检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:徐明[1,2] 范以萌 蒋昌俊[2,3] Xu Ming;Fan Yimeng;Jiang Changjun(College of Information Engineering,Shanghai Maritime University,Shanghai 201306;College of Electronics and Information Engineering,Tongji University,Shanghai 201804;Key Laboratory of Embedded System and Service Computing(Tongji University),Ministry of Education,Shanghai 201804)
机构地区:[1]上海海事大学信息工程学院,上海201306 [2]同济大学电子与信息工程学院,上海201804 [3]嵌入式系统与服务计算教育部重点实验室(同济大学),上海201804
出 处:《计算机研究与发展》2019年第12期2660-2670,共11页Journal of Computer Research and Development
基 金:国家自然科学基金项目(61202370);中国博士后科学基金项目(2014M561512)~~
摘 要:随着无线网络的不断发展,物理层安全问题逐渐成为广泛关注的焦点.针对水声信道存在的多径效应和多普勒效应,如何在合法节点比敌手对声源信息不确定性更高的情况下提取出高度保密的公共密钥这一问题,提出一种基于时变水声信道的物理层密钥生成方案.首次准确刻画出多径多普勒效应下的α阶Rényi熵,并得出合法节点和敌手关于声源序列的不确定性.在此基础上,提出一种具有强安全性的密钥协商协议,该协议利用Hash函数构造一元高阶多项式完成通信双方的身份认证,实现索引序列和预选密钥在公开信道下的安全传输.此外,利用双线性映射设计出一种不依赖随机种子长度与随机性并能抗主动攻击的保密增强协议.通过信息理论,证明了方案的健壮性、保密性和正确性,并得出密钥泄露率和敌手主动攻击成功率的上界.仿真实验表明,当声源信息量为50000 b时,该方案密钥泄露率的上界为3.74×10^-6,敌手主动攻击成功率的上界为5.468×10^-20,验证了方案的可行性.With the continuous development of wireless networks,the security of physical layer has gradually become the focus of widespread concern.Concerning the problem of how to extract a highly confidential key from the source information when legitimate nodes have more uncertainty than that of eavesdropping node under the circumstances of multipath and Doppler effects in underwater acoustic channel,a time-varying underwater acoustic channel based physical layer secret key generation scheme is proposed.For the first time,theαorder Rényi entropy with multipath and Doppler effects is accurately depicted,and the uncertainty of the source sequence from the legitimate nodes and the eavesdropping node is also obtained.On this basis,a key agreement protocol with strong security is proposed,which uses Hash function to construct one-variable high-order polynomial to complete identity authentication for both sides of communication and to realize secure transmission of index sequence and preselected key under the public channel.Moreover,a privacy amplification protocol against active attacks is designed using bilinear mapping,which does not depend on the length and randomness of the random seed.The robustness,confidentiality and correctness of the scheme are proved by the information theory.The simulation results show that the upper bound of key leakage rate is 3.74×10^-6 and the upper bound of active attack success rate is 5.468×10^-20 when the amount of the source information is 50000 b,which verifies the feasibility of the proposed scheme.
关 键 词:水声信道 物理层 Rényi熵 密钥协商 保密增强
分 类 号:TP309[自动化与计算机技术—计算机系统结构]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.28