期刊文献+

Analysis and Application of Endogenous Wireless Security Principle for Key Generation 被引量:4

下载PDF
导出
摘要 The open and broadcast nature of wireless channels leads to the inherent security problem of information leakage in wireless communication.We can utilize endogenous security functions to resolve this problem.The fundamental solution is channel-based mechanisms,like physical layer secret keys.Unfortunately,current investigations have not fully exploited the randomness of wireless channels,making secret key rates not high.Consequently,user data can be encrypted by reducing the data rate to match the secret key rate.Based on the analysis of the endogenous wireless security principle,we proposed that the channel-based endogenous secret key rate can nearly match the maximum data rate in the fast-fading environments.After that,we validated the proposition in an instantiation system with multiple phase shift keying(MPSK)inputs from the perspectives of both theoretical analysis and simulation experiments.The results indicate that it is possible to accomplish the onetime pad without decreasing the data rate via channelbased endogenous keys.Besides,we can realize highspeed endogenously secure transmission by introducing independent channels in the domains of frequency,space,or time.The conclusions derived provide a new idea for wireless security and promote the application of the endogenous security theory.
出处 《China Communications》 SCIE CSCD 2021年第4期99-114,共16页 中国通信(英文版)
基金 funded by the National Key R&D Program of China under Grant 2017YFB0801903 the National Natural Science Foundation of China under Grant 61871404,61701538,61521003 Doctoral Fund of Ministry of Education of China under Grant 2019M663994。
  • 相关文献

参考文献5

二级参考文献36

  • 1De la Pe a V,Ibragimov R,Sharakhmetov S.Characteriza-tions of joint distributions,copulas,information,depend-ence and decoupling,with applications to time series. . 2006
  • 2Davy M,Doucet A.Copulas: A new insight into positive time-frequency distributions. IEEE Signal Processing Let-ters . 2003
  • 3Jenison R,Reale R.The shape of neural dependence. Neu-ral Computation . 2004
  • 4Kraskov A,St gbauer H,Grassberger P.Estimating mutual information. Physical Review . 2004
  • 5Shannon CE.A mathematical theory of communication. Bell System Technical Journal, The . 1948
  • 6Cover TM,Thomas JA.Elements of Information Theory. . 1991
  • 7Sklar A.Fonctions de repartition a’n dimensions et leurs marges. . 1959
  • 8Silverman BW.Density estimation for statistics and data analysis. Monographs on Statistics and Applied Probability . 1986
  • 9J Beirlant,E Dudewicz,L Gyorfi,E Meulen.Nonparametric entropy estimation: an overview. Int J Math Stat Sci . 1997
  • 10L Paninski.Estimation of entropy and mutual information. Neural Computation . 2003

共引文献73

同被引文献19

引证文献4

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部