CN112073966A - Key extraction method and system based on wireless channel characteristics - Google Patents

Key extraction method and system based on wireless channel characteristics Download PDF

Info

Publication number
CN112073966A
CN112073966A CN202011254379.0A CN202011254379A CN112073966A CN 112073966 A CN112073966 A CN 112073966A CN 202011254379 A CN202011254379 A CN 202011254379A CN 112073966 A CN112073966 A CN 112073966A
Authority
CN
China
Prior art keywords
quantization
value
amplitude
communication
region
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011254379.0A
Other languages
Chinese (zh)
Other versions
CN112073966B (en
Inventor
马东堂
魏急波
熊俊
黄蕾
郭登科
曹阔
赵海涛
辜方林
张晓瀛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
National University of Defense Technology
Original Assignee
National University of Defense Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by National University of Defense Technology filed Critical National University of Defense Technology
Priority to CN202011254379.0A priority Critical patent/CN112073966B/en
Publication of CN112073966A publication Critical patent/CN112073966A/en
Application granted granted Critical
Publication of CN112073966B publication Critical patent/CN112073966B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a key extraction method and a system based on wireless channel characteristics, wherein in the scheme, a phase value sequence is screened by an amplitude value sequence and an amplitude screening threshold value, so that the condition that the key inconsistency rate is higher when the amplitude of a CFR estimation value is too large or too small due to random noise or other interference and the like can be effectively avoided, and the key inconsistency rate is reduced; in addition, the equal probability quantization area of the other communication party is determined according to the quantization mapping value sequence transmitted by the one communication party, so that the inconsistency rate of the keys generated by the two communication parties can be further reduced; furthermore, when the phase value sequence is screened, the phase value which is easy to quantize inconsistent key bits is deleted pertinently, so that the deleted data is less, and therefore, the generation rate of the key can be improved under the condition of ensuring the lower inconsistent rate of the key.

