generation based on autoencoder for weakly correlated channels,” in 2020 IEEE/CIC International Conference on Communications in China (ICCC). IEEE, 2020, pp. 1220–1225.
- J. Zhou and X. Zeng, “Physical-layer secret key generation based on domain-adversarial training of autoencoder for spatial correlated channels,” Applied Intelligence, vol. 53, no. 5, pp. 5304–5319, 2023.
- A. Taha, M. Alrabeiah, and A. Alkhateeb, “Enabling Large Intelligent Surfaces with Compressive Sensing and Deep Learning,” IEEE Access, vol. 9, pp. 44 304–44 321, 2021.
- E. Björnson and L. Sanguinetti, “Rayleigh Fading Modeling and Channel Hardening for Reconfigurable Intelligent Surfaces,” IEEE Wireless Communications Letters, vol. 10, no. 4, pp. 830–834, 2021.
- O. Tsilipakos, A. C. Tasolamprou, A. Pitilakis, F. Liu, X. Wang, M. S. Mirmoosa, D. C. Tzarouchis, S. Abadal, H. Taghvaee, C. Liaskos et al., “Toward Intelligent Metasurfaces: The Progress from Globally Tunable Metasurfaces to Software-Defined Metasurfaces with an Embedded Network of Controllers,” Advanced optical materials, vol. 8, no. 17, p. 2000783, 2020.
- O. Özdogan, E. Björnson, and E. G. Larsson, “Intelligent Reflecting Surfaces: Physics, Propagation, and Pathloss Modeling,” IEEE Wireless Communications Letters, vol. 9, no. 5, pp. 581–585, 2020.
- L. Jin, S. Zhang, Y. Lou, X. Xu, and Z. Zhong, “Secret Key Generation With Cross Multiplication of Two-Way Random Signals,” IEEE Access, vol. 7, pp. 113 065–113 080, 2019.
- W. Guo, “Explainable artificial intelligence for 6g: Improving trust between human and machine,” IEEE Communications Magazine, vol. 58, no. 6, pp. 39–45, 2020.
- A. Pishkoo and M. Darus, “On meijer’s g-functions (mgfs) and its applications,” Reviews in Theoretical Science, vol. 3, no. 2, pp. 216–223, 2015.
- A. M. Alaa and M. van der Schaar, “Demystifying black-box models with symbolic metamodels,” Advances in Neural Information Processing Systems, vol. 32, 2019.
- H. Chergui, M. Benjillali, and S. Saoudi, “Performance analysis of project-and-forward relaying in mixed mimo-pinhole and rayleigh dual-hop channel,” IEEE Communications Letters, vol. 20, no. 3, pp. 610–613, 2016.
- A. N. Kolmogorov, “On the representation of continuous functions of many variables by superposition of continuous functions of one variable and addition,” in Doklady Akademii Nauk, vol. 114, no. 5. Russian Academy of Sciences, 1957, pp. 953–956.
- S. C. Sun and W. Guo, “Approximate symbolic explanation for neural network enabled water-filling power allocation,” in 2020 IEEE 91st Vehicular Technology Conference (VTC2020-Spring), 2020, pp. 1–4.
- A. Alkhateeb, O. El Ayach, G. Leus, and R. W. Heath, “Channel Estimation and Hybrid Precoding for Millimeter Wave Cellular Systems,” IEEE Journal of Selected Topics in Signal Processing, vol. 8, no. 5, pp. 831–846, 2014.
Paper Prompts
Sign up for free to create and run prompts on this paper using GPT-5.
Top Community Prompts
Collections
Sign up for free to add this paper to one or more collections.