Physical Layer Group Key Generation With the Aid of Reconfigurable Intelligent Surfaces
Pith reviewed 2026-05-19 06:50 UTC · model grok-4.3
The pith
Reconfigurable intelligent surfaces align user channels to extract common group secret keys using existing channel data.
A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.
Core claim
The surface phase shifts are chosen to minimize the differences among the aggregate reflected channels seen by the user terminals, allowing the terminals to quantize those channels into matching key sequences. The design uses already-acquired CSI and solves the resulting optimization problems with successive convex approximation and semidefinite relaxation plus Gaussian randomization. Numerical evaluation shows that an active RIS reduces normalized mean squared error and key error rate while delivering more than four times the key generation rate of a passive RIS under the same power budget, and the generated keys pass standard randomness tests.
What carries the argument
RIS phase-shift optimization that equalizes aggregate reflecting channels across users using pre-acquired CSI
If this is right
- High key generation rates become possible even when the wireless environment is static.
- Active RIS outperforms passive RIS by more than a factor of four in key generation rate for the same power budget.
- No additional probing signals are required from the user terminals or the network.
- Performance can be quantified with normalized mean squared error, key error rate, key generation rate, and randomness metrics.
Where Pith is reading between the lines
- The method could reduce reliance on centralized key servers in large IoT deployments by letting devices derive keys locally from the radio channel.
- Updating the surface configuration periodically might extend the scheme to slowly moving users without losing the static-environment advantage.
- The same surface could potentially handle both communication beamforming and key alignment in the same time slot.
Load-bearing premise
The reconfigurable intelligent surface already holds accurate channel state information for every user terminal and can apply that information to set its phase shifts without any extra measurements or signaling.
What would settle it
Deploy a physical active RIS and several user devices in a static indoor environment, optimize the phase shifts from measured CSI, then check whether the observed key error rate falls and the key generation rate rises by the factor reported in the simulations.
Figures
read the original abstract
Reconfigurable intelligent surfaces (RIS) have the ability to alter the wireless environment by making changes in the impinging signal. While RIS has been extensively studied for enhancing wireless communications, its potential for facilitating group key generation (GKG) remains unexplored. In this study, we exploit the RIS to make the aggregate reflecting channels of different user terminals (UTs) as similar as possible to be able to extract common group secret keys from their channels. Specifically, the RIS will adjust its parameters to pave the way for GKG based on the physical channels of the UTs. Our method exploits the already gathered channel state information (CSI) in the RIS to beneficially design the phase shifts and does not impose additional probing burden on the network. We consider both passive RIS (PRIS) and active RIS (ARIS) to generate the group keys. The PRIS is widely adopted in physical layer key generation (PLKG) studies due to its use of passive elements, whereas the ARIS demonstrates superior capability in aligning the aggregate reflected channels among nodes in the GKG scenario, as demonstrated in this study. We will exploit various optimization methods like successive convex approximation (SCA) and semidefinite relaxation with Gaussian randomization (SDR-GR) to address the raised optimization problems. Unlike most of the studies in the literature, our scheme can achieve a high GKG rate in static environments as well. Finally, we will examine the performance of the proposed method by normalized mean squared error (NMSE), key error rate (KER), key generation rate (KGR) and key randomness metrics. Our numerical results verify that for the equal available power budget, the ARIS significantly outperforms PRIS in NMSE and KER, achieving more than four times higher KGR.
Editorial analysis
A structured set of objections, weighed in public.
Referee Report
Summary. The manuscript proposes using reconfigurable intelligent surfaces (both passive PRIS and active ARIS) to facilitate physical-layer group key generation among multiple user terminals. Phase shifts are designed via optimization (SCA and SDR-GR) on already-available CSI to align aggregate reflected channels, enabling extraction of common group keys without extra probing. Simulations compare NMSE, KER, KGR and randomness, claiming ARIS yields more than 4x higher KGR than PRIS under equal power budgets and works in static environments.
Significance. If the central claims hold, the work is significant for extending RIS to physical-layer security in static multi-user settings where conventional PLKG fails due to insufficient channel variation. The explicit PRIS-vs-ARIS comparison under power constraints and the use of existing CSI (avoiding extra overhead) are practical strengths; reproducible optimization formulations and numerical verification would strengthen impact.
major comments (2)
- [System Model / Problem Formulation] System model and problem formulation: the central claim that the scheme 'exploits the already gathered CSI in the RIS ... and does not impose additional probing burden' is load-bearing for the equal-power-budget ARIS-vs-PRIS comparison and the >4x KGR gain. No protocol, pilot overhead analysis, or power/time cost accounting is provided for acquiring accurate multi-UT CSI at the RIS, leaving the reported advantages conditional on an idealized zero-cost CSI regime.
