基于用户位置信息的密钥生成安全性 |
栾凤宇1, 张焱2, 郑繁繁3, 许希斌4, 周世东1,4 |
1. 清华大学 电子工程系, 北京 100084; 2. 北京理工大学 信息与电子学院, 北京 100081; 3. 厦门大学 通信工程系, 厦门 361005; 4. 清华大学 清华信息科学与技术国家实验室, 北京 100084 |
Security of a position-based secret key generation method |
LUAN Fengyu1, ZHANG Yan2, ZHENG Fanfan3, XU Xibin4, ZHOU Shidong1,4 |
1. Department of Electronic Engineering, Tsinghua University, Beijing 100084, China; 2. School of Information and Electronics, Beijing Institute of Technology, Beijing 100081, China; 3. Communication Engineering Department, Xiamen University, Xiamen 361005, China; 4. Tsinghua National Laboratory for Information Science and Technology, Tsinghua University, Beijing 100084, China |
摘要:
| |||
摘要随着无线与移动通信个人业务的快速发展,利用无线信道的特性生成密钥的方法成为新的研究热点,但这种方法并非绝对安全。当窃听者获得足够的散射环境信息和用户位置信息,就可能重构出合法用户之间的信道信息,影响密钥的安全性。其中用户和窃听者共同的散射环境难以做到对窃听者保密,但用户位置信息由于用户移动和窃听者有限的观测能力具备不确定性,能够为密钥生成提供安全保障。该文以密钥生成速率为安全性的衡量,研究了基于合法用户位置信息的密钥生成速率。首先推导了窃听者对不同场景(视距、非视距和不同散射物数量)中的用户位置推测误差表达式; 然后通过仿真,分析了窃听者对距离和角度不同观测误差、同一密钥生成周期内不同的信道观测次数对密钥生成速率的影响; 基于仿真和分析结果,证明了利用用户位置不确定度能够保障一定的密钥生成速率,从而确保了密钥的安全。 | |||
关键词 :无线通信,用户位置信息,密钥生成速率,散射环境 | |||
Abstract:With the increasing demand for security, many systems take advantage of channel randomness to generate secret keys. However, when an eavesdropper has good knowledge of the environmental information and the position information of legal users, this method is not absolutely safe. The scattering environmental information cannot be kept secret but the system can still be secure based on the uncertainty of the positions of legal users due to the users movements and the limited observation ability of the eavesdroppers. This study analyzes the security of the position-based secret keys generation method with the security measured by the secret key rates. The calculational errors of the positions of the legal users in different scenarios (LOS, NLOS and different numbers of scattering objects) are analyzed first. Then, the impacts of the distance observation error, the azimuth observation error and the number of observations in each secret key generation period on the secret key rates are analyzed in simulations. The results show that the uncertainty of the positions of legal users can be used to provide security for the secret keys. | |||
Key words:wireless communicationthe positions information of userssecret key ratescattering environment | |||
收稿日期: 2014-10-08 出版日期: 2015-09-30 | |||
| |||
通讯作者:周世东,教授,E-mail:zhousd@tsinghua.edu.cnE-mail: zhousd@ tsinghua.edu.cn |
引用本文: |
栾凤宇, 张焱, 郑繁繁, 许希斌, 周世东. 基于用户位置信息的密钥生成安全性[J]. 清华大学学报(自然科学版), 2015, 55(8): 831-837. LUAN Fengyu, ZHANG Yan, ZHENG Fanfan, XU Xibin, ZHOU Shidong. Security of a position-based secret key generation method. Journal of Tsinghua University(Science and Technology), 2015, 55(8): 831-837. |
链接本文: |
http://jst.tsinghuajournals.com/CN/或 http://jst.tsinghuajournals.com/CN/Y2015/V55/I8/831 |
图表:
图1 系统模型 |
表1 参数含义 |
表2 Eve观测的信息统计 |
图2 不同场景下的系统模型 |
图3 密钥生成速率上下界与σM 关系 |
图4 密钥生成速率上下界与σθ 关系 |
图5 密钥生成速率上下界与信道观测次数关系 |
参考文献:
[1] Wallace J W, Sarma R K. Automatic secret keys from reciprocal MIMO wireless channels: measurement and analysis [J]. Trans on Information Forensics and Security, 2010, 5(3): 381-392. [2] Wallace J W, Chen C, Jensen M A. Key generation exploiting MIMO channel evolution: algorithms and theoretical limits [C]// EUCAP 2009. Berlin, German: IEEE Press, 2009: 1499-1503. [3] Wallace J W. Secure physical layer key generation schemes: performance and information theoretic limits [C]// ICC 09. Dresden, German: IEEE Press. 2009: 1-5. [4] Wang Q, Su H, Ren K, et al. Fast and scalable secret key generation exploiting channel phase randomness in wireless networks [C]// Infocom 2011. Shanghai, China: IEEE Press, 2011: 1422-1430. [5] Gungor O, Chen F, Koksal C E. Secret key generation from mobility [C]// Globecom 2011. Houston, USA: IEEE Press, 2011: 874-878. [6] Gungor O, Chen F, Koksal C E. Secret key generation via locatlization and mobility in wireless networks [DB/OL]. [2014-10-01]. http://arxiv.org/abs/1112.2793v5. [7] Zhang X D, Liang Y C. Prefiltering-based ESPRIT for estimating parameters of sinusoids in non-Gaussian ARMA noise [J].IEEE Trans Signal Processing, 1993, 43(1): 349-353. [8] Fleury B H, Henri B. High-resolution channel parameter estimation for MIMO application using the SAGE algorithm [C]// 2002 International Zurich Seminar on Broadband communications. Zurich, Switzerland: IEEE Press, 2002: 301-309. [9] Wyner A. The wire-tap channel [J]. Bell Syst Tech J, 1975, 54(8): 1355-1387. [10] Bloch M R, Laneman J N. Secrecy form resolvability [DB/OL]. [2014-10-01].http://arxiv.org/abs/1105.5419v3. [11] Chan Y T. A simple and efficient estimation for hyperbolic location [J]. IEEE Trans Signal Processing, 1994, 42(8): 1905-1915. [12] Foy W. Position-location solutions by Taylor series estimation [J]. IEEE on Aerospace and Electronic Systems, 1976, 12(3): 187-194. [13] Schau H C. Passive source localization employing interesting spherical surfaces from time of arrival differences [J]. IEEE Trans Acoustics, Speech and Signal Processing, 1987, 35(8): 1223-1225. |
相关文章:
|