天堂国产午夜亚洲专区-少妇人妻综合久久蜜臀-国产成人户外露出视频在线-国产91传媒一区二区三区

當(dāng)前位置:主頁 > 科技論文 > 信息工程論文 >

基于信道特征提取的密鑰生成研究

發(fā)布時(shí)間:2019-04-15 22:32
【摘要】:最近幾年,無線通訊技術(shù)獲得了迅猛的發(fā)展,無線信道的開放性使得這種通信方式面臨著與有線通信方式相比更為嚴(yán)峻的安全威脅。傳統(tǒng)安全方案的安全性一方面基于算法的復(fù)雜性,另一方面依靠密鑰的隨機(jī)性和保密性。要增強(qiáng)安全方案的安全性,傳統(tǒng)手段是設(shè)計(jì)更為復(fù)雜的安全算法或增加密鑰的分組長度,但這樣就不斷的增加了算法執(zhí)行的復(fù)雜度,不利于無線通訊設(shè)備朝小型化發(fā)展的趨勢。物理層安全技術(shù)突破了傳統(tǒng)安全解決方案,它利用物理信道具有隨機(jī)性這一天然優(yōu)勢來產(chǎn)生密鑰,這既能大大提高密鑰的生成效率,在理想情況下,還能夠逼近香農(nóng)提出的“一次一密”保密方案,從而有效提高安全方案的安全性能。所以物理層安全技術(shù)自提出之日起,就引起了國內(nèi)外學(xué)者的廣泛關(guān)注。在物理層安全技術(shù)中,基于信道特征的密鑰產(chǎn)生技術(shù)是其中最為關(guān)鍵的技術(shù)。本文正是針對這一技術(shù)展開研究,主要研究內(nèi)容如下:(1)對于現(xiàn)有的基于物理信道的密鑰生成方案進(jìn)行了詳細(xì)的分析和總結(jié)。本文發(fā)現(xiàn)現(xiàn)有方案存在以下三個(gè)主要缺陷:第一,在主動(dòng)攻擊者實(shí)施干擾信道攻擊時(shí),沒有較優(yōu)的密鑰生成方案來抵御這類攻擊;第二,缺乏針對超寬帶系統(tǒng)的最佳特征提取算法;第三,在密鑰協(xié)商階段,現(xiàn)有大部分方案僅僅只考慮了密鑰一致性問題,而忽略了密鑰協(xié)商過程中的初始密鑰泄漏問題。(2)針對第一個(gè)缺陷,本文研究了基于隨機(jī)探測信號(hào)的密鑰生成方案。該方案將現(xiàn)有生成方案中的固定探測信號(hào)改為隨機(jī)探測信號(hào),再與信道沖激函數(shù)進(jìn)行卷積,從而得到新的特征提取信號(hào)。這種方案所生成的密鑰不僅包含信道的隨機(jī)性,而且還包含隨機(jī)信號(hào)的隨機(jī)性,因此,它能夠較好地抵御信道主動(dòng)干擾攻擊。(3)針對第二個(gè)缺陷,本文提出了基于多徑時(shí)延優(yōu)選提取算法的密鑰生成方案。該算法的原理是對接收端所接收到的多徑時(shí)延按照互相度的大小進(jìn)行快速排序,選出相關(guān)性最大的k個(gè)值作為信道特征進(jìn)行提取。基于這種算法的密鑰生成方案能夠比較大地提高初始安全密鑰的一致性,從而大大降低密鑰協(xié)商的開銷。(4)針對第三個(gè)缺陷,本文研究了基于混淆及RS碼協(xié)商的密鑰生成方案。該方案的原理是在協(xié)商階段先對需要傳輸?shù)拿荑進(jìn)行混淆處理,再利用RS碼對兩端初始密鑰進(jìn)行糾錯(cuò)得到完全一致的密鑰。這種方案既保證了兩端密鑰的一致性,同時(shí)也降低了密鑰在傳輸過程中的泄漏風(fēng)險(xiǎn)。(5)本文研究了將以上三種改進(jìn)算法結(jié)合到一起的方案,給出了仿真分析。
[Abstract]:In recent years, the wireless communication technology has been developed rapidly. The openness of the wireless channel makes this communication mode face more serious security threat than the wired communication mode. The security of traditional security scheme is based on the complexity of the algorithm on the one hand, on the other hand, depends on the randomness and confidentiality of the key. In order to enhance the security of the security scheme, the traditional method is to design more complex security algorithms or increase the packet length of the key. However, it increases the complexity of the algorithm execution and is not conducive to the development of wireless communication equipment towards miniaturization. The physical layer security technology breaks through the traditional security solution. It makes use of the natural advantage of the randomness of the physical channel to generate the key, which can not only greatly improve the efficiency of generating the key, but also under the ideal circumstances, It can also approach Shannon's one-time-one-secret security scheme, so as to effectively improve the security performance of the security scheme. Therefore, the physical layer security technology has attracted the attention of scholars both at home and abroad since it was put forward. Among the physical layer security techniques, key generation based on channel characteristics is the most important one. The main contents of this paper are as follows: (1) the existing key generation schemes based on physical channel are analyzed and summarized in detail. In this paper, we find that there are three main defects in the existing schemes: first, when active attackers carry out interference channel attacks, there is no better key generation scheme to resist such attacks; Secondly, there is a lack of optimal feature extraction algorithm for UWB systems. Thirdly, in the phase of key agreement, most of the existing schemes only consider the problem of key consistency, but ignore the initial key leakage problem in the process of key agreement. (2) for the first defect, In this paper, a key generation scheme based on random detection signal is studied. In this scheme, the fixed detection signal in the existing generation scheme is changed into a random detection signal, and then convolution with the channel impulse function to obtain a new feature extraction signal. The key generated by this scheme not only contains the randomness of the channel, but also the randomness of the random signal, so it can resist the channel active interference attack well. (3) in view of the second defect, In this paper, a key generation scheme based on multi-path delay optimization extraction algorithm is proposed. The principle of this algorithm is that the multipath delay received by the receiver is sorted quickly according to the degree of mutual phase, and the k values with the greatest correlation are selected to extract the channel features. The key generation scheme based on this algorithm can greatly improve the consistency of initial security keys, thus greatly reducing the overhead of key agreement. (4) aiming at the third defect, In this paper, a key generation scheme based on confusion and RS code agreement is studied. The principle of this scheme is to obfuscate the key that needs to be transmitted in the negotiation phase, and then use RS code to correct the initial keys at both ends to get a completely consistent key. This scheme not only guarantees the consistency of the keys at both ends, but also reduces the leakage risk of the keys in the process of transmission. (5) in this paper, the scheme combining the above three improved algorithms is studied, and the simulation analysis is given.
【學(xué)位授予單位】:電子科技大學(xué)
【學(xué)位級別】:碩士
【學(xué)位授予年份】:2017
【分類號(hào)】:TN918.4

