CRYPTOGRAPHIC KEY GENERATION SYSTEMS FOR SECURITY MODULES WITH HARDWARE SUPPORT OF IOT DEVICES
DOI:
https://doi.org/10.28925/2663-4023.2025.29.886Keywords:
hardware support for IoT devices, cryptographic keys, key generation systems, data encryption, symmetric and asymmetric cryptography, IoT device authentication, attacks: eavesdropping, on the intended channel, on the side channel and imitation.Abstract
The Internet of Things (IoT) is a very large source of both data and many vulnerabilities. In this regard, the issue of security arises for protecting the resources of IoT nodes and the data they exchange. This process is complicated by the insufficiency of the resources of these nodes in terms of computing power, memory size, energy resources, range and wireless connection performance. IoT devices can be deployed in critical environments where any information leakage to an interceptor or unauthorized penetration into the network can become a serious security threat, especially in the Internet of Military Things and Medical Things. In such networks, cryptographic methods are mainly used to ensure security. Here, the primary task is to generate cryptographic keys for IoT devices interacting with each other. Generating one common (session) key for both parties allows the use of symmetric encryption algorithms. To distribute these keys, public-key cryptography (asymmetric cryptography) can be used, which is too computationally complex and energy-intensive to run on resource-constrained IoT devices. A pressing task for implementing secure technologies and security rules in the IoT network is the task of generating and updating symmetric cryptographic keys with high entropy. Along with this, to simplify the system of exchange of cryptographic keys in the IoT network, the main issue is the secure delivery of new key data and key update during exchange. Most of the proposed key generation strategies are applied based on the physical layer of IoT for general wireless environments. The study provides a new taxonomy of key generation systems for IoT with a classification of approaches by hardware, which demonstrates the fundamental difference in the interaction of IoT devices by components: radio, audio, cameras, IMU sensors with inertial measurement units, various hardware and hybrid approaches. With this taxonomy, users can easily identify the most suitable method for their application scenarios. IoT physical layer-based key generation has received extensive research interest and has been applied with several wireless technologies such as Wi-Fi, ZigBee, LoRa/LoRaWAN, etc.
Downloads
References
Bala, D. Q., & Raman, B. (2020). PHY-based key agreement scheme using audio networking. 2020 International Conference on Communication Systems & Networks (COMSNETS), Bengaluru, India, 129–136. https://doi.org/10.1109/COMSNETS48256.2020.9027340
Bala, D. Q., Raman, B., Anees, A., & Chen, Y.-P. P. (2018). Discriminative binary feature learning and quantization in biometric key generation. Pattern Recognition, 77, 289–305.
Bansal, S., & Kumar, D. (2020). IoT ecosystem: A survey on devices, gateways, operating systems, middleware and communication. International Journal of Wireless Information Networks, 27(4), 1–25. https://doi.org/10.1007/s10776-020-00483-7
Bruesch, A., Le, N., Schürmann, D., Sigg, S., & Wolf, L. C. (2019). Security properties of gait for mobile device pairing. IEEE Transactions on Mobile Computing, 19(3).
Bruesch, A., Nguyen, L., Schürmann, D., Sigg, S., & Wolf, L. C. (2019). Security properties of gait for mobile device pairing. IEEE Transactions on Mobile Computing, 19(3). https://doi.org/10.1109/TMC.2019.2897933
Cabrera-Gutierrez, A. J., Castill, E., Escobar-Molero, A., Álvarez-Bermejo, J. A., Morales, D. P., & Parrilla, L. (2022). Integration of hardware security modules and permissioned blockchain in industrial IoT networks. IEEE Access, 10, 114331–114345. https://doi.org/10.1109/ACCESS.2022.3217815
Cheng, Q., Hsu, C., & Harn, L. (2020). Lightweight noninteractive membership authentication and group key establishment for WSNs. Mathematical Problems in Engineering, 2020, 1–9.
Dammak, M., Senouci, S. M., Messous, M. A., Elhdhili, M. H., & Gransart, C. (2020). Decentralized lightweight group key management for dynamic access control in IoT environments. IEEE Transactions on Network and Service Management, 17(3), 1742–1757.
Fomichev, M., Álvarez, F., Steinmetzer, D., Gardner-Stephen, P., & Hollick, M. (2017). Survey and systematization of secure device pairing. IEEE Communications Surveys & Tutorials, 20(1), 517–550.
Frustaci, M., Pace, P., Aloi, G., & Fortino, G. (2018). Evaluating critical security issues of the IoT world: Present and future challenges. IEEE Internet of Things Journal, 5, 2483–2495. https://ieeexplore.ieee.org/document/8086136
Furtak, J. (2020). Cryptographic keys generating and renewing system for IoT network nodes: A concept. Sensors, 20(17), 5012. https://doi.org/10.3390/s20175012
Furtak, J., Zieliński, Z., & Chudzikiewicz, J. (2019). A framework for constructing a secure domain of sensor nodes. Sensors, 19(12), 2797. https://www.mdpi.com/1424-8220/19/12/2797
Han, J., Chung, A. J., Sinha, M. K., Harishankar, M., Pan, S., Noh, H. Y., Zhang, P., & Tague, P. (2018). Do you feel what I hear? Enabling autonomous IoT device pairing using different sensor types. 2018 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, 836–852. IEEE.
