计算机科学 ›› 2017, Vol. 44 ›› Issue (Z11): 362-365.doi: 10.11896/j.issn.1002-137X.2017.11A.076

• 信息安全 • 上一篇    下一篇

基于成对生成策略的无线网络群密钥产生及其分析

代东明,吴晓富   

  1. 南京邮电大学 南京210036,南京邮电大学 南京210036
  • 出版日期:2018-12-01 发布日期:2018-12-01
  • 基金资助:
    本文受国家自然科学基金(61372123)资助

Group Secret Key Generation and Analysis in Wireless Network Based on Pairwise-generating Strategies

DAI Dong-ming and WU Xiao-fu   

  • Online:2018-12-01 Published:2018-12-01

摘要: 使用无线信道的物理层信息在无线设备间生成私密密钥用于确保移动环境的安全, 如今受到了广泛关注。然而在现实环境中,在多个设备之间生成群密钥以确保群安全通信的问题仍然存在挑战。针对无线网络星型拓扑结构,提出一种基于中心节点成对生成策略的群密钥产生方案。相比于文献中提出的利用群内节点间的接收信号强度差分实现提取群密钥的方案,详细分析了它们各自能实现的群密钥容量并给出了数值计算结果。分析表明,提出的基于成对生成策略的群密钥产生方法在密钥率方面优于文献中的差分提取方案。

关键词: 相互密钥提取,接收信号强度,群密钥生成,成对生成策略

Abstract: Secret key establishment within wireless terminals utilizing physical layer information of wireless channel to ensure the security of mobile environment has received wide attention.However,generating group secret key among multiple wireless devices for secure communication in reality environment remains a challenge.This paper proposed a group secret key establishment scheme based on central node pairwise-generating strategies under the star topology in wireless network.Compared with the existing group secret key extraction method using the difference of received signal strength(RSS) among the wireless devices in the group,we gave a explicit analysis and a specific numerical result on the achieva-ble group secret key rate of each one.It shows that our scheme outperforms that of generating group key by leveraging the difference of RSS on key rate.

Key words: Collaborative secret key extraction,Receiving signal strength,Group secret key generation,Pairwise-generating strategies

[1] AZIMI-SADJADI B,KIAYIAS A,MERCADO A,et al.Robust key generation from signal envelopes in wireless networks[C]∥Proceedings of the 14th ACM Conference on Computer and Communications Security.ACM,2007:401-410.
[2] ZHANG J,DUONG T Q,MARSHALL A,et al.Key Generation From Wireless Channels:A Review[J].IEEE Access,2016,4:614-626.
[3] JANA S,PREMNATH S N,CLARK M,et al.On the effectiveness of secret key extraction from wireless signal strength in real environments[C]∥Proceedings of the 15th Annual International Conference on Mobile Computing and Networking.ACM,2009:321-332.
[4] MATHUR S,TRAPPE W,MANDAYAM N,et al.Radio-tele-pathy:extracting a secret key from an unauhenticated wireless channel[C]∥Proceedings of the 14th ACM International Conference on Mobile Computing and Networking.ACM,2008:128-139.
[5] SAYEED A,PERRING A.Secure wireless communications:Secret keys through multipath[C]∥2008 IEEE International Conference on Acoustics,Speech and Signal Processing.IEEE,2008:3013-3016.
[6] WANG Q,SU H,REN K,et al.Fast and scalable secret key generation exploiting channel phase randomness in wireless networks[C]∥INFOCOM,2011 Proceedings IEEE.IEEE,2011:1422-1430.
[7] NITINAWARAT S,YE C,BARG A,et al.Secret key generation for a pairwise independent network model[J].IEEE Transac-tions on Information Theory,2010,56(12):6482-6489.
[8] YE C,REZNIK A.Group secret key generation algorithms[C]∥2007 IEEE International Symposium on Information Theory.IEEE,2007:2596-2600.
[9] KIM Y,PERRING A,TSUDIK G.Tree-based group key agreement[J].ACM Transactions on Information and System Security (TISSEC),2004,7(1):60-96.
[10] LIU H,WANG Y,CHEN Y,et al.Group Secret Key Generation via Received Signal Strength:Protocols,Achievable Rates,and Implementation[J].IEEE Transactions on Mobile Computing,2014,13(12):2820-2835.
[11] LAI L,HO S W.Key generation algorithms for pairwise independent networks based on graphical models[J].IEEE Transactions on Information Theory,2015,61(9):4828-4837.
[12] XU P,CUMANAN K,DING Z,et al.Group Secret Key Generation in Wireless Networks:Algorithms and Rate Optimization[J].IEEE Transactions on Information Forensics and Security,2016,11(8):1831-1846.
[13] THAI C D T,LEE J,QUEK T Q S.Secret group key generation in physical layer for mesh topology[C]∥2015 IEEE Global Communications Conference (GLOBECOM).IEEE,2015:1-6.
[14] WEI Y,ZHU C,NI J.Group Secret Key Generation Algorithm from Wireless Signal Strength[C]∥Sixth International Conferen-ce on Internet Computing for Science and Engineering.IEEE Computer Society,2012:239-245.
[15] LAI L,HO S W.Simultaneously generating multiple keys and multi-commodity flow in networks[C]∥Information Theory Workshop.IEEE,2012:627-631.
[16] CSISZAR I,NARAYAN P.Secrecy capacities for multiple terminals[J].IEEE Transactions on Information Theory,2004,50(12):3047-3061.
[17] TSE D,VISWANATH P.Fundamentals of wireless communication[M].Cambridge university press,2005.
[18] GOLDSMITH A.Wireless communications[M].Cambridge university press,2005.
[19] SHANNON C E.Communication theory of secrecy systems[J].Bell System Technical Journal,1949,28(4):656-715.
[20] YE C,REZNIK A,SHAH Y.Extracting Secrecy from JointlyGaussian Random Variables[C]∥IEEE International Symposiumon Information Theory.IEEE,2006:2593-2597.
[21] WILSON R,TSE D,SCHOLTZ R A.Channel Identification:Secret Sharing using Reciprocity in Ultrawideband Channels[C]∥IEEE International Conference on Ultra-Wideband.IEEE,2007:270-275.

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!