CN107528687A - Dynamic key based on physical layer channel cross correlation quantifies machinery of consultation - Google Patents
Dynamic key based on physical layer channel cross correlation quantifies machinery of consultation Download PDFInfo
- Publication number
- CN107528687A CN107528687A CN201710905539.5A CN201710905539A CN107528687A CN 107528687 A CN107528687 A CN 107528687A CN 201710905539 A CN201710905539 A CN 201710905539A CN 107528687 A CN107528687 A CN 107528687A
- Authority
- CN
- China
- Prior art keywords
- key
- quantization
- data
- bit
- packet
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000013139 quantization Methods 0.000 claims abstract description 153
- 238000004891 communication Methods 0.000 claims abstract description 72
- 238000000034 method Methods 0.000 claims abstract description 72
- 230000008569 process Effects 0.000 claims abstract description 33
- 230000011218 segmentation Effects 0.000 claims abstract 3
- 230000005540 biological transmission Effects 0.000 claims description 3
- 238000012360 testing method Methods 0.000 description 6
- 239000000523 sample Substances 0.000 description 5
- 230000003068 static effect Effects 0.000 description 5
- 238000006073 displacement reaction Methods 0.000 description 4
- 238000003491 array Methods 0.000 description 3
- 238000010586 diagram Methods 0.000 description 3
- 239000000284 extract Substances 0.000 description 3
- 238000011002 quantification Methods 0.000 description 3
- 230000008901 benefit Effects 0.000 description 2
- 238000004364 calculation method Methods 0.000 description 2
- 238000002474 experimental method Methods 0.000 description 2
- 230000006872 improvement Effects 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 230000004044 response Effects 0.000 description 2
- 238000005336 cracking Methods 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000007613 environmental effect Effects 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000011160 research Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0863—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
本发明公开了一种基于无线物理层信道特征的动态密钥量化协商方法,解决了现有量化协商方法密钥生成速率低,熵值较低的问题。量化协商过程包括:数据通信双方预先采集通信数据信息,初始化密钥量化协商参数,通信一方对分段后每一段数据依次进行动态分组斜率量化得到初始密钥,通信双方根据分组下标记录数组与舍弃数组对初始密钥进行密钥协商,最终双方各自得到最终密钥。本发明提高了密钥流生成速率,可在200秒左右时长内生成128‑256bit密钥流。保证了密钥流熵值较高,优于上下区间量化算法和固定分组斜率量化算法。本发明应用于无线网络加密通信中的密钥生成协商,实现安全通讯。
The invention discloses a dynamic key quantization negotiation method based on wireless physical layer channel characteristics, which solves the problems of low key generation rate and low entropy value in the existing quantization negotiation method. The quantization negotiation process includes: both parties of data communication collect communication data information in advance, initialize the key quantization negotiation parameters, the communication party performs dynamic packet slope quantization on each piece of data after segmentation to obtain the initial key, and the communication parties record the array and Discard the array to conduct key agreement on the initial key, and finally both parties get the final key. The invention improves the key stream generation rate, and can generate 128-256bit key stream within about 200 seconds. It ensures that the key stream entropy value is high, which is better than the upper and lower interval quantization algorithm and the fixed group slope quantization algorithm. The invention is applied to the key generation negotiation in wireless network encryption communication to realize safe communication.
Description
技术领域technical field
本发明属于无线网络安全技术领域,主要涉及无线网络通信中的密钥量化协商,具体是一种基于物理层信道互相关性的动态密钥量化协商方法,用于无线网络安全通信。The invention belongs to the technical field of wireless network security, and mainly relates to key quantization negotiation in wireless network communication, in particular to a dynamic key quantization negotiation method based on physical layer channel mutual correlation, which is used for wireless network security communication.
背景技术Background technique
建立一个安全的通信信道是无线网络的基础和最重要的安全需要,因为无线网络涉及到我们的日常安全和安全应用的各个方面。传统的网络安全机制依赖于密钥来支持保密和认证服务。Establishing a secure communication channel is the foundation and the most important security requirement of wireless networks, because wireless networks involve all aspects of our daily safety and security applications. Traditional network security mechanisms rely on keys to support confidentiality and authentication services.
