A Physical Layer Security Key Extraction Method Based on Fuzzy Extractor Negotiation
A technology of physical layer security and fuzzy extraction, applied in the field of Internet of Things secure communication, it can solve the problems of low number of interactions, sudden change of channel characteristics, and large communication overhead, and achieve the effects of reducing the number of communications, reducing leakage, and improving efficiency.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0152] figure 1 is the overall flow chart of the present invention; as figure 1 As shown, the present invention comprises the following steps:
[0153] The first step is to construct a physical layer security key extraction system based on fuzzy extractor negotiation. The system consists of two devices that communicate with each other (denoted as device A and device B), and device A and device B can send information to each other through a common channel. Each device can be both an information receiver and an information sender. Here, device A is set as the sender and device B as the receiver. A first initialization module, a first feature extraction module, a first feature quantization module, and a first key generation module are installed on device A, and a second initialization module, a second feature extraction module, and a second feature quantization module are installed on device B. , the second key regeneration module.
[0154] The first initialization module o...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

