• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

基于协作干扰的物理层群组秘密与私钥生成

Cooperative Jamming-Based Physical-Layer Group Secret and Private Key Generation.

作者信息

Fu Shiming, Ling Tong, Yang Jun, Li Yong

机构信息

School of Artificial Intelligence, Chongqing University of Education, Chongqing 400065, China.

School of Communications and Information Engineering, Chongqing University of Posts and Telecommunications, Chongqing 400065, China.

出版信息

Entropy (Basel). 2024 Sep 4;26(9):758. doi: 10.3390/e26090758.

DOI:10.3390/e26090758
PMID:39330091
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC11430993/
Abstract

This paper explores physical layer group key generation in wireless relay networks with a star topology. In this setup, the relay node plays the role of either a trusted or untrusted central node, while one legitimate node (Alice) acts as the reference node. The channel between the relay and Alice serves as the reference channel. To enhance security during the channel measurement stage, a cooperative jamming-based scheme is proposed in this paper. This scheme allows the relay to obtain superimposed channel observations from both the reference channel and other relay channels. Then, a public discussion is utilized to enable all nodes to obtain estimates of the reference channel. Subsequently, the legitimate nodes can agree on a secret key (SK) that remains secret from the eavesdropper (Eve), or a private key (PK) that needs to be secret from both the relay and Eve. This paper also derives the lower and upper bounds of the SK/PK capacity. Notably, it demonstrates that there exists only a small constant difference between the SK/PK upper and lower bounds in the high signal-to-noise ratio (SNR) regime. Simulation results confirm the effectiveness of the proposed scheme for ensuring security and efficiency of group key generation.

摘要

本文探讨了具有星型拓扑结构的无线中继网络中的物理层组密钥生成。在这种设置中,中继节点充当可信或不可信的中心节点,而一个合法节点(爱丽丝)充当参考节点。中继与爱丽丝之间的信道用作参考信道。为了在信道测量阶段增强安全性,本文提出了一种基于协作干扰的方案。该方案允许中继从参考信道和其他中继信道获得叠加的信道观测值。然后,利用公开讨论使所有节点能够获得参考信道的估计值。随后,合法节点可以就对窃听者(伊芙)保密的秘密密钥(SK),或对中继和伊芙都保密的私有密钥(PK)达成一致。本文还推导了SK/PK容量的上下界。值得注意的是,它表明在高信噪比(SNR)情况下,SK/PK上下界之间仅存在一个小的常数差异。仿真结果证实了所提方案对于确保组密钥生成的安全性和效率的有效性。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e497/11430993/ec747a14d2df/entropy-26-00758-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e497/11430993/474413f858a2/entropy-26-00758-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e497/11430993/e4a39f897de5/entropy-26-00758-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e497/11430993/3f040c32ffa4/entropy-26-00758-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e497/11430993/b8e8db71b6e2/entropy-26-00758-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e497/11430993/68dbd8f7878d/entropy-26-00758-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e497/11430993/0e317c8afdc4/entropy-26-00758-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e497/11430993/ab649df089e8/entropy-26-00758-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e497/11430993/ec747a14d2df/entropy-26-00758-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e497/11430993/474413f858a2/entropy-26-00758-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e497/11430993/e4a39f897de5/entropy-26-00758-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e497/11430993/3f040c32ffa4/entropy-26-00758-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e497/11430993/b8e8db71b6e2/entropy-26-00758-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e497/11430993/68dbd8f7878d/entropy-26-00758-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e497/11430993/0e317c8afdc4/entropy-26-00758-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e497/11430993/ab649df089e8/entropy-26-00758-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e497/11430993/ec747a14d2df/entropy-26-00758-g008.jpg

相似文献

1
Cooperative Jamming-Based Physical-Layer Group Secret and Private Key Generation.基于协作干扰的物理层群组秘密与私钥生成
Entropy (Basel). 2024 Sep 4;26(9):758. doi: 10.3390/e26090758.
2
Physical Layer Secret-Key Generation Scheme for Transportation Security Sensor Network.用于运输安全传感器网络的物理层密钥生成方案
Sensors (Basel). 2017 Jun 28;17(7):1524. doi: 10.3390/s17071524.
3
Physical Layer Security in Two-Way SWIPT Relay Networks with Imperfect CSI and a Friendly Jammer.具有不完美信道状态信息和友好干扰器的双向同时无线信息与能量传输中继网络中的物理层安全
Entropy (Basel). 2023 Jan 6;25(1):122. doi: 10.3390/e25010122.
4
The Physical Layer Security Experiments of Cooperative Communication System with Different Relay Behaviors.具有不同中继行为的协作通信系统的物理层安全实验
Sensors (Basel). 2017 Apr 6;17(4):781. doi: 10.3390/s17040781.
5
Free-space optical wiretap channel and experimental secret key agreement in 7.8 km terrestrial link.7.8公里地面链路中的自由空间光窃听信道与实验性密钥协商
Opt Express. 2018 Jul 23;26(15):19513-19523. doi: 10.1364/OE.26.019513.
6
Joint Resource Allocation in Secure OFDM Two-Way Untrusted Relay System.安全正交频分复用双向不可信中继系统中的联合资源分配
Sensors (Basel). 2022 Mar 21;22(6):2398. doi: 10.3390/s22062398.
7
Secure Transmission for Simultaneous Wireless Information and Power Transfer in AF Untrusted Relay Networks.在非可信中继网络中,用于无线信息和功率同时传输的安全传输方法。
Sensors (Basel). 2018 Dec 26;19(1):76. doi: 10.3390/s19010076.
8
Intelligent Reflecting Surface-Assisted Wireless Secret Key Generation against Multiple Eavesdroppers.针对多个窃听者的智能反射面辅助无线密钥生成
Entropy (Basel). 2022 Mar 23;24(4):446. doi: 10.3390/e24040446.
9
Secure Multiuser Communications in Wireless Sensor Networks with TAS and Cooperative Jamming.基于选择式放大转发与协作干扰的无线传感器网络安全多用户通信
Sensors (Basel). 2016 Nov 12;16(11):1908. doi: 10.3390/s16111908.
10
Secret key distillation over satellite-to-satellite free-space optics channel with a limited-sized aperture eavesdropper in the same plane of the legitimate receiver.在合法接收器同一平面内存在有限孔径窃听者的情况下,通过卫星到卫星自由空间光信道进行密钥蒸馏。
Opt Express. 2020 Dec 7;28(25):37129-37148. doi: 10.1364/OE.401597.

本文引用的文献

1
An Optimality Summary: Secret Key Agreement with Physical Unclonable Functions.最优性总结:基于物理不可克隆函数的密钥协商
Entropy (Basel). 2020 Dec 24;23(1):16. doi: 10.3390/e23010016.
2
Stealthy Secret Key Generation.隐秘密钥生成
Entropy (Basel). 2020 Jun 18;22(6):679. doi: 10.3390/e22060679.
3
Physical Layer Key Generation in 5G and Beyond Wireless Communications: Challenges and Opportunities.5G及未来无线通信中的物理层密钥生成:挑战与机遇
Entropy (Basel). 2019 May 15;21(5):497. doi: 10.3390/e21050497.