Underwater acoustic communication physical layer key generation scheme

被引:0
|
作者
Liu J. [1 ]
Shen Z. [1 ]
Han Q. [1 ]
Liu J. [1 ]
机构
[1] School of Telecommunications Engineering, Xidian University, Xi'an
来源
关键词
Compensation centralized quantization; Key generation; Local pilot; Nearby eavesdroppers; Unmanned underwater vehicle;
D O I
10.11959/j.issn.1000-436x.2019027
中图分类号
学科分类号
摘要
To ensure the communication safety of unmanned underwater vehicle, a physical layer key generation scheme of underwater acoustic channel based on orthogonal frequency division multiplexing (OFDM) system was proposed. First, a local pilot assistance channel sounding protocol was proposed to solve the reciprocity impaired caused by the great propagation delay in the underwater acoustic channel, ensure high key randomness and enhance the defenses against nearby eavesdroppers. Secondly, double-layer compensation centralized combined with adaptive guard interval quantization method was proposed to improve key agreement rate and key generation rate. Simulation results show that the scheme effectively overcomes the problems of impaired reciprocity and ensures high key generation rate and high randomness on the premise that the key agreement is superior to the existing schemes. © 2019, Editorial Board of Journal on Communications. All right reserved.
引用
收藏
页码:111 / 117
页数:6
相关论文
共 18 条
  • [1] Liu C.Y., Hong Y.W.P., Lin P.H., Et al., Jamming-resistant frequency hopping system with secret key generation from channel observations, 2016 IEEE Information Theory Workshop, pp. 46-50, (2016)
  • [2] Zhou H., Huie L.M., Lai L.F., Secret key generation in the two-way relay channel with active attackers, IEEE Transactions on Information Forensics and Security, 9, 3, pp. 476-488, (2014)
  • [3] Xiao S.F., Guo Y.F., Huang K.Z., Et al., High-rate secret key generation aided by multiple relays for Internet of things, Electronics Letters, 53, 17, pp. 1198-1200, (2017)
  • [4] Xu P., Cumanan K., Ding Z.G., Et al., Group secret key generation in wireless networks: algorithms and rate optimization, IEEE Transactions on Information Forensics & Security, 11, 8, pp. 1831-1846, (2016)
  • [5] Thai C.D.T., Lee J., Quek T.Q.S., Secret group key generation in physical layer for mesh topology, IEEE Global Communications Conference, pp. 1-6, (2015)
  • [6] Wu X.H., Peng Y.X., Hu C.J., Et al., A secret key generation method based on CSI in OFDM-FDD system, 2013 IEEE Globecom Workshops (GC WKSHPS), pp. 1297-1302, (2013)
  • [7] Qin D.R., Ding Z., Exploiting multi-antenna non-reciprocal channels for shared secret key generation, IEEE Transactions on Information Forensics and Security, 11, 12, pp. 2693-2705, (2016)
  • [8] Liu Y.C., Jing J.W., Yang J., Secure underwater acoustic communication based on a robust key generation scheme, 20089th International Conference on Signal Processing, pp. 1838-1841, (2008)
  • [9] Luo Y., Pu L.N., Peng Z., Et al., RSS-based secret key generation in underwater acoustic networks: advantages, challenges, and performance improvements, IEEE Communications Magazine, 54, 2, pp. 32-38, (2016)
  • [10] Huang Y., Zhou S.L., Shi Z.J., Et al., Channel frequency response-based secret key generation in underwater acoustic systems, IEEE Transactions on Wireless Communications, 15, 9, pp. 5875-5888, (2016)