首页> 外文会议>IEEE International Workshop on Signal Processing Advances in Wireless Communications >Overcoming limitations of secret key generation in block fading channels under active attacks
【24h】

Overcoming limitations of secret key generation in block fading channels under active attacks

机译:克服主动攻击下块衰落信道中秘密密钥生成的限制

获取原文

摘要

The topic of physical layer key agreement in Gaussian block fading channels in the presence of active adversaries is investigated in the present contribution. Frequency hopping versus frequency spreading are studied as potential defence strategies against denial of service (DoS) attacks in the form of jamming. We begin by investigating the optimal power allocation policy for the jammer - in the case of frequency spreading - when side information is available. Through numerical evaluations it is shown that effect of the availability of side information on the jammer's impact is minimal. Next, the competitive interaction between the legitimate nodes and the jammer is formulated as a one-shot zero-sum game; it is found that under short term power constraints, the legitimate nodes should not always employ frequency hopping while the jammer should always use frequency spreading. This result contradicts the common practice of using frequency hopping to defend against jamming attacks in standard wireless systems.
机译:在本贡献中,研究了在存在活跃对手的情况下高斯块衰落信道中物理层密钥协商的主题。跳频与扩频之间的关系被研究为潜在的防御策略,以干扰的形式抵制拒绝服务(DoS)攻击。我们首先研究在有辅助信息的情况下干扰器的最佳功率分配策略(在频率扩展的情况下)。通过数值评估表明,辅助信息的可用性对干扰机的影响是最小的。接下来,合法节点与干扰器之间的竞争性互动被公式化为一次零和博弈。发现在短期功率约束下,合法节点不应该总是使用跳频,而干扰源应该总是使用频率扩展。此结果与使用跳频防御标准无线系统中的干扰攻击的常规做法相矛盾。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号