期刊文献+

基于差分标志字节的无线通信安全策略

Wireless communication security strategy based on differential flag byte
下载PDF
导出
摘要 针对公共密钥密码系统识别模拟攻击的计算复杂度高,而功率时延模型(PDP)又受限于模型必须存在足够距离差的问题,提出一种基于差分标志字节(DFB)的无线通信安全策略,并给出了生成DFB的差分方程。该策略利用用户传输的数据信息,建立适当的差分标致字节的生成方程,使得当前传输的数据帧的标志字节由已传帧的相关参数决定,最后接收端通过阈值判决验证接收数据帧的差分标致字节,识别模拟攻击。通过理论分析,差分标致字节可以防止攻击者利用已掌握的部分通信参数信息,对用户实施反复的模拟攻击。在时间上,攻击者有效攻击时间更短,攻击达成周期更长。在空间上,攻击者空间位置被限制在有限椭圆内。最后,结合一种具体、简易的DFB进行了仿真分析,结果表明,此种简易模型下,通信系统的信噪比(SNR)高于-4 d B时,系统能够通过设置合适的阈值,能够实现针对模拟攻击的识别与防护。 Since the computational complexity of public key cryptography is high, and Power Delay Profile( PDP) model is limited by the distance between the attacker and the user, a wireless communication security strategy based on Differential Flag Byte( DFB) was proposed in the identification and defense of impersonation attack. Meanwhile, the equation to generate the DFB was given. The strategy utilized the transmission data information to generate the DFB equation, establishing the correlation that current flag byte of transmission data frame was determined by the relevant parameter of last frame. Finally,receiving terminal identified attack by testing and verifying the DFB received from the data frame with threshold decision.Through theoretical analysis, DFB could prevent recurrent impersonation attack, when the attacker knew the communicational parameter. Meanwhile, the attacker's effective attack time was shorter, and the attack cycle was longer. And the attacker was limited to a finite ellipse in space. Simulation analysis was carried out with a simple DFB at the end. The results show that wireless communication based on the simple DFB strategy can identify and defense impersonation attack by setting the appropriate threshold, when the communication system's Signal-to-Noise Ratio( SNR) was above- 4 d B.
出处 《计算机应用》 CSCD 北大核心 2016年第1期212-215,242,共5页 journal of Computer Applications
基金 国家自然科学基金资助项目(61401505)~~
关键词 模拟攻击 无线通信安全 点对点协议 阈值判决 攻击识别 impersonation attack wireless communication security Point-to-Point Protocol(PPP) threshold decision attack recognition
  • 相关文献

参考文献11

  • 1WYNER A D. The wire-tap channel [J]. Bell system technical journal, 1975, 54(8): 1355-1387.
  • 2ZHOU X, MCKAY M R. Physical layer security with artificial noise: secrecy capacity and optimal power allocation [C]// ICSPCS 2009: Proceedings of the 3rd International Conference on Signal Processing and Communication Systems. Piscataway, NJ: IEEE, 2009: 1-5.
  • 3YANG Y, LI Q, MA W K, et al. Cooperative secure beam forming for AF relay networks with multiple eavesdroppers [J]. IEEE signal processing letters, 2013, 20(1): 35-38.
  • 4DONG L, HAN Z, PETROPULU A P, et al. Improving wireless physical layer security via cooperating relays [J]. IEEE transactions on signal processing, 2010, 58(3): 1875-1888.
  • 5YILMAZ M H, ARSLAN H. Impersonation attack identification for secure communication [C]// Proceedings of the 2013 IEEE Globecom Workshops. Piscataway, NJ: IEEE, 2013: 1275-1279.
  • 6LAKSHMI B, SANMUGA L B, KARTHIKEYAN R. Detection and prevention of impersonation attack in wireless networks [J]. International journal of advanced research in computer science & technology, 2014, 2(1): 267-270.
  • 7DIFFIE W, HELLMAN M. New directions in cryptography [J]. IEEE transactions on information theory, 1976, 22(6): 644-654.
  • 8REN K, SU H, WANG Q. Secret key generation exploiting channel characteristics in wireless communications [J]. IEEE wireless communications, 2011, 18(4): 6-12.
  • 9SHIMIZU T, IWAI H, SASAOKA H. Physical-layer secret key agreement in two-way wireless relaying systems [J]. IEEE transactions on information forensics and security, 2011, 6(3): 650-660.
  • 10GOEL S, NEGI R. Guaranteeing secrecy using artificial noise [J]. IEEE transactions on wireless communications, 2008, 7(6): 2180-2189.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部