期刊文献+

基于物理层信道特征的无线网络认证机制 被引量:3

Wireless Network Authentication Method Based on Physical Layer Channel Characteristics
下载PDF
导出
摘要 在轻量级物联网中,针对传统认证方式存在的高能耗、高时延等问题,文中提出一种基于物理层信道特征的无线网络认证机制。该方案利用信道冲激频率响应(Channel Impulse Response,CIR)进行身份认证,并将其作为初始消息认证码(Message Authentication Code,MAC)进行消息认证;采用“哈希链”迭代的方式生成标签信号,进而实现MAC的更新,提高通信双方对数据包调换、篡改等攻击行为的敏感度;将身份认证与消息认证、标签信号与数据包紧密结合,适用于工业物联网、智能家居等安全要求高、设备资源有限的通信环境。安全性分析与仿真结果表明,与HMAC(Hash-based Message Authentication Code)、祖冲之完整性算法(EIA3)等相比,该方案的认证时延较短,具有一定的实用性。 In lightweight Internet of Things(IoT),the traditional authentication method has problems such as high energy consumption and high delay.Therefore,this paper proposed a wireless network authentication mechanism based on physical layer channel characteristics.The channel impulse frequency response(CIR)is used for identity authentication,and it is used as the initial message authentication code(MAC)for message authentication.It uses“Hash chain”to generate tag signals,so as to realize MAC updating and improve the sensitivity of packet exchange,tampering and other attacks.This method combines identity authentication with message authentication,tag signal and communication information,and is suitable for the communication environment with high security requirements and limited equipment resources,such as industrial Internet of Things and smart home.The security analysis and simulation results show that compared with HMAC,EIA3 and other algorithms,the authentication delay of this scheme is small and it has certain practicability.
作者 李兆斌 崔钊 魏占祯 赵洪 郭超 LI Zhao-bin;CUI Zhao;WEI Zhan-zhen;ZHAO Hong;GUO Chao(Beijing Electronic Science and Technology Institute,Beijing 100070,China)
出处 《计算机科学》 CSCD 北大核心 2020年第12期267-272,共6页 Computer Science
基金 国家重点研发计划项目(2017YFB0802705,2017YFGX110123) 中央高校基本科研业务费项目(328201911)。
关键词 物理层信道特征 消息认证码 标签信号 身份认证 消息认证 Physical layer channel characteristics Message authentication code Label signal Identification Message authentication
  • 相关文献

参考文献10

二级参考文献89

  • 1邱慧敏.Sybil攻击原理和防御措施[J].计算机安全,2005(10):63-65. 被引量:6
  • 2[1]Giannakis G B. Filterbanks for blind channel identification and equalization [J]. IEEE Trans Signal Processing Lett, 1997,4 (6) : 184-187.
  • 3[2]Heath R W, Giannakis G B. Exploiting input cyclostationarity for blind channel identification in OFDM system [J]. IEEE Trans Signal Processing, 1999,47(3) :848-856.
  • 4[4]Muquet B, Courville M D, Duhamel P. Subspacebased blind and semi-blind channel estimation for OFDM systems [J]. IEEE Trans Signal Processing,2002,50(7): 1699- 1712.
  • 5[5]Scaglione A, Giannakis G B, Barbarossa B. Redundant filterbank procoders and equalizers. Part Ⅱ.Blind channel estimation, synchronization, and direct equalization [J]. IEEE Trans Signal Processing,1999, 47(7) :2007-2022.
  • 6[6]Moulines E, Duhamel P, Cardoso J F, et al. Subspace methods for the blind identification of multichannel FIR filters [J]. IEEE Trans Signal Processing,1995, 43(12) :516-525.
  • 7JessGarms DanielSomerfield.Professional JAVA Security[M].北京:电子工业出版社,2002..
  • 8MohanAtreya 等.数字签名[M].北京:清华大学出版社,2003..
  • 9杨明 谢希仁.密码编码学与网络安全,原理与实践(第二版)[M].北京:电子工业出版社,2001..
  • 10AndrewNash WillianDuane etal.PKI:Implementing and Managing E-Security[M].北京:清华大学出版社,2002..

共引文献132

同被引文献16

引证文献3

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部