期刊文献+

物理层认证PHY-PCRAS应用于OFDM传输的性能分析 被引量:1

Performance Analysis of Physical Layer Challenge-response Authentication with OFDM Transmission
下载PDF
导出
摘要 物理层认证是在无线物理层对通信用户身份的识别,与网络上层安全协议相结合进一步加强无线网络的安全性。文中基于物理层相位激励-响应认证方案(PHY-PCRAS),研究无线正交频分复用(OFDM)传输系统中,子信道频域相关性对认证性能的影响。针对3GPP标准中的典型Urban信道模型,采用随机时延推导OFDM子信道频域的相关性,并进行了仿真验证。仿真结果表明,子信道频域的相关性随着子信道间距的增大呈指数趋势减小,且相关性越小,PHY-PCRAS认证性能越好。文中还将PHY-PCRAS和另一种激励响应型物理层认证机制(PHY-CRAM)进行了对比,结果表明:即使子信道相关,PHY-PCRAS仍然接近理想的效果,比PHY-CRAM算法具有更好的认证性能。 The physical- layer authentication recognizes the identities of communication users in the wireless physical layer,and it combines the network upper security protocols to further strengthen the security of wireless networks. Based on physical layer challenge- response authentication scheme( PHY- PCRAS),the influence of sub- channels frequency domain correlation with wireless OFDM transmission on the authentication performance was studied. For the 3GPP typical Urban channel model,the random delay was adopted to deduce the correlation of OFDM frequency domain sub- channels,and verified it through the simulation. The simulation results showthat the frequency domain sub- channels correlation decreases exponentially with the increasing of sub- channel space,and the smaller the correlation is,the better the authentication performance of PHY- PCRAS is. Compared PHY- PCRAS with another physical layer challenge- response authentication mechanism( PHY- CRAM),the simulation results showthat even if sub- channels are related,PHY-PCRAS is still close to the ideal performance,better than the PHY- CRAM algorithm.
出处 《计算机技术与发展》 2016年第1期137-141,共5页 Computer Technology and Development
基金 国家自然科学基金资助项目(61372123)
关键词 激励-响应认证 OFDM技术 频域相关性 认证性能分析 challenge-response authentication OFDM technology frequency domain correlation authentication performance analysis
  • 相关文献

参考文献14

  • 1Koorapaty H, Hassan A, Chennakesbu S. Secure information transmission for mobile radio [ J ]. IEEE Communication Let- ters,2000,4(2) :52-55.
  • 2Xiao L, Greenstein L, Mandayam N, et al. Using the physical layer for wireless authentication in time-variant channels[ J]. IEEE Trans on Wireless Communication, 2008,7 (7) : 2571 - 2579.
  • 3林通,黄开枝,罗文宇.一种基于多载波的多播系统物理层安全方案[J].电子与信息学报,2013,35(6):1338-1343. 被引量:10
  • 4Yu P L,Baras J S, Sadler B M. Physical-layer authentication [ J]. IEEE Trans on Information Forensics and Security,2008, 3(1) :38-51.
  • 5Zeng K, Govindan K, Mohapatra P. Non-cryptographic authen- tication and identification in wireless networks [ J ]. IEEE Wireless Communlcation,2010,17 (5) :56-62.
  • 6李翔宇,金梁,黄开枝,吉江.基于联合信道特征的中继物理层安全传输机制[J].计算机学报,2012,35(7):1399-1406. 被引量:5
  • 7Liu Yao, Ning Peng. Enhanced wireless channel authentication using time- synched link signature [ C ]//Proceedings of IEEE. Orlando,FL:IEEE,2012:2636-2640.
  • 8戴峤,宋华伟,金梁,黄开枝.基于等效信道的物理层认证和密钥分发机制[J].中国科学:信息科学,2014,44(12):1580-1592. 被引量:7
  • 9Tugnait J K. Wireless user authentication via comparison of power spectral densities [ J ~. IEEE Journal of Selected Areas in Communication ,2013,31 (9) : 1791-1802.
  • 10Shan D, Zeng K, Xiang W, et al. PHY- CRAM : physical layer challenge-response authentication mechanism for wireless net- works [ J ]. IEEE Journal of Selected Areas in Communication, 2013,31 (9) : 1817-1827.

二级参考文献56

  • 1钱旭东,何广强,曾贵华.连续变量量子密钥分发协商过程的优化实现[J].中国科学(F辑:信息科学),2009,39(10):1027-1033. 被引量:1
  • 2Parkvall Stefan, Astely David. The evolution of LTE towards IMT-Advanced. Journal of Communications, 2009, 4(3) : 146-154.
  • 3Wyner A D. The wire-tap channel. Bell Systems Technical Journal, 1975, 54(8):1355-1387.
  • 4Oohama Y. Capacity theorems for relay channels with confi- dential messages//Proceedings of the IEEE International Symposium on Information Theory. Nice, France, 2007:926-930.
  • 5He X, Yener A. Cooperation with an untrusted relay: Asecrecy perspective. IEEE Transactions on Information The- ory, 2010, 56(8): 3807-3827.
  • 6Zhang R, Song L, Han Z et al. Physical layer security for two way relay communications with friendly jammers//Pro- ceedings of the IEEE Global Telecommunications Confer- ence. Miami, USA, 2010:1-6.
  • 7He X, Yener A. Two-hop secure communication using an untrusted relay: A case for cooperative jamming//Proeeed- ings of the IEEE Global Telecommunications Conference. Los Angeles, USA, 200:1-5.
  • 8Zheng G, Choo G, Wong K. Optimal cooperative jamming to enhance physical layer security using relays. IEEE Transac- tions on Signal Processing, 2011, 59(3): 1317-1322.
  • 9Ekrem E, Ulukus E. Secrecy in cooperative relay broadcast channels. IEEE Transactions on Information Theory, 2011, 57(1) : 137-155.
  • 10Milosavljevic N, Gastpar M, Ramchandran K. Secure com- munication using an untrusted relay via sources and chan- nels//Proceedings of the IEEE International Symposium on Information Theory. Seoul, Korea, 2009: 2457-2461.

共引文献31

同被引文献13

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部