ISSN 1000-1239 CN 11-1777/TP

Journal of Computer Research and Development ›› 2019, Vol. 56 ›› Issue (12): 2660-2670.doi: 10.7544/issn1000-1239.2019.20190040

Previous Articles     Next Articles

Time-Varying Underwater Acoustic Channel Based Physical Layer Secret Key Generation Scheme

Xu Ming1,2, Fan Yimeng1, Jiang Changjun2,3   

  1. 1(College of Information Engineering, Shanghai Maritime University, Shanghai 201306);2(College of Electronics and Information Engineering, Tongji University, Shanghai 201804);3(Key Laboratory of Embedded System and Service Computing(Tongji University), Ministry of Education, Shanghai 201804)
  • Online:2019-12-01

Abstract: With the continuous development of wireless networks, the security of physical layer has gradually become the focus of widespread concern. Concerning the problem of how to extract a highly confidential key from the source information when legitimate nodes have more uncertainty than that of eavesdropping node under the circumstances of multipath and Doppler effects in underwater acoustic channel, a time-varying underwater acoustic channel based physical layer secret key generation scheme is proposed. For the first time, the α order Rényi entropy with multipath and Doppler effects is accurately depicted, and the uncertainty of the source sequence from the legitimate nodes and the eavesdropping node is also obtained. On this basis, a key agreement protocol with strong security is proposed, which uses Hash function to construct one-variable high-order polynomial to complete identity authentication for both sides of communication and to realize secure transmission of index sequence and preselected key under the public channel. Moreover, a privacy amplification protocol against active attacks is designed using bilinear mapping, which does not depend on the length and randomness of the random seed. The robustness, confidentiality and correctness of the scheme are proved by the information theory. The simulation results show that the upper bound of key leakage rate is 3.74×10\+\{-6\} and the upper bound of active attack success rate is 5.468×10\+\{-20\} when the amount of the source information is 50 000 b, which verifies the feasibility of the proposed scheme.

Key words: underwater acoustic channel, physical layer, Rényi entropy, key agreement, privacy amplification

CLC Number: