期刊文献+

一种基于非协调性跳频通信的高效密钥协商方法

An Efficient Method for Secret Key Establishmentbased on Uncoordinated Frequency-Hopping
下载PDF
导出
摘要 针对于传统跳频通信必需提前共享密钥的问题,本文提出一种高效安全的密钥协商方法,使得没有提前共享密钥的通信双方能够高效安全地建立一个跳频密钥,从而将半封闭式抗干扰通信完善为全封闭式抗干扰通信。该方法将非协调性跳频通信UFH与基于身份的密钥协商协议相结合,既保证了密钥协商过程的抗干扰性,又保证了其高效性。通过理论分析和仿真实验,较之D-H密钥协商协议,本文提出的协商方法将数据包传输量降低了90%,极大地提高了基于UFH通信模式的密钥协商效率。 In conventional frequency hopping communication, the secret key must he shared between the parties prior to their com- munication. This paper proposes an efficient and secure method of key establishment that enables communicating parties to efficiently and safely establish a frequency-hopping key, without a pre-shared key, thus the semi-closed anti-jamming communication is im- proved to fillly-enclosed anti-jamming communication. In this method, the UFH ( uncoordinated frequency hopping) is combined with lhe identity-based key establishment protocol, thus to ensure the key establishment an anti-jamming and efficient process.Theoretical analysis and simulation imlicates that the proposed method could reduce the number of being-transmitted packets by 90% as compared with the D-H key establishment protocol, and gre, atly improve the efficiency of key establishment based on UFH communication mode.
出处 《信息安全与通信保密》 2016年第3期93-97,102,共6页 Information Security and Communications Privacy
基金 国家自然科学基金资助项目(No.61371192)
关键词 非协调性跳频通信 预处理 hash链路 基于身份的密钥协商 全封闭式抗干扰 uncoordinated frequency-hopping communieafion pre-processing hash-link identity-based key establishment fully -enelosed anti-jamming communication
  • 相关文献

参考文献12

  • 1I,I C, DAI H. Connectivity of Multi-Channel Wireless Networks under Jamming Attacks[ C ]// Global Communic alions Confer- ence (GLOBECOM), 2013 IEEE. IEEE,2013:706-711.
  • 2CHEN G, LI Y, XIAO L, el al. Collaborative Anti-Januning Broadcast with Uncoordinated Frequency Hopping over USRP [C]// Vehicular Technology Conference (VTC Spring), 2015 IEEE 81st. IEEE, 2015.
  • 3S|rasser M, Piipper C, Capkun S. Efficient Uncoordinated FH- SS Anti-Jamming Communication [ C ]//Proceedings of lhe Tenth ACM International Symposium on Mobile Ad Hoc Net- working and Computing. ACM. 2009: 207-218.
  • 4Strasser M, Capkun S, Capkun S, et al. Jamming-Resistant Key Eslablishment using Uncoordinated Frequency Hopping [ C ]//Securily and Privacy, 2008. SP 2008. IEEE Symposium on. 1EEE, 2008: 64-78.
  • 5Slater D,Tague P, Poovendran R, et al. A Coding-Theoretic Approach tot Efficient Message Verification over Insecure Channels[ C ]//Proceedings of the second ACM conference on Wireless Network Securitv. ACM, 2009: 151-160.
  • 6Chong Z K, Bok-Min GO l,Ohsaki H, et al. Stepping-Ran- dom Code: a Raleless Erasure Code for Short-l~ength Messa- ges[ J]. IEICE TransaClions on Communications, 2013, 96 (7): 1764-1771.
  • 7LIU A,NING P, DAI H, et al. USD-FH: Jamming-Resistant Wireless Communication using Frequency Hopping with Unco- ordinated Seed Disclosure [ C ]//Mobile Adhoc and Sensor Sys- tems (MASS), 2010 IEEE 7th lnlernalional Conference on. IEEE, 2010: 41-50.
  • 8XIAO I,, DAI H, NING P. Jamming-Resistant ColIaborative Broadcast using Uncoc~rdinated Frequency Hopping[ J ]. Infor- mation Forensics and Security, IEEE Transactions on, 2012, 7(1): 297-309.
  • 9Popper C, Strasser M, Capkan S. Anti-Jamming Broadcast Conmmnication using Un(,oordinated Spread Spectrum Tech- niques[J]. Selected Areas in Communications, 1EEE Journal on. 2010. 28(5): 703-715.
  • 10Dan B, Franklin M. htentity-based Encryption fi'om the Weil Pairing[ J]. Siam Journal on Computing, 2003, 32(3) :213- 229.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部