Description

Key extraction method and system based on wireless channel characteristics
Technical Field
The present invention relates to the field of communication security and transmission technologies, and in particular, to a key extraction method and system based on wireless channel characteristics.
Background
With the widespread use of wireless sensor networks, cryptography-based security mechanisms face many challenges in computational complexity and security, and physical layer key extraction has been widely studied as an alternative solution. The physical layer key extraction process generally comprises four steps of channel detection, feature quantization, information negotiation and privacy enhancement. The characteristic quantization means that two legal communication parties respectively quantize the channel characteristic measurement values obtained by respective detection into binary sequences so as to obtain an initial key. The characteristic quantization method can directly influence two mutually restricted performance indexes, namely the key inconsistency rate and the key generation rate in the key extraction process, and is a very important step in the key extraction process.
At present, the characteristic quantization in the key extraction of the physical layer is widely researched at home and abroad, and a plurality of characteristic quantization methods are proposed. The main characteristic Quantization methods include a double-threshold Quantization method, a Channel Quantization with Guard-band (CQG) method with a Guard isolation band, and a Channel Quantization (CQA) method based on interaction error. Although the double-threshold quantization method can ensure a low key inconsistency rate, more channel characteristic measurement values are discarded, and one channel characteristic measurement value can only be quantized to obtain a 1-bit key, so that the key generation rate is low. Both the CQG and CQA methods perform multi-bit quantization on channel characteristic measurement values and reduce the inconsistency rate of the quantization results through a certain amount of information interaction. The CQG method reduces the key inconsistency rate by removing the channel characteristic measurement values falling within the guard interval, but also reduces the key generation rate. The improved CQG method deletes the channel characteristic measurement values of the two communication parties only when the channel characteristic measurement values are located in different protection isolation areas, and compared with the original CQG method, the key generation rate is obviously improved. The CQA method adjusts the quantization area by transmitting the quantization mapping value sequence on the public channel, reduces the key inconsistency rate of the two parties while not deleting any channel characteristic measurement value, and the key inconsistency rate and the key generation rate are the highest among the three quantization methods.
However, since the key inconsistency rate and the key generation rate are a pair of mutually constrained performance indexes, it is difficult for the above-mentioned feature quantization method in the existing scheme to simultaneously satisfy the lower key inconsistency rate and the higher key generation rate, and therefore, how to ensure the lower key inconsistency rate and simultaneously improve the key generation rate is a technical problem that needs to be solved by those skilled in the art.
Disclosure of Invention
The invention aims to provide a key extraction method, a device, equipment and a storage medium based on wireless channel characteristics, so as to ensure a lower key inconsistency rate and improve the key generation rate.
In order to achieve the above object, the present invention provides a key extraction method based on wireless channel characteristics, including:
both communication parties determine a CFR estimation value by using a detection signal sent by the other party; the CFR estimation value comprises an amplitude value sequence and a phase value sequence;
the two communication parties screen the phase value sequence according to the amplitude value sequence and the amplitude screening threshold value to obtain a target phase value sequence screened by the two communication parties;
a communication party determines an equal probability quantization area and a sub-area of each equal probability quantization area, and determines an equal probability quantization area and a sub-area in which each phase value in a target phase value sequence of the communication party falls; generating a first key according to the code of each equal probability quantization region, generating a quantization mapping value sequence according to the quantization mapping value of each sub-region, and sending the quantization mapping value sequence to the other communication party;
and the other communication party divides the equal probability quantization regions according to the quantization mapping value sequence, determines the equal probability quantization region into which each phase value in the target phase value sequence of the other communication party falls, and generates a second key according to the coding of each equal probability quantization region which falls.
Wherein, the both communication parties determine the CFR estimated value by using the detection signal sent by the other party, and the method comprises the following steps:
the two communication parties determine CFR estimated values of the two communication parties by using pilot frequency information in the detection signals transmitted by the other communication parties.
The method for filtering the phase value sequence by the two communication parties according to the amplitude value sequence and the amplitude filtering threshold value to obtain a target phase value sequence filtered by the two communication parties includes:
the two communication parties calculate corresponding amplitude cumulative distribution functions by using the amplitude value sequence;
determining an upper threshold value and a lower threshold value of the two communication parties according to the amplitude cumulative distribution function and a preset amplitude abnormal ratio;
the communication parties detect the amplitude value sequence, if the detected amplitude value is larger than the lower threshold value and smaller than the upper threshold value, the amplitude abnormal marking value of the detected amplitude value is recorded as a first marking value, otherwise, the amplitude abnormal marking value is recorded as a second marking value, and a marking value sequence is generated;
and the two communication parties send the respectively generated mark value sequences to the other party, compare the mark value sequences sent by the other party with the mark value sequences generated by the two communication parties, and if the amplitude abnormal mark values of the same target amplitude value are the second mark values, delete the phase value corresponding to the target amplitude value from the phase value sequence to obtain the target phase value sequences screened by the two communication parties.
Wherein, the determining the upper threshold value and the lower threshold value of the two communication parties according to the amplitude cumulative distribution function and the preset amplitude abnormal proportion comprises:
the communication party is according to the preset amplitude abnormal proportion
Figure 758660DEST_PATH_IMAGE001
Determining the upper threshold value as:
Figure 606661DEST_PATH_IMAGE002
determining the lower threshold value as follows:
Figure 908330DEST_PATH_IMAGE003
(ii) a Wherein,
Figure 862379DEST_PATH_IMAGE004
a sequence of amplitude values for the communication party
Figure 531389DEST_PATH_IMAGE005
Amplitude cumulative distribution function of
Figure 400992DEST_PATH_IMAGE006
The inverse function of (c);
the other party of communication is according to the abnormal amplitude proportion
Figure 353905DEST_PATH_IMAGE001
Determining the upper threshold value as:
Figure 964009DEST_PATH_IMAGE007
determining the lower threshold value as follows:
Figure 635161DEST_PATH_IMAGE008
(ii) a Wherein,
Figure 887282DEST_PATH_IMAGE009
a sequence of amplitude values for the other party of the communication
Figure 163543DEST_PATH_IMAGE010
Amplitude cumulative distribution function of
Figure 459395DEST_PATH_IMAGE011
The inverse function of (c).
Wherein the amplitude anomaly ratio is 0.08.
Wherein, the communication party determines the equal probability quantization region and the sub-region of each equal probability quantization region, including:
the communication party determines the boundary of each equal probability quantization region according to the quantization bit number and the phase accumulation distribution function of the target phase value sequence so as to divide the total range of the phase values into a predetermined number of equal probability quantization regions, and each equal probability quantization region has corresponding codes; each equiprobable quantization region is equally divided into two sub-regions, each sub-region having a corresponding quantization mapping value.
