Secret key generation based on signal power allocation optimisation

被引:1
作者
Lu, Xinjin [1 ]
Lei, Jing [1 ]
Li, Wei [1 ]
机构
[1] Natl Univ Def Technol, Coll Elect Sci & Technol, Changsha, Peoples R China
基金
中国国家自然科学基金;
关键词
AGREEMENT;
D O I
10.1049/cmu2.12422
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
With the rapid development of wireless communication, the use of the inherent features of wireless channels to enhance and supplement existing security mechanisms has attracted widespread attention. In this work, a key generation scheme based on power allocation optimisation is proposed. The subchannel state information obtained from channel probing is employed to allocate signal power. Furthermore, an improved channel probing process is designed to implement the optimisation scheme of power allocation. Theoretical analysis and simulation results show that this optimisation scheme can obtain higher key capacity, and the superiority is more prominent when the signal-to-noise ratio is low. Besides, the key bits mismatch rate of the proposed optimisation scheme is decreased and the corresponding key generation rate is higher compared with the benchmark.
引用
收藏
页码:1724 / 1730
页数:7
相关论文
共 11 条
[1]   COMMON RANDOMNESS IN INFORMATION-THEORY AND CRYPTOGRAPHY .1. SECRET SHARING [J].
AHLSWEDE, R ;
CSISZAR, I .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1993, 39 (04) :1121-1132
[2]  
Cheng, 2016, CONCURRENCY COMPUT P
[3]   Classifications and Applications of Physical Layer Security Techniques for Confidentiality: A Comprehensive Survey [J].
Hamamreh, Jehad M. ;
Furqan, Haji M. ;
Arslan, Huseyin .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (02) :1773-1828
[4]   Cryptographic key agreement for mobile radio [J].
Hassan, AA ;
Stark, WE ;
Hershey, JE ;
Chennakeshu, S .
DIGITAL SIGNAL PROCESSING, 1996, 6 (04) :207-212
[5]   Secured Key Management Scheme for Multicast Network Using Graphical Password [J].
Lavanya, S. ;
SaravanaKumar, N. M. ;
Vijayakumar, V. ;
Thilagam, S. .
MOBILE NETWORKS & APPLICATIONS, 2019, 24 (04) :1152-1159
[6]   Secure communications via sending artificial noise by both transmitter and receiver: optimum power allocation to minimise the insecure region [J].
Li, Wei ;
Tang, Yanqun ;
Ghogho, Mounir ;
Wei, Jibo ;
Xiong, Chunlin .
IET COMMUNICATIONS, 2014, 8 (16) :2858-2862
[7]   A Joint Angle and Distance based User Pairing Strategy for Millimeter Wave NOMA Networks [J].
Lu, Xiaolin ;
Zhou, Yong ;
Wong, Vincent W. S. .
2020 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2020,
[8]  
MAURER UM, 1993, IEEE T INFORM THEORY, V39, P733, DOI 10.1109/18.256484
[9]   Information-Theoretically Secret Key Generation for Fading Wireless Channels [J].
Ye, Chunxuan ;
Mathur, Suhas ;
Reznik, Alex ;
Shah, Yogendra ;
Trappe, Wade ;
Mandayam, Narayan B. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2010, 5 (02) :240-254
[10]  
Yongqiang Z., 2014, COMPUT KNOWL TECHNOL, V000, P6064