The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. ex. Some numerals are expressed as "XNUMX".
Copyrights notice
The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. Copyrights notice
Penjanaan kunci rahsia berdasarkan ciri saluran ialah kaedah keselamatan lapisan fizikal yang berkesan untuk rangkaian wayarles 5G. Isu bagaimana untuk memastikan kadar penjanaan kunci yang tinggi dan korelasi kunci rahsia di bawah serangan aktif perlu ditangani. Dalam kertas ini, satu skim penjanaan kunci rahsia praktikal baharu dengan kadar dan korelasi yang tinggi dicadangkan. Dalam skim yang dicadangkan kami, Alice dan Bob menghantar urutan rawak bebas dan bukannya urutan latihan yang diketahui atau isyarat penyiasatan; Alice mahupun Bob tidak boleh menyahkod jujukan rawak ini atau menganggarkan saluran. Urutan rawak pengguna bersama dengan kesan saluran digunakan sebagai sumber rawak biasa untuk menjana kunci rahsia. Dengan penyelesaian ini, pengguna yang sah dapat berkongsi kunci rahsia dengan panjang yang mencukupi dan keselamatan yang tinggi di bawah serangan aktif. Kami menilai skim yang dicadangkan melalui kajian analitik dan simulasi. Keputusan menunjukkan bahawa skim yang dicadangkan kami mencapai kadar penjanaan kunci yang tinggi dan keselamatan utama, dan sesuai untuk rangkaian wayarles 5G dengan peranti terhad sumber.
Qiuhua WANG
Hangzhou Dianzi University
Mingyang KANG
Hangzhou Dianzi University
Guohua WU
Hangzhou Dianzi University
Yizhi REN
Hangzhou Dianzi University
Chunhua SU
University of Aizu
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Salinan
Qiuhua WANG, Mingyang KANG, Guohua WU, Yizhi REN, Chunhua SU, "A Practical Secret Key Generation Scheme Based on Wireless Channel Characteristics for 5G Networks" in IEICE TRANSACTIONS on Information,
vol. E103-D, no. 2, pp. 230-238, February 2020, doi: 10.1587/transinf.2019INI0001.
Abstract: Secret key generation based on channel characteristics is an effective physical-layer security method for 5G wireless networks. The issues of how to ensure the high key generation rate and correlation of the secret key under active attack are needed to be addressed. In this paper, a new practical secret key generation scheme with high rate and correlation is proposed. In our proposed scheme, Alice and Bob transmit independent random sequences instead of known training sequences or probing signals; neither Alice nor Bob can decode these random sequences or estimate the channel. User's random sequences together with the channel effects are used as common random source to generate the secret key. With this solution, legitimate users are able to share secret keys with sufficient length and high security under active attack. We evaluate the proposed scheme through both analytic and simulation studies. The results show that our proposed scheme achieves high key generation rate and key security, and is suitable for 5G wireless networks with resource-constrained devices.
URL: https://global.ieice.org/en_transactions/information/10.1587/transinf.2019INI0001/_p
Salinan
@ARTICLE{e103-d_2_230,
author={Qiuhua WANG, Mingyang KANG, Guohua WU, Yizhi REN, Chunhua SU, },
journal={IEICE TRANSACTIONS on Information},
title={A Practical Secret Key Generation Scheme Based on Wireless Channel Characteristics for 5G Networks},
year={2020},
volume={E103-D},
number={2},
pages={230-238},
abstract={Secret key generation based on channel characteristics is an effective physical-layer security method for 5G wireless networks. The issues of how to ensure the high key generation rate and correlation of the secret key under active attack are needed to be addressed. In this paper, a new practical secret key generation scheme with high rate and correlation is proposed. In our proposed scheme, Alice and Bob transmit independent random sequences instead of known training sequences or probing signals; neither Alice nor Bob can decode these random sequences or estimate the channel. User's random sequences together with the channel effects are used as common random source to generate the secret key. With this solution, legitimate users are able to share secret keys with sufficient length and high security under active attack. We evaluate the proposed scheme through both analytic and simulation studies. The results show that our proposed scheme achieves high key generation rate and key security, and is suitable for 5G wireless networks with resource-constrained devices.},
keywords={},
doi={10.1587/transinf.2019INI0001},
ISSN={1745-1361},
month={February},}
Salinan
TY - JOUR
TI - A Practical Secret Key Generation Scheme Based on Wireless Channel Characteristics for 5G Networks
T2 - IEICE TRANSACTIONS on Information
SP - 230
EP - 238
AU - Qiuhua WANG
AU - Mingyang KANG
AU - Guohua WU
AU - Yizhi REN
AU - Chunhua SU
PY - 2020
DO - 10.1587/transinf.2019INI0001
JO - IEICE TRANSACTIONS on Information
SN - 1745-1361
VL - E103-D
IS - 2
JA - IEICE TRANSACTIONS on Information
Y1 - February 2020
AB - Secret key generation based on channel characteristics is an effective physical-layer security method for 5G wireless networks. The issues of how to ensure the high key generation rate and correlation of the secret key under active attack are needed to be addressed. In this paper, a new practical secret key generation scheme with high rate and correlation is proposed. In our proposed scheme, Alice and Bob transmit independent random sequences instead of known training sequences or probing signals; neither Alice nor Bob can decode these random sequences or estimate the channel. User's random sequences together with the channel effects are used as common random source to generate the secret key. With this solution, legitimate users are able to share secret keys with sufficient length and high security under active attack. We evaluate the proposed scheme through both analytic and simulation studies. The results show that our proposed scheme achieves high key generation rate and key security, and is suitable for 5G wireless networks with resource-constrained devices.
ER -