期刊文献+

基于宽带信道状态信息的密钥生成策略 被引量:2

Secret key generation strategy based on broadband channel state information
原文传递
导出
摘要 对于宽带通信系统,大量的频点信息可以作为随机源生成密钥,从而增强通信系统的安全性。然而环境中散射径的数目是有限的,导致不同频点存在着相关性。在限定总发送功率的条件下,针对不同频点的功率分配策略会对密钥的安全性能产生影响。该文以密钥生成速率作为密钥安全性的衡量,建立了功率分配模型以实现密钥生成速率的最大化,并利用Lagrange乘数法进行求解。为降低计算复杂度,提出了一种次优的功率分配方法,并与最优的序列二次规划(sequential quadratic programming,SQP)求解算法进行对比,数值结果表明:次优功率分配策略下得到的密钥安全性能非常接近通过SQP算法得到的最优功率分配策略的密钥安全性能。 The channel information for a large number of frequency points in broadband communication systems can be used as a random source to generate secret keys, thereby, enhancing system security. However, there is a limited number of multipaths in the scattering and there is a correlation between different frequency points. Thus, for the condition that the total transmission power is limited, the power allocation strategy for different frequency points will affect the secret key security. A power allocation model is given with the key generation rate as a measure of the security that maximizes the key generation rate. The model is solved with the Lagrange multiplier method. A suboptimal power allocation method is given to reduce the calculation complexity that compares with the optimal solution with the sequential quadratic programming (SQP) algorithm. Numerical tests show that the security with the suboptimal power allocation strategy is quite close to the security with the SQP algorithm which is considered to be the optimal strategy.
出处 《清华大学学报(自然科学版)》 EI CAS CSCD 北大核心 2017年第10期1009-1013,共5页 Journal of Tsinghua University(Science and Technology)
基金 国家"八六三"高技术项目(ss2015AA011306) 国家"九七三"重点基础研究发展计划项目(2012CB316000) 国家自然科学基金创新研究群体项目(61321061) 国家科技重大专项课题计划(2014ZX03004003-006) 清华大学自主科研项目(2015THZ02-3)
关键词 密钥生成速率 功率分配 LAGRANGE乘数法 次优算法 序列二次规划(SQP) secret key rate power allocation Lagrange multiplier method suboptimal algorithm sequential quadratic programming (SQP)
  • 相关文献

参考文献2

二级参考文献14

  • 1Henry L Bertoni. Radio propagation for modern wireless systems [M]. USA: Prentice Hall Inc., 2000. 被引量:1
  • 2Magdy F Iskander, Zhengqing Yun. Propagation models for wireless communication systems [J]. IEEE Trans. Microwave Theory Tech., 2002, 50 (3): 662~673. 被引量:1
  • 3F A Agelet, A Formella, J M H Rabanos, et al.. Efficient ray-tracing acceleration techniques for radio propagation modeling [J]. IEEE Trans. Veh. Technol., 2000, 49 (6):2089~2104. 被引量:1
  • 4中国科学院软件研究所并行软件研究与研发中心.并行计算实验室学术论文集 [EB/OL].http://www.rdcps.ac.cn/shouye/paper.html,. 被引量:1
  • 5G Durgin, N Patwari, T S Rappaport, Improved 3D ray launching method for wireless propagation prediction [J]. Electron. Lett., 1997, 33 (16): 1412~1413. 被引量:1
  • 6Wallace, Jon W.,Sharma, Rajesh K.Automatic secret keys from reciprocal MIMO wireless channels: Measurement and analysis. IEEE Transactions on Information Forensics and Security . 2010 被引量:1
  • 7Wilson, Robert,Tse, David,Scholtz, Robert A.Channel identification: Secret sharing using reciprocity in ultrawideband channels. IEEE Transactions on Information Forensics and Security . 2007 被引量:1
  • 8Wallace J.Secure physical layer key generation schemes:performance and information theoretic limits. IEEE International Conference on Communications—ICC 2009 . 2009 被引量:1
  • 9C X Ye,A Reznik,Gregory Sternberg,Yogendra Shah."On the secrecy capabilities of ITU channels". IEEE Vehicular Technology Conference (VTC-2007Fall) . 2007 被引量:1
  • 10D. S. Baum,J. Salo,G. Del Galdo,M. Milojevic,P. Ky sti,J. Hansen.An interim channelmodel for beyond-3G systems: extending the3GPP spatial channel model (SCM). IEEEVehicular Technology Conference . 2005 被引量:1

共引文献17

同被引文献26

引证文献2

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部