Wherein, the other party of communication divides an equiprobable quantization region according to the quantization mapping value sequence, and comprises: and the other communication party determines an equiprobable quantization region boundary except the first boundary and the tail boundary according to the quantization mapping value sequence, and determines an equiprobable quantization region based on the first boundary and the tail boundary of the one communication party.
In order to achieve the above object, the present invention further provides a key extraction system based on wireless channel characteristics, wherein two communication parties of the key extraction system include a communication party and a communication party;
both communication parties are used for: determining a CFR estimation value by using a detection signal sent by the opposite side; the CFR estimation value comprises an amplitude value sequence and a phase value sequence; screening the phase value sequence according to the amplitude value sequence and the amplitude screening threshold value to obtain a target phase value sequence after screening by both communication parties;
wherein the communication party is further configured to: determining an equiprobable quantization region and a sub-region of each equiprobable quantization region, and determining an equiprobable quantization region and a sub-region in which each phase value in a target phase value sequence of the communication party falls; generating a first key according to the code of each equal probability quantization region, generating a quantization mapping value sequence according to the quantization mapping value of each sub-region, and sending the quantization mapping value sequence to the other communication party;
the other party of the communication is also used for: dividing the equal probability quantization regions according to the quantization mapping value sequence, determining the equal probability quantization region into which each phase value in the target phase value sequence of the other communication party falls, and generating a second key according to the coding of each equal probability quantization region falling.
Wherein the communication party comprises: a first region determination module;
the region determining module is used for determining the boundary of each equiprobable quantization region according to the quantization bit number so as to divide the total range of phase values into a preset number of equiprobable quantization regions, and each equiprobable quantization region has corresponding codes; each equiprobable quantization region is equally divided into two sub-regions, each sub-region having a corresponding quantization mapping value.
Wherein the other party of communication comprises: a second region determination module;
the second region determining module is configured to determine, according to the sequence of quantization mapping values, an equiprobable quantization region boundary excluding a head boundary and a tail boundary, and determine an equiprobable quantization region using the head boundary and the tail boundary of the communication party.
According to the scheme, the key extraction method based on the wireless channel characteristics provided by the embodiment of the invention comprises the following steps: both communication parties determine a CFR estimation value by using a detection signal sent by the other party; the CFR estimation value comprises an amplitude value sequence and a phase value sequence; the two communication parties screen the phase value sequence according to the amplitude value sequence and the amplitude screening threshold value to obtain a target phase value sequence screened by the two communication parties; a communication party determines an equal probability quantization area and a sub-area of each equal probability quantization area, and determines an equal probability quantization area and a sub-area in which each phase value in a target phase value sequence of the communication party falls; generating a first key according to the code of each equal probability quantization region, generating a quantization mapping value sequence according to the quantization mapping value of each sub-region, and sending the quantization mapping value sequence to the other communication party; and the other communication party divides the equal probability quantization regions according to the quantization mapping value sequence, determines the equal probability quantization region into which each phase value in the target phase value sequence of the other communication party falls, and generates a second key according to the coding of each equal probability quantization region which falls.
Therefore, the scheme utilizes the amplitude value sequence and the amplitude screening threshold value to screen the phase value sequence, so that the condition that the key inconsistency rate is higher when the amplitude of the CFR estimation value is too large or too small due to random noise or other interference and the like can be effectively avoided, and the key inconsistency rate is reduced; in addition, since the equal probability quantization region of the other communication party is determined according to the quantization mapping value sequence transmitted by the one communication party, the inconsistency rate of the keys generated by the two communication parties can be further reduced; furthermore, when the phase value sequence is screened, the phase value which is easy to quantize inconsistent key bits is deleted pertinently, so that the deleted data is less, and the generation rate of the key is improved under the condition of ensuring lower key inconsistency rate; the invention also discloses a key extraction system based on the wireless channel characteristics, and the technical effects can be realized.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a schematic flow chart of a key extraction method based on wireless channel characteristics according to an embodiment of the present invention;
FIG. 2 is a comparison diagram of key inconsistency rates disclosed in an embodiment of the present invention;
FIG. 3 is a schematic diagram illustrating a comparison of key generation rates disclosed in an embodiment of the present invention;
FIG. 4 is a schematic view of the overall flow of a key extraction method disclosed in the embodiment of the present invention;
FIG. 5 is a schematic diagram illustrating a comparison of key inconsistency rates at different SNR according to an embodiment of the present invention;
fig. 6 is a schematic diagram illustrating a comparison of key generation rates at different signal-to-noise ratios according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The embodiment of the invention discloses a key extraction method, a device, equipment and a storage medium based on wireless channel characteristics, which are used for improving the key generation rate while ensuring the lower key inconsistency rate.
Referring to fig. 1, an embodiment of the present invention provides a key extraction method based on wireless channel characteristics, including:
s101, both communication sides determine a CFR estimation value by using a detection signal sent by the other side; the CFR estimation value comprises an amplitude value sequence and a phase value sequence; both of the communication parties use pilot frequency information in a probe signal transmitted by the other party to determine CFR estimated values of both of the communication parties.
It can be understood that, in the scheme, both communication parties need to send probe signals to each other in sequence within coherence time and perform Channel estimation to obtain a CFR (Channel Frequency Response) estimation value; specifically, both legal communication parties in the scheme form a point-to-point Time Division duplex Orthogonal Frequency Division Multiplexing (TDD-OFDM) communication system, the two legal communication parties send channel detection signals to each other in sequence, the estimation of the CFR at the pilot Frequency position is completed by utilizing the pilot Frequency information in the received detection signals, and the estimation modulus of the CFR and the application of an inverse trigonometric function are used for respectively obtaining the amplitude value and the phase value of the CFR. Because the detection signal is composed of data bit and pilot frequency bit, the pilot frequency is a known signal of both receiving and transmitting parties specially used for channel estimation, the scheme only realizes CFR estimation for pilot frequency information, and by the mode, data transmission is not delayed when the channel is detected.
S102, the two communication parties screen the phase value sequence according to the amplitude value sequence and the amplitude screening threshold value to obtain a target phase value sequence screened by the two communication parties;
specifically, in this embodiment, an excessively large or small amplitude value may be searched from the amplitude value sequence by setting an amplitude screening threshold value, and after the phase value corresponding to the excessively large or small amplitude value is deleted, a situation that the key inconsistency rate is high when the amplitude of the CFR estimation value is excessively large or small due to random noise or other interference may be avoided, so that the key inconsistency rate is reduced. In this embodiment, the amplitude filtering threshold may be preset, or may be determined according to the obtained amplitude value sequence, which is not described herein again.
