首页 | 本学科首页   官方微博 | 高级检索  
     

基于极化码的无协商密钥物理层安全传输方案
引用本文:黄开枝,万政,楼洋明,肖帅芳,许晓明.基于极化码的无协商密钥物理层安全传输方案[J].电子与信息学报,2020,42(12):2946-2952.
作者姓名:黄开枝  万政  楼洋明  肖帅芳  许晓明
作者单位:中国人民解放军战略支援部队信息工程大学 郑州 450001
基金项目:国家自然科学基金(61701538, 61871404, 61801435),国家自然科学基金创新群体项目(61521003)
摘    要:针对现有的密钥生成方案需要在通信流程中增加额外的密钥协商协议,导致在5G等标准通信系统中应用受限的问题,该文提出一种基于极化码的无协商密钥物理层安全传输方案。首先基于信道特征提取未协商的物理层密钥,然后针对物理信道与密钥加密信道共同构成的等效信道设计极化码,最后利用未协商的物理层密钥对编码后的序列进行简单的模二加加密后传输。该方案通过针对性设计的极化码纠正密钥差异和噪声引起的比特错误,实现可靠的安全传输。仿真表明,该文基于等效信道设计的极化码在保证合法双方以最优的码率可靠传输的同时可以防止窃听者窃听,实现了安全与通信的一体化。

关 键 词:物理层安全    密钥生成    极化码    信息协商    安全与通信共生
收稿时间:2019-11-01

Physical Layer Secure Transmission Scheme with Joint Polar Codes and Non-reconciliation Secret Keys
Kaizhi HUANG,Zheng WAN,Yangming LOU,Shuaifang XIAO,Xiaoming XU.Physical Layer Secure Transmission Scheme with Joint Polar Codes and Non-reconciliation Secret Keys[J].Journal of Electronics & Information Technology,2020,42(12):2946-2952.
Authors:Kaizhi HUANG  Zheng WAN  Yangming LOU  Shuaifang XIAO  Xiaoming XU
Affiliation:Information Engineering University, Zhengzhou 450001, China
Abstract:The existing key generation scheme requires additional key reconciliation protocol in a communication process, resulting in the limited application to the communication system, such as the Fifth-Generation mobile communication (5G). A physical layer secure transmission scheme with a joint polar code and non-reconciliation secret keys is proposed. Firstly, the non-reconciliation physical layer keys are extracted from the channel feature, and then the polar code is designed based on the equivalent channel, which is formed by the physical channel and the key encryption channel. Finally, the encoded sequence is simply modular plus encrypted and transmitted using the non-reconciliation physical layer key. Key differences and noise-induced bit errors are corrected through a targeted design of polarization codes to achieve reliable and secure transmission. The simulation shows that the polar code based on the equivalent channel can ensure the reliable transmission between two legitimate users at the optimal code rate.
Keywords:
点击此处可从《电子与信息学报》浏览原始摘要信息
点击此处可从《电子与信息学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号