然而,在动态移动无线环境中,即使是即时移动实体之间对等的关联,也很难保证一个证书管理机构或密钥管理中心的可用性。借助于在无线网络环境中无线终端(STA)与接入点(AP)间建立的无线信道具有一定的互相关性,利用具有相关性的双方共享的无线信道特征进行密钥量化协商,从中提取出足够保证一定安全强度的密钥流。However, in a dynamic mobile wireless environment, it is difficult to guarantee the availability of a certificate management authority or a key management center even if there is a peer-to-peer association between instant mobile entities. With the help of the wireless channel established between the wireless terminal (STA) and the access point (AP) in the wireless network environment, there is a certain cross-correlation, and the wireless channel characteristics shared by both parties with correlation are used for key quantization negotiation, and the key is extracted from it. Generate a key stream that is sufficient to guarantee a certain security strength.
关于这方面的最近趋势是使用无线信道的接收信号强度(RSS)来提取密钥。接收信号强度(RSS)是无线电信道的一个流行的统计,并且可以用作发射机和接收机之间共享秘密信息的来源。A recent trend in this regard is to use the Received Signal Strength (RSS) of the wireless channel to extract keys. Received Signal Strength (RSS) is a popular statistic of radio channels and can be used as a source of shared secret information between transmitter and receiver.
传统的使用RSS来进行密钥量化协商的方法,例如基于上下区间阈值的量化方法,有许多不足之处,尤其是在静止的情况:(1)其致命弱点是比特生成率低;(2)所生成的密钥具有低熵(具有连续多个0或连续多个1的序列),降低了保密性;(3)无法有效抵御预测的信道攻击,因为如果信道被周期性地阻塞,RSS的读取将增加或减少。The traditional method of using RSS to carry out key quantization negotiation, such as the quantization method based on the upper and lower interval thresholds, has many shortcomings, especially in the static situation: (1) its fatal weakness is the low bit generation rate; (2) The generated key has low entropy (sequence with consecutive multiple 0s or consecutive multiple 1s), which reduces the confidentiality; (3) cannot effectively resist the predicted channel attack, because if the channel is periodically blocked, the RSS Reads will increase or decrease.
发明内容Contents of the invention
本发明的目的是针对现有技术的不足,提出一种密钥生成速率快,密钥熵值较高的基于物理层信道互相关性的动态密钥量化协商方法。The object of the present invention is to propose a dynamic key quantization negotiation method based on physical layer channel mutual correlation with fast key generation rate and high key entropy value in view of the deficiencies in the prior art.
本发明是一种基于无线物理层信道特征的动态密钥量化协商方法,其特征在于,包括有如下步骤:The present invention is a kind of dynamic key quantitative negotiation method based on wireless physical layer channel characteristic, it is characterized in that, comprises following steps:
步骤1:数据通信的双方预先采集通信数据信息:首先双方建立一种具有互相关性的无线信道,在固定时间内进行交互,各自获取按照固定发送速率发送固定时长所采集到的数据包,各自提取出每个数据包中的信道特征值,各自构成一串用于密钥量化的输入数据;Step 1: The two parties in the data communication pre-collect the communication data information: first, the two parties establish a wireless channel with mutual correlation, interact within a fixed time, and each obtain the data packets collected by sending a fixed time at a fixed sending rate. Extracting the channel eigenvalues in each data packet, respectively forming a string of input data for key quantization;
步骤2:数据通信的双方初始化密钥量化参数:双方各自对用于密钥量化的输入数据进行分段,每段初始分组的基准点初始化为该段的第一个数据点,每段的分组序号均从1开始,并设置斜率阈值;Step 2: Both parties in the data communication initialize key quantization parameters: both parties segment the input data for key quantization respectively, and the reference point of each initial grouping is initialized as the first data point of the segment, and the grouping of each segment The serial numbers start from 1, and set the slope threshold;
步骤3:数据通信的一方对分段后的每一段数据依次进行动态分组斜率量化:Step 3: One party of the data communication performs dynamic grouping slope quantification on each piece of segmented data in turn:
