姚念民

个人信息Personal Information

教授

博士生导师

硕士生导师

任职 : 智能计算教研室主任

性别:男

毕业院校:吉林大学

学位:博士

所在单位:计算机科学与技术学院

学科:计算机应用技术. 计算机软件与理论

办公地点:创新园大厦A820

联系方式:13304609362

电子邮箱:lucos@dlut.edu.cn

扫描关注

论文成果

当前位置: 姚念民欢迎报考硕博士 >> 科学研究 >> 论文成果

Efficient key generation leveraging channel reciprocity and balanced gray code

点击次数:

论文类型:期刊论文

发表时间:2019-02-01

发表刊物:WIRELESS NETWORKS

收录刊物:SCIE、EI

卷号:25

期号:2

页面范围:611-624

ISSN号:1022-0038

关键字:Key generation; Channel reciprocity; Balanced gray code; Wireless networks

摘要:Key generation leveraging wireless channel reciprocity can establish secret keys from unauthenticated broadcast channels and thus protect the communication of wireless networks. However, in real environments, the measurements collected by the involved transceivers might have many discrepancies due to the non-simultaneous directional measurements and other factors, such as hardware differences and asymmetric interferences. Meanwhile, if the multi-level quantization in conjunction with source coding is implemented to convert measurements to bits, the resulting high bit mismatch rate makes key agreement inefficient and insecure. In this paper, key generation schemes leveraging channel reciprocity and balanced gray code are proposed. To enhance the efficiency of key generation, an efficient encoding scheme based on balanced gray code is carried out during key generation. The proposed encoding scheme can simultaneously reduce the bit mismatch rate and improve the secret bit rate. In addition, the code book is reusable once it is generated. The proposed key generation schemes can be classified into the uniform and non-uniform schemes according to different quantization processes. Several experiments in real mobile environments are conducted to validate the proposed schemes. The received signal strength measurements are extracted from heterogeneous devices as statistics of channel states in each experiment. The results of these experiments show that (1) the proposed encoding scheme significantly enhances the efficiency of key generation; (2) both the uniform and non-uniform schemes can efficiently generate secret keys between heterogeneous transceivers.