期刊文献+

密钥生成中Karhunen-Loève变换的敏感性分析 被引量:1

Analysis of the Sensitivity of Karhunen-Loève Transform in the Secret Key Establishment
下载PDF
导出
摘要 在基于信道特征的密钥生成方案中,用作随机信源的信道特征序列样值之间往往存在着相关性,这会使得最终提取的密钥强度较弱。为了提高生成密钥的强度,相关论文[4-5]引入Karhunen-Loève(K-L)变换对信道特征序列进行去相关处理。然而,通过大量仿真实验,我们发现K-L变换在其实现过程中存在敏感性问题,即通信两端独立地实现K-L变换而不通过公开信道交互协商信息时,两端生成密钥的不一致率非常高。针对这一问题,本文提出利用格型白化滤波器代替K-L变换实现去相关处理。仿真结果表明,采用格型白化滤波器用于去相关处理时无需通过公开信道交换任何信息。 In the secret key establishment using channel characteristics,elements of the measured channel vector are always correlated,which will result in low entropy of the extracted key. Relevant researches has employed Karhunen-Loève transform to decorrelate the measured channel vector in order to furtherly generate secret key with a higher entropy. However,through extensive simulations,we find that the implementation of Karhunen-Loève transform is very sensitive. When Karhunen-Loève transform is independently implemented at two communicating nodes,the bit disagreement ratio of the generated key at two nodes is unusually high. In this paper,we propose to apply lattice whitening filter to do decorrelation instead of Karhunen-Loève transform. Simulation results shows that the decorrelation process with lattice whitening filter can be independently implemented at two nodes without transmission of any information through the public channel.
出处 《信号处理》 CSCD 北大核心 2015年第9期1124-1130,共7页 Journal of Signal Processing
基金 国家自然科学基金(61372123)
关键词 密钥生成 K-L变换 格型白化滤波器 secret key generation Karhunen-Loève transform lattice whitening filter
  • 相关文献

参考文献14

  • 1Ye C, Reznik A, Shah Y. Extracting secrecy from jointly Gaussian random variables[ C]//2006 IEEE International Symposium on Information Theory, Seattle, July 2006: 2593 -2597.
  • 2Ye C, Mathur S, Reznik A, et al. Information-Theoreti- cally secret key generation for fading wireless channels [ J ]. IEEE Transactions on Information Forensics and Se- curity, 2010, 5(2): 240-254.
  • 3Premnath S N, Jana S, Croft J, et al. Secret key extrac- tion from wireless signal strength in real environments [ J]. IEEE Transactions on Mobile Computing, 2013, 12 (5) :917-930.
  • 4Patwari N, Croft J, Jana S. High-rate uncorrelated bit extraction for shared secret key generation from channel measurements[ J]. IEEE Transactions on Mobile Compu- ting, 2009, 9( 1 ) : 17-30.
  • 5Chen C, Jensen A M. Secret key establishment using tem- porally and spatially correlated wireless channel coeffi- cients [ J ]. IEEE Transaction on Mobile Computing, 2011,10(2) : 205-215.
  • 6蔡文炳,张水莲,辛刚,于大鹏.密钥生成系统中的双门限量化算法研究[J].信号处理,2013,29(6):782-787. 被引量:7
  • 7Durgin G D. Space-Time wireless channels [ M]. Prentic Hall PTR, 2002.
  • 8Rappaport T S. Wireless communications: Principles and Practice[ M]. Prentic Hall PTR, 2001.
  • 9Zheng Y R, Xiao C. Simulation models with correct statis- tical properties for rayleigh fading channels [ J ]. IEEE Transactions on Communications. 2003, 51 (6) : 920-928.
  • 10Haykin S. McMern fliers[ M]. Macmillan, New York, 1989.

二级参考文献13

  • 1Aono T, Higuchi K, Ohira T, Komiyama B, Sasaoka H. Wireless secret key generation exploiting reactance do- main scalar response of multipath fading channels [ J ]. IEEE Transactions on Antennas and Propagation, 2005, 53( 11 ) :3776-3784.
  • 2Wilson R, Tse D, Scholtz R A. Channel identification: Secret sharing using reciprocity in UWB channels [ J ]. IEEE Transactions on Information Forensics and Security, 2007, 2(3) :364-375.
  • 3Maurer U. Secret key agreement by public discussion from common information [ J ]. IEEE Transactions on Informa- tion Theory, 1993, 39 (3) :733-742.
  • 4Brassard G, Salvail L. Secret-key reconciliation by public discussion [ J ]. Advances in Cryptology-Eurocrypt, 1994, 410-423.
  • 5Butter W T. Fast efficient error reconciliation for quantum cryptography[J]. Phys. Rev. A, 2003, 67(5):3-28.
  • 6Ye C, Reznik A, Shah Y. Extracting Secrecy from Jointly Gaussian Random Variables [ C ]. International Symposium on Information Theory, Seattle, USA, 2006:2593-2597.
  • 7Max J. Quantizing for Mimimum Distortion [ J]. IRE Transactions on Information Theory, 1960, 6( 1 ) :7-12.
  • 8Hamida S,Pierrot J,Castelluccia C. An Adaptive Quanti- zation Algorithm for Secret Key Generation using Radio Channel Measurements [ C ] Proec.edings of 3'I IEEE ln- ternatinnal Conterence on New technologies, Mobility and Security, Cairo, Egypt, 2009 : 1-5.
  • 9Chan Chen, Jensen M. Secrel Key Establishment Using Temporally and Spatially Correlated Wireless Channel Co- efficiems[ J]. IEEE Transactions oll Mobile Computing, 2011:10(2) :205-215.
  • 10Patwari N,Croft J,Jana S, Kasera S K. High Rate Uncor- related Bit Extraction for Shared Secret Key Genera/ion from Channel Measurements[ J ]. IEEE Transactions on Mobile Computing,2010,9( 1 ) : 17-30.

共引文献6

同被引文献3

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部