期刊文献+

PHY-CRAM物理层激励响应认证机制的性能分析

Performance Analysis of PHY-CRAM Physical Layer Challenge Response Authentication Mechanism
下载PDF
导出
摘要 物理层认证是利用物理层资源的特性识别通信用户身份,可以有效地阻止非法用户的接入与访问,加强无线网络的信息安全性。PHY-CRAM是最近提出的一种典型的物理层激励响应认证机制,目前其性能主要依赖于仿真。尝试对其认证性能进行理论分析,推导了成功认证概率和错误接收概率的解析表达式。推导结果表明:PHY-CRAM认证准则中的相关系数服从莱斯分布,成功认证概率和错误接收概率均可用Marcum Q函数来计算。进一步的计算机仿真结果显示:相关系数的概率密度曲线与莱斯分布的概率密度曲线相吻合,且认证使用的密钥越长,吻合性越好;接收操作特性(ROC)曲线的理论值和统计值是一致的。 The physical layer authentication recognizes the identities of communication users by exploiting the characteristics of physical layer resources,which can effectively prevent illegal users from accessing the wireless network in order to enhance the information security of wireless network.PHY-CRAM proposed recently is a typical physical layer challenge response authentication mechanism,and its performance mainly depends on the simulation.So this paper attempted to theoretically analyze the authentication performance and derived the analytical expressions of successful authentication rate and false acceptance rate.The derived results show that the correlation coefficient of PHY-CRAM authentication standards obeys Rice distribution,and successful authentication rate and false acceptance rate can be calculated by Marcum Q function.The computer simulation results show that the probability density curve of correlation coefficient is coincident with that of Rice distribution,and the longer the secret key is,the better the fitness is.The theory value of receiver operating characteristic curve is identical with the statistical value.
出处 《计算机科学》 CSCD 北大核心 2016年第2期188-191,223,共5页 Computer Science
基金 国家自然科学基金项目(61372123)资助
关键词 激励响应认证 OFDM技术 接收操作特性曲线 理论分析 Challenge response authentication OFDM technology Receiver operating characteristic curve Theoretical analysis
  • 相关文献

参考文献5

二级参考文献66

  • 1钱旭东,何广强,曾贵华.连续变量量子密钥分发协商过程的优化实现[J].中国科学(F辑:信息科学),2009,39(10):1027-1033. 被引量:1
  • 2Parkvall Stefan, Astely David. The evolution of LTE towards IMT-Advanced. Journal of Communications, 2009, 4(3) : 146-154.
  • 3Wyner A D. The wire-tap channel. Bell Systems Technical Journal, 1975, 54(8):1355-1387.
  • 4Oohama Y. Capacity theorems for relay channels with confi- dential messages//Proceedings of the IEEE International Symposium on Information Theory. Nice, France, 2007:926-930.
  • 5He X, Yener A. Cooperation with an untrusted relay: Asecrecy perspective. IEEE Transactions on Information The- ory, 2010, 56(8): 3807-3827.
  • 6Zhang R, Song L, Han Z et al. Physical layer security for two way relay communications with friendly jammers//Pro- ceedings of the IEEE Global Telecommunications Confer- ence. Miami, USA, 2010:1-6.
  • 7He X, Yener A. Two-hop secure communication using an untrusted relay: A case for cooperative jamming//Proeeed- ings of the IEEE Global Telecommunications Conference. Los Angeles, USA, 200:1-5.
  • 8Zheng G, Choo G, Wong K. Optimal cooperative jamming to enhance physical layer security using relays. IEEE Transac- tions on Signal Processing, 2011, 59(3): 1317-1322.
  • 9Ekrem E, Ulukus E. Secrecy in cooperative relay broadcast channels. IEEE Transactions on Information Theory, 2011, 57(1) : 137-155.
  • 10Milosavljevic N, Gastpar M, Ramchandran K. Secure com- munication using an untrusted relay via sources and chan- nels//Proceedings of the IEEE International Symposium on Information Theory. Seoul, Korea, 2009: 2457-2461.

共引文献31

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部