- [Numerical Results] Numerical results section: performance claims (NMSE, KER, KGR) rest on SCA and SDR-GR solutions, yet no simulation parameters, convergence tolerances, stopping criteria, error bars, or verification that the relaxed solutions satisfy the original non-convex constraints are supplied. This undermines assessment of whether the reported gains are robust or scenario-specific.
minor comments (2)
- [Abstract] Abstract lacks any mention of simulation parameters, number of UTs, RIS size, or SNR ranges, which are standard for reproducibility in eess.SP papers.
- [Optimization Problems] Notation for aggregate reflected channels and the exact objective functions for PRIS versus ARIS should be stated explicitly with equation numbers for clarity.
Simulated Author's Rebuttal
We thank the referee for the constructive comments, which help improve the clarity and rigor of our work. We address each major comment point by point below, indicating the revisions we will incorporate.
read point-by-point responses
-
Referee: System model and problem formulation: the central claim that the scheme 'exploits the already gathered CSI in the RIS ... and does not impose additional probing burden' is load-bearing for the equal-power-budget ARIS-vs-PRIS comparison and the >4x KGR gain. No protocol, pilot overhead analysis, or power/time cost accounting is provided for acquiring accurate multi-UT CSI at the RIS, leaving the reported advantages conditional on an idealized zero-cost CSI regime.
Authors: We acknowledge that the manuscript assumes CSI availability at the RIS as is standard in RIS literature for communication tasks, without providing an explicit overhead analysis for multi-UT estimation. This assumption underpins the claim of no additional probing specifically for key generation. We agree this point merits clarification. In the revised manuscript, we will add a dedicated paragraph in the system model section describing a standard TDD-based CSI acquisition protocol (with pilot symbols from the UTs to the RIS), its associated time and power overhead, and how it is shared with existing communication functions rather than being unique to the proposed scheme. This will strengthen the equal-power-budget comparison. revision: yes
-
Referee: Numerical results section: performance claims (NMSE, KER, KGR) rest on SCA and SDR-GR solutions, yet no simulation parameters, convergence tolerances, stopping criteria, error bars, or verification that the relaxed solutions satisfy the original non-convex constraints are supplied. This undermines assessment of whether the reported gains are robust or scenario-specific.
Authors: We agree that the current numerical results section lacks sufficient implementation details for reproducibility. In the revised manuscript, we will expand the simulation setup subsection to include all parameter values (e.g., number of RIS elements, UT locations, noise variances, power budgets), SCA convergence tolerance (set to 10^{-4}), SDR-GR randomization trials (1000), stopping criteria, and explicit verification that the obtained solutions satisfy the original unit-modulus and power constraints within a small tolerance. We will also add error bars to the KGR and KER plots based on 1000 Monte Carlo runs and include a brief robustness discussion across static and low-mobility scenarios. revision: yes
Circularity Check
No significant circularity detected; derivation relies on external CSI assumption and numerical optimization
full rationale
The paper's core approach optimizes RIS phase shifts to align aggregate reflected channels for group key generation, using SCA and SDR-GR solvers on the assumed pre-existing CSI. Performance metrics (NMSE, KER, KGR) are obtained via simulation under equal power budgets, with ARIS vs PRIS comparisons presented as empirical outcomes rather than closed-form derivations. No self-definitional loops, fitted parameters renamed as predictions, or load-bearing self-citations appear in the provided text. The 'already gathered CSI' premise is stated as an operating assumption that avoids extra probing, but this is not derived from the method itself and does not reduce any claimed result to a tautology by construction. The >4x KGR gain is a reported simulation finding, not forced by redefinition of inputs.
Axiom & Free-Parameter Ledger
axioms (1)
- domain assumption RIS possesses accurate CSI of all user terminals without extra probing
Lean theorems connected to this paper
-
IndisputableMonolith/Cost/FunctionalEquation.leanwashburn_uniqueness_aczel unclear?
unclearRelation between the paper passage and the cited Recognition theorem.
