电信科学 ›› 2021, Vol. 37 ›› Issue (12): 32-41.doi: 10.11959/j.issn.1000-0801.2021260
黄晶晶
出版日期:
2021-12-20
发布日期:
2021-12-01
作者简介:
黄晶晶(1985- ),女,博士,北京赛西科技发展有限责任公司高级工程师,主要研究方向为工业信息安全
Jingjing HUANG
Online:
2021-12-20
Published:
2021-12-01
摘要:
无线体域网是以人体为中心的无线网络,受其有限的资源和计算能力的约束,如何保证无线体域网通信节点间共享密钥是当前面临的一大挑战。提出了一种基于超宽带无线体域网信道特征的密钥生成机制,利用超宽带信道多径相对时延与平均时延的差值量化生成密钥,降低了密钥不匹配率,同时引入辅助节点,提高了密钥生成速率。仿真结果表明,该机制能够在兼顾密钥一致性的前提下,获得较高的密钥生成速率并保证密钥的安全性。
中图分类号:
黄晶晶. 体域网中一种基于无线信道特征的密钥生成方法研究[J]. 电信科学, 2021, 37(12): 32-41.
Jingjing HUANG. Research on secret key generation based on wireless channel characteristics in body area network[J]. Telecommunications Science, 2021, 37(12): 32-41.
[1] | IEEE B E . IEEE Standard for local and metropolitan area networks part 15.6:wireless body area networks[S]. IEEE, 2012. |
[2] | DIFFLE W , H-ELLMAN M , . New directions in cryptography[J]. IEEE Transactions on Information Theory, 1976,22(6): 644-654. |
[3] | BLASS E , ZITTERBART M . Efficient implementation of elliptic curve cryptography for wireless sensor networks[R]. Technical report.Universitat Karlsruhe, 2005: 1-16. |
[4] | CHERUKURI S , VENKATASUBRAMANIAN K K , GUPTA S K S . Biosec:a biometric based approach for securing communication in wireless networks of biosensors implanted in the human body[C].// Proceedings of Parallel Processing workshops. Piscataway:IEEE Press, 2003: 432-439. |
[5] | POON C C Y , ZHANG Y T , BAO S D . A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health[J]. IEEE Communications Magazine, 2006,44(4): 73-81. |
[6] | VENKATASUBRAMANIAN K K , BANERJEE A , GUPTA S K S . EKG-based key agreement in Body Sensor Networks[C]// Proceedings of IEEE INFOCOM Workshops 2008. Piscataway:IEEE Press, 2008: 1-6. |
[7] | OVILLA-MARTINEZ B , ODíAZ-PéREZ A , GARZA-SALDA?A J J , . Key establishment protocol for a patient monitoring system based on PUF and PKG[C]// Proceedings of 2013 10th International Conference and Expo on Emerging Technologies for a Smarter World (CEWIT). Piscataway:IEEE Press, 2013: 1-6. |
[8] | VENKATASUBRAMANIAN K K , BANERJEE A , GUPTA S K S . PSKA:usable and secure key agreement scheme for body area networks[J]. IEEE Transactions on Information Technology in Biomedicine, 2010,14(1): 60-68. |
[9] | WU Y , Sun Y M , ZHAN L ,et al. Low mismatch key generation based on wavelet-transform trend and fuzzy vault in body area network[EB]. 2013. |
[10] | 龙航, 袁广翔, 王静 ,等. 物理层安全技术研究现状与展望[J]. 电信科学, 2011,27(9): 60-65. |
LONG H , YUAN G X , WANG J ,et al. Physical layer security:survey and Future Chinese full text[J]. Telecommunications Science, 2011,27(9): 60-65. | |
[11] | GOLDSMITH A . Wireless Communications[M]. Manchester UK: Cambridge University Press, 2005: 108-109. |
[12] | 周百鹏 . 基于无线信道特征提取的密钥生成技术研究[D]. 郑州:解放军信息工程大学, 2011. |
ZHOU B P . Research on secret key generation utilizing the wireless channel characteristics[D]. Zhengzhou:PLA Information Engineering University, 2011. | |
[13] | HASSAN A A , STARK W E , HERSHEY J E ,et al. Cryptographic key agreement for mobile radio[J]. Digital Signal Processing, 1996,6(4): 207-212. |
[14] | WANG Q , SU H , REN K ,et al. Fast and scalable secret key generation exploiting channel phase randomness in wireless networks[C]// 2011 Proceedings IEEE INFOCOM. Piscataway:IEEE Press, 2011: 1422-1430. |
