导航
English 大连理工大学登录
人工智能应用
论文成果
Efficient key generation leveraging channel reciprocity and balanced gray code
发表时间:2019-07-01 点击次数:
论文类型: 期刊论文
第一作者: Zhan, Furui
通讯作者: Yao, NM (reprint author), Dalian Univ Technol, Dept Comp Sci & Technol, Dalian, Peoples R China.
合写作者: Yao, Nianmin,Gao, Zhenguo,Lu, Zhimao,Chen, Bingcai
发表时间: 2019-02-01
发表刊物: WIRELESS NETWORKS
收录刊物: SCIE、EI
文献类型: J
卷号: 25
期号: 2
页面范围: 611-624
ISSN号: 1022-0038
关键字: Key generation; Channel reciprocity; Balanced gray code; Wireless networks
摘要: Key generation leveraging wireless channel reciprocity can establish secret keys from unauthenticated broadcast channels and thus protect the communication of wireless networks. However, in real environments, the measurements collected by the involved transceivers might have many discrepancies due to the non-simultaneous directional measurements and other factors, such as hardware differences and asymmetric interferences. Meanwhile, if the multi-level quantization in conjunction with source coding is implemented to convert measurements to bits, the resulting high bit mismatch rate makes key agreement inefficient and insecure. In this paper, key generation schemes leveraging channel reciprocity and balanced gray code are proposed. To enhance the efficiency of key generation, an efficient encoding scheme based on balanced gray code is carried out during key generation. The proposed encoding scheme can simultaneously reduce the bit mismatch rate and improve the secret bit rate. In addition, the code book is reusable once it is generated. The proposed key generation schemes can be classified into the uniform and non-uniform schemes according to different quantization processes. Several experiments in real mobile environments are conducted to validate the proposed schemes. The received signal strength measurements are extracted from heterogeneous devices as statistics of channel states in each experiment. The results of these experiments show that (1) the proposed encoding scheme significantly enhances the efficiency of key generation; (2) both the uniform and non-uniform schemes can efficiently generate secret keys between heterogeneous transceivers.
是否译文: