Unlock instant, AI-driven research and patent intelligence for your innovation.

A Physical Layer Security Key Extraction Method Based on Fuzzy Extractor Negotiation

A technology of physical layer security and fuzzy extraction, applied in the field of Internet of Things secure communication, it can solve the problems of low number of interactions, sudden change of channel characteristics, and large communication overhead, and achieve the effects of reducing the number of communications, reducing leakage, and improving efficiency.

Active Publication Date: 2022-06-17
NAT UNIV OF DEFENSE TECH
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0013] The technical problem to be solved by the present invention is to propose a key extraction method that has the characteristics of coping with sudden changes in channel characteristics, high key generation rate, less interaction times, and able to resist malicious attacks. In the scene of key extraction, it solves the problems of low key generation rate, high key inconsistency rate, high communication overhead, leakage of certain information and complex coding when extracting keys between IoT devices, and effectively improves the security of IoT device communication.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Physical Layer Security Key Extraction Method Based on Fuzzy Extractor Negotiation
  • A Physical Layer Security Key Extraction Method Based on Fuzzy Extractor Negotiation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0152] figure 1 is the overall flow chart of the present invention; as figure 1 As shown, the present invention comprises the following steps:

[0153] The first step is to construct a physical layer security key extraction system based on fuzzy extractor negotiation. The system consists of two devices that communicate with each other (denoted as device A and device B), and device A and device B can send information to each other through a common channel. Each device can be both an information receiver and an information sender. Here, device A is set as the sender and device B as the receiver. A first initialization module, a first feature extraction module, a first feature quantization module, and a first key generation module are installed on device A, and a second initialization module, a second feature extraction module, and a second feature quantization module are installed on device B. , the second key regeneration module.

[0154] The first initialization module o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a physical layer security key extraction method based on fuzzy extractor negotiation, aiming to solve the problems of low key generation rate, high key inconsistency rate, information leakage and the like when extracting keys between IoT devices. The technical solution is to build a physical layer security key extraction system based on negotiating fuzzy extractors, use an adaptive multi-bit quantization algorithm to quantify the extracted channel features, and adaptively select the length of quantization bits according to the variation range of channel features; The code encodes the extracted channel features; the IoT device groups the quantized initial keys and negotiates a consensus key using a "digital lock"-based fuzzy extractor. The present invention can improve the efficiency of key negotiation, avoid the problem of high key inconsistency rate caused by channel characteristic mutation, and can effectively reduce the communication rounds and information leakage between IoT devices in the key extraction process.

Description

technical field [0001] The invention belongs to the security communication field of the Internet of Things, and in particular relates to a method for extracting a physical layer security key based on fuzzy extractor negotiation. Background technique [0002] For the first time in 2020, IoT-connected devices outnumbered non-IoT-connected devices. Of the 21.7 billion actively connected devices in the world, 11.7 billion (54%) will be IoT-connected by the end of 2020. The large-scale IoT system is deployed in many aspects such as urban construction, industrial control, and intelligent life, which can realize the true interconnection of all things. However, due to the inherent broadcast nature of wireless communication, malicious attackers can launch various passive attacks (such as eavesdropping, traffic analysis and monitoring, etc.) and active attacks (such as modification, impersonation and replay, etc.). Therefore, the information transmission of the Internet of Things sy...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08G16Y30/10
CPCH04L9/0861H04L9/0838G16Y30/10
Inventor 韩彪黄锦森王宝生王小峰李瀚迅
Owner NAT UNIV OF DEFENSE TECH