[15] | WANG Q , XU K H , REN K . Cooperative secret key generation from phase estimation in narrowband fading channels[J]. IEEE Journal on Selected Areas in Communications, 2012,30(9): 1666-1674. |
[16] | AZIMI-SADJADI B , KIAYIAS A , MERCADO A ,et al. Robust key generation from signal envelopes in wireless networks[C]// Proceedings of the 14th ACM conference on Computer and communications security - CCS '07. New York:ACM Press, 2007: 401-410. |
[17] | MATHUR S , TRAPPE W , MANDAYAM N ,et al. Radio-telepathy:extracting a secret key from an unauthenticated wireless channel[C]// Proceedings of the 14th ACM international conference on Mobile computing and networking - MobiCom '08. New York:ACM Press, 2008: 128-139. |
[18] | JANA S , PREMNATH S N , CLARK M ,et al. On the effectiveness of secret key extraction from wireless signal strength in real environments[C]// Proceedings of the 15th annual international conference on Mobile computing and networking - MobiCom '09. New York:ACM Press, 2009: 321-332. |
[19] | AONO T , HIGUCHI K , OHIRA T ,et al. Wireless secret key generation for fading wireless channels[J]. IEEE Trans on Antennas and Propagation, 2005,53(11): 3776-3784. |
[20] | YE C X , MATHUR S , REZNIK A ,et al. Information-theoretically secret key generation for fading wireless channels[J]. IEEE Transactions on Information Forensics and Security, 2010,5(2): 240-254. |
[21] | REN K , SU H , WANG Q . Secret key generation exploiting channel characteristics in wireless communications[J]. IEEE Wireless Communications, 2011,18(4): 6-12. |
[22] | WILSON R , TSE D , SCHOLTZ R A . Channel identification:secret sharing using reciprocity in ultrawideband channels[J]. IEEE Transactions on Information Forensics and Security, 2007,2(3): 364-375. |
[23] | GHOREISHI MADISEH M , HE S , MCGUIRE M L ,et al. Verification of secret key generation from UWB channel observations[C]// Proceedings of 2009 IEEE International Conference on Communications. Piscataway:IEEE Press, 2009: 1-5. |
[24] | MADISEH M G , MCGUIRE M L , NEVILLE S S ,et al. Secret key generation and agreement in UWB communication channels[C]// Proceedings of IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference. Piscataway:IEEE Press, 2008: 1-5. |
[25] | HANLEN L W , SMITH D , ZHANG J A ,et al. Key-sharing via channel randomness in narrowband body area networks:is everyday movement sufficient?[C]// Proceedings of Proceedings of the 4th International ICST Conference on Body Area Networks. ICST, 2009: 1-8. |
[26] | ALI S T , SIVARAMAN V , OSTRY D . Secret key generation rate vs.reconciliation cost using wireless channel characteristics in body area networks[C]// Proceedings of 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing. Piscataway:IEEE Press, 2010: 644-650. |
[27] | ALI S T , SIVARAMAN V , OSTRY D . Zero reconciliation secret key generation for body-worn health monitoring devices[C]// Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks - WISEC '12. New York:ACM Press, 2012: 16-18. |
