1
When Physical Layer Key Generation Meets RIS:
Opportunities, Challenges, and Road Ahead
Ning Gao, Member, IEEE, Yu Han, Member, IEEE, Nannan Li, Shi Jin, Senior Member, IEEE,
and Michail Matthaiou, Fellow, IEEE
Abstract—Physical layer key generation (PLKG) is a promis-
ing technology to obtain symmetric keys between a pair of
wireless communication users in a plug-and-play manner. The
shared entropy source almost entirely comes from the intrinsic
randomness of the radio channel, which is highly dependent
on the wireless environments. However, in some static/block
fading wireless environments, the intrinsic randomness of the
wireless channel is hard to be guaranteed. Very recently, thanks
to reconfigurable intelligent surfaces (RISs) with their excellent
ability on electromagnetic wave control, the wireless channel envi-
ronment can be customized. In this article, we overview the RIS-
aided PLKG in static indoor environments, including its channel
model and hardware architectures. Then, we propose potential
application scenarios and analyze the design challenges of RIS-
aided PLKG, including channel reciprocity, RIS reconfiguration
speed and RIS deployment via proof-of-concept experiments
on a RIS-aided PLKG prototype system. In particular, our
experimental results show that the key generation rate is 15-
fold higher than that without RIS in a static indoor environment.
Next, we design a RIS jamming attack via a prototype experiment
and discuss its possible attack-defense countermeasures. Finally,
several conclusions and future directions are identified.
Index Terms—Endogenous security, physical layer key gener-
ation, reconfigurable intelligent surface, 6G.
I. INTRODUCTION
From the fifth-generation (5G) wireless communication to
the forthcoming 6G wireless communication, we are pro-
gressing towards the era of Internet of Everything (IoE) with
great momentum. This transformative shift is attributed to
massive multiple-input multiple-output (MIMO), millimeter
wave (mmWave) communication, integrated space-to-ground
communication, and so on. However, due to the broadcast
nature of wireless networks, malicious users can easily launch
a series of attacks through the physical layer, such as jamming,
eavesdropping and media access control (MAC) spoofing,
etc [1]. As more and more ubiquitous wireless networks are
rolled out, the investigation of the lightweight and low latency
physical layer security (PLS) becomes more important. Thus,
integrating security into the physical layer is indispensable
for the evolution of wireless communications. Traditionally,
symmetric encryption schemes play an important role in infor-
mation security, such as providing information confidentiality,
N. Gao and N. Li are with the School of Cyber Science and Engineering,
Southeast University, Nanjing 210096, China (e-mail: ninggao@seu.edu.cn;
linannan@seu.edu.cn).
Y. Han and S. Jin are with the National Mobile Communications Re-
search Laboratory, Southeast University, Nanjing 210096, China, (e-mail:
hanyu@seu.edu.cn; jinshi@seu.edu.cn).
M. Matthaiou is with the Centre for Wireless Innovation (CWI), Queen’s
University Belfast, Belfast BT3 9DT, U.K. (e-mail: m.matthaiou@qub.ac.uk).
information integrity and authentication. On the other hand,
the secret keys management for tremendous heterogeneous
Internet of Things (IoT) devices, including key generation,
updates, and storage, is constantly under significant pressure.
Physical layer key generation (PLKG) is a promising tech-
nology to extract symmetric keys from wireless fading channel
in a plug-and-play manner [2]. Specifically, the PLKG is based
on short-term channel reciprocity, spatial channel uniqueness
and intrinsic channel randomness, which require no public
key infrastructure (PKI). From the perspective of information-
theoretical security, PLKG stands out as one of the most
promising scheme for achieving Shannon’s perfect encryption.
The standard process of PLKG can be described as follows:
•Channel probing: Based on the short-term channel reci-
procity in time division duplex (TDD) systems, the le-
gitimate users transmit their pilot sequences accordingly
to estimate the channel and collect the channel probing
characteristics, such as the received signal strength (RSS)
and channel state information (CSI).
•Quantization: The legitimate users independently quan-
tify the channel features into binary bit sequences, which
are used as raw bit sequences. Due to the quantization
accuracy, noise and imperfect synchronization, etc, there
are some mismatched bits in the raw sequences.
•Information reconciliation: The legitimate users negotiate
the possible bit disagreements between each other by
using an error correcting code, i.e., low density parity
check (LDPC) code or principle component analysis, etc.
Then, we obtain the raw key sequences.
•Privacy amplification: To remove the possible informa-
tion leakage in public negotiation, the final symmetric
key is distilled from the discussed raw key sequences via
the hash function, which completes the PLKG process.
However, the performance of the PLKG is strongly depen-
dent on the intrinsic channel randomness. The key generation
rate cannot be guaranteed in harsh wireless environments, yet,
the data throughput is on the order of Gbit/s, which limits its
practical large-scale penetration and deployment. For example,
in static indoor environments, negotiating a sufficiently ran-
dom raw key is a laborious and time-consuming task due to the
fact that the channel based attenuations are almost predictable.
This situation is predominant in some scenarios, such as inside
empty rooms or at corridors during night. Previous works have
focused on PLKG in harsh wireless environments [3]–[5]. The
widely studied approach is to increase the randomness of the
wireless channel by employing a single relay and/or coopera-
arXiv:2210.02337v2 [cs.CR] 3 Jul 2023