期刊文献+

一种无线信道密钥容量求解方法

A Solution of the Secret Key Capacity for Wireless Channel
下载PDF
导出
摘要 为了准确求解合法通信双方利用无线信道生成共享密钥的容量,借助于瑞利衰落统计模型和互易性对无线信道进行建模,得到合法双方接收信号的统计分布;通过对统计分布进行雅克比变换分别推导出双方包络的联合分布和相位的联合分布,进而通过互信息公式求解出相应的两个密钥容量表达式。利用窄带信道的互易性,提出了一种发送信号为非相干载波的密钥生成协议,合法双方在相干时间内以时分双工(TDD)方式对无线信道进行多载波探测,双方分别利用接收信号包络、相位信息生成密钥,将两密钥去除相关性后拼接起来作为最终的密钥以用于安全通信。该协议能够同时利用接收信号的包络和相位信息,且密钥容量与非相干载波的个数成正比。仿真结果表明:分别基于信号包络、相位信息生成的密钥存在相关性;仅由包络和相位信息生成密钥并未充分利用信道特性信息,当信噪比为10dB时,利用接收信号包络、相位的密钥容量的数值求和比利用接收信号的密钥容量低0.3b/s。 A model for wireless channel is established to evaluate accurately the capacity of the shared secret key generated by legitimate users in the channel.The building of the model is based on statistical models of Rayleigh fading and reciprocity from the statistical distribution of the received signals.The joint probability density functions of both the envelope and the phase at the legitimate users are respectively derived by using a Jacobi transform.The corresponding expressions of the two secret key capacities are then deduced by using the formula of mutual information.Then a protocol of secret key generation in which the transmitted signals are multicarriers is presented by utilizing the reciprocity of the narrowband channel.The legitimate users implement the multi-carrier channel sounding in TDD mode within the coherence time,and exploit the information of envelope and phase in the received signals to generate secret keys.The keys are spliced together to realize secure communication by removing the correlation between them.The proposed protocol can use information of the envelope and the phase simultaneously,and the capacity of the secret key is proportional to the number of carriers.Simulation results show that correlation exists between the secret keys generated based on information of the envelope and the phase,and that the numerical sum of key capacity that exploits information of the envelope and the phase is lower than that of received signals by 0.3 bit/s when the SNR is 10 dB.It can be concluded that legitimate users can utilize more information in the received signals to generate shared secret key.
出处 《西安交通大学学报》 EI CAS CSCD 北大核心 2014年第6期31-36,共6页 Journal of Xi'an Jiaotong University
基金 国家"863计划"资助项目(2009AA011205 2013AA013603) 国家自然科学基金资助项目(61271253)
关键词 无线信道 密钥生成 密钥容量 相干载波 wireless channel secret key generation secret key capacity coherent carriers
  • 相关文献

参考文献15

  • 1HERSHEY J E, HASSAN A A, YARLAGADDA R. Unconventional cryptographic keying variable management [J]. IEEE Transactions on Communications, 1995, 43(1): 3-6.
  • 2MAURER U. Secret key agreement by public discussion from common information [J]. IEEE Transactions on Information Theory, 1993, 39(3): 733-742.
  • 3SMITH G S. A direct derivation of a single-antenna reciprocity relation for the time domain [J]. IEEE Transactions on Antenna and Propagation, 2004, 52(4): 1568-1577.
  • 4LIU Y, DRAPER S C, SAYEED A M. Exploiting channel diversity in secret key generation from multipath fading randomness [J]. IEEE Transactions on Information Forensics and Security, 2012, 7(5): 1484-1497.
  • 5CHEN Chan, JENSEN M A. Secret key establishment using temporally and spatially correlated wireless channel coefficients [J]. IEEE Transactions on Mobile Computing, 2011, 10(2): 205-215.
  • 6YE Chunxuan, MATHUR S, REZNIK A, et al. Information-theoretically secret key generation for fading wireless channels [J]. IEEE Transactions on Information Forensics and Security, 2010, 5(2): 240-254.
  • 7WANG Qian, XU Kaihe, REN Kui. Cooperative secret key generation from phase estimation in narrowband fading channels [J]. IEEE Journal on Selected Areas in Communications, 2012, 30(9): 1666-1674.
  • 8KHISTI A, DIGGAVI S N, WORNELL G W. Secret-key generation using correlated sources and channels [J]. IEEE Transactions on Information Theory, 2012, 58(6): 652-670.
  • 9NITINAWARAT S, NARAYAN P. Secret key generation for correlated Gaussian sources [J]. IEEE Transactions on Information Theory, 2012, 58(6): 3373-3391.
  • 10CSISZAR I, NARAYAN P. Secrecy generation for multiaccess channel models [J]. IEEE Transactions on Information Theory, 2013, 59(1): 17-31.

二级参考文献22

  • 1MAURER U M. Secret key agreement by public discussion from com- mon information [ J ]. IEEE Trans on Information Theory, 1993,39 (4) :?33-742.
  • 2AONO T, HIGUCHI K, OHIRA T,et al. Wireless secret key generation exploiting reactance-domain scalar response of muhipath fading chan- nels[J]. IEEE Trans on Antennas and propagation,2005,53 ( 11 ) :3776-3784.
  • 3JANA S,PREMNATH S N, CLARK M, et al. On the effectiveness of secret key extraction from wireless signal strength in real environ- ments[ C]//Proc of the 15th ACM Conference on Mobile Computing and Networking. New York : ACM Press ,2009:321-332.
  • 4AZIMI-SADJADI B, KIAYIAS A, MERCADO A,et al. Robust key generation from signal envelopes in wireless networks [ C ]//Proc of the 14th ACM Conference on Computer and Communications Security. New York : ACM Press,2007:401 - 410.
  • 5HAMIDA T S B, PIERROT J B, CASTELLUCCIA C. An adaptive quantization algorithm for secret key generation using radio channel measurements[ C ]//Proc of the 3rd International Conference on New Technologies, Mobility and Security. Piscataway, NJ : IEEE Press, 2009:59-63.
  • 6WILSON R,TSE D, SCHOLTZ R A. Channel identification: secret sharing using reciprocity in UWB channels [ J]. IEEE Trans on In- formation Forensics and Security, 2007,2(3) : 64-375.
  • 7PATWARI N, CROFT J, JANA S. High rate uncorrelated bit extraction for shared secret key generation from channel measurements [ J ]. IEEE Trans on Mobile Computing, 20i0, 9(3) : 17-30.
  • 8KOORAPATY H, HASSAN A A, CHENNAKESHU S. Secure infor- mation transmission for mobile radio [ J ]. IEEE Communications Letters, 2000, 4(2) : 52-55.
  • 9MATHUR S, TRAPPE W, MANDAYAM N, et al. Radio-telepathy: extracting a secret key from an unauthenticated wireless channel [C]// Proc of the 14th ACM International Conference on Mobile Computing and Networking. New York : ACM Press, 2008 : 128-139.
  • 10Di BENEDETTO MG,GIANCOLA G,葛利嘉译.超宽带无线电基础[M].北京:电子工业出版社,2005.

共引文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部