首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 78 毫秒
1.
针对物联网准静态信道下密钥生成速率低的问题,该文提出一种基于中继节点协作的密钥生成方法。首先,通信双方通过信道估计获得直达信道和部分中继信道信息;然后,中继节点采用网络编码技术参与协作,使得通信双方获取全部中继信道信息;最后,通信双方在直达信道上进行密钥协商,利用直达信道信息、中继信道信息与协商信息共同生成相同的密钥。安全性分析表明该方法能够提高可达密钥速率,并且随着信噪比的提高,可达密钥速率呈线性增长,趋于最优值。蒙特卡洛仿真验证了理论分析的结果,并得出了增加中继节点数量、选取信道变化幅度大的中继节点,可以进一步提高可达密钥速率。  相似文献   

2.
魏浩  侯晓赟  朱艳  郑宝玉 《信号处理》2014,30(11):1245-1251
本文利用时分系统无线多径信道的互易性,提取信道相位信息作为密钥,实现双向中继信道的密钥生成与分发。由于信道的稀疏多径特性,采用基于压缩感知的重构算法对信道状态信息进行估计。端节点采用正交导频设计,将双向中继信道分解为两个点对点的信道;而中继采用物理层网络编码的思想,广播导频和密钥比特的异或。这样,仅用2个时隙就实现了密钥生成与分发,还保证了密钥的安全,且无需预先进行密钥的分配。仿真结果表明,本文所提方案可以有效的实现双向中继信道的密钥生成与分发,保证了物理层的安全通信。   相似文献   

3.
物理层密钥生成技术使得节点能够利用无线信道的物理特性直接生成共享密钥,从而保证无线通信过程的安全性。针对当前物理层密钥生成方案普遍存在实际场景下密钥生成率低的问题,提出了一个基于Savitzky-olay滤波的物理层密钥生成机制优化方案。该方案中,合法通信节点首先探测信道并通过Savitzky-olay滤波消除部分由信道干扰造成的信道状态差异,然后,利用多级量化以及格雷码将信道状态转为比特序列,最终通过Cascade交互式信息协调协议以及基于2阶全域哈希函数的保密增强生成合法节点之间的共享密钥。实验结果表明,基于Savitzky-olay滤波的优化方案能够有效提高物理层密钥生成过程的效率,提高了此类安全机制的实际可用性。  相似文献   

4.
无线多址接入中继网络中,用户可选择是否接入中继,同时中继也可选择所服务的用户。在中继处应用网络编码技术可使单个中继同时服务于2个用户共享同一时频资源进行无干扰信息传输。基站采用联合检测方法恢复原始信息,从而得到传输速率的提升。针对多用户多中继场景,为了进一步提升系统的吞吐量,需要为用户选择合适的中继协助其传输,考虑到多址网络编码中继的中继选择问题是一个复杂的优化问题,为了降低其求解复杂度,分别采用基于贪婪准则和考虑用户公平性的信道分配算法进行求解。仿真结果表明,所提信道分配算法相比于随机信道分配可获得较大的性能增益,并且基于贪婪准则的算法性能优于考虑用户公平性的算法。  相似文献   

5.
This article proposes an optimized in-band control channel scheme with channel selection scheduling algorithm and network coding based transmission paradigm in the distributed cognitive radio network (...  相似文献   

6.
邱睿  谢顺钦  范靖  解楠  杨晨 《电讯技术》2023,63(7):1028-1035
针对无线信道生成密钥方法在信息协商中的信息泄露问题,提出了低信息泄露Cascade算法。通过构造传统Cascade协商过程的密钥协商过程矩阵,推导了合法用户所得密钥中安全的信息量,改进了Cascade算法;结合符号定时同步预处理以及高精度参数估计得到了一个完整的密钥生成方案。基于实测数据的分析结果表明,符号定时同步预处理能有效降低初始密钥不一致率;在协商成功率、密钥生成速率、密钥随机性、安全性等方面,低信息泄露Cascade协商算法与传统Cascade算法相比综合性能更优。  相似文献   

7.
Wireless communication is particularly susceptible to eavesdropping due to its broadcast nature. Security and privacy systems have become critical for wireless providers and enterprise networks. This paper considers the problem of secret communication over the Gaussian broadcast channel, where a multiple-antenna transmitter wishes to send independent confidential messages to two users with information-theoretic secrecy. That is, each user would like to obtain its own confidential message in a reliable and safe manner. This communication model is referred to as the multiple-antenna Gaussian broadcast channel with confidential messages (MGBC-CM). Under this communication scenario, a secret dirty-paper coding scheme and the corresponding achievable secrecy rate region are first developed based on Gaussian codebooks. Next, a computable Sato-type outer bound on the secrecy capacity region is provided for the MGBC-CM. Furthermore, the Sato-type outer bound proves to be consistent with the boundary of the secret dirty-paper coding achievable rate region, and hence, the secrecy capacity region of the MGBC-CM is established. Finally, two numerical examples demonstrate that both users can achieve positive rates simultaneously under the information-theoretic secrecy requirement.   相似文献   