It can be understood that, in this embodiment, the two communicating parties may include one communicating party and the other communicating party, and for the above-mentioned S101 and S102, the operations that both the communicating party and the other communicating party need to perform are operations, and if the communicating party is abbreviated as Alice and the other communicating party is abbreviated as Bob, after S101 is performed, Alice and Bob both generate respective CFR estimated values, and after S102 is performed, Alice and Bob both generate respective target phase value sequences.
S103, a communication party determines an equal probability quantization area and a sub-area of each equal probability quantization area, and determines an equal probability quantization area and a sub-area in which each phase value in a target phase value sequence of the communication party falls; generating a first key according to the code of each equal probability quantization region, generating a quantization mapping value sequence according to the quantization mapping value of each sub-region, and sending the quantization mapping value sequence to the other communication party;
when it is necessary to describe, after both communication parties generate the corresponding target phase value sequence, the target phase value sequence needs to be quantized to obtain the corresponding key. When generating the key, the communication party of both parties needs to divide the equal probability quantization region and the sub-region of each equal probability quantization region. The process of determining the equal probability quantization regions and the sub-regions of each equal probability quantization region by a communication party in the scheme specifically comprises the following steps: a communication party determines the boundary of each equal probability quantization region according to the quantization bit number and the phase accumulation distribution function of the target phase value sequence so as to divide the total range of the phase values into a predetermined number of equal probability quantization regions, wherein each equal probability quantization region has corresponding codes; each equiprobable quantization region is equally divided into two sub-regions, each sub-region having a corresponding quantization mapping value.
Specifically, if the target phase value sequence of the communication party of the filtered CFR estimated value is
Figure 899735DEST_PATH_IMAGE012
The target phase value sequence of the other party of communication is
Figure 221126DEST_PATH_IMAGE013
Wherein:
Figure 164942DEST_PATH_IMAGE014
Figure 569379DEST_PATH_IMAGE015
and m is the number of phase values retained. One of the two communication parties is firstly according to
Figure 356069DEST_PATH_IMAGE016
Cumulative distribution function of
Figure 949993DEST_PATH_IMAGE017
Overall range of phase values
Figure 742456DEST_PATH_IMAGE018
Is divided into
Figure 114532DEST_PATH_IMAGE019
Quantizing the regions with equal probability, and using different values for each region with equal probability
Figure 450835DEST_PATH_IMAGE020
The bit Gray code is coded sequentially, with equal probability region boundary
Figure 317291DEST_PATH_IMAGE021
Figure 484967DEST_PATH_IMAGE022
Wherein
Figure 778676DEST_PATH_IMAGE020
The number of bits quantized for each phase value; for example: setting the number of bits quantized per phase value
Figure 133434DEST_PATH_IMAGE023
Alice basis
Figure 803581DEST_PATH_IMAGE016
Cumulative distribution function of
Figure 560185DEST_PATH_IMAGE017
Overall range of phase values
Figure 493637DEST_PATH_IMAGE018
Is divided into
Figure 804532DEST_PATH_IMAGE024
And (3) quantizing the regions with equal probability, and sequentially encoding the 8 regions with equal probability into a 3-bit Gray code: 000. 001, 011, 010, 110, 111, 101, 100.
After the equal probability quantization regions are determined, each equal probability quantization region needs to be equally divided into two sub-regions, and the boundary between the two sub-regions is
Figure 527638DEST_PATH_IMAGE025
And setting different quantization mapping values for the two subintervals, such as: for the first
Figure 92742DEST_PATH_IMAGE027
Phase value
Figure 508680DEST_PATH_IMAGE028
Quantizing the mapped value if the value falls within the left subinterval of the quantization region
Figure 306872DEST_PATH_IMAGE029
(ii) a If it is not
Figure 256505DEST_PATH_IMAGE028
Falls within the right subinterval of the quantization region, the mapped value is quantized
Figure 253279DEST_PATH_IMAGE030
Namely:
Figure 43381DEST_PATH_IMAGE031
after the equal probability quantization region with the corresponding code and the sub-region with the corresponding quantization mapping value are determined in the above way, the Alice terminal can perform the filtering on the target phase value sequence
Figure 548443DEST_PATH_IMAGE012
Quantizing each phase value into corresponding 3-bit Gray code according to the equivalent area in which the phase value falls, and concatenating all quantized results to obtain a first secret key
Figure 82192DEST_PATH_IMAGE032
Simultaneously recording the quantization mapping value generated during quantization
Figure 933474DEST_PATH_IMAGE032
A sequence; that is to say: at each quantized phase value
Figure 373770DEST_PATH_IMAGE028
A 3-bit Gray code and a quantized mapping value can be obtained
Figure 880975DEST_PATH_IMAGE033
Alice will filter the phase value sequence
Figure 749574DEST_PATH_IMAGE012
Obtained after quantization
Figure 143777DEST_PATH_IMAGE034
The 3 bits Gray code are connected to obtain a length of 3 ×
Figure 72419DEST_PATH_IMAGE034
First key of (2)
Figure 801340DEST_PATH_IMAGE032
(ii) a Obtained after quantization
Figure 755521DEST_PATH_IMAGE034
An
Figure 800969DEST_PATH_IMAGE033
Value-joining, i.e. obtaining the length to be sent to Bob as
Figure 369353DEST_PATH_IMAGE034
Is/are as follows
Figure 398620DEST_PATH_IMAGE033
And (4) sequencing.
And S104, dividing the equal probability quantization regions according to the quantization mapping value sequence by the other communication party, determining the equal probability quantization region into which each phase value in the target phase value sequence of the other communication party falls, and generating a second key according to the coding of each equal probability quantization region which falls.
In this embodiment, in order to reduce the rate of inconsistency between the keys generated by both communication parties, the equal probability quantization region of Bob is adjusted according to the quantization mapping value sequence sent by Alice, and then the phase sequence of CFR is quantized by the adjusted equal probability quantization region. Specifically, the method comprises the following steps: when the other communication party divides the equal probability quantization region according to the quantization mapping value sequence, the equal probability quantization region boundary except the head boundary and the tail boundary is determined according to the quantization mapping value sequence, and the equal probability quantization region is determined based on the head boundary and the tail boundary of the communication party.
In particular toIn other words, Alice will quantize the mapped values
Figure 609022DEST_PATH_IMAGE033
The sequence is sent over the open channel to Bob, who, based on the received sequence
Figure 774555DEST_PATH_IMAGE033
And (3) constructing a new equal probability quantization region by the sequence, and sequentially coding each equal probability quantization region by using different 3-bit Gray codes: 000. 001, 011, 010, 110, 111, 101, 100, wherein the new equal probability quantization region has a boundary of
Figure 717103DEST_PATH_IMAGE035
Wherein: bob's head boundary
Figure 482934DEST_PATH_IMAGE036
And a trailing boundary
Figure 185442DEST_PATH_IMAGE037
First boundary with Alice
Figure 720328DEST_PATH_IMAGE038
And a trailing boundary
Figure 99357DEST_PATH_IMAGE039
The same, that is:
Figure 306479DEST_PATH_IMAGE040
Figure 858683DEST_PATH_IMAGE041
and for other boundaries, by formula
Figure 716917DEST_PATH_IMAGE042
Determining, wherein,
Figure 11720DEST_PATH_IMAGE043
it can be seen that:
Figure 689826DEST_PATH_IMAGE044
Figure 45721DEST_PATH_IMAGE045
Figure 509195DEST_PATH_IMAGE046
the boundary of the new equal probability quantization region divided for the Bob terminal,
Figure 230026DEST_PATH_IMAGE047
in order to divide the number of quantization regions,
Figure 661007DEST_PATH_IMAGE048
an offset generated from the sequence of quantized mapped values; if it is
Figure 305747DEST_PATH_IMAGE024
Then, then
Figure 872994DEST_PATH_IMAGE049
Offset amount of
Figure 764727DEST_PATH_IMAGE050
Further, after Bob divides the equal probability quantization region according to the quantization mapping value sequence, Bob will pair the phase value sequence of the CFR estimation value after screening according to the new equal probability quantization region
Figure 417425DEST_PATH_IMAGE051
