Abstract:When the propagation environment does not change, the only factor that can lead to uncertainties in the key generation rate is the changing position of the user. This study analyzes the relationship between the user position variation and the wireless key generation rate with the key generation rate limit analyzed for scenarios in two static environments. The results show that in an astatic channel environment where the user positions are changing, the channel distribution is not Gaussian and the secret key generation rate is only affected by changes in the user position. The upper bound on the secret key generation rate is estimated numerically based on the channel error for the simple reflection scene. For the scattering scene, the results show that the key generation rate is high enough when the user position changes about one wavelength.
周世东, 杨志, 肖立民. 基于用户位置变化的密钥生成速率[J]. 清华大学学报(自然科学版), 2017, 57(8): 862-866.
ZHOU Shidong, YANG Zhi, XIAO Limin. Key generation rate analysis with changes in the user position. Journal of Tsinghua University(Science and Technology), 2017, 57(8): 862-866.
Hassana A A, Starkb W E, Hersheyc J E, et al. Cryptographic key agreement for mobile radio[J]. Digital Signal Processing, 1996, 6(4):207-212.
[2]
Jin R, Du X, Zeng K, et al. Delay analysis of physical-layer key generation in dynamic roadside-to-vehicle networks[J]. IEEE Transactions on Vehicular Technology, 2017, 66(3):2526-2535.
[3]
Jana S, Premnath S N, Clark M, et al. On the effectiveness of secret key extraction from wireless signal strength in real environments[C]//Proceedings of the 15th Annual International Conference on Mobile Computing and Networking. Beijing, 2009:321-332.
[4]
Li X, Liu J, Yao Q, et al. Efficient and consistent key extraction based on received signal strength for vehicular ad hoc networks[J/OL]. IEEE Access, 2017[2016-11-08]. http://ieeexplore.ieee.org/document/7884974/. DOI:10.1109/ACCESS.2017.2685627.
[5]
Wang Q, Su H, Ren K, et al. Fast and scalable secret key generation exploiting channel phase randomness in wireless networks[C]//31st IEEE International Conference on Computer Communications (INFOCOM). Shanghai, 2011:1422-1430.
[6]
Zeng K, Wu D, Chan A, et al. Exploiting multiple-antenna diversity for shared secret key generation in wireless networks[C]//30th IEEE International Conference on Computer Communications (INFOCOM). San Diego, CA, 2010:1-9.
[7]
He X, Dai H, Shen W, et al. Toward proper guard zones for link signature[J]. IEEE Transactions on Wireless Communications, 2016, 15(3):2104-2117.
[8]
Marino F, Paolini E, Chiani M. Secret key extraction from a UWB channel:Analysis in a real environment[C]//2014 IEEE International Conference on Ultra-Wideband (ICUWB). Paris, 2014:80-85.
[9]
Tunaru I, Denis B, Perrier R, et al. Cooperative group key generation using IR-UWB multipath channels[C]//2015 IEEE International Conference on Ubiquitous Wireless Broadband (ICUWB). Montreal, 2015:1-5.
[10]
Wallace J. Secure physical layer key generation schemes:Performance and information theoretic limits[C]//IEEE International Conference on Communications. Dresden, 2009:1-5.
[11]
栾凤宇, 张焱, 郑繁繁, 等. 基于用户位置信息的密钥生成安全性[J]. 清华大学学报(自然科学版), 2015, 55(8):831-837.LUAN Fengyu, ZHANG Yan, ZHENG Fanfan, et al. Security of a position-based secret key generation method[J]. Journal of Tsinghua University (Science and Technology), 2015, 55(8):831-837. (in Chinese)
[12]
Gungor O, Chen F, Koksal C E. Secret key generation via localization and mobility[J]. IEEE Transactions on Vehicular Technology, 2014, 64(6):2214-2230.
[13]
Maurer U M. Secret key agreement by public discussion from common information[J]. IEEE Transactions on Information Theory, 1993, 39(3):733-742.