8.
针对密钥生成系统中传统量化算法导致合法双方初始不一致率较高从而降低最终的密钥生成长度的问题,提出了双门限量化的基本模型,合法双方同时设置一个上门限和下门限,将高于上门限的采样值量化为1,低于下门限的采样值量化为0,同时将上、下门限之间的采样值舍弃。通过分析可知,这种量化方法有较高的可靠性,并且不会泄露有关密钥的任何信息。本文分析了其在密钥生成中的具体应用,并以合法双方最终生成的密钥的长度为目标函数,推导得到了双门限量化时最优的量化因子。进一步的仿真表明,相比较传统的等概量化,通过选择合适的量化因子,合法双方能够生成更长的密钥。在信噪比为15 dB-25 dB时,密钥长度的提升在0.1比特以上。   相似文献   

9.
针对现有的密钥生成方案需要在通信流程中增加额外的密钥协商协议,导致在5G等标准通信系统中应用受限的问题,该文提出一种基于极化码的无协商密钥物理层安全传输方案。首先基于信道特征提取未协商的物理层密钥,然后针对物理信道与密钥加密信道共同构成的等效信道设计极化码,最后利用未协商的物理层密钥对编码后的序列进行简单的模二加加密后传输。该方案通过针对性设计的极化码纠正密钥差异和噪声引起的比特错误,实现可靠的安全传输。仿真表明,该文基于等效信道设计的极化码在保证合法双方以最优的码率可靠传输的同时可以防止窃听者窃听,实现了安全与通信的一体化。  相似文献   

10.
In this paper, a multiuser communication system in which wireless users cooperate to transmit information to a base station is considered. The proposed scheme can significantly enlarge the achievable rate region, provided that the wireless connections between pairs of cooperating users are stronger than the connection from every user to the base station. The gains in transmission rate remain substantial even when the channel phase information is only available at the receivers, not at the transmitters. In the proposed scheme, a transmission period is divided into two time intervals. During the first time interval, wireless users send data to the base station and to the neighboring users simultaneously using a broadcast channel paradigm. During the second time interval, the users cooperate to transmit information to the base station. The achievable rate region corresponding to this paradigm is characterized under a random phase channel model for a two-user system. Results are then generalized to a multiple-user scenario. For fixed system parameters, the achievable rate region is strictly larger than that of the traditional multiple-access channel, thereby allowing a fair distribution of the wireless resources among users. Numerical analysis suggests that cooperating with a single partner is enough to achieve most of the benefits associated with cooperation.   相似文献   

11.
Most recent research on channel‐based key generation oriented to time division duplex system because the channel reciprocity feature is applied directly for secret key generation. Most of commercial cellular systems depend on frequency division duplex (FDD) systems. In this paper, we investigate the impact of uplink and downlink of FDD systems for the generation of shared secret keys between two parties in the presents of passive eavesdropper. In addition, we are considering improving the rate of the secret key for wireless communication in FDD mode. The main idea is to use the fading coefficient of the channels between the relay and other parties as an additional random common source for the secret key generation. Also, explore the using of channel estimation techniques to reduce the channel training sequence and study its effect on the generation of shared key for wireless communications in FDD mode. We derive the upper bound of the generated shared key rate for four scenarios and give numerical examples to reveal the performance of our suggested improvement approaches.  相似文献   

12.
This paper studies the achievable rate for three-node discrete memoryless relay channel.Specifically in this mode,we explore two generalized feedbacks simultaneously:the source node actively collects feedback signals from the channel;and at the same time,the destination node actively transmits feedback signals to the relay node.These two feedback signals,which are called generalized feedback overheard from the channel that is likely to be noisy,induce that all the three nodes are in full duplex mode.The basic coding strategies of Cover and El Gamal are applied to the relay-source feedback transmission by the source forwarding the compressions of the channel output sequences at the relay node to the destination,and are also applied to the destination-relay feedback transmission to improve the decoding ability at the relay.Based on Cover and El Gamal coding,a new coding scheme adopting rate splitting and four-block Markov superposition encoding is proposed and the corresponding achievable rate is achieved.The proposed scheme is able to exploit two feedbacks simultaneously which can effectively eliminate underlying transmission bottlenecks for the channels.The derived achievable rate result generalizes several previously known results by including them as special cases.  相似文献   

13.
This paper considers the transmission of confidential data over wireless channels. Based on an information-theoretic formulation of the problem, in which two legitimates partners communicate over a quasi-static fading channel and an eavesdropper observes their transmissions through a second independent quasi-static fading channel, the important role of fading is characterized in terms of average secure communication rates and outage probability. Based on the insights from this analysis, a practical secure communication protocol is developed, which uses a four-step procedure to ensure wireless information-theoretic security: (i) common randomness via opportunistic transmission, (ii) message reconciliation, (iii) common key generation via privacy amplification, and (iv) message protection with a secret key. A reconciliation procedure based on multilevel coding and optimized low-density parity-check (LDPC) codes is introduced, which allows to achieve communication rates close to the fundamental security limits in several relevant instances. Finally, a set of metrics for assessing average secure key generation rates is established, and it is shown that the protocol is effective in secure key renewal-even in the presence of imperfect channel state information.  相似文献   