And quantizing each phase value into a corresponding 3-bit Gray code according to the area in which the phase value falls, and connecting all the quantization results to obtain a second key. When it needs to be noted, due to factors such as environmental noise, a half-duplex mode of a receiver, hardware difference and the like, inconsistent bits may exist in a first secret key and a second secret key obtained after feature quantization at both ends of Alice and Bob of two communication parties, and a final secret key with consistent security can be obtained through information negotiation and privacy enhancement subsequently.
In conclusion, the method for screening the phase value sequence by using the amplitude value sequence and the amplitude screening threshold value can effectively avoid the situation that the key inconsistency rate is high when the amplitude of the CFR estimation value is too large or too small due to random noise or other interference and the like, and reduce the key inconsistency rate; in addition, since the equal probability quantization region of the other communication party is determined according to the quantization mapping value sequence transmitted by the one communication party, the inconsistency rate of the keys generated by the two communication parties can be further reduced; furthermore, when the phase value sequence is screened, the phase value which is easy to quantize inconsistent key bits is deleted pertinently, so that the deleted data is less, and the generation rate of the key is improved under the condition of ensuring the lower inconsistent rate of the key.
Based on the foregoing embodiment, in this embodiment, the process of screening the phase value sequence by the two communication parties according to the amplitude value sequence and the amplitude screening threshold value to obtain a target phase value sequence screened by the two communication parties specifically includes the following steps:
s11, the two communication parties calculate corresponding amplitude cumulative distribution functions by using the amplitude value sequence;
specifically, according to the scheme, when the phase value sequence of the CFR estimation value is screened according to the amplitude value sequence of the CFR estimation value and the phase value sequence of the CFR estimation value after screening is obtained, firstly, the amplitude value sequence of the CFR estimation value needs to be obtained for both communication parties
Figure 865855DEST_PATH_IMAGE052
And
Figure 553188DEST_PATH_IMAGE053
and separately calculate
Figure 615822DEST_PATH_IMAGE052
And
Figure 506549DEST_PATH_IMAGE053
cumulative distribution function of
Figure 742358DEST_PATH_IMAGE054
And
Figure 284198DEST_PATH_IMAGE055
s12, determining an upper threshold value and a lower threshold value of the two communication parties according to the amplitude cumulative distribution function and a preset amplitude abnormal ratio;
wherein, the communication party is according to the abnormal ratio of the preset amplitude
Figure 268466DEST_PATH_IMAGE001
Determining the upper threshold value as:
Figure 895756DEST_PATH_IMAGE002
determining the lower threshold value as follows:
Figure 935256DEST_PATH_IMAGE003
(ii) a Wherein,
Figure 82335DEST_PATH_IMAGE004
a sequence of amplitude values for the communication party
Figure 752351DEST_PATH_IMAGE005
Amplitude cumulative distribution function of
Figure 398096DEST_PATH_IMAGE006
The inverse function of (c);
the other party of communication is according to the abnormal amplitude proportion
Figure 460861DEST_PATH_IMAGE001
Determining the upper threshold value as:
Figure 774030DEST_PATH_IMAGE007
determining the lower threshold value as follows:
Figure 117679DEST_PATH_IMAGE008
(ii) a Wherein,
Figure 250720DEST_PATH_IMAGE009
a sequence of amplitude values for the other party of the communication
Figure 117176DEST_PATH_IMAGE010
Amplitude cumulative distribution function of
Figure 19273DEST_PATH_IMAGE011
The inverse function of (c).
It should be noted that the amplitude anomaly ratio in the present embodiment
Figure 765512DEST_PATH_IMAGE001
It needs to be determined according to actual conditions, and in this embodiment, a better value is selected through simulation comparison, so as to determine the amplitude screening threshold. Fig. 2 is a schematic diagram showing a comparison of key inconsistency rates disclosed in the embodiment of the present invention; fig. 3 is a schematic diagram showing a comparison of key generation rates disclosed in the embodiment of the present invention; it can be seen from the comparison of the key inconsistency rates in the case of the abnormal amplitude ratios shown in fig. 2, the abnormal amplitude ratios are compared
Figure 136581DEST_PATH_IMAGE001
The key inconsistency rate gradually decreases, however
Figure 790417DEST_PATH_IMAGE001
The more the increase, the smaller the decrease in the key inconsistency rate. When in use
Figure 563332DEST_PATH_IMAGE056
The reduction of the key inconsistency rate is significantly reduced from before. As can be seen from the comparison of the key generation rates in the situation of the values of the amplitude anomaly ratios with different magnitudes shown in fig. 3, the key generation rate also follows the amplitude anomaly ratio
Figure 824680DEST_PATH_IMAGE001
Is increased and gradually decreased, and
Figure 869996DEST_PATH_IMAGE001
the larger the magnitude of the increase, the faster the rate of decline of the key generation rate. Comprehensively considering two indexes of the key inconsistency rate and the key generation rate, and selecting the amplitude anomaly ratioExample (b)
Figure 327523DEST_PATH_IMAGE057
S13, the communication parties detect the amplitude value sequence, if the detected amplitude value is larger than the lower threshold value and smaller than the upper threshold value, the amplitude abnormal marking value of the detected amplitude value is recorded as a first marking value, otherwise, the amplitude abnormal marking value is recorded as a second marking value, and a marking value sequence is generated;
after the amplitude screening threshold values of the two communication parties are determined, the two communication parties can respectively carry out amplitude sequence comparison on the CFR estimated values according to the upper threshold value and the lower threshold value
Figure 220523DEST_PATH_IMAGE052
And
Figure 105303DEST_PATH_IMAGE053
detecting and calculating corresponding amplitude anomaly marking values
Figure 388648DEST_PATH_IMAGE058
And
Figure 915444DEST_PATH_IMAGE059
: when it comes to
Figure 397372DEST_PATH_IMAGE060
Amplitude value of CFR estimated value
Figure 656315DEST_PATH_IMAGE061
At the upper threshold
Figure 738540DEST_PATH_IMAGE062
And a lower threshold
Figure 751584DEST_PATH_IMAGE063
In between, the amplitude anomaly flag value is recorded as a first flag value, otherwise, it is recorded as a second flag value, in this scheme, the first flag value may be set to 0, and the second flag value may be set to 1, that is:
Figure 602865DEST_PATH_IMAGE064
and S14, the two communication parties send the generated mark value sequences to each other, the mark value sequences sent by the other parties are compared with the mark value sequences generated by the two communication parties, and if the amplitude abnormal mark values of the same target amplitude value are the second mark values, the phase value corresponding to the target amplitude value is deleted from the phase value sequence, so that the target phase value sequence screened by the two communication parties is obtained.
In this way, after both communication parties generate corresponding marker value sequences, both communication parties need to interact and compare the respective marker value sequences through the public channel, and when the amplitude abnormal marker values of the same target amplitude value are both the second marker values, for example, when both the amplitude abnormal marker values are the second marker values
Figure 32709DEST_PATH_IMAGE065
And is
Figure 352964DEST_PATH_IMAGE066
Then, both communication parties separately set the phase value of the CFR estimated value of the position corresponding to the amplitude abnormality flag value
Figure 159245DEST_PATH_IMAGE067
And
Figure 68296DEST_PATH_IMAGE068
and (5) deleting. Referring to fig. 4, a schematic diagram of an overall flow of a key extraction method provided in an embodiment of the present invention is shown; as can be seen from fig. 4, after both Alice and Bob perform threshold value calculation and amplitude value sequence detection, their respective marker value sequences are sent to the other party, and then phase value sequences are filtered. When both communication parties obtain the initial key, Alice needs to send the quantized mapping value sequence to Bob, and Bob can create an equiprobable quantization region through the quantized mapping value sequence and quantize the phase value sequence to obtain the initial key.
