SolarKey

Battery-free Key Generation Using Solar Cells

Journal Article (2023)
Author(s)

Bo Bo (Newcastle University)

X. U. Weitao (City University of Hong Kong)

G. A.O. Mingcen (Working in Google)

G. Lan (TU Delft - Embedded Systems)

L. I. Kai (CISTER Research Centre)

L. U.O. Chengwen (Shenzhen University)

J. I.N. Zhang (Shenzhen University)

Research Group
Embedded Systems
DOI related publication
https://doi.org/10.1145/3605780
More Info
expand_more
Publication Year
2023
Language
English
Research Group
Embedded Systems
Issue number
1
Volume number
20
Reuse Rights

Other than for strictly personal use, it is not permitted to download, forward or distribute the text or part of it, without the consent of the author(s) and/or copyright holder(s), unless the work is under an open content license such as Creative Commons.

Abstract

Solar cells have been widely used for offering energy for Internet of Things (IoT) devices. Recently, solar cells have also been used as sensors for context awareness sensing due to their sensitivity to varying lighting conditions. In this article, we are the first to use solar cells for symmetric key generation. To generate symmetric keys, we take advantage of photovoltage measurements generated from solar cells equipped with a pair of IoT devices. Symmetric keys are essential for pairing IoT devices and further securing wireless communication. Despite the sensitivity to varying lighting conditions, challenges still remain for the use of solar cells for key generation, such as time unsynchronisation and noisy measurements. To solve these challenges, we design a novel key generation framework, SolarKey, which includes the starting point detection and a compressed sensing-based two-tier key reconciliation method. Extensive experiments have been conducted to evaluate the performance of our proposed key generation method in various environments, which shows the proposed method can improve the key matching rate by up to 25%. We also conduct security analysis and the randomness test, which shows that SolarKey is resilient to common attacks such as the eavesdropping attack and the imitating attack and sufficiently random.