We exploit the RIS to make the aggregate reflecting channels of different user terminals (UTs) as similar as possible... exploits the already gathered channel state information (CSI) in the RIS to beneficially design the phase shifts
-
IndisputableMonolith/Foundation/AlphaCoordinateFixation.leanJ_uniquely_calibrated_via_higher_derivative unclear?
unclearRelation between the paper passage and the cited Recognition theorem.
successive convex approximation (SCA) and semidefinite relaxation with Gaussian randomization (SDR-GR)
What do these tags mean?
- matches
- The paper's claim is directly supported by a theorem in the formal canon.
- supports
- The theorem supports part of the paper's argument, but the paper may add assumptions or extra steps.
- extends
- The paper goes beyond the formal theorem; the theorem is a base layer rather than the whole result.
- uses
- The paper appears to rely on the theorem as machinery.
- contradicts
- The paper's claim conflicts with a theorem or certificate in the canon.
- unclear
- Pith found a possible connection, but the passage is too broad, indirect, or ambiguous to say the theorem truly supports the claim.
Reference graph
Works this paper leans on
-
[1]
J. Zhang, G. Li, A. Marshall, A. Hu, and L. Hanzo, “A new frontier for IoT security emerging from three decades of key generation relying on wireless channels,” IEEE Access, vol. 8, pp. 138 406–138 446, 2020
work page 2020
-
[2]
On the secret-key capacity over multipath fading channel,
D. Guo, D. Ma, J. Xiong, X. Liu, and J. Wei, “On the secret-key capacity over multipath fading channel,” IEEE Trans. Inf. Forensics Security , vol. 19, pp. 6044–6054, 2024
work page 2024
-
[3]
V . Shahiri, H. Behroozi, A. Kuhestani, and K.-K. Wong, “Reconfigurable-intelligent-surface-assisted secret key generation under spatially correlated channels in quasi-static environments,” IEEE Internet Things J. , vol. 11, no. 9, pp. 15 808–15 822, 2024
work page 2024
-
[4]
Exploiting malicious RIS for secret key acquisition in physical-layer key generation,
L. Hu, G. Li, A. Hu, and D. W. K. Ng, “Exploiting malicious RIS for secret key acquisition in physical-layer key generation,” IEEE Wireless Commun. Lett., vol. 13, no. 2, pp. 417–421, 2024. 9 1 4 8 12 16 20 Number of channel realizations 0 0.2 0.4 0.6 0.8 1 Real part of aggregate channel (a) Applying equal phase shifts in PRIS UT1 UT2 UT3 Eve 1 4 8 12 16 ...
work page 2024
-
[5]
G. Li, C. Sun, W. Xu, M. D. Renzo, and A. Hu, “On maximizing the sum secret key rate for reconfigurable intelligent surface-assisted multiuser systems,” IEEE Trans. Inf. Forensics Security , vol. 17, pp. 211–225, 2022
work page 2022
-
[6]
Reconfigurable intelligent surface-assisted secret key generation in spatially correlated channels,
L. Hu, G. Li, X. Qian, A. Hu, and D. W. K. Ng, “Reconfigurable intelligent surface-assisted secret key generation in spatially correlated channels,” IEEE Trans. Wireless Commun. , vol. 23, no. 3, pp. 2153– 2166, 2024
work page 2024
-
[7]
Physical layer secret key generation with the aid of spatially correlated active RIS,
V . Shahiri and H. Behroozi, “Physical layer secret key generation with the aid of spatially correlated active RIS,” IEEE Wireless Commun. Lett., vol. 13, no. 2, pp. 535–539, 2024
work page 2024
-
[8]
STAR- RIS-assisted physical-layer key generation,
Z. Wan, Z. Chu, D. Mi, H.-M. Wang, L. Jin, and K. Huang, “STAR- RIS-assisted physical-layer key generation,” IEEE Trans. Veh. Technol., vol. 73, no. 6, pp. 9165–9170, 2024
work page 2024
-
[9]
Physical layer key generation for IOS-assisted communication systems,
G. Cao, Y . Zhang, Z. Ji, M. Zhang, and Y . Li, “Physical layer key generation for IOS-assisted communication systems,” IEEE Trans. Veh. Technol., vol. 73, no. 11, pp. 17 887–17 892, 2024
