|
- 2016
一种利用OFDM系统无线信道相位响应的 密钥提取方案
|
Abstract:
针对无线通信系统中利用信道特征提取密钥效率较低的问题,提出了一种利用正交频分复用(OFDM)系统无线信道相位响应的密钥提取方案,该方案首先利用相位随机化的信号对信道相位响应进行探测,并且随机选择一个合法节点通过对探测得到的信道相位进行量化生成初始密钥;其次,将初始密钥进行映射和预均衡处理后发送给对方节点,实现初始密钥的安全分发;最后,合法双方通过信息协商和保密增强获得安全密钥。该方案充分利用了无线信道相位响应的随机性和互易性,只需要一个合法节点来量化产生初始密钥,减少了量化处理,提升了密钥提取性能,同时由于信道相位响应对于收发端之间的距离十分敏感,而保证了该方案的安全性。仿真结果表明,当信噪比为10 dB时,与已有的基于信道相位和信道幅度的密钥提取方案相比,所提方案的密钥容量分别增加34%和70%,密钥不一致率分别降低37%和63%,密钥产生速率分别提高了6.6%和17%,同时所提方案生成的密钥通过了NIST随机性测试。
A secret key extraction scheme based on wireless channel??phase response of orthogonal frequency??division multiplexing (OFDM) systems is proposed to solve the low efficiency problem of secret key generation based on the characteristics of wireless channels. The proposed scheme probes the channel??phase response by using the probe signal with random phase, and a node is randomly selected to generate an initial secret key by quantizing the channel??phase response. The initial secret key is mapped and pre??equalized, and then sent to the other node to achieve secure distribution of the initial secret key. Finally, the both sides receive secure secret keys through information consultation and secrecy enhancement. The proposed scheme fully utilizes the randomness and reciprocity of the wireless channel??phase response and generates the initial secret key by quantifying a single legitimate node. Thus the performance of secret key extraction is improved. Further, the security of the scheme is ensured by the sensitivity of the channel??phase response to the distance between the transmitter and receiver. Simulation results and comparisons with the existing channel??phase based scheme and the channel??amplitude based scheme show that the secret key capacity of the proposed scheme increases by 34% and 70%, the secret key mismatch rate decreases by 37% and 63%, and the secret key generation rate increases by 6.6% and 17%. Moreover, the extracted secret key passes the NIST test
[1] | [10]WANG Qian, SU Hai, REN Kui, et al. Fast and scalable secret key generation exploiting channel phase randomness in wireless networks [C]∥Proceedings of IEEE INFOCOM. Piscataway, NJ, USA: IEEE, 2011: 1422??1430. |
[2] | DAI Qiao, SONG Huawei, JIN Liang, et al. Physical layer authentication and secret key distribution mechanism based on equivalent channel [J]. Science China, 2014, 44(12): 1580??1592. |
[3] | [16]SZABO Z. Information theoretical estimators toolbox [J]. Journal of Machine Learning Research, 2014, 15: 283??287. |
[4] | [17]RARESCHI F, ROVATTI R, SETTI G. On statistical tests for randomness included in the NIST SP800??22 test suite and based on the binomial distribution [J]. IEEE Transactions on Information Forensics and Security, 2012, 7(2): 491??505. |
[5] | [2]AHLSWEDE R, CSISZ?BR I. Common randomness in information theory and cryptography: part ISecret sharing [J]. IEEE Transactions on Information Theory, 1993, 39(4): 1121??1132. |
[6] | [3]HASSAN A A, STARKB W E, HERSHEYC J E, et al. Cryptographic key agreement for mobile radio [J]. Digital Signal Processing, 1996, 6(4): 207??212. |
[7] | [4]MATHUR S, TRAPPE W, MANDAYAM N, et al. Radio??telepathy: extracting a secret key from an unauthenticated wireless channel [C]∥Proceedings of the 14th ACM International Conference on Mobile Computing and Networking. New York, USA: ACM, 2008: 128??139. |
[8] | [5]JANA S, PREMNATH S N, CLARK M, et al. On the effectiveness of secret key extraction from wireless signal strength in real environments [C]∥Proceedings of the Annual International Conference on Mobile Computing and Networking. New York, USA: ACM, 2009: 321??332. |
[9] | [13]JAKES W C. Microwave mobile communications [M]. Piscataway, NJ, USA: Wiley??IEEE Press, 1994: 121??127. |
[10] | [14]BRASSARD G, SALVAIL L. Secret??key reconciliation by public discussion [M]∥ Lecture Notes in Computer Science: Vol??765. Berlin, Germany: Springer, 1998: 410??423. |
[11] | [15]戴峤, 宋华伟, 金梁, 等. 基于等效信道的物理层认证和密钥分发机制 [J]. 中国科学, 2014, 44(12): 1580??1592. |
[12] | [1]MAURER U M. Secret key agreement by public discussion from common information [J]. IEEE Transactions on Information Theory, 1993, 39(3): 733??742. |
[13] | [6]LIU H, YANG J, WANG Y, et al. Group secret key generation via received signal strength: protocols, achievable rates, and implementation [J]. IEEE Transactions on Mobile Computing, 2014, 13(12): 2820??2835. |
[14] | [7]WANG Q, XU K, REN K. Cooperative secret key generation from phase estimation in narrow band fading channels [J]. IEEE Journal on Selected Areas in Communications, 2012, 30(9): 1666??1674. |
[15] | [8]CHENG Longwang, LI Wei, MA Dongtang. Secret key generation via random beamforming in stationary environment [C]∥Proceedings of 2015 International Conference on Wireless Communications and Signal Processing. Piscataway, NJ, USA: IEEE, 2015: 7341290. |
[16] | [9]蔡文炳, 付双红, 张水莲, 等. 一种无线信道密钥容量求解方法 [J]. 西安交通大学学报, 2014, 48(6): 31??36. |
[17] | CAI Wenbing, FU Hongshuang, ZHANG Shuilian, et al. A solution of secret key capacity for wireless channel [J]. Journal of Xi’an Jiaotong University, 2014, 48(6): 31??36. |
[18] | [11]HUANG Jingjing, JIANG Ting. Dynamic secret key generation exploiting ultra??wideband wireless channel characteristics [C]∥Proceedings of 2015 IEEE Wireless Communications and Networking Conference. Piscataway, NJ, USA: IEEE, 2015: 1701??1706. |
[19] | [12]周百鹏, 黄开枝, 金梁, 等. 一种基于多径相对时延的密钥生成方法 [J]. 计算机应用研究, 2011, 28(6): 2196??2198. |
[20] | ZHOU Baipeng, HUANG Kaizhi, JIN Liang, et al. Scheme of key generation based on multipath relative??delay [J]. Application Research of Computers, 2011, 28(6): 2196??2198. |