In conclusion, the amplitude value sequence of the CFR estimated value obtained by channel detection is detected, and the corresponding phase value sequence of the CFR estimated value is screened by using the detection result, so that the situation that the key inconsistency rate is high when the amplitude of the CFR estimated value is too large or too small due to random noise or other interference and the like is effectively avoided, and the inconsistency rate of the initial key is reduced. Compared with the existing characteristic quantization method, the method has the advantages that when the phase value of the CFR estimated value is screened, the phase value which is easy to quantize inconsistent key bits is deleted in a targeted mode, so that deleted data are less, and the generation rate of the key is improved under the condition that the lower initial key inconsistency rate is guaranteed.
Referring to fig. 5, a schematic diagram for comparing key inconsistency rates at different signal-to-noise ratios is provided in the embodiment of the present invention; referring to fig. 6, a schematic diagram of comparing seed key generation rates under different signal-to-noise ratios is provided in the embodiment of the present invention; it can be seen that fig. 5 and fig. 6 are respectively the comparison between the key inconsistency rate and the key generation rate under different signal-to-noise ratios of the present scheme and two existing feature quantization methods, namely, CQA and improved CQG.
In FIG. 5, the abscissa represents the signal-to-noise ratio
Figure DEST_PATH_IMAGE069
The ordinate represents the key inconsistency rate of both parties of legal communication, the curve with the diamond represents the key inconsistency rate obtained by the method provided by the invention, the curve with the circle represents the key inconsistency rate obtained by a CQA method, and the curve with the square represents the key inconsistency rate obtained by an improved CQG method; in FIG. 6, the abscissa represents the signal-to-noise ratio
Figure 278828DEST_PATH_IMAGE069
The ordinate represents the key generation rate under the condition that the channel detection rate is unchanged, the curve with the diamond represents the key generation rate obtained by the method provided by the invention, the curve with the circle represents the key generation rate obtained by the CQA method, and the curve with the square represents the key generation rate obtained by the improved CQG method.
It can be seen that the three methodsThe key inconsistency rate of the method is gradually reduced along with the increase of the signal-to-noise ratio, and the key inconsistency rate of the scheme is the lowest, such as in
Figure 7750DEST_PATH_IMAGE070
Compared with CQA and improved CQG methods, the key inconsistency rate of the method is reduced by 31.5% and 20.4% respectively. In the aspect of key generation rate, the CQA method has the highest key generation rate because any CFR estimation value is not deleted; the improved CQG method has the advantages that the CFR estimated value deleted is the most, and the key generation rate is relatively the lowest; the method provided by the invention has the advantages that the CFR estimated value is deleted in a targeted manner, the deleted CFR estimated value is much less than that of an improved CQG method, and the key generation rate is obviously improved. Such as in
Figure 430772DEST_PATH_IMAGE070
In time, the key generation rate of the invention is improved by 5.2 percent compared with the improved CQG method, which is between the CQA and the improved CQG method. The result shows that the scheme can remarkably improve the key generation rate while ensuring the lower key inconsistency rate.
The key extraction system provided by the embodiment of the present invention is introduced below, and the key extraction system described below and the key extraction method described above may be referred to each other.
The embodiment of the invention provides a key extraction system based on wireless channel characteristics, wherein two communication parties of the key extraction system comprise a communication party and a communication party;
both communication parties are used for: determining a CFR estimation value by using a detection signal sent by the opposite side; the CFR estimation value comprises an amplitude value sequence and a phase value sequence; screening the phase value sequence according to the amplitude value sequence and the amplitude screening threshold value to obtain a target phase value sequence after screening by both communication parties;
wherein the communication party is further configured to: determining an equiprobable quantization region and a sub-region of each equiprobable quantization region, and determining an equiprobable quantization region and a sub-region in which each phase value in a target phase value sequence of the communication party falls; generating a first key according to the code of each equal probability quantization region, generating a quantization mapping value sequence according to the quantization mapping value of each sub-region, and sending the quantization mapping value sequence to the other communication party;
the other party of the communication is also used for: dividing the equal probability quantization regions according to the quantization mapping value sequence, determining the equal probability quantization region into which each phase value in the target phase value sequence of the other communication party falls, and generating a second key according to the coding of each equal probability quantization region falling.
Wherein, the two communication parties are specifically used for: the CFR estimated value of both communication parties is determined by using pilot frequency information in a probe signal transmitted by the other party.
Wherein, the two communication parties are specifically used for: calculating a corresponding amplitude cumulative distribution function by using the amplitude value sequence; determining an upper threshold value and a lower threshold value of the two communication parties according to the amplitude cumulative distribution function and a preset amplitude abnormal ratio; detecting the amplitude value sequence, if the detected amplitude value is larger than the lower threshold value and smaller than the upper threshold value, recording an amplitude abnormal marking value of the detected amplitude value as a first marking value, otherwise, recording the amplitude abnormal marking value as a second marking value, and generating a marking value sequence;
and the two communication parties send the respectively generated mark value sequences to the other party, compare the mark value sequences sent by the other party with the mark value sequences generated by the two communication parties, and if the amplitude abnormal mark values of the same target amplitude value are the second mark values, delete the phase value corresponding to the target amplitude value from the phase value sequence to obtain the target phase value sequences screened by the two communication parties.
Wherein, the communication party is according to the preset amplitude abnormal proportion
Figure 194329DEST_PATH_IMAGE001
Determining the upper threshold value as:
Figure 231555DEST_PATH_IMAGE002
determining the lower threshold value as follows:
Figure 464084DEST_PATH_IMAGE003
(ii) a Wherein,
Figure 674486DEST_PATH_IMAGE004
a sequence of amplitude values for the communication party
Figure 292549DEST_PATH_IMAGE005
Amplitude cumulative distribution function of
Figure 516988DEST_PATH_IMAGE006
The inverse function of (c);
the other party of communication is according to the abnormal amplitude proportion
Figure 282819DEST_PATH_IMAGE001
Determining the upper threshold value as:
Figure 234594DEST_PATH_IMAGE007
determining the lower threshold value as follows:
Figure 520213DEST_PATH_IMAGE008
(ii) a Wherein,
Figure 899242DEST_PATH_IMAGE009
a sequence of amplitude values for the other party of the communication
Figure 903101DEST_PATH_IMAGE010
Amplitude cumulative distribution function of
Figure 720884DEST_PATH_IMAGE011
The inverse function of (c). The amplitude anomaly ratio was 0.08.
Wherein the communication party comprises: a first region determination module;
the region determining module is used for determining the boundary of each equiprobable quantization region according to the quantization bit number so as to divide the total range of phase values into a preset number of equiprobable quantization regions, and each equiprobable quantization region has corresponding codes; each equiprobable quantization region is equally divided into two sub-regions, each sub-region having a corresponding quantization mapping value.
Wherein the other party of communication comprises: a second region determination module;
the second region determining module is used for determining an equiprobable quantization region boundary except a head boundary and a tail boundary according to the quantization mapping value sequence and determining an equiprobable quantization region by utilizing the head boundary and the tail boundary of the communication party.
The embodiment of the present invention further provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the steps of the key extraction method based on wireless channel characteristics described in any of the above-mentioned method embodiments are implemented.
Wherein the storage medium may include: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
The embodiments in the present description are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the invention. Thus, the present invention is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (10)

