Font Size: a A A

Physical-layer Security And Wireless Dynamic Secret Key Protocol

Posted on:2016-07-31Degree:MasterType:Thesis
Country:ChinaCandidate:T ZhangFull Text:PDF
GTID:2348330488474412Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
Wireless communication is based on open medium. Though the openness of medium can make communication more convenient, it also may turn into hidden danger of communication security. Wireless channel is a natural broadcast channel, the eavesdroppers can make an attack more easily, and this can lead to a decrease on the security of wireless communication.This paper mainly discusses the key agreement mechanism in wireless channels. To strengthen the security of wireless channels, a dynamic key protocol is put forward. The basic ideas of dynamic key protocol is that, updating the key with the message transmitted, which makes the eavesdroppers hardly break the key in time. Key updating can also solve the problem of key lost.In this paper, we first discuss the security problem of wireless physical layer and some security solution. Then we propose a security solution of using a dynamic key protocol to solve the problem of physical-layer security. In the process of building up the dynamic key protocol, we emphatically introduce the concept of dynamic secrets, the method for extracting dynamic secrets and the method for updating key. A dynamic secret is a sequence which is extracted from the message transmitted, it can be used for updating key. In order to ensure the performance and security of the protocol, some restrictions, such as the speed and frequency of extracting dynamic secrets, are made into the method for extracting dynamic secrets. The concept of updating secret keys is that the protocol can update the key without the artificial help. In the process of updating secret keys, we mainly need think over the security of the key, the timeliness of updating the key and the method for disposing the weak key. After discussing the protocol, we compare it with other protocols and analysis its advantages. At last, we discuss the protocol's realization process and analysis its performance. In order to test the protocol's performance and security, we design an experimental procedure. Then we summarize the pattern from the data tested by us to analysis the protocol's performance and security.The experiment results illustrate that our protocol is more secure, efficient and practical.
Keywords/Search Tags:dynamic secret key, key agreement, updating key, physical-layer security
PDF Full Text Request
Related items