[1]李古月,胡爱群.基于K-L变换的无线信道密钥提取方法[J].东南大学学报(自然科学版),2017,47(2):203-208.[doi:10.3969/j.issn.1001-0505.2017.02.001]
 Li Guyue,Hu Aiqun.Secret key extraction algorithm for wireless channel based on K-L transform[J].Journal of Southeast University (Natural Science Edition),2017,47(2):203-208.[doi:10.3969/j.issn.1001-0505.2017.02.001]
点击复制

基于K-L变换的无线信道密钥提取方法()
分享到:

《东南大学学报(自然科学版)》[ISSN:1001-0505/CN:32-1178/N]

卷:
47
期数:
2017年第2期
页码:
203-208
栏目:
信息与通信工程
出版日期:
2017-03-20

文章信息/Info

Title:
Secret key extraction algorithm for wireless channel based on K-L transform
作者:
李古月胡爱群
东南大学信息科学与工程学院, 南京 210096
Author(s):
Li Guyue Hu Aiqun
School of Information Science and Engineering, Southeast University, Nanjing 210096, China
关键词:
密钥生成 物理层安全 K-L变换 相关系数 特征向量
Keywords:
secret key generation physical layer security K-L transform correlation coefficient eigenvector
分类号:
TN918.82
DOI:
10.3969/j.issn.1001-0505.2017.02.001
摘要:
为了解决基于无线信道特征的密钥生成方案中信道特征测量值不互易且高度冗余的问题, 提出了一种基于K-L变换的无线信道密钥提取方法.首先,将K-L变换划分为信号分组、变换矩阵计算和信号变换3个部分,并对各个部分进行数学建模,分别阐明了有交互和无交互2种K-L变换的特点.然后,计算了交互协方差矩阵或变换矩阵引起的信息泄露率,并分析了2种变换的计算复杂度.结果表明,有交互的K-L变换可以提高密钥的一致性,降低计算复杂度,泄露信息足以忽略,更加适用于无线信道密钥生成.
Abstract:
To solve the problem of non-reciprocity and high redundancy of channel characteristic measurements in secret key generation algorithm based on wireless channel characteristics, a secret key extraction approach based on K-L transform is proposed. First, the K-L transform is divided into three parts including signal partition, transform matrix calculation, and signal transform. The corresponding mathematical model of each step is established. The characteristics of two K-L transforms with and without interaction are clarified, respectively. Then, the information leakage rate caused by covariance or transform matrix interaction is calculated, and the computational complexities of these two transforms are analyzed. The results show that the K-L transform with interaction can enhance key agreement, reduce computational complexity and lead to negligibly small information leakage, making it more applicable for secret key generation from wireless channel.

参考文献/References:

[1] Diffie W, Hellman M. New directions in cryptography[J]. IEEE Transactions on Information Theory, 1976, 22(6): 644-654. DOI:10.1109/tit.1976.1055638.
[2] Bloch M, Barros J, Rodrigues M R D, et al. Wireless information-theoretic security [J]. IEEE Transactions on Information Theory, 2008, 54(6): 2515-2534. DOI:10.1109/tit.2008.921908.
[3] 李古月, 胡爱群, 石乐. 无线信道的密钥生成方法[J]. 密码学报, 2014,1(3): 211-224. DOI:10.13868/j.cnki.jcr.000020.
Li Guyue, Hu Aiqun, Shi Le. Secret key extraction in wireless channel [J]. Journal of Cryptologic Research, 2014, 1(3): 211-224. DOI:10.13868/j.cnki.jcr.000020. (in Chinese)
[4] Zenger C T, Zimmer J, Pietersz M, et al. Exploiting the physical environment for securing the Internet of things [C]//Proceedings of the ACM New Security Paradigms Workshop. Enschede, the Netherlands, 2015: 44-58. DOI:10.1145/2841113.2841117.
[5] Gopinath S, Guillaume R, Duplys P, et al. Reciprocity enhancement and decorrelation schemes for PHY-based key generation [C]//2014 IEEE Globecom Workshops. Austin, TX,USA, 2014: 1367-1372. DOI:10.1109/glocomw.2014.7063624.
[6] Mathur S, Reznik A, Ye C, et al. Exploiting the physical layer for enhanced security: Security and privacy in emerging wireless networks [J]. IEEE Wireless Communications, 2010, 17(5):63-70. DOI:10.1109/mwc.2010.5601960.
[7] Zeng K, Wu D, Chan A, et al. Exploiting multiple-antenna diversity for shared secret key generation in wireless networks [C]//IEEE 29th Conference on Computer Communications. San Diego, CA,USA, 2010: 1-9. DOI:10.1109/infcom.2010.5462004.
[8] Wallace J W, Sharma R K. Automatic secret keys from reciprocal MIMO wireless channels: Measurement and analysis [J]. IEEE Transactions on Information Forensics and Security, 2010, 5(3): 381-392. DOI:10.1109/tifs.2010.2052253.
[9] Liu H, Wang Y, Yang J, et al. Fast and practical secret key extraction by exploiting channel response [C]//IEEE 32th Conference on Computer Communications. Turin,Italy, 2013: 3048-3056.DOI:10.1109/infcom.2013.6567117.
[10] Patwari N, Croft J, Jana S, et al. High-rate uncorrelated bit extraction for shared secret key generation from channel measurements [J]. IEEE Transactions on Mobile Computing, 2010, 9(1): 17-30. DOI:10.1109/tmc.2009.88.
[11] Li G, Hu A, Zou Y, et al. A novel transform for secret key generation in time-varying TDD channel under hardware fingerprint deviation [C]//IEEE 82nd Vehicular Technology Conference. Boston, MA,USA, 2015: 1-5. DOI:10.1109/vtcfall.2015.7390807.
[12] Chen C, Jensen M A. Secret key establishment using temporally and spatially correlated wireless channel coefficients [J]. IEEE Transactions on Mobile Computing, 2011, 10(2): 205-215.

备注/Memo

备注/Memo:
收稿日期: 2016-09-06.
作者简介: 李古月(1989—),女,博士生;胡爱群(联系人),男,博士,教授,博士生导师,aqhu@seu.edu.cn.
基金项目: 国家自然科学基金资助项目(61571110)、江苏省“六大人才高峰”资助项目.
引用本文: 李古月,胡爱群.基于K-L变换的无线信道密钥提取方法[J].东南大学学报(自然科学版),2017,47(2):203-208. DOI:10.3969/j.issn.1001-0505.2017.02.001.
更新日期/Last Update: 2017-03-20