1. A key extraction method based on wireless channel characteristics is characterized by comprising the following steps:
both communication parties determine a CFR estimation value by using a detection signal sent by the other party; the CFR estimation value comprises an amplitude value sequence and a phase value sequence;
the two communication parties screen the phase value sequence according to the amplitude value sequence and the amplitude screening threshold value to obtain a target phase value sequence screened by the two communication parties;
a communication party determines an equal probability quantization area and a sub-area of each equal probability quantization area, and determines an equal probability quantization area and a sub-area in which each phase value in a target phase value sequence of the communication party falls; generating a first key according to the code of each equal probability quantization region, generating a quantization mapping value sequence according to the quantization mapping value of each sub-region, and sending the quantization mapping value sequence to the other communication party;
and the other communication party divides the equal probability quantization regions according to the quantization mapping value sequence, determines the equal probability quantization region into which each phase value in the target phase value sequence of the other communication party falls, and generates a second key according to the coding of each equal probability quantization region which falls.
2. The key extraction method according to claim 1, wherein the determining of the CFR estimation value by the two communicating parties using a probe signal transmitted from the other party includes:
the two communication parties determine CFR estimated values of the two communication parties by using pilot frequency information in the detection signals transmitted by the other communication parties.
3. The method of claim 1, wherein the two parties of communication filter the phase value sequence according to the amplitude value sequence and the amplitude filter threshold value to obtain a filtered target phase value sequence, and the method comprises:
the two communication parties calculate corresponding amplitude cumulative distribution functions by using the amplitude value sequence;
determining an upper threshold value and a lower threshold value of the two communication parties according to the amplitude cumulative distribution function and a preset amplitude abnormal ratio;
the communication parties detect the amplitude value sequence, if the detected amplitude value is larger than the lower threshold value and smaller than the upper threshold value, the amplitude abnormal marking value of the detected amplitude value is recorded as a first marking value, otherwise, the amplitude abnormal marking value is recorded as a second marking value, and a marking value sequence is generated;
and the two communication parties send the respectively generated mark value sequences to the other party, compare the mark value sequences sent by the other party with the mark value sequences generated by the two communication parties, and if the amplitude abnormal mark values of the same target amplitude value are the second mark values, delete the phase value corresponding to the target amplitude value from the phase value sequence to obtain the target phase value sequences screened by the two communication parties.
4. The method of claim 3, wherein the determining an upper threshold and a lower threshold of the two communicating parties according to the amplitude cumulative distribution function and a preset amplitude anomaly ratio comprises:
the communication party is according to the preset amplitude abnormal proportion
Figure 912038DEST_PATH_IMAGE001
Determining the upper threshold value as:
Figure 598234DEST_PATH_IMAGE002
determining the lower threshold value as follows:
Figure 601962DEST_PATH_IMAGE003
(ii) a Wherein,
Figure 528461DEST_PATH_IMAGE004
a sequence of amplitude values for the communication party
Figure 719271DEST_PATH_IMAGE005
Amplitude cumulative distribution function of
Figure 22207DEST_PATH_IMAGE006
The inverse function of (c);
the other party of communication is according to the abnormal amplitude proportion
Figure 880442DEST_PATH_IMAGE001
Determining the upper threshold value as:
Figure 430372DEST_PATH_IMAGE007
determining the lower threshold value as follows:
Figure 374057DEST_PATH_IMAGE008
(ii) a Wherein,
Figure 215105DEST_PATH_IMAGE009
a sequence of amplitude values for the other party of the communication
Figure 927846DEST_PATH_IMAGE010
Amplitude cumulative distribution function of
Figure 648678DEST_PATH_IMAGE011
The inverse function of (c).
5. The key extraction method according to claim 4, wherein the amplitude anomaly ratio is 0.08.
6. The key extraction method according to any one of claims 1 to 5, wherein the determining, by the communication party, the equiprobable quantization regions and the sub-regions of each equiprobable quantization region comprises:
the communication party determines the boundary of each equal probability quantization region according to the quantization bit number and the phase accumulation distribution function of the target phase value sequence so as to divide the total range of the phase values into a predetermined number of equal probability quantization regions, and each equal probability quantization region has corresponding codes; each equiprobable quantization region is equally divided into two sub-regions, each sub-region having a corresponding quantization mapping value.
7. The key extraction method according to claim 6, wherein the dividing of the equiprobable quantization region by the other party of communication based on the sequence of quantization mapping values comprises:
and the other communication party determines an equiprobable quantization region boundary except the first boundary and the tail boundary according to the quantization mapping value sequence, and determines an equiprobable quantization region based on the first boundary and the tail boundary of the one communication party.
8. A key extraction system based on wireless channel characteristics is characterized in that two communication parties of the key extraction system comprise a communication party and a communication party;
both communication parties are used for: determining a CFR estimation value by using a detection signal sent by the opposite side; the CFR estimation value comprises an amplitude value sequence and a phase value sequence; screening the phase value sequence according to the amplitude value sequence and the amplitude screening threshold value to obtain a target phase value sequence after screening by both communication parties;
wherein the communication party is further configured to: determining an equiprobable quantization region and a sub-region of each equiprobable quantization region, and determining an equiprobable quantization region and a sub-region in which each phase value in a target phase value sequence of the communication party falls; generating a first key according to the code of each equal probability quantization region, generating a quantization mapping value sequence according to the quantization mapping value of each sub-region, and sending the quantization mapping value sequence to the other communication party;
the other party of the communication is also used for: dividing the equal probability quantization regions according to the quantization mapping value sequence, determining the equal probability quantization region into which each phase value in the target phase value sequence of the other communication party falls, and generating a second key according to the coding of each equal probability quantization region falling.
9. The key extraction system of claim 8, wherein the communication party comprises: a first region determination module;
the region determining module is used for determining the boundary of each equiprobable quantization region according to the quantization bit number so as to divide the total range of phase values into a preset number of equiprobable quantization regions, and each equiprobable quantization region has corresponding codes; each equiprobable quantization region is equally divided into two sub-regions, each sub-region having a corresponding quantization mapping value.
10. The key extraction system according to claim 9, wherein the other party of communication includes: a second region determination module;
the second region determining module is configured to determine, according to the sequence of quantization mapping values, an equiprobable quantization region boundary excluding a head boundary and a tail boundary, and determine an equiprobable quantization region using the head boundary and the tail boundary of the communication party.
CN202011254379.0A 2020-11-11 2020-11-11 Key extraction method and system based on wireless channel characteristics Active CN112073966B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011254379.0A CN112073966B (en) 2020-11-11 2020-11-11 Key extraction method and system based on wireless channel characteristics

