期刊文献+

均匀散射环境中物理层安全密钥容量分析 被引量:2

Analysis of physical layer secret key capacity in the uniform scattering environment
下载PDF
导出
摘要 物理层安全密钥容量受信道测量时差、终端移动和加性噪声等因素影响,在均匀散射环境中定量分析了上述因素对密钥容量的影响。在分析含噪窄带信道参数的时域统计特性的基础之上,推导了密钥容量时域闭式解,并且分别在均匀散射和非均匀散射环境中验证了推导结果的正确性和适用性。 Physical layer secret key capacity was affected by time difference of channel sounding, mobility of terminals, and additive noise. Effects on the physical layer secret key capacity were quantitatively analyzed in the uniform scattering environment. Based on the time domain statistical characteristics of narrow band wireless channel parameters with noise, a closed-form solution to physical layer secret key capacity in the time domain was derived. Afterwards, simulations in the uniform and non-uniform scattering environment were carried out to demonstrate its validity and applicability, respectively.
出处 《通信学报》 EI CSCD 北大核心 2016年第9期75-81,共7页 Journal on Communications
基金 国家高技术研究发展计划("863"计划)基金资助项目(No.2015AA01A708) 国家自然科学基金资助项目(No.61171108 No.61471396) 中国博士后科学基金资助项目(No.2016M592990)~~
关键词 物理层安全 物理层安全密钥 密钥容量 均匀散射环境 physical layer security physical layer secret key secret key capacity uniform scattering environment
  • 相关文献

参考文献25

  • 1SHEHADEH Y E H, HOGREFE D. A survey on secret key generation mechanisms on the physical layer in wireless networks [J]. Security and Communication Networks, 2015, 8(2): 332-41.
  • 2WANG T, LIU Y, VASILAKOS A V. Survey on channel reciprocity based key establishment techniques for wireless systems [J]. Wireless Networks, 2015, 21(6): 1835-46.
  • 3THAI C D T, LEE J, QUEK T Q. Physical-layer secret key generation with colluding untrusted relays [J]. IEEE Transactions on Wireless Communications, 2016, 15(2): 1517-30.
  • 4CHOU T H, DRAPER S C, SAYEED A M. Key generation using external source excitation: capacity, reliabihty, and secrecy exponent[J]. IEEE Transactions on Information Theory, 2012, 58(4): 2455-74.
  • 5PFENNIG S, FRANZ E, ENGELMANN S, et al. End-to-end key establishment with physical layer key generation and specific attacker models [M]. Physical and Data-Link Security Techniques for Future Communication Systems. Springer, 2016: 93-110.
  • 6PREMNATH S N, JANA S, CROFT J, et al. Secret key extraction from wireless signal strength in real environments [J]. IEEE Transactions on Mobile Computing, 2013, 12(5): 917-30.
  • 7TSOURI G R, WAGNER D M. Threshold constraints on symmetric key extraction from rician fading estimates [J]. IEEE Transactions on Mobile Computing, 2013, 12(12): 2496-506.
  • 8戴峤,宋华伟,金梁,黄开枝.基于等效信道的物理层认证和密钥分发机制[J].中国科学:信息科学,2014,44(12):1580-1592. 被引量:7
  • 9MAURER U M. Secret key agreement by public discussion from common information[J]. IEEE Transactions on Information Theory, 1993, 39(3): 733-42.
  • 10AHLSWEDE R, CSISZ,R I. Common randomness in information theory and cryptography, part I: secret sharing [J]. IEEE Transactions on Information Theory, 1993, 39(4): 1121-32.

二级参考文献41

  • 1钱旭东,何广强,曾贵华.连续变量量子密钥分发协商过程的优化实现[J].中国科学(F辑:信息科学),2009,39(10):1027-1033. 被引量:1
  • 2PENG HC, LONG F, DING C. Feature selection based on mutual information: criteria of max-dependency, max-relevance, and minredundancy [J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2005, 27(8): 1226 - 1238.
  • 3HACINE-GHARBI A, RAVIER P, HARBS R, et al. Low bias histogram-based estimation of mutual information for feature selection [J]. Pattern Recognition Letters, 2012, 33(16): 1302- 1308.
  • 4MOON Y, RAJAGOPALAN B, LALL U. Estimation of mutual information using kernel density estimators [J]. Physical Review E, 1995, 52(3): 2318 - 2321.
  • 5KRASKOV A, STOGBAUER H, GRASSBERGER P. Estimating mutual information [J]. Physical Review E, 2004, 69(6): 066138.
  • 6DARBELLAY G A, VAJDA I. Estimation of the information by an adaptive partitioning of the observation space [J]. IEEE Transactions on Information Theory, 1999,45(4): 1315 -1321.
  • 7DAUB C 0, STEUER R, SELBIG J, et al. Estimating mutual information using B-spline functions - an improved similarity measure for analysing gene expression data [J]. BMC Bioinformatics, 2004, 5(1): 118.
  • 8SUZUKI T, SUGIYAMA M, SESE J, et al. Approximating mutual information by maximum likelihood density ratio estimation [C]I/New Challenges for Feature Selection in Data Mining and Knowledge Discovery, JMLR Workshop and Conference Proceedings. Brookline, USA: Microtome Publishing, 2008, 4: 5 - 20.
  • 9ENDRES D, FOLDIAK P. Bayesian bin distribution inference and mutual information [J]. IEEE Transactions on Information Theory, 2005,51(11): 3766 - 3779.
  • 10SHANNON C E. A mathematical theory of communication [J]. Acm Sigmobile Mobile Computing and Communications Review, 2001, 5(1): 3 - 55.

共引文献34

同被引文献11

引证文献2

二级引证文献23

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部