当前位置: X-MOL 学术IET Commun. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Power maximisation technique for generating secret keys by exploiting physical layer security in wireless communication
IET Communications ( IF 1.5 ) Pub Date : 2020-04-30 , DOI: 10.1049/iet-com.2019.0956
Xiaoping Wang 1 , Muhammad Waqas 1, 2 , Shanshan Tu 1 , Sadaqat Ur Rehman 3 , Ridha Soua 4 , Obaid Ur Rehman 5 , Sajid Anwar 2 , Wei Zhao 6
Affiliation  

The intrinsic broadcast nature of wireless communication let the attackers to initiate several passive attacks such as eavesdropping. In this attack, the attackers do not disturb/stop or interrupt the communication channel, but it will silently steal the information between authentic users. For this purpose, physical layer security (PLS) is one of the promising methodologies to secure wireless transmissions from eavesdroppers. However, PLS is further divided into keyless security and secret key-based security. The keyless security is not practically implemented because it requires full/part of instantaneous/statistical channel state information (CSI) of the eavesdroppers. Alternatively, key-based security is exploiting the randomness and reciprocity of wireless channels that do not require any CSI from an eavesdropper. The secret key-based security is due to the unpredictability of wireless channels between two users. However, the secret key-based security mainly on two basic parameters, i.e. coherence time and transmission power. Nevertheless, the wireless channel between users has a short coherence time, and it will provide shorter keys' length due to which eavesdropper can easily extract keys between communicating parties. To overcome this limitation, we proposed the power allocation scheme to improve the secret key generation rate (SKGR) to strengthen the security between authentic users.

中文翻译:

通过在无线通信中利用物理层安全性来生成秘密密钥的功率最大化技术

无线通信的固有广播特性使攻击者可以发起多种被动攻击,例如窃听。在这种攻击中,攻击者不会打扰/停止或中断通信通道,但会默默地窃取真实用户之间的信息。为此,物理层安全性(PLS)是从窃听者那里保护无线传输安全的有前途的方法之一。但是,PLS进一步分为无密钥安全性和基于秘密密钥的安全性。由于无钥安全性要求窃听者的全部/部分瞬时/统计信道状态信息(CSI),因此实际上并未实现。或者,基于密钥的安全性正在利用不需要窃听者提供任何CSI的无线信道的随机性和互易性。基于密钥的安全性是由于两个用户之间的无线通道不可预测。但是,基于密钥的安全性主要基于两个基本参数,即相干时间和传输功率。然而,用户之间的无线信道具有较短的相干时间,并且它将提供较短的密钥长度,因此窃听者可以轻松地在通信方之间提取密钥。为了克服此限制,我们提出了一种功率分配方案,以提高秘密密钥生成率(SKGR),以增强真实用户之间的安全性。由于窃听者可以轻松地在通信方之间提取密钥,因此它将提供较短的密钥长度。为了克服此限制,我们提出了一种功率分配方案,以提高秘密密钥生成率(SKGR),以增强真实用户之间的安全性。由于窃听者可以轻松地在通信方之间提取密钥,因此它将提供较短的密钥长度。为了克服此限制,我们提出了一种功率分配方案,以提高秘密密钥生成率(SKGR),以增强真实用户之间的安全性。
更新日期:2020-04-30
down
wechat
bug