• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

无线通信中基于物理层提供的链密钥的无条件认证

Unconditional Authentication Based on Physical Layer Offered Chain Key in Wireless Communication.

作者信息

Wang Shaoyu, Huang Kaizhi, Xu Xiaoming, Hu Xiaoyan, Yang Jing, Jin Liang

机构信息

Wireless Communication Technology Office, Information Engineering University, Zhengzhou 450002, China.

出版信息

Entropy (Basel). 2022 Mar 30;24(4):488. doi: 10.3390/e24040488.

DOI:10.3390/e24040488
PMID:35455151
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC9031411/
Abstract

Authentication is a critical issue in wireless communication due to the impersonation and substitution attacks from the vulnerable air interface launched by the malicious node. There are currently two kinds of authentication research in wireless communication. One is based on cryptography and relies on computational complexity, the other is based on physical layer fingerprint and can not protect data integrity well. Both of these approaches will become insecure when facing attackers with infinite computing power. In this paper, we develop a wireless unconditional authentication framework based on one-time keys generated from wireless channel. The proposed unconditional authentication framework provides a new perspective to resist infinite computing power attackers. We study the performance of the unconditional authentication framework in this paper. First, a physical layer offered chain key (PHYLOCK) structure is proposed, which can provide one-time keys for unconditional authentication. The physical layer offered chain keys are generated by XORing the physical layer updated keys extracted from the current channel state information (CSI) and the previous chain keys. The security of PHYLOCK is analyzed from the perspective of information theory. Then, the boundary of the deception probability is conducted. It is shown that unconditional authentication can achieve a probability of deception 2-12Hk, where Hk is the entropy of the one-time key used for one message. Finally, the conditions for unconditional authentication are listed. Our analysis shows that the length of the key and the authentication code need to be twice the length of the message and the encoding rules of the authentication code need to satisfy the restrictions we listed.

摘要

由于恶意节点从易受攻击的空中接口发起的假冒和替换攻击,认证在无线通信中是一个关键问题。目前无线通信中有两种认证研究。一种基于密码学,依赖于计算复杂性,另一种基于物理层指纹,不能很好地保护数据完整性。当面对具有无限计算能力的攻击者时,这两种方法都会变得不安全。在本文中,我们基于从无线信道生成的一次性密钥开发了一种无线无条件认证框架。所提出的无条件认证框架为抵御无限计算能力攻击者提供了一个新的视角。在本文中,我们研究了无条件认证框架的性能。首先,提出了一种物理层提供的链密钥(PHYLOCK)结构,它可以为无条件认证提供一次性密钥。物理层提供的链密钥是通过对从当前信道状态信息(CSI)中提取的物理层更新密钥与先前的链密钥进行异或运算生成的。从信息论的角度分析了PHYLOCK的安全性。然后,确定了欺骗概率的边界。结果表明,无条件认证可以实现欺骗概率2-12Hk,其中Hk是用于一条消息的一次性密钥的熵。最后,列出了无条件认证的条件。我们的分析表明,密钥和认证码的长度需要是消息长度的两倍,并且认证码的编码规则需要满足我们列出的限制。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ca85/9031411/24665f7e1a49/entropy-24-00488-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ca85/9031411/ac2677f63c13/entropy-24-00488-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ca85/9031411/a83c72c2b37c/entropy-24-00488-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ca85/9031411/ca7616658914/entropy-24-00488-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ca85/9031411/e6a0f940d22d/entropy-24-00488-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ca85/9031411/8a2cdd2884e7/entropy-24-00488-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ca85/9031411/155908e2e191/entropy-24-00488-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ca85/9031411/24665f7e1a49/entropy-24-00488-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ca85/9031411/ac2677f63c13/entropy-24-00488-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ca85/9031411/a83c72c2b37c/entropy-24-00488-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ca85/9031411/ca7616658914/entropy-24-00488-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ca85/9031411/e6a0f940d22d/entropy-24-00488-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ca85/9031411/8a2cdd2884e7/entropy-24-00488-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ca85/9031411/155908e2e191/entropy-24-00488-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ca85/9031411/24665f7e1a49/entropy-24-00488-g007.jpg

相似文献

1
Unconditional Authentication Based on Physical Layer Offered Chain Key in Wireless Communication.无线通信中基于物理层提供的链密钥的无条件认证
Entropy (Basel). 2022 Mar 30;24(4):488. doi: 10.3390/e24040488.
2
Physical Layer Authentication in Wireless Networks-Based Machine Learning Approaches.无线网络中基于机器学习的物理层认证。
Sensors (Basel). 2023 Feb 6;23(4):1814. doi: 10.3390/s23041814.
3
An SSL-PUF Based Access Authentication and Key Distribution Scheme for the Space-Air-Ground Integrated Network.一种基于SSL-PUF的空天地一体化网络接入认证与密钥分发方案。
Entropy (Basel). 2023 May 6;25(5):760. doi: 10.3390/e25050760.
4
A New Privacy-Preserving Handover Authentication Scheme for Wireless Networks.一种用于无线网络的新型隐私保护切换认证方案。
Sensors (Basel). 2017 Jun 20;17(6):1446. doi: 10.3390/s17061446.
5
Centralized Threshold Key Generation Protocol Based on Shamir Secret Sharing and HMAC Authentication.基于 Shamir 秘密共享和 HMAC 认证的集中式门限密钥生成协议。
Sensors (Basel). 2022 Jan 3;22(1):331. doi: 10.3390/s22010331.
6
Enhanced Two-Factor Authentication and Key Agreement Using Dynamic Identities in Wireless Sensor Networks.无线传感器网络中使用动态身份的增强型双因素认证和密钥协商
Sensors (Basel). 2015 Nov 30;15(12):29841-54. doi: 10.3390/s151229767.
7
Secure Authentication Protocol for Wireless Sensor Networks in Vehicular Communications.车载通信中无线传感器网络的安全认证协议。
Sensors (Basel). 2018 Sep 21;18(10):3191. doi: 10.3390/s18103191.
8
A User Authentication Scheme Based on Elliptic Curves Cryptography for Wireless Ad Hoc Networks.一种基于椭圆曲线密码学的无线自组织网络用户认证方案。
Sensors (Basel). 2015 Jul 14;15(7):17057-75. doi: 10.3390/s150717057.
9
An Improved Two-Layer Authentication Scheme for Wireless Body Area Networks.无线体域网的改进型双层认证方案。
J Med Syst. 2018 Jun 29;42(8):143. doi: 10.1007/s10916-018-0990-x.
10
An efficient and adaptive mutual authentication framework for heterogeneous wireless sensor network-based applications.一种用于基于异构无线传感器网络应用的高效自适应相互认证框架。
Sensors (Basel). 2014 Feb 11;14(2):2732-55. doi: 10.3390/s140202732.