Jiang, Q., Huang, X., Zhang, N., Zhang, K., Ma, X., & Ma, J. (2019). Shake to communicate: Secure handshake acceleration-based pairing mechanism for wrist-worn devices. IEEE Internet of Things Journal, 6(3), 5618–5630.
Klimushyn, P., Solianyk, T., Mozhaiev, O., Gnusov, Y., Manzhai, O., & Svitlychny, V. (2022). Crypto-resistant methods and random number generators in Internet of Things (IoT) devices. Innovative Technologies and Scientific Solutions for Industries, 2(20), 22–34. https://doi.org/10.30837/ITSSI.2022.20.022
Li, G., Zhang, Z., Zhang, J., & Hu, A. (2020). Encrypting wireless communications on the fly using one-time pad and key generation. IEEE Internet of Things Journal. https://doi.org/10.1109/JIOT.2020.3004451
Li, Z., Pei, Q., Markwood, I., Liu, Y., & Zhu, H. (2018). Secret key establishment via RSS trajectory matching between wearable devices. IEEE Transactions on Information Forensics and Security, 13, 802–817. https://doi.org/10.1109/TIFS.2017.2768020
Lin, Q., Xu, W., Lan, G., Cui, Y., Jia, H., Hu, W., Hassan, M., & Seneviratne, A. (2020). KEHKey: Kinetic energy harvester-based authentication and key generation for body area network. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 4(1), 1–26.
Lin, Q., Xu, W., Liu, J., Khamis, A., Hu, W., Hassan, M., & Seneviratne, A. (2019). H2B: Heartbeat-based secret key generation using piezo vibration sensors. Proceedings of the 18th International Conference on Information Processing in Sensor Networks, Montreal, Quebec, Canada, 265–276. ACM.
Lu, Y., Wu, F., Tang, S., Kong, L., & Chen, G. (2019). FREE: A fast and robust key extraction mechanism via inaudible acoustic signal. Proceedings of the 20th ACM International Symposium on Mobile Ad Hoc Networking and Computing, Catania, Italy, 311–320. ACM.
Moara-Nkwe, K., Shi, Q., Lee, G. M., & Eiza, M. H. (2018). A novel physical layer secure key generation and refreshment scheme for wireless sensor networks. IEEE Access, 6, 11374–11387. https://doi.org/10.1109/ACCESS.2018.2806423
Piccoli, A., Pahl, M.-O., Fries, S., & Sel, T. (2020). Ensuring consistency for asynchronous group-key management in the industrial IoT. Proceedings of the 16th International Conference on Network and Service Management (CNSM), Izmir, Turkey, 1–5. https://doi.org/10.23919/CNSM50824.2020.9269080
Pierson, T. J., Liang, X., Peterson, R., & Kotz, D. (2016). Wanda: Securely introducing mobile devices. Proceedings of IEEE INFOCOM 2016, San Francisco, CA, USA, 1–9. IEEE.
Prantl, T., Prantl, D., Bauer, A., Iffländer, L., Dmitrienko, A., Kounev, S., & Krupitzer, C. (2021). Benchmarking of pre- and post-quantum group encryption schemes with focus on IoT. Proceedings of the IEEE International Performance, Computing, and Communications Conference (IPCCC), 1–10.
Prantl, T., Zeck, T., Bauer, A., Ten, P., Prantl, D., Yahya, A. E. B., Iffländer, L., Dmitrienko, A., Krupitzer, C., & Kounev, S. (2022). A survey on secure group communication schemes with focus on IoT communication. IEEE Access, 10, 99944–99962. https://doi.org/10.1109/ACCESS.2022.3206451
Ruotsalainen, H., Zhang, J., & Grebeniuk, S. (2020). Experimental investigation on wireless key generation for low power wide area networks. IEEE Internet of Things Journal, 7(3), 1745–1755.
Samiullah, F., Gan, M.-L., Akleylek, S., & Aun, Y. (2023). Group key management: A systematic literature review. IEEE Access, 11, 77464–77491. https://doi.org/10.1109/ACCESS.2023.3298024
Shang, J., & Wu, J. (2020). AudioKey: A usable device pairing system using audio signals on smartwatches. International Journal of Security and Networks, 15(1), 46–58.
Shen, Y., Yang, F., Du, B., Xu, W., Luo, C., & Wen, H. (2018). Shake-n-Shack: Enabling secure data exchange between smart wearables via handshakes. 2018 IEEE International Conference on Pervasive Computing and Communications (PerCom), 1–10. IEEE.
