• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

一种通过预处理方法与多级量化相结合生成简单密钥的方法。

A Simple Secret Key Generation by Using a Combination of Pre-Processing Method with a Multilevel Quantization.

作者信息

Yuliana Mike

机构信息

Department of Electrical Engineering, Faculty of Electrical Technology, Institut Teknologi Sepuluh Nopember, Jalan Raya ITS, Keputih, Sukolilo, Surabaya 60111, Indonesia.

Department of Electrical Engineering, Politeknik Elektronika Negeri Surabaya (PENS), Jalan Raya ITS, Keputih, Sukolilo, Surabaya 60111, Indonesia.

出版信息

Entropy (Basel). 2019 Feb 18;21(2):192. doi: 10.3390/e21020192.

DOI:10.3390/e21020192
PMID:33266907
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC7514674/
Abstract

Limitations of the computational and energy capabilities of IoT devices provide new challenges in securing communication between devices. Physical layer security (PHYSEC) is one of the solutions that can be used to solve the communication security challenges. In this paper, we conducted an investigation on PHYSEC which utilizes channel reciprocity in generating a secret key, commonly known as secret key generation (SKG) schemes. Our research focused on the efforts to get a simple SKG scheme by eliminating the information reconciliation stage so as to reduce the high computational and communication cost. We exploited the pre-processing method by proposing a modified Kalman (MK) and performing a combination of the method with a multilevel quantization, i.e., combined multilevel quantization (CMQ). Our approach produces a simple SKG scheme for its significant increase in reciprocity so that an identical secret key between two legitimate users can be obtained without going through the information reconciliation stage.

摘要

物联网设备在计算和能量能力方面的局限性给设备间通信安全带来了新挑战。物理层安全(PHYSEC)是可用于解决通信安全挑战的解决方案之一。在本文中,我们对利用信道互易性生成密钥(通常称为密钥生成(SKG)方案)的物理层安全进行了研究。我们的研究致力于通过消除信息协调阶段来获得简单的SKG方案,从而降低高昂的计算和通信成本。我们通过提出一种改进的卡尔曼(MK)方法并将其与多级量化相结合,即组合多级量化(CMQ),来利用预处理方法。我们的方法产生了一个简单的SKG方案,因为其互易性显著提高,从而无需经过信息协调阶段就能在两个合法用户之间获得相同的密钥。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5e1d/7514674/08159bffeac1/entropy-21-00192-g015.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5e1d/7514674/d6cdb1dab336/entropy-21-00192-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5e1d/7514674/ea8f3686f945/entropy-21-00192-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5e1d/7514674/4648afe1fe10/entropy-21-00192-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5e1d/7514674/e47466be6909/entropy-21-00192-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5e1d/7514674/76b205041318/entropy-21-00192-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5e1d/7514674/cac0fbcb9f5c/entropy-21-00192-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5e1d/7514674/6eec918171e3/entropy-21-00192-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5e1d/7514674/30ce2e383cc0/entropy-21-00192-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5e1d/7514674/f54f9f737784/entropy-21-00192-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5e1d/7514674/b279dcdbb3e1/entropy-21-00192-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5e1d/7514674/96b35279d851/entropy-21-00192-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5e1d/7514674/8b5b11089ef6/entropy-21-00192-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5e1d/7514674/f27bfe0e9e74/entropy-21-00192-g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5e1d/7514674/ee05226973ec/entropy-21-00192-g014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5e1d/7514674/08159bffeac1/entropy-21-00192-g015.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5e1d/7514674/d6cdb1dab336/entropy-21-00192-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5e1d/7514674/ea8f3686f945/entropy-21-00192-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5e1d/7514674/4648afe1fe10/entropy-21-00192-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5e1d/7514674/e47466be6909/entropy-21-00192-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5e1d/7514674/76b205041318/entropy-21-00192-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5e1d/7514674/cac0fbcb9f5c/entropy-21-00192-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5e1d/7514674/6eec918171e3/entropy-21-00192-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5e1d/7514674/30ce2e383cc0/entropy-21-00192-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5e1d/7514674/f54f9f737784/entropy-21-00192-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5e1d/7514674/b279dcdbb3e1/entropy-21-00192-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5e1d/7514674/96b35279d851/entropy-21-00192-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5e1d/7514674/8b5b11089ef6/entropy-21-00192-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5e1d/7514674/f27bfe0e9e74/entropy-21-00192-g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5e1d/7514674/ee05226973ec/entropy-21-00192-g014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5e1d/7514674/08159bffeac1/entropy-21-00192-g015.jpg

