Time-Varying Underwater Acoustic Channel Based Physical Layer Secret Key Generation Scheme

被引:0
作者
Xu M. [1 ,2 ]
Fan Y. [1 ]
Jiang C. [2 ,3 ]
机构
[1] College of Information Engineering, Shanghai Maritime University, Shanghai
[2] College of Electronics and Information Engineering, Tongji University, Shanghai
[3] Key Laboratory of Embedded System and Service Computing(Tongji University), Ministry of Education, Shanghai
来源
Jisuanji Yanjiu yu Fazhan/Computer Research and Development | 2019年 / 56卷 / 12期
基金
中国博士后科学基金; 中国国家自然科学基金;
关键词
Key agreement; Physical layer; Privacy amplification; Rényi entropy; Underwater acoustic channel;
D O I
10.7544/issn1000-1239.2019.20190040
中图分类号
学科分类号
摘要
With the continuous development of wireless networks, the security of physical layer has gradually become the focus of widespread concern. Concerning the problem of how to extract a highly confidential key from the source information when legitimate nodes have more uncertainty than that of eavesdropping node under the circumstances of multipath and Doppler effects in underwater acoustic channel, a time-varying underwater acoustic channel based physical layer secret key generation scheme is proposed. For the first time, the α order Rényi entropy with multipath and Doppler effects is accurately depicted, and the uncertainty of the source sequence from the legitimate nodes and the eavesdropping node is also obtained. On this basis, a key agreement protocol with strong security is proposed, which uses Hash function to construct one-variable high-order polynomial to complete identity authentication for both sides of communication and to realize secure transmission of index sequence and preselected key under the public channel. Moreover, a privacy amplification protocol against active attacks is designed using bilinear mapping, which does not depend on the length and randomness of the random seed. The robustness, confidentiality and correctness of the scheme are proved by the information theory. The simulation results show that the upper bound of key leakage rate is 3.74×10-6 and the upper bound of active attack success rate is 5.468×10-20 when the amount of the source information is 50 000 b, which verifies the feasibility of the proposed scheme. © 2019, Science Press. All right reserved.
引用
收藏
页码:2660 / 2670
页数:10
相关论文
共 22 条
[1]  
Yang Y., Zhang Y., Li Z., Et al., RAKA: New authenticated key agreement protocol based on Ring-LWE, Journal of Computer Research and Development, 54, 10, pp. 2187-2192, (2017)
[2]  
Chen M., Strongly secure anonymous implicit authentication and key agreement for roaming service, Journal of Computer Research and Development, 54, 12, pp. 2772-2784, (2017)
[3]  
Zhang Q., Gan Y., Wang R., Et al., Inter-cluster asymmetric group key agreement, Journal of Computer Research and Development, 55, 12, pp. 2651-2663, (2018)
[4]  
Chen D., Research on physical layer security protocol in wireless network, (2014)
[5]  
Waqas M., Ahmed M., Li Y., Et al., Social-aware secret key generation for secure device-to-device communication via trusted and non-trusted relays, IEEE Transactions on Wireless Communications, 17, 6, pp. 3918-3930, (2018)
[6]  
Li G., Hu A., Zhang J., Et al., High-agreement uncorrelated secret key generation based on principal component analysis pre-processing, IEEE Transactions on Communications, 66, 7, pp. 3022-3034, (2018)
[7]  
Sun D., Zheng C., Cui H., Et al., Developing status and some cutting-edge issues of underwater sensor network localization technology, Scientia Sinica Informationis, 48, 9, pp. 1121-1136, (2018)
[8]  
Wang D., Shang E., Underwater Acoustics, (2013)
[9]  
Bennett G.H., Brassard G., Crepeau C., Et al., Generalized privacy amplification, IEEE Transactions on Information Theory, 41, 6, pp. 1915-1923, (1995)
[10]  
Khiabani Y.S., Wei S., A joint Shannon cipher and privacy amplification approach to attaining exponentially decaying information leakage, Information Sciences, 357, 3, pp. 6-22, (2016)