Sudarsono, A., Yuliana, M., Kristalina, P., & Barakbah, A. R. (2018). An implementation of shared key generation extracted from received signal strength in vehicular ad-hoc communication. Proceedings of the 2018 Sixth International Symposium on Computing and Networking (CANDAR), Takayama, Japan, 57–65.
Tian, Y., Wang, Z., Xiong, J., & Ma, J. (2020). A blockchain-based secure key management scheme with trustworthiness in DWSNs. IEEE Transactions on Industrial Informatics, 16, 6193–6202. https://doi.org/10.1109/TII.2020.2965975
Wang, Q., Kang, M., Wu, G., Ren, Y., & Su, C. (2020). A practical secret key generation scheme based on wireless channel characteristics for 5G networks. IEICE Transactions on Information and Systems, 103(2), 230–238.
Wu, Y., Lin, Q., Jia, H., Hassan, M., & Hu, W. (2020). Auto-Key: Using autoencoder to speed up gait-based key generation in body area networks. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 4(1), 1–23.
Xi, W., Qian, C., Han, J., Zhao, K., Zhong, S., Li, X.-Y., & Zhao, J. (2016). Instant and robust authentication and key agreement among mobile devices. Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, 616–627. ACM.
Xie, P., Feng, J., Cao, Z., & Wang, J. (2018). GeneWave: Fast authentication and key agreement on commodity mobile devices. IEEE/ACM Transactions on Networking, 26(4), 1688–1700.
Xu, G., Adetifa, O., Mao, J., Sakk, E., & Wang, S. (2025). Developing quantum trusted platform module (QTPM) to advance IoT security. Future Internet, 17(5), 193. https://doi.org/10.3390/fi17050193
Xu, W., Jha, S., & Hu, W. (2019). LoRa-Key: Secure key generation system for LoRa-based network. IEEE Internet of Things Journal, 6(4), 6404–6416.
Xu, W., Zhang, J., Huang, S., Luo, C., & Li, W. (2022). Key generation for Internet of Things: A contemporary survey. ACM Computing Surveys, 14, 1–37. https://doi.org/10.1145/3429740
Yuliana, M., Wirawan, & Suwadi. (2019). A simple secret key generation by using a combination of pre-processing method with a multilevel quantization. Entropy, 21, 192. https://doi.org/10.3390/e21020192
Yuliana, M., Wirawan, & Suwadi. (2019). An efficient key generation for the Internet of Things based synchronized quantization. Sensors, 19(12). https://doi.org/10.3390/s19122674
Yuliana, M., Wirawan, & Suwadi. (2019). Performance analysis of loss level quantization on the secret key generation scheme in indoor wireless environment. International Journal of Advanced Science, Engineering and Information Technology, 9, 100–108. https://doi.org/10.18517/ijaseit.9.1.7583
Zhan, F., Yao, N., Gao, Z., & Yu, H. (2018). Efficient key generation leveraging wireless channel reciprocity for MANETs. Journal of Network and Computer Applications, 103, 18–28. https://doi.org/10.1016/j.jnca.2017.11.014
Zhang, J., Ding, M., López-Pérez, D., Marshall, A., & Hanzo, L. (2019). Design of an efficient OFDMA-based multi-user key generation protocol. IEEE Transactions on Vehicular Technology, 68(9), 8842–8852.
Zhang, J., Li, G., Marshall, A., Hu, A., & Hanzo, L. (2020). A new frontier for IoT security emerging from three decades of key generation relying on wireless channels. IEEE Access, 8, 138406–138446. https://doi.org/10.1109/ACCESS.2020.3012006
Zhang, J., Rajendran, S., Sun, Z., Woods, R., & Hanzo, L. (2019). Physical layer security for the Internet of Things: Authentication and key generation. IEEE Wireless Communications, 26(5), 92–98.
Zhang, J., Wang, Z., Yang, Z., & Zhang, Q. (2017). Proximity-based IoT device authentication. Proceedings of IEEE INFOCOM 2017, Atlanta, GA, USA, 1–9. IEEE.
Zhang, J., Woods, R., Duong, T. Q., Marshall, A., Ding, Y., Huang, Y., & Xu, Q. (2016). Experimental study on key generation for physical layer security in wireless communications. IEEE Access, 4, 4464–4477.
Klimushyn, P. S. (2025). Communication technologies and specialised communication protocols for ensuring cybersecurity of the Internet of Things. Law and Safety, 2(97), 52–68. https://doi.org/10.32631/pb.2025.2.05
Klimushyn, P. S. (2025). Problematic aspects of IoT cybersecurity standardisation. Law and Safety, 1(96), 53–66. https://doi.org/10.32631/pb.2025.1.05
Klimushyn, P., Svitlychnyi, V., Gnusov, Y., & Onyshchenko, Y. (2025). Automotive electronics and cybersecurity: A systematic review of security attacks and countermeasures. Cybersecurity: Education, Science, Technology, 4(28), 115–136. https://doi.org/10.28925/2663-4023.2025.28.760
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Петро Клімушин, Максим Хруслов, Юрій Гнусов, Вадим Мальцев

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.