[1]杨硕,侯晓赟,朱艳. 无线信道物理层密钥生成方法与密钥协商体系[J].计算机技术与发展,2017,27(05):123-127.
 YANG Shuo,HOU Xiao-yun,ZHU Yan. Generation and Agreement of Secret Keys for Physical Layer Security Based on Wireless Channels[J].,2017,27(05):123-127.
点击复制

 无线信道物理层密钥生成方法与密钥协商体系()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
27
期数:
2017年05期
页码:
123-127
栏目:
智能、算法、系统工程
出版日期:
2017-05-10

文章信息/Info

Title:
 Generation and Agreement of Secret Keys for Physical Layer Security Based on Wireless Channels
文章编号:
1673-629X(2017)05-0123-05
作者:
 杨硕侯晓赟朱艳
 南京邮电大学 信号处理与传输研究院
Author(s):
 YANG ShuoHOU Xiao-yunZHU Yan
关键词:
 物理层密钥生成密钥协商信息调和一致性认证保密增强
Keywords:
 physical layersecret key generationsecret key agreementinformation reconciliationconsistency authenticationprivacy amplification
分类号:
TP301
文献标志码:
A
摘要:
 由于信道的开放性,无线通信面临着被窃听的危险,通常采用加密来增强通信的安全传输.无线物理层密钥技术利用了无线信道的时变性和互易性,不仅可以实现"一次一密",而且无需进行密钥分发,避免了传统加密技术中因密钥分发而引起的泄密风险,因而成为信息安全领域的最新研究热点之一.为此,对基于无线信道特征的物理层密钥生成方法进行了回顾与总结,并比较了各自优缺点.针对通信双方初始生成密钥的不一致性问题,从信息调和、一致性认证、保密增强这三个方面分析研究了密钥协商体系.归纳总结了一些典型的技术和算法,并对比分析了其优缺点.未来研究方向应是充分利用信道特征,并设计出更优的量化策略,提高初始密钥的一致性,降低信息协商的程度,同时要兼顾密钥的随机性以及密钥生成速率;在信息协商阶段,应设计出更好的信道编码进行纠错.
Abstract:
 Due to the openness of the channel,the wireless communication faces the danger of being eavesdropped,so it usually uses encryption to enhance the security of communication.The wireless physical layer key technology utilizes the time-varying and reciprocity of radio channel,not only to achieve "one-time pad",but also to eliminate the need for key distribution,avoiding the risk of leak caused by key distribution for the traditional encryption technology.Therefore it has become one of the latest research hotspots in the field of information security.For this reason,the physical layer key generation method based on the characteristics of the wireless channel is reviewed and summarized,and their advantages and disadvantages are compared.According to the inconsistent problem of the initial generation of the key,the key agreement protocol are analyzed in three aspects:information reconciliation,consistency authentication and privacy amplification.Some typical techniques and algorithms are summarized,and their advantages and disadvantages are compared.Further research direction is to make full use of channel characteristics,and to design better quantitative strategies,which can improve the consistency of the initial key and reduce the level of information reconciliation.At the same time,the randomness of the key and the rate of the key generation should be considered.In the key agreement phase,a better channel coding is designed to correct the error.

相似文献/References:

[1]张志宏,吴庆波,邵立松,等.基于飞腾平台TOE协议栈的设计与实现[J].计算机技术与发展,2014,24(07):1.
 ZHANG Zhi-hong,WU Qing-bo,SHAO Li-song,et al. Design and Implementation of TCP/IP Offload Engine Protocol Stack Based on FT Platform[J].,2014,24(05):1.
[2]梁文快,李毅. 改进的基因表达算法对航班优化排序问题研究[J].计算机技术与发展,2014,24(07):5.
 LIANG Wen-kuai,LI Yi. Research on Optimization of Flight Scheduling Problem Based on Improved Gene Expression Algorithm[J].,2014,24(05):5.
[3]黄静,王枫,谢志新,等. EAST文档管理系统的设计与实现[J].计算机技术与发展,2014,24(07):13.
 HUANG Jing,WANG Feng,XIE Zhi-xin,et al. Design and Implementation of EAST Document Management System[J].,2014,24(05):13.
[4]侯善江[],张代远[][][]. 基于样条权函数神经网络P2P流量识别方法[J].计算机技术与发展,2014,24(07):21.
 HOU Shan-jiang[],ZHANG Dai-yuan[][][]. P2P Traffic Identification Based on Spline Weight Function Neural Network[J].,2014,24(05):21.
[5]李璨,耿国华,李康,等. 一种基于三维模型的文物碎片线图生成方法[J].计算机技术与发展,2014,24(07):25.
 LI Can,GENG Guo-hua,LI Kang,et al. A Method of Obtaining Cultural Debris’ s Line Chart Based on Three-dimensional Model[J].,2014,24(05):25.
[6]翁鹤,皮德常. 混沌RBF神经网络异常检测算法[J].计算机技术与发展,2014,24(07):29.
 WENG He,PI De-chang. Chaotic RBF Neural Network Anomaly Detection Algorithm[J].,2014,24(05):29.
[7]刘茜[],荆晓远[],李文倩[],等. 基于流形学习的正交稀疏保留投影[J].计算机技术与发展,2014,24(07):34.
 LIU Qian[],JING Xiao-yuan[,LI Wen-qian[],et al. Orthogonal Sparsity Preserving Projections Based on Manifold Learning[J].,2014,24(05):34.
[8]尚福华,李想,巩淼. 基于模糊框架-产生式知识表示及推理研究[J].计算机技术与发展,2014,24(07):38.
 SHANG Fu-hua,LI Xiang,GONG Miao. Research on Knowledge Representation and Inference Based on Fuzzy Framework-production[J].,2014,24(05):38.
[9]叶偲,李良福,肖樟树. 一种去除运动目标重影的图像镶嵌方法研究[J].计算机技术与发展,2014,24(07):43.
 YE Si,LI Liang-fu,XIAO Zhang-shu. Research of an Image Mosaic Method for Removing Ghost of Moving Targets[J].,2014,24(05):43.
[10]余松平[][],蔡志平[],吴建进[],等. GSM-R信令监测选择录音系统设计与实现[J].计算机技术与发展,2014,24(07):47.
 YU Song-ping[][],CAI Zhi-ping[] WU Jian-jin[],GU Feng-zhi[]. Design and Implementation of an Optional Voice Recording System Based on GSM-R Signaling Monitoring[J].,2014,24(05):47.

更新日期/Last Update: 2017-07-07