基于信道特征提取的密鑰生成研究
[Abstract]:In recent years, the wireless communication technology has been developed rapidly. The openness of the wireless channel makes this communication mode face more serious security threat than the wired communication mode. The security of traditional security scheme is based on the complexity of the algorithm on the one hand, on the other hand, depends on the randomness and confidentiality of the key. In order to enhance the security of the security scheme, the traditional method is to design more complex security algorithms or increase the packet length of the key. However, it increases the complexity of the algorithm execution and is not conducive to the development of wireless communication equipment towards miniaturization. The physical layer security technology breaks through the traditional security solution. It makes use of the natural advantage of the randomness of the physical channel to generate the key, which can not only greatly improve the efficiency of generating the key, but also under the ideal circumstances, It can also approach Shannon's one-time-one-secret security scheme, so as to effectively improve the security performance of the security scheme. Therefore, the physical layer security technology has attracted the attention of scholars both at home and abroad since it was put forward. Among the physical layer security techniques, key generation based on channel characteristics is the most important one. The main contents of this paper are as follows: (1) the existing key generation schemes based on physical channel are analyzed and summarized in detail. In this paper, we find that there are three main defects in the existing schemes: first, when active attackers carry out interference channel attacks, there is no better key generation scheme to resist such attacks; Secondly, there is a lack of optimal feature extraction algorithm for UWB systems. Thirdly, in the phase of key agreement, most of the existing schemes only consider the problem of key consistency, but ignore the initial key leakage problem in the process of key agreement. (2) for the first defect, In this paper, a key generation scheme based on random detection signal is studied. In this scheme, the fixed detection signal in the existing generation scheme is changed into a random detection signal, and then convolution with the channel impulse function to obtain a new feature extraction signal. The key generated by this scheme not only contains the randomness of the channel, but also the randomness of the random signal, so it can resist the channel active interference attack well. (3) in view of the second defect, In this paper, a key generation scheme based on multi-path delay optimization extraction algorithm is proposed. The principle of this algorithm is that the multipath delay received by the receiver is sorted quickly according to the degree of mutual phase, and the k values with the greatest correlation are selected to extract the channel features. The key generation scheme based on this algorithm can greatly improve the consistency of initial security keys, thus greatly reducing the overhead of key agreement. (4) aiming at the third defect, In this paper, a key generation scheme based on confusion and RS code agreement is studied. The principle of this scheme is to obfuscate the key that needs to be transmitted in the negotiation phase, and then use RS code to correct the initial keys at both ends to get a completely consistent key. This scheme not only guarantees the consistency of the keys at both ends, but also reduces the leakage risk of the keys in the process of transmission. (5) in this paper, the scheme combining the above three improved algorithms is studied, and the simulation analysis is given.
【學(xué)位授予單位】:電子科技大學(xué)
【學(xué)位級別】:碩士
【學(xué)位授予年份】:2017
【分類號(hào)】:TN918.4
【相似文獻(xiàn)】
相關(guān)期刊論文 前10條
1 徐娟,朱健,黃承明;上海市高速公路聯(lián)網(wǎng)收費(fèi)系統(tǒng)的密鑰生成方法[J];交通與計(jì)算機(jī);2002年04期
2 顧純祥;王磊;祝躍飛;;無線自組網(wǎng)絡(luò)上基于身份的密鑰生成協(xié)議[J];計(jì)算機(jī)工程;2005年24期
3 夏瑞學(xué);;密鑰生成與管理系統(tǒng)[J];山西電子技術(shù);2009年01期
4 常郝;周國祥;;基于書寫力與字形信息的生物特征密鑰生成[J];計(jì)算機(jī)應(yīng)用;2009年08期
5 常郝;周國祥;吳仲城;申飛;;基于生物特征的密鑰生成研究[J];計(jì)算機(jī)應(yīng)用研究;2007年07期
6 童立,甘嘉州;一種高效的基于令牌的密鑰生成方案[J];計(jì)算機(jī)工程;2002年09期
7 鄭飛;安全層次系統(tǒng)及其密鑰生成算法[J];通信保密;1991年04期
8 鄭飛;安全層次系統(tǒng)及其密鑰生成算法[J];計(jì)算機(jī)工程與設(shè)計(jì);1992年01期
9 楊立卓;葉哲江;;子密鑰生成算法的改進(jìn)[J];貴州大學(xué)學(xué)報(bào)(自然科學(xué)版);2011年04期
10 易小琳;劉旭輝;;基于時(shí)空混沌同步的同步密鑰生成算法[J];北京工業(yè)大學(xué)學(xué)報(bào);2013年05期
相關(guān)會(huì)議論文 前1條
1 申飛;黃承杰;吳仲城;;生物特征加密技術(shù)現(xiàn)狀與發(fā)展趨勢[A];全國計(jì)算機(jī)安全學(xué)術(shù)交流會(huì)論文集(第二十三卷)[C];2008年
相關(guān)博士學(xué)位論文 前3條
1 黃晶晶;基于無線信道環(huán)境的密鑰生成機(jī)制研究[D];北京郵電大學(xué);2015年
2 陳熙;鑒別生物特征提取及密鑰生成研究[D];西南交通大學(xué);2011年
3 李古月;無線通信物理層安全理論與方法研究[D];東南大學(xué);2017年
相關(guān)碩士學(xué)位論文 前10條
1 蔣登位;基于信道特征提取的密鑰生成研究[D];電子科技大學(xué);2017年
2 劉彥午;基于接收信號(hào)強(qiáng)度后處理的傳感網(wǎng)密鑰生成方法研究[D];西安電子科技大學(xué);2014年
3 陳葉蓉;基于時(shí)延的物理防克隆技術(shù)研究與實(shí)現(xiàn)[D];東南大學(xué);2015年
4 胡惠菊;基于無線信道的物理層密鑰生成技術(shù)[D];南京郵電大學(xué);2016年
5 曹中強(qiáng);基于無線信道特征的密鑰生成方法研究[D];南京郵電大學(xué);2016年
6 楊碩;基于無線信道的物理層密鑰生成與協(xié)商技術(shù)研究[D];南京郵電大學(xué);2017年
7 梁斌;指紋密鑰生成與基于身份的加密方案研究[D];杭州電子科技大學(xué);2015年
8 余訓(xùn)健;無線網(wǎng)絡(luò)密鑰生成的關(guān)鍵技術(shù)研究[D];南京郵電大學(xué);2017年
9 周百鵬;基于無線信道特征提取的密鑰生成技術(shù)研究[D];解放軍信息工程大學(xué);2011年
10 常郝;基于動(dòng)態(tài)手寫簽名的生物特征密鑰生成研究[D];合肥工業(yè)大學(xué);2007年
,本文編號(hào):2458543
本文鏈接:http://sikaile.net/kejilunwen/xinxigongchenglunwen/2458543.html