相似文献

1
A Simple Secret Key Generation by Using a Combination of Pre-Processing Method with a Multilevel Quantization.一种通过预处理方法与多级量化相结合生成简单密钥的方法。
Entropy (Basel). 2019 Feb 18;21(2):192. doi: 10.3390/e21020192.
2
Protecting Physical Layer Secret Key Generation from Active Attacks.保护物理层密钥生成免受主动攻击。
Entropy (Basel). 2021 Jul 27;23(8):960. doi: 10.3390/e23080960.
3
An Efficient Key Generation for the Internet of Things Based Synchronized Quantization.一种基于同步量化的物联网高效密钥生成方法。
Sensors (Basel). 2019 Jun 13;19(12):2674. doi: 10.3390/s19122674.
4
Stealthy Secret Key Generation.隐秘密钥生成
Entropy (Basel). 2020 Jun 18;22(6):679. doi: 10.3390/e22060679.
5
Physical Layer Key Generation in 5G and Beyond Wireless Communications: Challenges and Opportunities.5G及未来无线通信中的物理层密钥生成:挑战与机遇
Entropy (Basel). 2019 May 15;21(5):497. doi: 10.3390/e21050497.
6
Cooperative Jamming-Based Physical-Layer Group Secret and Private Key Generation.基于协作干扰的物理层群组秘密与私钥生成
Entropy (Basel). 2024 Sep 4;26(9):758. doi: 10.3390/e26090758.
7
Robust secret image sharing scheme resistance to maliciously tampered shadows by AMBTC and quantization.鲁棒的秘密图像共享方案抵抗 AMBTC 和量化的恶意篡改阴影。
Gene Expr Patterns. 2022 Sep;45:119267. doi: 10.1016/j.gep.2022.119267. Epub 2022 Aug 5.
8
RIS-Enabled Secret Key Generation for Secured Vehicular Communication in the Presence of Denial-of-Service Attacks.基于 RIS 的抗 DoS 攻击安全车载通信中密钥生成
Sensors (Basel). 2023 Apr 19;23(8):4104. doi: 10.3390/s23084104.
9
Secure Route-Obfuscation Mechanism with Information-Theoretic Security for Internet of Things.具有信息论安全性的物联网安全路由混淆机制
Sensors (Basel). 2020 Jul 29;20(15):4221. doi: 10.3390/s20154221.
10
Intelligent Reflecting Surface-Assisted Wireless Secret Key Generation against Multiple Eavesdroppers.针对多个窃听者的智能反射面辅助无线密钥生成
Entropy (Basel). 2022 Mar 23;24(4):446. doi: 10.3390/e24040446.

引用本文的文献

1
Intelligent Reflecting Surface Assisted Multi-User Robust Secret Key Generation for Low-Entropy Environments.低熵环境下智能反射面辅助的多用户鲁棒密钥生成
Entropy (Basel). 2021 Oct 14;23(10):1342. doi: 10.3390/e23101342.
2
An Efficient Key Generation for the Internet of Things Based Synchronized Quantization.一种基于同步量化的物联网高效密钥生成方法。
Sensors (Basel). 2019 Jun 13;19(12):2674. doi: 10.3390/s19122674.

本文引用的文献

1
A Review of Physical Layer Security Techniques for Internet of Things: Challenges and Solutions.物联网物理层安全技术综述:挑战与解决方案
Entropy (Basel). 2018 Sep 23;20(10):730. doi: 10.3390/e20100730.
2
An IoT-Based Computational Framework for Healthcare Monitoring in Mobile Environments.基于物联网的移动环境医疗监测计算框架。
Sensors (Basel). 2017 Oct 10;17(10):2302. doi: 10.3390/s17102302.
3
Channel-Based Key Generation for Encrypted Body-Worn Wireless Sensor Networks.用于加密穿戴式无线传感器网络的基于信道的密钥生成
Sensors (Basel). 2016 Sep 8;16(9):1453. doi: 10.3390/s16091453.