Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Key generation method capable of ensuring security of wireless communication

A key generation and wireless communication technology, applied in key distribution, can solve problems such as solution failure, channel noise interference asymmetry, high bit mismatch rate, etc., to achieve the effect of ensuring communication security, reducing bit mismatch rate, and ensuring efficiency

Inactive Publication Date: 2016-10-26
DALIAN UNIV OF TECH
View PDF3 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, when these schemes are applied to complex scenarios, most of them may fail, because the following factors will cause a lot of differences between the channel state sequences collected by both parties: 1) Many existing transceivers are It is half-duplex, which causes the sending and receiving parties to be unable to detect the channel at the same time; 2) The noise of the channel and the interference experienced are asymmetrical; 3) The hardware device itself is defective
As a result, the differences between these channel state sequences will be transformed into different bits after quantization and encoding, which will cause the bit mismatch rate between the binary bit strings to be too high to complete the key agreement efficiently
In the worst case, some solutions may fail

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key generation method capable of ensuring security of wireless communication
  • Key generation method capable of ensuring security of wireless communication
  • Key generation method capable of ensuring security of wireless communication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] The preferred embodiments of the present invention will be specifically described below in conjunction with the accompanying drawings. The inventive concepts provided by the present invention can be implemented in a wide variety of specific contexts. The specific embodiments discussed are merely illustrative of implementations of the invention, and do not limit the scope of the invention.

[0037] figure 1 A typical wireless communication system is shown. Consider the system as a time-division half-duplex system where there are two users A and B. Combined with the specific environment, consider the channel asymmetry between users. Therefore, channel S is between user A and user B, and channel T is between user B and user A. The communication radius of user A is R A , the communication radius of user B is R B . In addition, there is a communication radius R C User C. The communication radius of the three users can be different, but it must be ensured that all us...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the field of wireless communication, and discloses a key generation method capable of ensuring the security of wireless communication. The key generation method is based on a wireless channel reciprocity and a curve fitting method, extracts a shared key of wireless communication users from a shared wireless channel state to ensure the communication security, and specifically comprises five steps consisting of channel state estimation, pretreatment, quantization and coding, information coordination and privacy amplification; after the treatment of privacy amplification, a generated bit string can be used as a final shared key for transmitting and receiving parties, for protection the subsequent communication security. According to the method, the problem that a difference exists between channel state sequences collected by the transmitting and receiving parties can be solved, key negotiation and whole key generation efficiency are ensured, and the method can be more widely applied to various complex actual application scenarios, for efficiently ensuring the communication security.

Description

technical field [0001] The invention belongs to the field of wireless communication, and relates to a key generation method for ensuring the security of wireless communication. Background technique [0002] Wireless channels are inherently open, which makes the wireless communication process more vulnerable to security threats. Therefore, ensuring wireless communication security is of paramount importance. In the existing security system, the role of the key is irreplaceable, and it is the basis for most security mechanisms. [0003] Traditional key generation methods are mainly based on Public Key Cryptography. Such methods take advantage of the computational difficulty of certain problems to ensure that keys are difficult to crack, and thus require significant computational and other resources. In addition, public key encryption systems usually require an infrastructure (Public Key Infrastructure). To sum up, public-key cryptosystems are not suitable for certain applic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08
CPCH04L9/0861H04L9/0875
Inventor 姚念民战福瑞
Owner DALIAN UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products