work page 2024
-
[10]
Resource allocation for STAR-RIS-assisted MIMO physical- layer key generation,
Z. Wan, K. Liu, Y . Chen, K. Huang, H.-M. Wang, Z. Chu, M. Yi, and L. Jin, “Resource allocation for STAR-RIS-assisted MIMO physical- layer key generation,” IEEE Trans. Inf. Forensics Security , vol. 19, pp. 10 328–10 338, 2024
work page 2024
-
[11]
Phase-shift matrices optimization in STAR-RIS-aided physical-layer key generation,
Y . Song, L. Chen, J. Shen, P. Zhang, and Q. Gu, “Phase-shift matrices optimization in STAR-RIS-aided physical-layer key generation,” IEEE Internet Things J. , vol. 11, no. 23, pp. 38 778–38 789, 2024
work page 2024
-
[12]
Beyond-diagonal RIS attacks on physical layer key generation,
H. Wang, J. Nossek, and A. L. Swindlehurst, “Beyond-diagonal RIS attacks on physical layer key generation,” in Proc. IEEE 25th Int. Workshop Signal Process. Adv. Wireless Commun. (SPAWC) , 2024, pp. 946–950
work page 2024
-
[13]
Active reconfigurable intelligent surface-aided wireless communications,
R. Long, Y .-C. Liang, Y . Pei, and E. G. Larsson, “Active reconfigurable intelligent surface-aided wireless communications,” IEEE Trans. Wire- less Commun., vol. 20, no. 8, pp. 4962–4975, 2021
work page 2021
-
[14]
Secret group-key generation at physical layer for multi-antenna mesh topology,
C. D. T. Thai, J. Lee, J. Prakash, and T. Q. S. Quek, “Secret group-key generation at physical layer for multi-antenna mesh topology,” IEEE Trans. Inf. Forensics Security, vol. 14, no. 1, pp. 18–33, 2019
work page 2019
-
[15]
J. Tang, H. Wen, H.-H. Song, L. Jiao, and K. Zeng, “Sharing secrets via wireless broadcasting: A new efficient physical layer group secret key generation for multiple IoT devices,” IEEE Internet Things J. , vol. 9, no. 16, pp. 15 228–15 239, 2022
work page 2022
-
[16]
Group secret key generation in wireless networks: Algorithms and rate optimization,
P. Xu, K. Cumanan, Z. Ding, X. Dai, and K. K. Leung, “Group secret key generation in wireless networks: Algorithms and rate optimization,” IEEE Trans. Inf. Forensics Security, vol. 11, no. 8, pp. 1831–1846, 2016
work page 2016
-
[17]
Multi-party secret key generation over underwater acoustic channels,
M. Xu, Y . Fan, and L. Liu, “Multi-party secret key generation over underwater acoustic channels,” IEEE Wireless Commun. Lett. , vol. 9, no. 7, pp. 1075–1079, 2020
work page 2020
-
[18]
Efficient physical layer group key generation in 5G wireless networks,
L. Jiao, P. Wang, N. Wang, S. Chen, A. Alipour-Fanid, J. Le, and K. Zeng, “Efficient physical layer group key generation in 5G wireless networks,” in Proc. IEEE Conf. Commun. Netw. Secur. (CNS), 2020, pp. 1–9
work page 2020
-
[19]
A secure communication system in self-organizing networks via lightweight group key generation,
S. Peng, B. Han, C. Wu, and B. Wang, “A secure communication system in self-organizing networks via lightweight group key generation,” IEEE Open J. Comput. Soc. , vol. 1, pp. 182–192, 2020
work page 2020
-
[20]
Scalable secret key generation for wireless sensor networks,
U. Altun, S. T. Basaran, G. K. Kurt, and E. Ozdemir, “Scalable secret key generation for wireless sensor networks,” IEEE Syst. J. , vol. 16, no. 4, pp. 6031–6041, 2022
work page 2022
-
[21]
Cooperative group secret 10 key generation based on secure network coding,
S. Xiao, Y . Guo, K. Huang, and L. Jin, “Cooperative group secret 10 key generation based on secure network coding,” IEEE Commun. Lett. , vol. 22, no. 7, pp. 1466–1469, 2018
work page 2018
-
[22]
Design of an efficient OFDMA-based multi-user key generation protocol,
J. Zhang, M. Ding, D. L ´opez-P´erez, A. Marshall, and L. Hanzo, “Design of an efficient OFDMA-based multi-user key generation protocol,”IEEE Trans. Veh. Technol., vol. 68, no. 9, pp. 8842–8852, 2019