【相似文獻(xiàn)】

相關(guān)期刊論文 前10條

1 徐娟,朱健,黃承明;上海市高速公路聯(lián)網(wǎng)收費(fèi)系統(tǒng)的密鑰生成方法[J];交通與計(jì)算機(jī);2002年04期

2 顧純祥;王磊;祝躍飛;;無線自組網(wǎng)絡(luò)上基于身份的密鑰生成協(xié)議[J];計(jì)算機(jī)工程;2005年24期

3 夏瑞學(xué);;密鑰生成與管理系統(tǒng)[J];山西電子技術(shù);2009年01期

4 常郝;周國祥;;基于書寫力與字形信息的生物特征密鑰生成[J];計(jì)算機(jī)應(yīng)用;2009年08期

5 常郝;周國祥;吳仲城;申飛;;基于生物特征的密鑰生成研究[J];計(jì)算機(jī)應(yīng)用研究;2007年07期

6 童立,甘嘉州;一種高效的基于令牌的密鑰生成方案[J];計(jì)算機(jī)工程;2002年09期

7 鄭飛;安全層次系統(tǒng)及其密鑰生成算法[J];通信保密;1991年04期

8 鄭飛;安全層次系統(tǒng)及其密鑰生成算法[J];計(jì)算機(jī)工程與設(shè)計(jì);1992年01期

9 楊立卓;葉哲江;;子密鑰生成算法的改進(jìn)[J];貴州大學(xué)學(xué)報(bào)(自然科學(xué)版);2011年04期

10 易小琳;劉旭輝;;基于時(shí)空混沌同步的同步密鑰生成算法[J];北京工業(yè)大學(xué)學(xué)報(bào);2013年05期

相關(guān)會(huì)議論文 前1條

1 申飛;黃承杰;吳仲城;;生物特征加密技術(shù)現(xiàn)狀與發(fā)展趨勢[A];全國計(jì)算機(jī)安全學(xué)術(shù)交流會(huì)論文集(第二十三卷)[C];2008年

相關(guān)博士學(xué)位論文 前3條

1 黃晶晶;基于無線信道環(huán)境的密鑰生成機(jī)制研究[D];北京郵電大學(xué);2015年

2 陳熙;鑒別生物特征提取及密鑰生成研究[D];西南交通大學(xué);2011年

3 李古月;無線通信物理層安全理論與方法研究[D];東南大學(xué);2017年

相關(guān)碩士學(xué)位論文 前10條

1 蔣登位;基于信道特征提取的密鑰生成研究[D];電子科技大學(xué);2017年

2 劉彥午;基于接收信號(hào)強(qiáng)度后處理的傳感網(wǎng)密鑰生成方法研究[D];西安電子科技大學(xué);2014年

3 陳葉蓉;基于時(shí)延的物理防克隆技術(shù)研究與實(shí)現(xiàn)[D];東南大學(xué);2015年

4 胡惠菊;基于無線信道的物理層密鑰生成技術(shù)[D];南京郵電大學(xué);2016年

5 曹中強(qiáng);基于無線信道特征的密鑰生成方法研究[D];南京郵電大學(xué);2016年

6 楊碩;基于無線信道的物理層密鑰生成與協(xié)商技術(shù)研究[D];南京郵電大學(xué);2017年

7 梁斌;指紋密鑰生成與基于身份的加密方案研究[D];杭州電子科技大學(xué);2015年

8 余訓(xùn)健;無線網(wǎng)絡(luò)密鑰生成的關(guān)鍵技術(shù)研究[D];南京郵電大學(xué);2017年

9 周百鵬;基于無線信道特征提取的密鑰生成技術(shù)研究[D];解放軍信息工程大學(xué);2011年

10 常郝;基于動(dòng)態(tài)手寫簽名的生物特征密鑰生成研究[D];合肥工業(yè)大學(xué);2007年



本文編號(hào):2458543

資料下載
論文發(fā)表

本文鏈接:http://sikaile.net/kejilunwen/xinxigongchenglunwen/2458543.html


Copyright(c)文論論文網(wǎng)All Rights Reserved | 網(wǎng)站地圖 |

版權(quán)申明:資料由用戶8fb8b***提供,本站僅收錄摘要或目錄,作者需要?jiǎng)h除請E-mail郵箱bigeng88@qq.com