The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. ex. Some numerals are expressed as "XNUMX".
Copyrights notice
The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. Copyrights notice
La génération de clés secrètes basées sur les caractéristiques des canaux constitue une méthode de sécurité de couche physique efficace pour les réseaux sans fil 5G. Il convient de résoudre les problèmes liés à la manière de garantir un taux élevé de génération de clés et une corrélation entre les clés secrètes soumises à une attaque active. Dans cet article, un nouveau schéma pratique de génération de clés secrètes avec un taux et une corrélation élevés est proposé. Dans le schéma proposé, Alice et Bob transmettent des séquences aléatoires indépendantes au lieu de séquences d'apprentissage ou de signaux de sondage connus ; ni Alice ni Bob ne peuvent décoder ces séquences aléatoires ou estimer le canal. Les séquences aléatoires de l'utilisateur ainsi que les effets de canal sont utilisés comme source aléatoire commune pour générer la clé secrète. Grâce à cette solution, les utilisateurs légitimes peuvent partager des clés secrètes d'une longueur suffisante et d'un niveau de sécurité élevé en cas d'attaque active. Nous évaluons le schéma proposé à travers des études analytiques et de simulation. Les résultats montrent que le schéma proposé permet d'obtenir un taux de génération de clés et une sécurité de clé élevés, et qu'il convient aux réseaux sans fil 5G dotés de dispositifs aux ressources limitées.
Qiuhua WANG
Hangzhou Dianzi University
Mingyang KANG
Hangzhou Dianzi University
Guohua WU
Hangzhou Dianzi University
Yizhi REN
Hangzhou Dianzi University
Chunhua SU
University of Aizu
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copier
Qiuhua WANG, Mingyang KANG, Guohua WU, Yizhi REN, Chunhua SU, "A Practical Secret Key Generation Scheme Based on Wireless Channel Characteristics for 5G Networks" in IEICE TRANSACTIONS on Information,
vol. E103-D, no. 2, pp. 230-238, February 2020, doi: 10.1587/transinf.2019INI0001.
Abstract: Secret key generation based on channel characteristics is an effective physical-layer security method for 5G wireless networks. The issues of how to ensure the high key generation rate and correlation of the secret key under active attack are needed to be addressed. In this paper, a new practical secret key generation scheme with high rate and correlation is proposed. In our proposed scheme, Alice and Bob transmit independent random sequences instead of known training sequences or probing signals; neither Alice nor Bob can decode these random sequences or estimate the channel. User's random sequences together with the channel effects are used as common random source to generate the secret key. With this solution, legitimate users are able to share secret keys with sufficient length and high security under active attack. We evaluate the proposed scheme through both analytic and simulation studies. The results show that our proposed scheme achieves high key generation rate and key security, and is suitable for 5G wireless networks with resource-constrained devices.
URL: https://global.ieice.org/en_transactions/information/10.1587/transinf.2019INI0001/_p
Copier
@ARTICLE{e103-d_2_230,
author={Qiuhua WANG, Mingyang KANG, Guohua WU, Yizhi REN, Chunhua SU, },
journal={IEICE TRANSACTIONS on Information},
title={A Practical Secret Key Generation Scheme Based on Wireless Channel Characteristics for 5G Networks},
year={2020},
volume={E103-D},
number={2},
pages={230-238},
abstract={Secret key generation based on channel characteristics is an effective physical-layer security method for 5G wireless networks. The issues of how to ensure the high key generation rate and correlation of the secret key under active attack are needed to be addressed. In this paper, a new practical secret key generation scheme with high rate and correlation is proposed. In our proposed scheme, Alice and Bob transmit independent random sequences instead of known training sequences or probing signals; neither Alice nor Bob can decode these random sequences or estimate the channel. User's random sequences together with the channel effects are used as common random source to generate the secret key. With this solution, legitimate users are able to share secret keys with sufficient length and high security under active attack. We evaluate the proposed scheme through both analytic and simulation studies. The results show that our proposed scheme achieves high key generation rate and key security, and is suitable for 5G wireless networks with resource-constrained devices.},
keywords={},
doi={10.1587/transinf.2019INI0001},
ISSN={1745-1361},
month={February},}
Copier
TY - JOUR
TI - A Practical Secret Key Generation Scheme Based on Wireless Channel Characteristics for 5G Networks
T2 - IEICE TRANSACTIONS on Information
SP - 230
EP - 238
AU - Qiuhua WANG
AU - Mingyang KANG
AU - Guohua WU
AU - Yizhi REN
AU - Chunhua SU
PY - 2020
DO - 10.1587/transinf.2019INI0001
JO - IEICE TRANSACTIONS on Information
SN - 1745-1361
VL - E103-D
IS - 2
JA - IEICE TRANSACTIONS on Information
Y1 - February 2020
AB - Secret key generation based on channel characteristics is an effective physical-layer security method for 5G wireless networks. The issues of how to ensure the high key generation rate and correlation of the secret key under active attack are needed to be addressed. In this paper, a new practical secret key generation scheme with high rate and correlation is proposed. In our proposed scheme, Alice and Bob transmit independent random sequences instead of known training sequences or probing signals; neither Alice nor Bob can decode these random sequences or estimate the channel. User's random sequences together with the channel effects are used as common random source to generate the secret key. With this solution, legitimate users are able to share secret keys with sufficient length and high security under active attack. We evaluate the proposed scheme through both analytic and simulation studies. The results show that our proposed scheme achieves high key generation rate and key security, and is suitable for 5G wireless networks with resource-constrained devices.
ER -