首页> 外文学位 >Localization-based Secret Key Agreement for Wireless Network.
【24h】

Localization-based Secret Key Agreement for Wireless Network.

机译:无线网络基于本地化的密钥协议。

获取原文
获取原文并翻译 | 示例

摘要

Due to the shared nature of wireless medium, generating secret key between legitimate nodes under the presence of eavesdroppers remains challenging in wireless network environment. In this research, a framework of secret key agreement utilizing observations of nodes relative location is considered. While many current works concern secret key generation only for 3-nodes (2 legitimate nodes and 1 eavesdropper), this research proposes an approach and analysis for a wireless network environment with m (m>3) legitimate nodes and 1 eavesdropper. The proposed algorithm uses the distance between a randomly selected node 1 and node 2 as the Reference Distance (RD) to establish the secret key. In order to secure the delivery of RD to other m-2 nodes, an Additive Distance Value (ADV) is used for public discussion. Further, different types of topologies are developed to accomplish secret key agreement for m node wireless network including star, chain and hybrid topologies. After the ADV distribution and RD estimation, the secret key is generated through secret bit extraction. The Maximum achievable Secret key generation Rate (MSR) based on the above network topologies is studied through theoretical analysis and mathematical estimation. Based on these analyze, the feasibility of proposed secret key generation algorithm is validated with a comparable secret key generation rate. The relationship between secret key, wireless network size and signal-noise ratio has been identified. Moreover, a comparison between star topology, chain topology and hybrid topology has been discussed. After that, several wireless network models including random patterned moving wireless nodes are studied to show the feasibility and performance of our proposed secret key generation algorithm. A chain topology improving method is proposed based on the wireless network model simulation. Last but not the lease, in order to reduce the bit mismatch rate, an optional secret key agreement procedure is also proposed. In all, this research studies the secret key agreement based on localization information in an m node wireless network under the presence of eavesdroppers.
机译:由于无线介质的共享性质,在窃听者的存在下在合法节点之间生成秘密密钥在无线网络环境中仍然具有挑战性。在这项研究中,考虑了利用节点相对位置的观察结果的秘密密钥协议框架。尽管许多当前的工作仅涉及3个节点(2个合法节点和1个窃听者)的秘密密钥生成,但本研究提出了一种针对具有m(m> 3个合法节点和1个窃听者)的无线网络环境的方法和分析。所提出的算法使用随机选择的节点1和节点2之间的距离作为参考距离(RD)来建立密钥。为了确保将RD传递到其他m-2节点,将使用“相距距离值”(ADV)进行公开讨论。此外,开发了不同类型的拓扑以完成用于m个节点无线网络的秘密密钥协议,包括星型,链型和混合型拓扑。在进行ADV分配和RD估计后,通过秘密位提取生成秘密密钥。通过理论分析和数学估计,研究了基于上述网络拓扑的最大可实现密钥生成率(MSR)。基于这些分析,以可比较的密钥生成速率验证了所提出的密钥生成算法的可行性。已经确定了密钥,无线网络大小和信噪比之间的关系。此外,还讨论了星形拓扑,链形拓扑和混合拓扑之间的比较。之后,研究了包括随机模式移动无线节点在内的几种无线网络模型,以证明我们提出的密钥生成算法的可行性和性能。提出了一种基于无线网络模型仿真的链拓扑改进方法。最后但不是租赁,为了降低比特不匹配率,还提出了可选的秘密密钥协商程序。总之,这项研究研究了在窃听者存在的情况下基于m节点无线网络中定位信息的秘密密钥协议。

著录项

  • 作者

    Wu, Qiang.;

  • 作者单位

    The University of Toledo.;

  • 授予单位 The University of Toledo.;
  • 学科 Electrical engineering.
  • 学位 M.S.
  • 年度 2015
  • 页码 192 p.
  • 总页数 192
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号