基于信道特征提取的密鑰生成研究
[Abstract]:In recent years, the wireless communication technology has been developed rapidly. The openness of the wireless channel makes this communication mode face more serious security threat than the wired communication mode. The security of traditional security scheme is based on the complexity of the algorithm on the one hand, on the other hand, depends on the randomness and confidentiality of the key. In order to enhance the security of the security scheme, the traditional method is to design more complex security algorithms or increase the packet length of the key. However, it increases the complexity of the algorithm execution and is not conducive to the development of wireless communication equipment towards miniaturization. The physical layer security technology breaks through the traditional security solution. It makes use of the natural advantage of the randomness of the physical channel to generate the key, which can not only greatly improve the efficiency of generating the key, but also under the ideal circumstances, It can also approach Shannon's one-time-one-secret security scheme, so as to effectively improve the security performance of the security scheme. Therefore, the physical layer security technology has attracted the attention of scholars both at home and abroad since it was put forward. Among the physical layer security techniques, key generation based on channel characteristics is the most important one. The main contents of this paper are as follows: (1) the existing key generation schemes based on physical channel are analyzed and summarized in detail. In this paper, we find that there are three main defects in the existing schemes: first, when active attackers carry out interference channel attacks, there is no better key generation scheme to resist such attacks; Secondly, there is a lack of optimal feature extraction algorithm for UWB systems. Thirdly, in the phase of key agreement, most of the existing schemes only consider the problem of key consistency, but ignore the initial key leakage problem in the process of key agreement. (2) for the first defect, In this paper, a key generation scheme based on random detection signal is studied. In this scheme, the fixed detection signal in the existing generation scheme is changed into a random detection signal, and then convolution with the channel impulse function to obtain a new feature extraction signal. The key generated by this scheme not only contains the randomness of the channel, but also the randomness of the random signal, so it can resist the channel active interference attack well. (3) in view of the second defect, In this paper, a key generation scheme based on multi-path delay optimization extraction algorithm is proposed. The principle of this algorithm is that the multipath delay received by the receiver is sorted quickly according to the degree of mutual phase, and the k values with the greatest correlation are selected to extract the channel features. The key generation scheme based on this algorithm can greatly improve the consistency of initial security keys, thus greatly reducing the overhead of key agreement. (4) aiming at the third defect, In this paper, a key generation scheme based on confusion and RS code agreement is studied. The principle of this scheme is to obfuscate the key that needs to be transmitted in the negotiation phase, and then use RS code to correct the initial keys at both ends to get a completely consistent key. This scheme not only guarantees the consistency of the keys at both ends, but also reduces the leakage risk of the keys in the process of transmission. (5) in this paper, the scheme combining the above three improved algorithms is studied, and the simulation analysis is given.
【學位授予單位】:電子科技大學
【學位級別】:碩士
【學位授予年份】:2017
【分類號】:TN918.4
【相似文獻】
相關期刊論文 前10條
1 徐娟,朱健,黃承明;上海市高速公路聯(lián)網(wǎng)收費系統(tǒng)的密鑰生成方法[J];交通與計算機;2002年04期
2 顧純祥;王磊;祝躍飛;;無線自組網(wǎng)絡上基于身份的密鑰生成協(xié)議[J];計算機工程;2005年24期
3 夏瑞學;;密鑰生成與管理系統(tǒng)[J];山西電子技術;2009年01期
4 常郝;周國祥;;基于書寫力與字形信息的生物特征密鑰生成[J];計算機應用;2009年08期
5 常郝;周國祥;吳仲城;申飛;;基于生物特征的密鑰生成研究[J];計算機應用研究;2007年07期
6 童立,甘嘉州;一種高效的基于令牌的密鑰生成方案[J];計算機工程;2002年09期
7 鄭飛;安全層次系統(tǒng)及其密鑰生成算法[J];通信保密;1991年04期
8 鄭飛;安全層次系統(tǒng)及其密鑰生成算法[J];計算機工程與設計;1992年01期
9 楊立卓;葉哲江;;子密鑰生成算法的改進[J];貴州大學學報(自然科學版);2011年04期
10 易小琳;劉旭輝;;基于時空混沌同步的同步密鑰生成算法[J];北京工業(yè)大學學報;2013年05期
相關會議論文 前1條
1 申飛;黃承杰;吳仲城;;生物特征加密技術現(xiàn)狀與發(fā)展趨勢[A];全國計算機安全學術交流會論文集(第二十三卷)[C];2008年
相關博士學位論文 前3條
1 黃晶晶;基于無線信道環(huán)境的密鑰生成機制研究[D];北京郵電大學;2015年
2 陳熙;鑒別生物特征提取及密鑰生成研究[D];西南交通大學;2011年
3 李古月;無線通信物理層安全理論與方法研究[D];東南大學;2017年
相關碩士學位論文 前10條
1 蔣登位;基于信道特征提取的密鑰生成研究[D];電子科技大學;2017年
2 劉彥午;基于接收信號強度后處理的傳感網(wǎng)密鑰生成方法研究[D];西安電子科技大學;2014年
3 陳葉蓉;基于時延的物理防克隆技術研究與實現(xiàn)[D];東南大學;2015年
4 胡惠菊;基于無線信道的物理層密鑰生成技術[D];南京郵電大學;2016年
5 曹中強;基于無線信道特征的密鑰生成方法研究[D];南京郵電大學;2016年
6 楊碩;基于無線信道的物理層密鑰生成與協(xié)商技術研究[D];南京郵電大學;2017年
7 梁斌;指紋密鑰生成與基于身份的加密方案研究[D];杭州電子科技大學;2015年
8 余訓健;無線網(wǎng)絡密鑰生成的關鍵技術研究[D];南京郵電大學;2017年
9 周百鵬;基于無線信道特征提取的密鑰生成技術研究[D];解放軍信息工程大學;2011年
10 常郝;基于動態(tài)手寫簽名的生物特征密鑰生成研究[D];合肥工業(yè)大學;2007年
,本文編號:2458543
本文鏈接:http://sikaile.net/kejilunwen/xinxigongchenglunwen/2458543.html