基于信道特征提取的密钥生成研究
[Abstract]:In recent years, the wireless communication technology has been developed rapidly. The openness of the wireless channel makes this communication mode face more serious security threat than the wired communication mode. The security of traditional security scheme is based on the complexity of the algorithm on the one hand, on the other hand, depends on the randomness and confidentiality of the key. In order to enhance the security of the security scheme, the traditional method is to design more complex security algorithms or increase the packet length of the key. However, it increases the complexity of the algorithm execution and is not conducive to the development of wireless communication equipment towards miniaturization. The physical layer security technology breaks through the traditional security solution. It makes use of the natural advantage of the randomness of the physical channel to generate the key, which can not only greatly improve the efficiency of generating the key, but also under the ideal circumstances, It can also approach Shannon's one-time-one-secret security scheme, so as to effectively improve the security performance of the security scheme. Therefore, the physical layer security technology has attracted the attention of scholars both at home and abroad since it was put forward. Among the physical layer security techniques, key generation based on channel characteristics is the most important one. The main contents of this paper are as follows: (1) the existing key generation schemes based on physical channel are analyzed and summarized in detail. In this paper, we find that there are three main defects in the existing schemes: first, when active attackers carry out interference channel attacks, there is no better key generation scheme to resist such attacks; Secondly, there is a lack of optimal feature extraction algorithm for UWB systems. Thirdly, in the phase of key agreement, most of the existing schemes only consider the problem of key consistency, but ignore the initial key leakage problem in the process of key agreement. (2) for the first defect, In this paper, a key generation scheme based on random detection signal is studied. In this scheme, the fixed detection signal in the existing generation scheme is changed into a random detection signal, and then convolution with the channel impulse function to obtain a new feature extraction signal. The key generated by this scheme not only contains the randomness of the channel, but also the randomness of the random signal, so it can resist the channel active interference attack well. (3) in view of the second defect, In this paper, a key generation scheme based on multi-path delay optimization extraction algorithm is proposed. The principle of this algorithm is that the multipath delay received by the receiver is sorted quickly according to the degree of mutual phase, and the k values with the greatest correlation are selected to extract the channel features. The key generation scheme based on this algorithm can greatly improve the consistency of initial security keys, thus greatly reducing the overhead of key agreement. (4) aiming at the third defect, In this paper, a key generation scheme based on confusion and RS code agreement is studied. The principle of this scheme is to obfuscate the key that needs to be transmitted in the negotiation phase, and then use RS code to correct the initial keys at both ends to get a completely consistent key. This scheme not only guarantees the consistency of the keys at both ends, but also reduces the leakage risk of the keys in the process of transmission. (5) in this paper, the scheme combining the above three improved algorithms is studied, and the simulation analysis is given.
【学位授予单位】:电子科技大学
【学位级别】:硕士
【学位授予年份】:2017
【分类号】:TN918.4
【相似文献】
相关期刊论文 前10条
1 徐娟,朱健,黄承明;上海市高速公路联网收费系统的密钥生成方法[J];交通与计算机;2002年04期
2 顾纯祥;王磊;祝跃飞;;无线自组网络上基于身份的密钥生成协议[J];计算机工程;2005年24期
3 夏瑞学;;密钥生成与管理系统[J];山西电子技术;2009年01期
4 常郝;周国祥;;基于书写力与字形信息的生物特征密钥生成[J];计算机应用;2009年08期
5 常郝;周国祥;吴仲城;申飞;;基于生物特征的密钥生成研究[J];计算机应用研究;2007年07期
6 童立,甘嘉州;一种高效的基于令牌的密钥生成方案[J];计算机工程;2002年09期
7 郑飞;安全层次系统及其密钥生成算法[J];通信保密;1991年04期
8 郑飞;安全层次系统及其密钥生成算法[J];计算机工程与设计;1992年01期
9 杨立卓;叶哲江;;子密钥生成算法的改进[J];贵州大学学报(自然科学版);2011年04期
10 易小琳;刘旭辉;;基于时空混沌同步的同步密钥生成算法[J];北京工业大学学报;2013年05期
相关会议论文 前1条
1 申飞;黄承杰;吴仲城;;生物特征加密技术现状与发展趋势[A];全国计算机安全学术交流会论文集(第二十三卷)[C];2008年
相关博士学位论文 前3条
1 黄晶晶;基于无线信道环境的密钥生成机制研究[D];北京邮电大学;2015年
2 陈熙;鉴别生物特征提取及密钥生成研究[D];西南交通大学;2011年
3 李古月;无线通信物理层安全理论与方法研究[D];东南大学;2017年
相关硕士学位论文 前10条
1 蒋登位;基于信道特征提取的密钥生成研究[D];电子科技大学;2017年
2 刘彦午;基于接收信号强度后处理的传感网密钥生成方法研究[D];西安电子科技大学;2014年
3 陈叶蓉;基于时延的物理防克隆技术研究与实现[D];东南大学;2015年
4 胡惠菊;基于无线信道的物理层密钥生成技术[D];南京邮电大学;2016年
5 曹中强;基于无线信道特征的密钥生成方法研究[D];南京邮电大学;2016年
6 杨硕;基于无线信道的物理层密钥生成与协商技术研究[D];南京邮电大学;2017年
7 梁斌;指纹密钥生成与基于身份的加密方案研究[D];杭州电子科技大学;2015年
8 余训健;无线网络密钥生成的关键技术研究[D];南京邮电大学;2017年
9 周百鹏;基于无线信道特征提取的密钥生成技术研究[D];解放军信息工程大学;2011年
10 常郝;基于动态手写签名的生物特征密钥生成研究[D];合肥工业大学;2007年
,本文编号:2458543
本文链接:https://www.wllwen.com/kejilunwen/xinxigongchenglunwen/2458543.html