14.
Non-Orthogonal Multiplex Access (NOMA) can be deployed in Unmanned Aerial Vehicle (UAV) networks to improve spectrum efficiency. Due to the broadcasting feature of NOMA-UAV networks, it is essential to focus on the security of the wireless system. This paper focuses on maximizing the secrecy sum rate under the constraint of the achievable rate of the legitimate channels. To tackle the non-convexity optimization problem, a reinforcement learning-based alternative optimization algorithm is proposed. Firstly, with the help of successive convex approximations, the optimal power allocation scheme with a given UAV trajectory is obtained by using convex optimization tools. Afterwards, through plenty of explorations of the wireless environment, the Q-learning networks approach the optimal location transition strategy of the UAV, even without the wireless channel state information.  相似文献   

15.
This article considers the two-way multiple-input multiple-output (MIMO) relaying channels with multiple users, in which multiple users are served simultaneously by the base station (BS) with the assistance of the relay. The transmission consists of only two phases, doubling the system throughout over traditional one-way half-duplex transmission. A zero-forcing dirty paper coding (ZFDPC) aided physical-layer network coding (PNC) scheme is proposed in this article and the achievable capacity of the ZFDPC aided PNC scheme is derived. Simulation results show that the proposed scheme outperforms the previous decode-and-forward (DF) and zero-forcing beamforming (ZFBF) aided PNC scheme due to more degrees of freedoms and the advantage of PNC. Moreover, we analyze the effect of the imperfect channel state information (CSI) from RS to users at BS side to show the robustness of the proposed ZFDPC aided PNC scheme.  相似文献   

16.
伴随着信息技术的高速发展,无线通信网络的安全形势日益严峻。数以亿计的设备接入无线通信网络中,针对用户隐私以及基础网络环境的窃听、攻击事件频频发生,无线通信网络的安全问题已成为限制无线通信业务广泛开展的严重障碍。传统认证与加密机制与传输相脱离,以密码算法和分发密钥的私密性为前提,容易受到物理层的攻击。为此,迫切需要深入开展面向物理层的安全机制研究。从无线通信网络的根源出发,面向无线信道的内生属性,研究了基于无线信道特征的内生安全通信架构,并针对此架构提出了基于射频指纹与信道密钥的内生安全通信技术方案。该架构将认证、加密与传输融为一体,从体系结构上增强了防御效果;利用无线信道特征的内生特点,从技术手段上提高了安全性能。  相似文献   

17.
18.
We propose the cross-layer based opportunistic multi-channel medium access control (MAC) protocols, which integrate the spectrum sensing at physical (PHY) layer with the packet scheduling at MAC layer, for the wireless ad hoc networks. Specifically, the MAC protocols enable the secondary users to identify and utilize the leftover frequency spectrum in a way that constrains the level of interference to the primary users. In our proposed protocols, each secondary user is equipped with two transceivers. One transceiver is tuned to the dedicated control channel, while the other is designed specifically as a cognitive radio that can periodically sense and dynamically use the identified un-used channels. To obtain the channel state accurately, we propose two collaborative channel spectrum-sensing policies, namely, the random sensing policy and the negotiation-based sensing policy, to help the MAC protocols detect the availability of leftover channels. Under the random sensing policy, each secondary user just randomly selects one of the channels for sensing. On the other hand, under the negotiation-based sensing policy, different secondary users attempt to select the distinct channels to sense by overhearing the control packets over the control channel. We develop the Markov chain model and the M/GY/1-based queueing model to characterize the performance of our proposed multi-channel MAC protocols under the two types of channel-sensing policies for the saturation network and the non-saturation network scenarios, respectively. In the non-saturation network case, we quantitatively identify the tradeoff between the aggregate traffic throughput and the packet transmission delay, which can provide the insightful guidelines to improve the delay-QoS provisionings over cognitive radio wireless networks.  相似文献   

19.
In this study, a channel selection algorithm is proposed to enhance the transmission rate for scalable video coding (SVC) source transmission over multi-input multi-output (MIMO) wireless systems. The proposed algorithm allows each layer of SVC video to choose its appropriate channel in wireless MIMO systems based on channel state information for transmission rate enhancement. Here, this difficult problem is converted into mathematical optimization problem to improve the performance of SVC video transmission. Experimental results show that the transmission rate of the proposed method outperforms the existing scheme.  相似文献   

20.
陈庄  于溯  罗颂  蔡定雯 《电讯技术》2021,61(12):1562-1572
针对传统图像加密算法难以保证在云环境下密钥配送的安全性,以及DNA编码在抗统计学分析效果欠佳等问题提出了一种面向云环境的彩色图像混合加密算法。提出了一种自适应DNA编码对传统方法进行改善,通过国产SM2与SM3加密算法作为散列值的生成函数与控制参数的非对称加密,运用盲水印技术镶嵌至密文图像中。实验结果表明,该算法密钥空间大且加密图像相邻像素相关性较低,具有更为接近理想值的像素改变率与像素平均改变强度,具有较为理想的安全性同时在密钥的传输过程中由非对称加密算法保证其安全可靠。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号