• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

基于负数据库和无线传感器网络物理信道状态特征的密钥同步方法

Key Synchronization Method Based on Negative Databases and Physical Channel State Characteristics of Wireless Sensor Network.

作者信息

Pu Haoyang, Chen Wen, Wang Hongchao, Bao Shenghong

机构信息

School of Cyber Science and Engineering, Sichuan University, Chengdu 610207, China.

出版信息

Sensors (Basel). 2024 Sep 25;24(19):6217. doi: 10.3390/s24196217.

DOI:10.3390/s24196217
PMID:39409257
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC11479239/
Abstract

Due to their inherent openness, wireless sensor networks (WSNs) are vulnerable to eavesdropping attacks. Addressing the issue of secure Internet Key Exchange (IKE) in the absence of reliable third parties like CA/PKI (Certificate Authority/Public Key Infrastructure) in WSNs, a novel key synchronization method named NDPCS-KS is proposed in the paper. Firstly, through an initial negotiation process, both ends of the main channels generate the same initial key seeds using the Channel State Information (CSI). Subsequently, negotiation keys and a negative database (NDB) are synchronously generated at the two ends based on the initial key seeds. Then, in a second-negotiation process, the NDB is employed to filter the negotiation keys to obtain the keys for encryption. NDPCS-KS reduced the risk of information leakage, since the keys are not directly transmitted over the network, and the eavesdroppers cannot acquire the initial key seeds because of the physical isolation of their eavesdropping channels and the main channels. Furthermore, due to the NP-hard problem of reversing the NDB, even if an attacker obtains the NDB, deducing the initial key seeds is computationally infeasible. Therefore, it becomes exceedingly difficult for attackers to generate legitimate encryption keys without the NDB or initial key seeds. Moreover, a lightweight anti-replay and identity verification mechanism is designed to deal with replay attacks or forgery attacks. Experimental results show that NDPCS-KS has less time overhead and stronger randomness in key generation compared with other methods, and it can effectively counter replay, forgery, and tampering attacks.

摘要

由于其固有的开放性,无线传感器网络(WSN)容易受到窃听攻击。针对无线传感器网络中在没有像CA/PKI(证书颁发机构/公钥基础设施)这样可靠第三方的情况下安全互联网密钥交换(IKE)的问题,本文提出了一种名为NDPCS-KS的新型密钥同步方法。首先,通过初始协商过程,主信道两端利用信道状态信息(CSI)生成相同的初始密钥种子。随后,基于初始密钥种子在两端同步生成协商密钥和一个否定数据库(NDB)。然后,在第二次协商过程中,利用NDB对协商密钥进行过滤以获得加密密钥。NDPCS-KS降低了信息泄露的风险,因为密钥不是直接在网络上传输,并且窃听者由于其窃听信道与主信道的物理隔离而无法获取初始密钥种子。此外,由于反转NDB的NP难问题,即使攻击者获得了NDB,推导出初始密钥种子在计算上也是不可行的。因此,攻击者在没有NDB或初始密钥种子的情况下生成合法加密密钥变得极其困难。此外,还设计了一种轻量级的抗重放和身份验证机制来应对重放攻击或伪造攻击。实验结果表明,与其他方法相比,NDPCS-KS在密钥生成方面具有更少的时间开销和更强的随机性,并且能够有效对抗重放、伪造和篡改攻击。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/83d8/11479239/f31e5b9208ba/sensors-24-06217-g014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/83d8/11479239/400d29708579/sensors-24-06217-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/83d8/11479239/5c5bfa68b6f6/sensors-24-06217-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/83d8/11479239/f118af311b5e/sensors-24-06217-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/83d8/11479239/567416d143d4/sensors-24-06217-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/83d8/11479239/5641a72d5226/sensors-24-06217-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/83d8/11479239/12fc8a91f3f5/sensors-24-06217-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/83d8/11479239/f8ebd58331b2/sensors-24-06217-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/83d8/11479239/fa2af673b2cb/sensors-24-06217-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/83d8/11479239/de1a584ed99c/sensors-24-06217-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/83d8/11479239/011bb0e74e4f/sensors-24-06217-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/83d8/11479239/4d35f767acf4/sensors-24-06217-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/83d8/11479239/e30d949321f4/sensors-24-06217-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/83d8/11479239/8acb451b9a04/sensors-24-06217-g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/83d8/11479239/f31e5b9208ba/sensors-24-06217-g014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/83d8/11479239/400d29708579/sensors-24-06217-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/83d8/11479239/5c5bfa68b6f6/sensors-24-06217-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/83d8/11479239/f118af311b5e/sensors-24-06217-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/83d8/11479239/567416d143d4/sensors-24-06217-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/83d8/11479239/5641a72d5226/sensors-24-06217-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/83d8/11479239/12fc8a91f3f5/sensors-24-06217-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/83d8/11479239/f8ebd58331b2/sensors-24-06217-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/83d8/11479239/fa2af673b2cb/sensors-24-06217-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/83d8/11479239/de1a584ed99c/sensors-24-06217-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/83d8/11479239/011bb0e74e4f/sensors-24-06217-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/83d8/11479239/4d35f767acf4/sensors-24-06217-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/83d8/11479239/e30d949321f4/sensors-24-06217-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/83d8/11479239/8acb451b9a04/sensors-24-06217-g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/83d8/11479239/f31e5b9208ba/sensors-24-06217-g014.jpg