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011254379.0A CN112073966B (en) 2020-11-11 2020-11-11 Key extraction method and system based on wireless channel characteristics

Publications (2)

Publication Number Publication Date
CN112073966A true CN112073966A (en) 2020-12-11
CN112073966B CN112073966B (en) 2021-01-26

Family

ID=73655021

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011254379.0A Active CN112073966B (en) 2020-11-11 2020-11-11 Key extraction method and system based on wireless channel characteristics

Country Status (1)

Country Link
CN (1) CN112073966B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112532328A (en) * 2021-02-07 2021-03-19 中国人民解放军国防科技大学 Channel characteristic quantization method and device, electronic equipment and storage medium

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104640110A (en) * 2015-01-15 2015-05-20 南京邮电大学 Symmetric key generating method based on channel characteristics in terminal direct communication
CN105120453A (en) * 2015-07-15 2015-12-02 中国科学院信息工程研究所 Secret key generation method
CN105933894A (en) * 2016-04-29 2016-09-07 金梁 Method for carrying out secret key extraction by utilizing random characteristic of received signal of receiving party
CN106102052A (en) * 2016-03-01 2016-11-09 南京邮电大学 A kind of two dimensional wireless physical layer key generation method of combined channel amplitude and phase place
CN107040372A (en) * 2015-12-15 2017-08-11 罗伯特·博世有限公司 The method that the physical characteristic according to measured by transmission channel produces the value sequence of secret in a device
CN108599912A (en) * 2018-04-25 2018-09-28 北京师范大学 A kind of method, apparatus, electronic equipment and storage medium generating pilot tone pattern
CN109218981A (en) * 2018-11-20 2019-01-15 太原理工大学 Wi-Fi access authentication method based on position signal feature common recognition
CN110896317A (en) * 2019-11-06 2020-03-20 南京邮电大学 Frequency hopping sequence generation method and device based on wireless channel physical layer secret key
CN111148099A (en) * 2020-01-02 2020-05-12 燕山大学 Side channel key generation method, device and communication system
CN111669730A (en) * 2020-05-26 2020-09-15 西安交通大学 Physical layer key generation method and updating method for one-to-one proximity communication

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104640110A (en) * 2015-01-15 2015-05-20 南京邮电大学 Symmetric key generating method based on channel characteristics in terminal direct communication
CN105120453A (en) * 2015-07-15 2015-12-02 中国科学院信息工程研究所 Secret key generation method
CN107040372A (en) * 2015-12-15 2017-08-11 罗伯特·博世有限公司 The method that the physical characteristic according to measured by transmission channel produces the value sequence of secret in a device
CN106102052A (en) * 2016-03-01 2016-11-09 南京邮电大学 A kind of two dimensional wireless physical layer key generation method of combined channel amplitude and phase place
CN105933894A (en) * 2016-04-29 2016-09-07 金梁 Method for carrying out secret key extraction by utilizing random characteristic of received signal of receiving party
CN108599912A (en) * 2018-04-25 2018-09-28 北京师范大学 A kind of method, apparatus, electronic equipment and storage medium generating pilot tone pattern
CN109218981A (en) * 2018-11-20 2019-01-15 太原理工大学 Wi-Fi access authentication method based on position signal feature common recognition
CN110896317A (en) * 2019-11-06 2020-03-20 南京邮电大学 Frequency hopping sequence generation method and device based on wireless channel physical layer secret key
CN111148099A (en) * 2020-01-02 2020-05-12 燕山大学 Side channel key generation method, device and communication system
CN111669730A (en) * 2020-05-26 2020-09-15 西安交通大学 Physical layer key generation method and updating method for one-to-one proximity communication

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
LONGWANG CHENG; WEI LI; DONGTANG MA; LI ZHOU; CHUNSHENG ZHU; JIB: "Towards an Effective Secret Key Generation Scheme for Imperfect Channel State Information", 《2016 IEEE TRUSTCOM/BIGDATASE/ISPA》 *
王晓敏: "基于无线信道物理层特性的密钥生成方法的研究", 《中国优秀硕士学位论文全文数据库(电子期刊)信息科技辑》 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112532328A (en) * 2021-02-07 2021-03-19 中国人民解放军国防科技大学 Channel characteristic quantization method and device, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN112073966B (en) 2021-01-26

Similar Documents

Publication Publication Date Title
US9161214B2 (en) Wireless communication method and system for transmission authentication at the physical layer
Chen et al. Quantization index modulation: A class of provably good methods for digital watermarking and information embedding
Qiu et al. Reversible data hiding in encrypted images using adaptive reversible integer transformation
CN112788599B (en) Physical layer key generation method based on channel state information
CN104901795A (en) Physical layer key extraction method based on channel characteristic
El-Bendary FEC merged with double security approach based on encrypted image steganography for different purpose in the presence of noise and different attacks
CN112073966B (en) Key extraction method and system based on wireless channel characteristics
CN113395157B (en) Physical layer key extraction method based on quantization protection band
CN105959104B (en) Steganalysis method based on Hamming distance distribution
CN112202511A (en) Physical layer key generation method and system based on channel characteristics
CN111327786B (en) Robust steganography method based on social network platform
Hameed A high secure speech transmission using audio steganography and duffing oscillator
CN112532328B (en) Channel characteristic quantization method and device, electronic equipment and storage medium
Yu et al. A coding layer robust reversible watermarking algorithm for digital image in multi-antenna system
WO2013000174A1 (en) Method for generating consistent cryptographic key based on wireless channel features
CN113923312A (en) Digital image coding layer robust reversible watermarking method based on wireless communication
El-Khamy et al. Robust image hiding in audio based on integer wavelet transform and Chaotic maps hopping
Weng et al. Robust image content authentication with tamper location
CN111755018A (en) Audio hiding method and device based on wavelet transformation and quantized embedded key
CN116405201A (en) Electrocardiosignal dynamic steganography method and system based on CEEMD and convolution error correction code
Bäuml et al. Channel model for watermarks subject to desynchronization attacks
US11494866B2 (en) Video watermarking
RU2517337C1 (en) Method of embedding message in jpeg 2000 digital image
CN109120377B (en) Novel information hiding method in data transmission and storage medium
KR101269182B1 (en) Apparatus for video encryption by randomized block shuffling and a method thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant