Font Size: a A A

A Kind Of Key Generation Algorithm And Scheme Based On Wireless Channel

Posted on:2018-04-17Degree:MasterType:Thesis
Country:ChinaCandidate:J L SongFull Text:PDF
GTID:2348330521951528Subject:Engineering
Abstract/Summary:PDF Full Text Request
With the advent of the era of information,the network has become an indispensable part of people's life.Internet connect all over the world and brought a lot of convenience.At the same time,network security has become the subject of much attention.With the rapid development of mobile information era,the status of the wireless network rapid ascension,wireless network security is becoming more and more important.In traditional encryption methods cannot well adapt to the wireless network,to develop a new type of key generation system appears especially important.The physical layer key generation algorithm is a new encryption method,when the distance between two wireless terminals Alice and Bob over ?/2(? represents the wavelength of the wireless network),characteristics of the physical channel between Alice and Bob is different form the characteristics of the physical channel Alice and Bob between other nodes.Based on this characteristics of the wireless network,information can be extracted through the network channels,such as RSS(Received Signal Strength,the Received Signal Strength),CSI(the Channel State Information,the Channel State Information)and using some algorithm to quantify the channel characteristics and produce safe,reliable key.The existing quantization algorithm is widespread has a low utilization,a slow key generation rate and a bad characteristics of the randomness.In addition,Current research on characteristics of the physical channel key generation system is mostly two terminal for peer-to-peer interaction,without reference to the third node forwards.To solve these problems,This paper puts forward some new solutions and make the corresponding test and evaluation,the main content includes :(1)Design a new interval key generation algorithm,through raising the utilization coefficient of sample and improve each sample to quantify the number keys to a sharp rising the key generation rate.The paper introduces the existing disadvantages of the original algorithm and puts forward some ideas and designs.Then the key generation system is analyzed and modeled.Finally,the design idea of interval key generation algorithm is analyzed and the advantages of the algorithm are analyzed.(2)We design a new key stitching algorithm to assist interval key generation algorithm,through the key resolution and reorganization splicing ascending the randomness of the entropy of the key and increase the safety and reliability of the key.The key stitching algorithm firstly introduces the disadvantages of direct splicing.Then raise the idea of splicing.Finally,the concrete implementation scheme and use case display of the algorithm are given.The key splicing algorithm needs to generate a series of keys from the interval algorithm and the basic algorithm,the two keys are then separated by a certain set of rules,and then a new key is made by splicing the broken child key string.(3)We design a containing relay node scheme of key generation for extension to the original point to point communication mode,for the system to provide greater scope and improve the safety of the key performance indicators by relay nodes.In this paper,the limitation of point communication is analyzed first,and when the two terminals are too far away or the signal strength is insufficient,the connection cannot be established directly.Then the innovative thinking and design objectives of key generation solution based on the relay nodes were proposed.Finally,the scheme is designed in detail,and a related application scenario is proposed,which analyzes the advantages of the scheme.(4)interval key generation algorithm and key stitching algorithm are discussed in detailed test and evaluation,in a variety of different scenarios with different types of samples to test the new algorithm,provide the actual data support for the theoretical analysis of the algorithm.The tests were conducted using RSS and CSI and there are three categories: performance comparison testing,parameter configuration testing,and scenario compatibility test.
Keywords/Search Tags:the physical layer security, wireless channel, key generation algorithm, relay nodes
PDF Full Text Request
Related items