work page 2019
-
[23]
G. Li, L. Hu, and A. Hu, “Lightweight group secret key generation leveraging non-reconciled received signal strength in mobile wireless networks,” in Proc. IEEE Int. Conf. Commun. Workshops , 2019, pp. 1–6
work page 2019
-
[24]
Channel estimation for RIS-aided multiuser millimeter-wave systems,
G. Zhou, C. Pan, H. Ren, P. Popovski, and A. L. Swindlehurst, “Channel estimation for RIS-aided multiuser millimeter-wave systems,” IEEE Trans. Signal Process., vol. 70, pp. 1478–1492, 2022
work page 2022
-
[25]
X. Wei, D. Shen, and L. Dai, “Channel estimation for RIS assisted wireless communications—part I: Fundamentals, solutions, and future opportunities,” IEEE Commun. Lett. , vol. 25, no. 5, pp. 1398–1402, 2021
work page 2021
-
[26]
Rayleigh fading modeling and channel hardening for reconfigurable intelligent surfaces,
E. Bj ¨ornson and L. Sanguinetti, “Rayleigh fading modeling and channel hardening for reconfigurable intelligent surfaces,” IEEE Wireless Com- mun. Lett., vol. 10, no. 4, pp. 830–834, 2021
work page 2021
-
[27]
S. Boyd and L. Vandenberghe, Convex Optimization . Cambridge University Press, 2004
work page 2004
-
[28]
Limited-feedback resource allocation in heterogeneous cellular networks,
N. Mokari, F. Alavi, S. Parsaeefard, and T. Le-Ngoc, “Limited-feedback resource allocation in heterogeneous cellular networks,” IEEE Trans. Veh. Technol., vol. 65, no. 4, pp. 2509–2521, 2016
work page 2016
-
[29]
M. Forouzesh, P. Azmi, N. Mokari, K.-K. Wong, and H. Pishro-Nik, “Robust physical layer security for power domain non-orthogonal multi- ple access-based HetNets and HUDNs: SIC avoidance at eavesdroppers,” IEEE Access, vol. 7, pp. 107 879–107 896, 2019
work page 2019
-
[30]
G. C. Alexandropoulos and E. Vlachos, “A hardware architecture for reconfigurable intelligent surfaces with minimal active elements for explicit channel estimation,” in Proc. IEEE Int. Conf. Acoust., Speech Signal Process. (ICASSP) , 2020, pp. 9175–9179
work page 2020
-
[31]
Enabling large intelligent surfaces with compressive sensing and deep learning,
A. Taha, M. Alrabeiah, and A. Alkhateeb, “Enabling large intelligent surfaces with compressive sensing and deep learning,” IEEE Access , vol. 9, pp. 44 304–44 321, 2021
work page 2021
-
[32]
Beamforming design for active IRS-aided MIMO integrated sensing and communication systems,
J. Li, G. Zhou, T. Gong, and N. Liu, “Beamforming design for active IRS-aided MIMO integrated sensing and communication systems,”IEEE Wireless Commun. Lett., vol. 12, no. 10, pp. 1786–1790, 2023
work page 2023
-
[33]
Semidefinite relaxation of quadratic optimization problems,
Z.-q. Luo, W.-k. Ma, A. M.-c. So, Y . Ye, and S. Zhang, “Semidefinite relaxation of quadratic optimization problems,” IEEE Signal Process. Mag., vol. 27, no. 3, pp. 20–34, 2010
work page 2010
-
[34]
Physical layer secret key generation in static environments,
N. Aldaghri and H. Mahdavifar, “Physical layer secret key generation in static environments,” IEEE Trans. Inf. Forensics Security, vol. 15, pp. 2692–2705, 2020
work page 2020
-
[35]
Deep-learning- based physical-layer secret key generation for FDD systems,
X. Zhang, G. Li, J. Zhang, A. Hu, Z. Hou, and B. Xiao, “Deep-learning- based physical-layer secret key generation for FDD systems,” IEEE Internet Things J. , vol. 9, no. 8, pp. 6081–6094, 2022
work page 2022
-
[36]
X. Zhang, G. Li, J. Zhang, L. Peng, A. Hu, and X. Wang, “Enabling deep learning-based physical-layer secret key generation for FDD-OFDM systems in multi-environments,” IEEE Trans. Veh. Technol. , vol. 73, no. 7, pp. 10 135–10 149, 2024
work page 2024
discussion (0)
Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.