期刊文献+

基于物理层位置信息的跨层双向认证 被引量:2

Cross-Layer Mutual Authentication Scheme Based on Physical Layer Location Information
下载PDF
导出
摘要 针对传统认证存在身份信息破解风险、物理层认证无法实现初始认证的问题,提出一种结合身份信息和物理层位置信息的跨层双向认证方案。利用物理层提供的熵增加认证系统的共享随机性,在防止身份信息破解条件下实现认证。首先提出一种跨层认证信息生成方案,随后分析认证性能。仿真结果表明,该方案有望实现信息论安全双向认证,且增加认证信息长度或者提高信噪比可以显著提升认证性能。 In order to solve the problem of identity information cracking in traditional authentication and the initial authentication failure of the physical layer authentication, this paper proposes a cross-layer mutual authentication scheme, combining the identity information and the physical layer loca-tion information. Specifically, we use the entropy supplied by the physical layer to increase the common randomness of the authentication system to achieve authentication while preventing the identity information cracking. We first introduce a generalized cross-layer authentication message generation scheme. Then, the authentication performance of the proposed scheme is analyzed. Simulation resuits show that this scheme is expected to achieve information theoretic security mutual authentication. Furthermore, authentication performance increases significantly with the growth of authentication message length and the signal to noise ratios (SNR).
出处 《信息工程大学学报》 2017年第3期279-283,304,共6页 Journal of Information Engineering University
基金 国家863计划资助项目(2015AA01A708)
关键词 信息论安全 物理层安全 跨层认证 双向认证 information theoretic security physical layer security cross-layer authentication mutual authentication
  • 相关文献

参考文献2

二级参考文献30

  • 1钱旭东,何广强,曾贵华.连续变量量子密钥分发协商过程的优化实现[J].中国科学(F辑:信息科学),2009,39(10):1027-1033. 被引量:1
  • 2AHLSWEDE R,CSISZAR I. Common randomness in information theory and cryptography secret sharing[J].{H}IEEE Transactions on Information Theory,1993,(04):1121-1132.
  • 3MAURER U M. Secret key agreement by public discussion from common information[J].{H}IEEE Transactions on Information Theory,1993,(03):733-742.
  • 4HERSHEY J E,HASSAN A A,YARLAGADDA R. Unconventional cryptographic keying variable management[J].IEEE Trans on Com-munication,1995,(01):3-6.
  • 5MATHUR S,TRAPPER W,MANDAYAM N. Radio-telepathy:extracting a secret key from an unauthenticated wireless channel[A].San Francisco,USA,2008.128-139.
  • 6AONO T,HIGUCHI K,OHIRA T. Wireless secret key genera-tion exploiting reactance domain scalar response of multipath fading channels[J].{H}IEEE Transactions on Antennas and Propagation,2005,(11):3776-3784.
  • 7JANA S;PREMNATH N S;CLARK M.On the effectiveness of secret key extraction from wireless signal strength in real environ-ments[A]{H}北京,2009321-332.
  • 8WILSON R,TSE D,SCHOLTZ R A. Channel identification:secret sharing using reciprocity in UWB channels[J].IEEE Trans on Infor-mation Forensics and Security,2007,(03):17-30.
  • 9YE C,MATHUR S,REZNIK A. Information-theoretically secret key generation for fading wireless channels[J].IEEE Trans on Infor-mation Forensics and Security,2010,(02):240-254.
  • 10SASAOKA H,IWAI H. Securing Wireless Communications at the Physical Layer[M].Springer Publishing Company,2010.261-280.

共引文献15

同被引文献13

引证文献2

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部