检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:张平娟[1] 刘志宏[1] 张腾[1] 田森平[1]
机构地区:[1]西安电子科技大学计算机学院,西安710071
出 处:《计算机科学与探索》2015年第1期80-93,共14页Journal of Frontiers of Computer Science and Technology
基 金:国家自然科学基金No.61173135~~
摘 要:无线网络可以利用物理层的信道噪声来增强系统的安全性能。通常物理层安全协议针对特定无线信道的噪声特性进行设计,并假设窃听者的信道特性已知,但在实际中该假设是不可行的。针对无线信道的安全通信问题,提出了密钥进化协议,设计了基于动态秘密的加密机制,使合法用户的密钥随传输数据流不断进化,而不用假设敌手的信道特征已知。如果合法用户之间存在认证信道,即使敌手的信道相比合法用户的信道具有优势,合法用户之间也能建立安全的会话密钥。最后,提出了k容忍加密机制(k-resistance encryption scheme,k-RES),该机制能够容忍加密密钥和解密密钥之间最多k比特的差异。Physical-layer channel noise can be used to networks. In general, a physical-layer security protocol enhance the security performance of the system in wireless is tailored to the channels and relies on the assumption that knowledge on the eavesdropper' s channel is available. However, this assumption is not practical. This paper focuses on the problem of developing key agreement schemes for secure communication across wireless channel, and pro- poses a key evolution scheme and designs an encryption mechanism based on dynamic secrets, allowing the legiti- mate users' keys to evolve continuously based on the transmitted messages over the noisy wireless channel with- out assuming that the channel characteristics of the enemy are known. Even if the eavesdropper' s channel is superior to the legitimate receiver, the legitimate parties can establish secret keys. Finally, this paper proposes a novel k-resistance encryption scheme (k-RES) that can use different keys to encrypt and decrypt messages if there are no more than k bits difference between the encryption and decryption keys.
分 类 号:TP393[自动化与计算机技术—计算机应用技术]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.117