[1]贾仁庆,吴晓富,朱卫平. Cascade密钥协商的改进方案[J].计算机技术与发展,2016,26(11):97-100.
 JIA Ren-qing,WU Xiao-fu,ZHU Wei-ping. An Improved Scheme of Cascade Protocol[J].,2016,26(11):97-100.
点击复制

 Cascade密钥协商的改进方案()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
26
期数:
2016年11期
页码:
97-100
栏目:
安全与防范
出版日期:
2016-11-10

文章信息/Info

Title:
 An Improved Scheme of Cascade Protocol
文章编号:
1673-629X(2016)11-0097-04
作者:
 贾仁庆吴晓富朱卫平
 南京邮电大学 通信与信息工程学院
Author(s):
 JIA Ren-qingWU Xiao-fuZHU Wei-ping
关键词:
 物理层安全Cascade协商交互次数效率
Keywords:
 physical layer securityCascadenumber of communicationsefficiency
分类号:
TN918
文献标志码:
A
摘要:
 随着移动互联网业务的快速发展,无线通信安全已成为一个重要课题。近年来,无线密钥提取技术引起了研究者们的关注,通过无线密钥提取技术促使合法通信双方拥有大量的共享密钥,结合一次一密机制,使实现信息论意义上的绝对安全成为可能。密钥协商是提取物理层密钥的关键步骤。在众多的密钥协商方案中,Cascade协商方案由于能够高效地协商出一致的密钥而备受关注。然而,Cascade协商采用二分法进行纠错,在纠错的过程中需要通信双方不断交互校验信息,从而导致Cascade对网络延迟较为敏感。为了降低Cascade协商的交互次数,提出Cascade的一种改进方案,利用截止二分搜索方案进行密钥协商。实验仿真结果表明:所提方案可以在保证密钥协商效率的同时,有效降低了通信双方的交互次数。
Abstract:
 With the rapid development of mobile Internet services,information security for wireless communication is becoming a very im-portant research topic. Recently,there has been great interest in generating the shared secret key based on the physical layer security tech-niques,which could achieve the perfect secrecy combined with a one-time pad. Information reconciliation is a key step of secret key gen-eration. Cascade is the most famous reconciliation protocol duo to the high efficiency. However,Cascade is highly interactive protocol which makes it very sensitive to network latencies. In order to reduce the number of communications,a modifying strategy of Cascade is proposed by Abort-BINARY searching. Extensive simulation results show that the modifying strategy could ensure high efficiency of in-formation reconciliation and reduce the number of communications effectively.

相似文献/References:

[1]张志宏,吴庆波,邵立松,等.基于飞腾平台TOE协议栈的设计与实现[J].计算机技术与发展,2014,24(07):1.
 ZHANG Zhi-hong,WU Qing-bo,SHAO Li-song,et al. Design and Implementation of TCP/IP Offload Engine Protocol Stack Based on FT Platform[J].,2014,24(11):1.
[2]梁文快,李毅. 改进的基因表达算法对航班优化排序问题研究[J].计算机技术与发展,2014,24(07):5.
 LIANG Wen-kuai,LI Yi. Research on Optimization of Flight Scheduling Problem Based on Improved Gene Expression Algorithm[J].,2014,24(11):5.
[3]黄静,王枫,谢志新,等. EAST文档管理系统的设计与实现[J].计算机技术与发展,2014,24(07):13.
 HUANG Jing,WANG Feng,XIE Zhi-xin,et al. Design and Implementation of EAST Document Management System[J].,2014,24(11):13.
[4]侯善江[],张代远[][][]. 基于样条权函数神经网络P2P流量识别方法[J].计算机技术与发展,2014,24(07):21.
 HOU Shan-jiang[],ZHANG Dai-yuan[][][]. P2P Traffic Identification Based on Spline Weight Function Neural Network[J].,2014,24(11):21.
[5]李璨,耿国华,李康,等. 一种基于三维模型的文物碎片线图生成方法[J].计算机技术与发展,2014,24(07):25.
 LI Can,GENG Guo-hua,LI Kang,et al. A Method of Obtaining Cultural Debris’ s Line Chart Based on Three-dimensional Model[J].,2014,24(11):25.
[6]翁鹤,皮德常. 混沌RBF神经网络异常检测算法[J].计算机技术与发展,2014,24(07):29.
 WENG He,PI De-chang. Chaotic RBF Neural Network Anomaly Detection Algorithm[J].,2014,24(11):29.
[7]刘茜[],荆晓远[],李文倩[],等. 基于流形学习的正交稀疏保留投影[J].计算机技术与发展,2014,24(07):34.
 LIU Qian[],JING Xiao-yuan[,LI Wen-qian[],et al. Orthogonal Sparsity Preserving Projections Based on Manifold Learning[J].,2014,24(11):34.
[8]尚福华,李想,巩淼. 基于模糊框架-产生式知识表示及推理研究[J].计算机技术与发展,2014,24(07):38.
 SHANG Fu-hua,LI Xiang,GONG Miao. Research on Knowledge Representation and Inference Based on Fuzzy Framework-production[J].,2014,24(11):38.
[9]叶偲,李良福,肖樟树. 一种去除运动目标重影的图像镶嵌方法研究[J].计算机技术与发展,2014,24(07):43.
 YE Si,LI Liang-fu,XIAO Zhang-shu. Research of an Image Mosaic Method for Removing Ghost of Moving Targets[J].,2014,24(11):43.
[10]余松平[][],蔡志平[],吴建进[],等. GSM-R信令监测选择录音系统设计与实现[J].计算机技术与发展,2014,24(07):47.
 YU Song-ping[][],CAI Zhi-ping[] WU Jian-jin[],GU Feng-zhi[]. Design and Implementation of an Optional Voice Recording System Based on GSM-R Signaling Monitoring[J].,2014,24(11):47.
[11]冯元,侯晓贇,魏浩,等. 节点位置对窃听信道安全容量的影响[J].计算机技术与发展,2014,24(12):146.
 FENG Yuan,HOU Xiao-yun,WEI Hao,et al. Influence of Nodes Location to Security Capacity in Wire-tap Channel[J].,2014,24(11):146.
[12]黄志川,吴蒙. 多目标优化的相控阵三维方向调制方法[J].计算机技术与发展,2016,26(11):111.
 HUANG Zhi-chuan,WU Meng. Three-dimensional Direction Modulation of Phased Array Based on Multi-objective Optimization[J].,2016,26(11):111.
[13]陈璇,冯友宏. 安全中断概率约束下MISOME系统安全性能分析[J].计算机技术与发展,2017,27(02):76.
 CHEN Xuan,FENG You-hong. nalysis of Security Performance of MISOME System with Security Outage Probability Constraints[J].,2017,27(11):76.
[14]张雪麒,王保云. 多干扰者协作的MIMO系统下功率分配算法设计[J].计算机技术与发展,2017,27(07):120.
 ZHANG Xue-qi,WANG Bao-yun. Robust Power Allocation Design in Secure MIMO System with Multiple Cooperative Jammers[J].,2017,27(11):120.

更新日期/Last Update: 2016-12-13