3.1数据通信的一方选取第一段数据,从该段的基准点开始,将之后的数据点依次与基准点进行比较,若当前数据点与基准点的差值的绝对值大于斜率阈值时,则进行密钥量化,生成一个比特,并且记录当前数据点为当前分组的终点,将数据点下标保存在分组下标记录中,分组序号增加1,下一分组的基准点即为上一分组的终点;否则舍弃该数据点,进行下一数据点的比较,直至结束该分组生成一个比特;这一过程完成了一个分组的比特量化;3.1 The data communication party selects the first segment of data, starts from the reference point of this segment, and compares the subsequent data points with the reference point in turn. If the absolute value of the difference between the current data point and the reference point is greater than the slope threshold, then Carry out key quantization, generate a bit, and record the current data point as the end point of the current group, save the subscript of the data point in the subscript record of the group, increase the group number by 1, and the reference point of the next group is that of the previous group End point; otherwise discard the data point and compare the next data point until the end of the group to generate a bit; this process completes the bit quantization of a group;
3.2数据通信的一方将对该段数据依次按照步骤3.1进行动态分组量化,一个分组量化生成有且仅有一个比特,将每个分组量化生成的一个比特依次保存在已量化比特串中,若已量化比特串为空,则当前生成的一个比特即为已量化比特串;否则将生成的一个比特拼接到已量化比特串尾部;这一过程完成了一段数据的分组比特量化;3.2 The data communication party will perform dynamic packet quantization on the segment of data in turn according to step 3.1. One packet quantization generates one and only one bit, and one bit generated by each packet quantization is sequentially stored in the quantized bit string. If the quantized bit string is empty, the currently generated bit is the quantized bit string; otherwise, the generated bit is spliced to the end of the quantized bit string; this process completes the group bit quantization of a piece of data;
3.3数据通信的一方对每一段数据按照步骤3.2进行比特量化,将量化后得到的每一段已量化比特串依次进行拼接生成原始量化密钥,得到密钥量化结果,即原始量化密钥和分组下标记录;3.3 The data communication party performs bit quantization on each piece of data according to step 3.2, splices each piece of quantized bit string obtained after quantization in turn to generate the original quantization key, and obtains the result of key quantization, that is, the original quantization key and the grouping marked record;
步骤4:数据通信的双方根据分组下标记录与舍弃数组进行密钥协商过程,具体协商过程包括:Step 4: The two parties of the data communication conduct the key negotiation process according to the subscript record of the group and the discarded array. The specific negotiation process includes:
4.1数据通信的一方将密钥量化结果中的分组下标记录发送给另一方;4.1 One party of the data communication sends the group subscript record in the key quantization result to the other party;
4.2数据通信的另一方收到对方的分组下标记录后,根据分组下标记录对自己的用于密钥量化的输入数据依次进行分组密钥量化,若当前分组无生成比特则将该分组下标记录在舍弃数组中;否则将生成的比特保存在已量化比特串中,若已量化比特串为空,则当前生成的一个比特即为已量化比特串;否则将生成的一个比特拼接到已量化比特串尾部,量化结束后另一方得到了密钥量化结果,即已量化比特串和舍弃数组,另一方将舍弃数组发送给对方,已量化比特串作为另一方最终的量化密钥;4.2 After the other party of the data communication receives the group subscript record of the other party, it performs group key quantization on its own input data for key quantization according to the group subscript record. If the current group has no generated bits, the group is downloaded. If the quantized bit string is empty, the currently generated bit is the quantized bit string; otherwise, the generated bit is spliced into the quantized bit string. Quantize the tail of the bit string. After quantization, the other party obtains the key quantization result, that is, the quantized bit string and the discarded array. The other party sends the discarded array to the other party. The quantized bit string is used as the final quantized key of the other party;
4.3数据通信的对方收到另一方的舍弃数组后,根据舍弃数组依次对自己原始量化密钥中的相应分组量化比特进行舍弃,得到最终的量化密钥,完成双方密钥协商过程;4.3 After receiving the discarded array from the other party, the other party of the data communication discards the corresponding grouped quantized bits in its original quantized key in turn according to the discarded array to obtain the final quantized key and complete the key negotiation process between the two parties;
步骤5:数据通信的双方的密钥量化协商过程结束,双方各自得到一串具有足够安全长度128-256bit的01比特密钥流,在此量化协商密钥的环境下实现无线加密通信。Step 5: the key quantization negotiation process of both parties of the data communication ends, and both parties respectively obtain a string of 01 bit key streams with sufficient security length 128-256bit, and realize wireless encrypted communication under the environment of this quantization negotiation key.
