Native Security Scheme Based on Physical Layer Chain Key for Encryption and Authentication

被引:1
作者
Jin, Liang [1 ]
Hu, Xiaoyan [1 ]
Sun, Xiaoli [1 ]
Lou, Yangming [1 ]
Huang, Kaizhi [1 ]
Zhong, Zhou [1 ]
Xu, Xiaoming [1 ]
机构
[1] PLA Strateg Support Force Informat Engn Univ, Zhengzhou, Peoples R China
来源
2021 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE WORKSHOPS (WCNCW) | 2021年
基金
中国国家自然科学基金;
关键词
Physical layer security; physical layer key; chain key; encryption; authentication;
D O I
10.1109/WCNCW49093.2021.9420012
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
To solve the problem that key is susceptible to eavesdroppers in the correlated channel scenarios, in this paper, we propose a native security scheme based on physical layer chain keys, which can be used for encryption and authentication. First, the physical layer chain key is generated by performing XOR operation on the updated key and the previous chain key, where the updated key is obtained by the current channel state information. The proposed scheme uses the chain key as the authentication root, and the authentication relationship is continuously transferred as the chain grows. Then, CRC is used to realize identity authentication and message verification simultaneously. Finally, the derivation based on information theory proves the security of chain key for encryption and authentication. The simulation results show that the proposed chain key scheme can leak less information and have a lower probability of successful attack than the traditional physical layer key in the correlated channel scenarios.
引用
收藏
页数:7
相关论文
共 18 条
[1]  
[Anonymous], 2019, N 2019 IEEE 89 VEH T, DOI DOI 10.1007/978-3-030-16194-1_1
[2]  
Gopinath S, 2014, IEEE GLOBE WORK, P1367, DOI 10.1109/GLOCOMW.2014.7063624
[3]   MNOS: a mimic network operating system for software defined networks [J].
Hu, Hongchao ;
Wang, Zhenpeng ;
Cheng, Guozhen ;
Wu, Jiangxing .
IET INFORMATION SECURITY, 2017, 11 (06) :345-355
[4]  
Hu X., 2020, SECURITY COMMUNICATI, P1
[5]  
Jakes W. C., 1994, MICROWAVE MOBILE COM
[6]  
Jin L, 2020, IEEE INT CONF COMMUN, P1092, DOI [10.1109/ICCC49849.2020.9238873, 10.1109/iccc49849.2020.9238873]
[7]   High-Agreement Uncorrelated Secret Key Generation Based on Principal Component Analysis Preprocessing [J].
Li, Guyue ;
Hu, Aiqun ;
Zhang, Junqing ;
Peng, Linning ;
Sun, Chen ;
Cao, Daming .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2018, 66 (07) :3022-3034
[8]  
Liming P., 2018, IEEE T MOBILE COMPUT, V18, P507
[9]   Exploiting Multi-Antenna Non-Reciprocal Channels for Shared Secret Key Generation [J].
Qin, Dongrun ;
Ding, Zhi .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (12) :2693-2705
[10]  
Ren Q., CHINESE J ELECTRON, V29