相似文献

1
Key Synchronization Method Based on Negative Databases and Physical Channel State Characteristics of Wireless Sensor Network.基于负数据库和无线传感器网络物理信道状态特征的密钥同步方法
Sensors (Basel). 2024 Sep 25;24(19):6217. doi: 10.3390/s24196217.
2
Enhanced BB84 quantum cryptography protocol for secure communication in wireless body sensor networks for medical applications.用于医疗应用的无线人体传感器网络中安全通信的增强型BB84量子密码协议。
Pers Ubiquitous Comput. 2023;27(3):875-885. doi: 10.1007/s00779-021-01546-z. Epub 2021 Mar 18.
3
Secure Authentication Protocol for Wireless Sensor Networks in Vehicular Communications.车载通信中无线传感器网络的安全认证协议。
Sensors (Basel). 2018 Sep 21;18(10):3191. doi: 10.3390/s18103191.
4
Non-Reconciled Physical-Layer Keys-Assisted Secure Communication Scheme Based on Channel Correlation.基于信道相关性的未协调物理层密钥辅助安全通信方案
Entropy (Basel). 2022 Aug 22;24(8):1167. doi: 10.3390/e24081167.
5
Interleaved Honeypot-Framing Model with Secure MAC Policies for Wireless Sensor Networks.交错蜜罐-框架模型与无线传感器网络的安全 MAC 策略。
Sensors (Basel). 2022 Oct 21;22(20):8046. doi: 10.3390/s22208046.
6
Channel-Based Key Generation for Encrypted Body-Worn Wireless Sensor Networks.用于加密穿戴式无线传感器网络的基于信道的密钥生成
Sensors (Basel). 2016 Sep 8;16(9):1453. doi: 10.3390/s16091453.
7
On Performance Analysis of Protective Jamming Schemes in Wireless Sensor Networks.无线传感器网络中保护干扰方案的性能分析
Sensors (Basel). 2016 Nov 24;16(12):1987. doi: 10.3390/s16121987.
8
Graph Layer Security: Encrypting Information via Common Networked Physics.图形层安全:通过通用网络物理系统加密信息。
Sensors (Basel). 2022 May 23;22(10):3951. doi: 10.3390/s22103951.
9
A Lightweight Authentication MAC Protocol for CR-WSNs.轻量级认证 MAC 协议用于 CR-WSNs。
Sensors (Basel). 2023 Feb 10;23(4):2015. doi: 10.3390/s23042015.
10
Cost-Effective Encryption-Based Autonomous Routing Protocol for Efficient and Secure Wireless Sensor Networks.用于高效安全无线传感器网络的基于加密的经济高效自主路由协议
Sensors (Basel). 2016 Mar 31;16(4):460. doi: 10.3390/s16040460.

本文引用的文献

1
Lightweight Security Transmission in Wireless Sensor Networks through Information Hiding and Data Flipping.通过信息隐藏和数据翻转实现无线传感器网络中的轻量级安全传输。
Sensors (Basel). 2022 Jan 21;22(3):823. doi: 10.3390/s22030823.
2
Hiding solutions in random satisfiability problems: a statistical mechanics approach.随机可满足性问题中的隐藏解:一种统计力学方法。
Phys Rev Lett. 2002 May 6;88(18):188701. doi: 10.1103/PhysRevLett.88.188701. Epub 2002 Apr 18.