Please wait a minute...
 首页  期刊介绍 期刊订阅 联系我们
 
最新录用  |  预出版  |  当期目录  |  过刊浏览  |  阅读排行  |  下载排行  |  引用排行  |  百年期刊
Journal of Tsinghua University(Science and Technology)    2015, Vol. 55 Issue (8) : 831-837     DOI:
ELECTRONIC ENGINEERING |
Security of a position-based secret key generation method
LUAN Fengyu1, ZHANG Yan2, ZHENG Fanfan3, XU Xibin4, ZHOU Shidong1,4
1. Department of Electronic Engineering, Tsinghua University, Beijing 100084, China;
2. School of Information and Electronics, Beijing Institute of Technology, Beijing 100081, China;
3. Communication Engineering Department, Xiamen University, Xiamen 361005, China;
4. Tsinghua National Laboratory for Information Science and Technology, Tsinghua University, Beijing 100084, China
Download: PDF(1100 KB)  
Export: BibTeX | EndNote | Reference Manager | ProCite | RefWorks    
Abstract  With the increasing demand for security, many systems take advantage of channel randomness to generate secret keys. However, when an eavesdropper has good knowledge of the environmental information and the position information of legal users, this method is not absolutely safe. The scattering environmental information cannot be kept secret but the system can still be secure based on the uncertainty of the positions of legal users due to the users movements and the limited observation ability of the eavesdroppers. This study analyzes the security of the position-based secret keys generation method with the security measured by the secret key rates. The calculational errors of the positions of the legal users in different scenarios (LOS, NLOS and different numbers of scattering objects) are analyzed first. Then, the impacts of the distance observation error, the azimuth observation error and the number of observations in each secret key generation period on the secret key rates are analyzed in simulations. The results show that the uncertainty of the positions of legal users can be used to provide security for the secret keys.
Keywords wireless communication      the positions information of users      secret key rate      scattering environment     
ZTFLH:  TN929.5  
Issue Date: 15 August 2015
Service
E-mail this article
E-mail Alert
RSS
Articles by authors
LUAN Fengyu
ZHANG Yan
ZHENG Fanfan
XU Xibin
ZHOU Shidong
Cite this article:   
LUAN Fengyu,ZHANG Yan,ZHENG Fanfan, et al. Security of a position-based secret key generation method[J]. Journal of Tsinghua University(Science and Technology), 2015, 55(8): 831-837.
URL:  
http://jst.tsinghuajournals.com/EN/     OR     http://jst.tsinghuajournals.com/EN/Y2015/V55/I8/831
   
   
   
   
   
   
   
[1] Wallace J W, Sarma R K. Automatic secret keys from reciprocal MIMO wireless channels: measurement and analysis [J]. Trans on Information Forensics and Security, 2010, 5(3): 381-392.
[2] Wallace J W, Chen C, Jensen M A. Key generation exploiting MIMO channel evolution: algorithms and theoretical limits [C]// EUCAP 2009. Berlin, German: IEEE Press, 2009: 1499-1503.
[3] Wallace J W. Secure physical layer key generation schemes: performance and information theoretic limits [C]// ICC 09. Dresden, German: IEEE Press. 2009: 1-5.
[4] Wang Q, Su H, Ren K, et al. Fast and scalable secret key generation exploiting channel phase randomness in wireless networks [C]// Infocom 2011. Shanghai, China: IEEE Press, 2011: 1422-1430.
[5] Gungor O, Chen F, Koksal C E. Secret key generation from mobility [C]// Globecom 2011. Houston, USA: IEEE Press, 2011: 874-878.
[6] Gungor O, Chen F, Koksal C E. Secret key generation via locatlization and mobility in wireless networks [DB/OL]. [2014-10-01]. http://arxiv.org/abs/1112.2793v5.
[7] Zhang X D, Liang Y C. Prefiltering-based ESPRIT for estimating parameters of sinusoids in non-Gaussian ARMA noise [J].IEEE Trans Signal Processing, 1993, 43(1): 349-353.
[8] Fleury B H, Henri B. High-resolution channel parameter estimation for MIMO application using the SAGE algorithm [C]// 2002 International Zurich Seminar on Broadband communications. Zurich, Switzerland: IEEE Press, 2002: 301-309.
[9] Wyner A. The wire-tap channel [J]. Bell Syst Tech J, 1975, 54(8): 1355-1387.
[10] Bloch M R, Laneman J N. Secrecy form resolvability [DB/OL]. [2014-10-01].http://arxiv.org/abs/1105.5419v3.
[11] Chan Y T. A simple and efficient estimation for hyperbolic location [J]. IEEE Trans Signal Processing, 1994, 42(8): 1905-1915.
[12] Foy W. Position-location solutions by Taylor series estimation [J]. IEEE on Aerospace and Electronic Systems, 1976, 12(3): 187-194.
[13] Schau H C. Passive source localization employing interesting spherical surfaces from time of arrival differences [J]. IEEE Trans Acoustics, Speech and Signal Processing, 1987, 35(8): 1223-1225.
[1] WANG Kaifeng, ZHANG Qi, LIU Chang, DU Yazhen, CHEN Ningning, GAO Ying. Software-defined railway wireless communication network[J]. Journal of Tsinghua University(Science and Technology), 2019, 59(2): 142-147.
[2] MI Xiang, ZHAO Ming, XU Xibin, WANG Jing. Resource optimization for D2D communications based on statistical QoS provisioning[J]. Journal of Tsinghua University(Science and Technology), 2017, 57(12): 1296-1302.
[3] LI Tao, LUAN Fengyu, ZHOU Shidong. Secret key generation strategy based on broadband channel state information[J]. Journal of Tsinghua University(Science and Technology), 2017, 57(10): 1009-1013.
[4] NIU Yong, FENG Ziqi, LI Yong, JIN Depeng, SU Li. Timing tracking methods in millimeter-wave wireless communications[J]. Journal of Tsinghua University(Science and Technology), 2017, 57(1): 61-66.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
Copyright © Journal of Tsinghua University(Science and Technology), All Rights Reserved.
Powered by Beijing Magtech Co. Ltd