• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
高级检索

基于时变水声信道的物理层密钥生成方案

徐明, 范以萌, 蒋昌俊

徐明, 范以萌, 蒋昌俊. 基于时变水声信道的物理层密钥生成方案[J]. 计算机研究与发展, 2019, 56(12): 2660-2670. DOI: 10.7544/issn1000-1239.2019.20190040
引用本文: 徐明, 范以萌, 蒋昌俊. 基于时变水声信道的物理层密钥生成方案[J]. 计算机研究与发展, 2019, 56(12): 2660-2670. DOI: 10.7544/issn1000-1239.2019.20190040
Xu Ming, Fan Yimeng, Jiang Changjun. Time-Varying Underwater Acoustic Channel Based Physical Layer Secret Key Generation Scheme[J]. Journal of Computer Research and Development, 2019, 56(12): 2660-2670. DOI: 10.7544/issn1000-1239.2019.20190040
Citation: Xu Ming, Fan Yimeng, Jiang Changjun. Time-Varying Underwater Acoustic Channel Based Physical Layer Secret Key Generation Scheme[J]. Journal of Computer Research and Development, 2019, 56(12): 2660-2670. DOI: 10.7544/issn1000-1239.2019.20190040
徐明, 范以萌, 蒋昌俊. 基于时变水声信道的物理层密钥生成方案[J]. 计算机研究与发展, 2019, 56(12): 2660-2670. CSTR: 32373.14.issn1000-1239.2019.20190040
引用本文: 徐明, 范以萌, 蒋昌俊. 基于时变水声信道的物理层密钥生成方案[J]. 计算机研究与发展, 2019, 56(12): 2660-2670. CSTR: 32373.14.issn1000-1239.2019.20190040
Xu Ming, Fan Yimeng, Jiang Changjun. Time-Varying Underwater Acoustic Channel Based Physical Layer Secret Key Generation Scheme[J]. Journal of Computer Research and Development, 2019, 56(12): 2660-2670. CSTR: 32373.14.issn1000-1239.2019.20190040
Citation: Xu Ming, Fan Yimeng, Jiang Changjun. Time-Varying Underwater Acoustic Channel Based Physical Layer Secret Key Generation Scheme[J]. Journal of Computer Research and Development, 2019, 56(12): 2660-2670. CSTR: 32373.14.issn1000-1239.2019.20190040

基于时变水声信道的物理层密钥生成方案

基金项目: 国家自然科学基金项目(61202370);中国博士后科学基金项目(2014M561512)
详细信息
  • 中图分类号: TP309

Time-Varying Underwater Acoustic Channel Based Physical Layer Secret Key Generation Scheme

  • 摘要: 随着无线网络的不断发展,物理层安全问题逐渐成为广泛关注的焦点.针对水声信道存在的多径效应和多普勒效应,如何在合法节点比敌手对声源信息不确定性更高的情况下提取出高度保密的公共密钥这一问题,提出一种基于时变水声信道的物理层密钥生成方案.首次准确刻画出多径多普勒效应下的α阶Rényi熵,并得出合法节点和敌手关于声源序列的不确定性.在此基础上,提出一种具有强安全性的密钥协商协议,该协议利用Hash函数构造一元高阶多项式完成通信双方的身份认证,实现索引序列和预选密钥在公开信道下的安全传输.此外,利用双线性映射设计出一种不依赖随机种子长度与随机性并能抗主动攻击的保密增强协议.通过信息理论,证明了方案的健壮性、保密性和正确性,并得出密钥泄露率和敌手主动攻击成功率的上界.仿真实验表明,当声源信息量为50 000 b时,该方案密钥泄露率的上界为3.74×10\+\{-6\},敌手主动攻击成功率的上界为5.468×10\+\{-20\},验证了方案的可行性.
    Abstract: With the continuous development of wireless networks, the security of physical layer has gradually become the focus of widespread concern. Concerning the problem of how to extract a highly confidential key from the source information when legitimate nodes have more uncertainty than that of eavesdropping node under the circumstances of multipath and Doppler effects in underwater acoustic channel, a time-varying underwater acoustic channel based physical layer secret key generation scheme is proposed. For the first time, the α order Rényi entropy with multipath and Doppler effects is accurately depicted, and the uncertainty of the source sequence from the legitimate nodes and the eavesdropping node is also obtained. On this basis, a key agreement protocol with strong security is proposed, which uses Hash function to construct one-variable high-order polynomial to complete identity authentication for both sides of communication and to realize secure transmission of index sequence and preselected key under the public channel. Moreover, a privacy amplification protocol against active attacks is designed using bilinear mapping, which does not depend on the length and randomness of the random seed. The robustness, confidentiality and correctness of the scheme are proved by the information theory. The simulation results show that the upper bound of key leakage rate is 3.74×10\+\{-6\} and the upper bound of active attack success rate is 5.468×10\+\{-20\} when the amount of the source information is 50 000 b, which verifies the feasibility of the proposed scheme.
  • 期刊类型引用(8)

    1. 邱朋飞,孙日辉,王春露,汪东升. 现代处理器低功耗漏洞发现与利用. 中国科学:信息科学. 2025(02): 297-325 . 百度学术
    2. 徐杰,吴茂雪. 基于数据中心的数据传输网络拓扑结构及拥塞控制研究. 中国高新科技. 2024(21): 27-28+31 . 百度学术
    3. 杨帆,张倩颖,施智平,关永. 可信执行环境软件侧信道攻击研究综述. 软件学报. 2023(01): 381-403 . 百度学术
    4. 黎秀,潘虹,朱镕申. 移动终端软件高速缓存侧信道脆弱性识别仿真. 计算机仿真. 2022(02): 496-500 . 百度学术
    5. 王崇,魏帅,张帆,宋克. 缓存侧信道防御研究综述. 计算机研究与发展. 2021(04): 794-810 . 本站查看
    6. 丛眸,张平,王宁. 针对KASLR的Linux计时攻击方法. 计算机工程. 2021(08): 177-182 . 百度学术
    7. 高岩,资郴琛,冯四风,顾青. 面向拟态防御理论构造Web网关的安全调度算法. 小型微型计算机系统. 2021(09): 1913-1919 . 百度学术
    8. 李志峰,高玉琢. 基于高速缓存的侧信道攻击方法研究. 网络安全技术与应用. 2021(09): 4-7 . 百度学术

    其他类型引用(3)

计量
  • 文章访问数:  860
  • HTML全文浏览量:  2
  • PDF下载量:  240
  • 被引次数: 11
出版历程
  • 发布日期:  2019-11-30

目录

    /

    返回文章
    返回