[28] | TSOURI G R , WILCZEWSKI J . Reliable symmetric key generation for body area networks using wireless physical layer security in the presence of an on-body eavesdropper[C]// ISABEL '11:Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies. 2011: 1-6. |
[29] | YAO L J , ALI S T , SIVARAMAN V ,et al. Decorrelating secret bit extraction via channel hopping in body area networks[C]// Proceedings of 2012 IEEE 23rd International Symposium on Personal,Indoor and Mobile Radio Communications - (PIMRC). Piscataway:IEEE Press, 2012: 1454-1459. |
[30] | YAO L J , ALI S , SIVARAMAN V ,et al. Improving secret key generation performance for on-body devices[C]// Proceedings of Proceedings of the 6th International ICST Conference on Body Area Networks. ACM, 2011: 19-22. |
[31] | ALI A , KHAN F A . A broadcast-based key agreement scheme using set reconciliation for wireless body area networks[J]. Journal of Medical Systems, 2014,38(5): 33. |
[32] | YAZDANDOOST K Y , SAYRAFIANPOVR K . Channel model for body area network (BAN)[EB]. 2008. |
[33] | MOLISCH A F , BALAKRISHNAN K , CASSIOLI D ,et al. IEEE 802.15.4a channel model - final report[EB]. 2004. |
[34] | RUKHIN A , SOTA J , NECHVATAL J ,et al. A statistical test suite for random and pseudorandom number generators for cryptographic applications[R]. National Institute of Standards and Technology, 2000. |
[35] | DODIS Y , OSTROVSKY R , REYZIN L ,et al. Fuzzy extractors:how to generate strong keys from biometrics and other noisy data[J]. SIAM Journal on Computing, 2008,38(1): 97-139. |
[36] | BRASSARD G , SALVAIL L . Secret-key reconciliation by public discussion[M]. Advances in Cryptology — EUROCRYPT ’93. Berlin,Heidelberg: Springer Berlin Heidelberg, 1994: 410-423. |
[37] | 郑严 . 公开信道密钥协商中的信息协调[D]. 重庆:西南大学, 2009. |
ZHENG Y . Information Reconciliation of Secret key Agreement on Public Channel[D]. Chongqing:Southwest University, 2009. | |
[38] | LAI L F , LIANG Y B , DU W L . PHY-based cooperative key generation in wireless networks[C]// Proceedings of 2011 49th Annual Allerton Conference on Communication,Control,and Computing (Allerton). Piscataway:IEEE Press, 2011: 662-669. |
[1] | 刘建国, 渠灏, 黄红明, 朱智丹. IPv6+智能骨干网络技术研究[J]. 电信科学, 2023, 39(5): 155-166. |
[2] | 孙宏伟, 曹雪虹, 焦良葆, 孟琳, 刘子恒, 袁枫. DS-TWR算法室内定位批量测距系统的优化研究[J]. 电信科学, 2022, 38(1): 73-82. |
[3] | 李楠楠, 韩瑜, 高宁, 金石. 基于幅度和相位联合分区的无线物理层密钥生成方法[J]. 电信科学, 2021, 37(5): 100-112. |
[4] | 赵红梅,赵杰磊. 超宽带室内定位算法综述[J]. 电信科学, 2018, 34(9): 130-142. |
[5] | 谭劲,张玉娟. 一种能量平衡的无线体域网络AODV多播路由发现协议[J]. 电信科学, 2016, 32(8): 69-76. |
[6] | 张衍志,叶小琴. WSN中基于周期性超宽带距离信息的女巫攻击检测[J]. 电信科学, 2016, 32(8): 110-117. |
[7] | 马玉军,陈敏,王军锋. 一种多等级无线体域网服务质量方法[J]. 电信科学, 2014, 30(5): 81-87. |
[8] | 姜全泽,来志远,陈方荣. 超宽带CMNet城域网优化组网策略[J]. 电信科学, 2013, 29(4): 131-140. |
[9] | 蔡康,唐宏,朱永庆. 超宽带城域网架构设计思路和关键技术浅析[J]. 电信科学, 2012, 28(1): 5-9. |
[10] | 欧亮,阮科,朱永庆,邹洁. 超宽带网络环境下的一体化自助指配技术研究[J]. 电信科学, 2012, 28(1): 21-25. |
[11] | 欧亮,阮科,朱永庆,邹洁. 超宽带网络环境下的一体化自助指配技术研究[J]. 电信科学, 2012, 28(1): 17-21. |
[12] | 刘国荣,刘东鑫,沈军,金华敏. 超宽带网络异常流量检测与防治技术探析[J]. 电信科学, 2012, 28(1): 22-25. |
[13] | . 超宽带网络异常流量检测与防治技术探析[J]. 电信科学, 2012, 28(1): 26-29. |
[14] | 赵红梅,田向,路立平. 一种新型平面超宽带天线的设计[J]. 电信科学, 2011, 27(8): 74-78. |
[15] | 董时菊,王海波,刘寅生. 利用TDD信道互易性和现有LTE帧结构实现信道预测[J]. 电信科学, 2011, 27(6): 68-73. |
阅读次数 | ||||||
全文 |
|
|||||
摘要 |
|
|||||
|