隨機(jī)無線網(wǎng)絡(luò)中干擾協(xié)助下的安全通信
發(fā)布時(shí)間:2018-01-31 12:54
本文關(guān)鍵詞: 干擾 安全圖 隨機(jī)幾何 無線網(wǎng)絡(luò) 出處:《西安電子科技大學(xué)》2014年碩士論文 論文類型:學(xué)位論文
【摘要】:基于密碼學(xué)的無線網(wǎng)絡(luò)安全體系一般忽略無線媒介的物理特性和節(jié)點(diǎn)的空間位置,但這兩個(gè)因素直接影響節(jié)點(diǎn)之間通信的安全性。因此,合理利用無線媒介和節(jié)點(diǎn)空間位置的固有隨機(jī)性能夠顯著提高無線網(wǎng)絡(luò)物理層的安全性。近年來,有關(guān)無線信道的信息論安全的研究日新月異,但這些研究最大的局限性在于只考慮少量節(jié)點(diǎn)的情形,為了分析由大量合法節(jié)點(diǎn)和竊聽者節(jié)點(diǎn)組成的大規(guī)模網(wǎng)絡(luò),文獻(xiàn)[13]和[1][14]分別從幾何和信息論的觀點(diǎn)引入了安全通信圖即iS-graph,它是描述隨機(jī)無線網(wǎng)絡(luò)中安全鏈路的一種隨機(jī)圖,圖中的安全鏈路利用無線媒介的物理特性建立。iS-graph的安全容量可以通過增加可控干擾以降低竊聽者端的信號與干擾加噪聲比(SINR)來實(shí)現(xiàn)。此時(shí),干擾對無線網(wǎng)絡(luò)安全而言變成了一種有效資源。合法的通信雙方可以利用干擾來增加竊聽者的噪聲,從而提高合法用戶信道的安全速率,且相應(yīng)的干擾策略有多種。受信息論安全和協(xié)作干擾技術(shù)的啟發(fā),本文研究隨機(jī)無線網(wǎng)絡(luò)中機(jī)密信息的傳輸,并在iS-graph的基礎(chǔ)上提出一種干擾協(xié)助的安全通信圖模型,命名為jS-graph。該模型中合法節(jié)點(diǎn)在協(xié)作干擾節(jié)點(diǎn)的幫助下實(shí)現(xiàn)安全通信。接下來分別討論了協(xié)議模型和閾值模型下jS-graph的安全屬性,研究結(jié)果表明,與無協(xié)作干擾的iS-graph相比,j S-graph能取得顯著的安全增益,即說明合適的協(xié)作干擾能夠顯著地提高隨機(jī)無線網(wǎng)絡(luò)的安全通信能力。最后文章又提出了一種新的干擾策略,其可適用于隨機(jī)無線網(wǎng)絡(luò)中竊聽者位置信息未知的情形,該策略解決了現(xiàn)實(shí)通信過程中竊聽者信息并不總是可用的問題。文章結(jié)果有助于分析竊聽者和協(xié)作干擾對無線網(wǎng)絡(luò)安全性的影響。
[Abstract]:Cryptography-based wireless network security architecture generally ignores the physical characteristics of wireless media and the spatial location of nodes, but these two factors directly affect the security of communication between nodes. Reasonable use of the inherent randomness of wireless media and node space position can significantly improve the security of the physical layer of wireless networks. In recent years, the research on information security of wireless channels is changing with each passing day. But the biggest limitation of these studies is to consider only a small number of nodes. In order to analyze a large network of legal nodes and eavesdropper nodes, the literature. [13] and. [1]. [From the point of view of geometry and information theory, the secure communication graph (iS-graph) is introduced, which is a random graph describing secure links in random wireless networks. The secure link in the diagram uses the physical properties of the wireless media to establish the security capacity of .iS-graph, which can reduce the signal-to-interference / noise ratio of the eavesdropper by increasing controllable interference. To make it happen. Interference has become an effective resource for wireless network security. Legitimate communication parties can use interference to increase the noise of eavesdroppers and thus improve the security rate of legitimate user channels. And the corresponding interference strategies are various. Inspired by information theory security and cooperative interference technology, this paper studies the transmission of confidential information in random wireless networks. On the basis of iS-graph, a security communication graph model of interference assistance is proposed. Named jS-graph. in this model, legal nodes can communicate safely with the help of cooperative interference nodes. Then, the security properties of jS-graph under the protocol model and threshold model are discussed respectively. The results show that compared with the iS-graph without cooperative interference, the JS-graph can achieve a significant security gain. That is to say, the appropriate cooperative interference can significantly improve the security communication capability of random wireless networks. Finally, a new jamming strategy is proposed in this paper. It can be applied to the situation where the eavesdropper location information is unknown in random wireless networks. This strategy solves the problem that eavesdropping information is not always available in real communication. The results of this paper are helpful to analyze the influence of eavesdroppers and cooperative interference on the security of wireless networks.
【學(xué)位授予單位】:西安電子科技大學(xué)
【學(xué)位級別】:碩士
【學(xué)位授予年份】:2014
【分類號】:TN918
【相似文獻(xiàn)】
相關(guān)期刊論文 前10條
1 李澤光,郝莉,徐暉;IPSEC安全體系與實(shí)施[J];網(wǎng)絡(luò)安全技術(shù)與應(yīng)用;2005年02期
2 王雪梅;王帥;;統(tǒng)一混沌系統(tǒng)及其在安全通信中的應(yīng)用[J];微計(jì)算機(jī)信息;2007年15期
3 覃征,李順東,閻禮祥;電子商務(wù)中非字母文字的信息隱匿安全通信算法[J];西安交通大學(xué)學(xué)報(bào);2001年08期
4 ;消除安全風(fēng)險(xiǎn)[J];個(gè)人電腦;2001年11期
5 羅蕾,王慶譚,羅麗;WAP安全構(gòu)架研究及WTLS的實(shí)現(xiàn)[J];電子科技大學(xué)學(xué)報(bào);2002年04期
6 路,
本文編號:1479111
本文鏈接:http://sikaile.net/kejilunwen/wltx/1479111.html
最近更新
教材專著