在本发明中,不再使用固定的阈值生成密钥,而是用两个信道特征数据点的RSS值的差值即斜率值,对密钥进行量化。使用本发明,可以在更短的时间里生成更健壮的密钥。In the present invention, instead of using a fixed threshold to generate a key, the key is quantized by using the difference between the RSS values of two channel characteristic data points, that is, the slope value. Using the present invention, more robust keys can be generated in less time.
与现有技术相比,本发明的技术优势:Compared with prior art, technical advantage of the present invention:
1.本发明量化过程采用动态分组方法,结合斜率阈值量化方法,当数据点与基准点的差值的绝对值满足阈值要求,即可划分为一个有效分组,将信道特征数据的有效分组数目大幅度提高,动态分组方法的平均分组长度小于固定分组方法中所设定的固定分组长度,所以使用本发明方法生成密钥的生成速率较高,实验证明,使用本发明,200秒内生成128-256bit左右的比特密钥流,动态分组量化协商方法有效提高了密钥生成速率;1. The quantization process of the present invention adopts the dynamic grouping method, combined with the slope threshold quantization method, when the absolute value of the difference between the data point and the reference point meets the threshold value requirement, it can be divided into an effective grouping, and the effective grouping number of the channel characteristic data is large Amplitude improves, and the average grouping length of dynamic grouping method is less than the fixed grouping length set in the fixed grouping method, so use the method of the present invention to generate the key generation rate higher, experiment proves, use the present invention, generate 128-200 seconds The bit key stream of about 256bit, the dynamic packet quantization negotiation method effectively improves the key generation rate;
2.本发明采用相邻信道数据点间差值这一特征,最大限度上保护并描述了信道数据的特性,使得量化协商密钥熵值较高,也正因为本发明所生成的密钥具有较高熵值,确保了无线通信中数据保密的安全性;2. The present invention adopts the feature of the difference between adjacent channel data points to protect and describe the characteristics of the channel data to the greatest extent, so that the entropy value of the quantization negotiation key is high, and it is also because the key generated by the present invention has Higher entropy value ensures the security of data confidentiality in wireless communication;
3.本发明方法在进行量化密钥生成时,不会受数据通信双方接收到的信道特征值存在的位移影响,因为所使用的数据特征为相邻数据点的差值,将数据点所包含的偏移值进行抵消,因此信道特征数据存在的位移对量化协商密钥生成速率、熵值没有任何影响,更优于之前已有的区间阈值量化算法。3. When the method of the present invention performs quantization key generation, it will not be affected by the displacement of the channel characteristic value received by both parties of data communication, because the used data characteristic is the difference between adjacent data points, and the data points will contain Therefore, the displacement of the channel characteristic data has no effect on the quantization negotiation key generation rate and entropy value, which is better than the previous interval threshold quantization algorithm.
4.本发明密钥协商过程中,交互数据仅为分组下标记录数组和舍弃数组,数组存储的为数据点的下标,而非数据点RSS值,这样做更好的保证了RSS数据的安全性,即不向外界发送任何与RSS值有关的内容,窃听者即使捕获得到这两个数组,并不能从中恢复出量化密钥。这在一定程度上抵御了预测信道攻击,增强了密钥协商过程中的安全性。4. In the key negotiation process of the present invention, the interactive data is only the group subscript record array and the discarded array, and what the array stores is the subscript of the data point, rather than the RSS value of the data point, which better ensures the RSS data Security, that is, do not send any content related to the RSS value to the outside world. Even if the eavesdropper captures these two arrays, he cannot recover the quantization key from them. This resists predictive channel attacks to a certain extent and enhances the security during the key agreement process.
附图说明Description of drawings
图1为本发明的密钥量化流程示意图;Fig. 1 is a schematic diagram of key quantization flow chart of the present invention;
图2为本发明的通信双方量化折线图;Fig. 2 is a quantized line diagram of both communication parties of the present invention;
图3为本发明的通信双方密钥协商时序图。FIG. 3 is a sequence diagram of key agreement between communicating parties in the present invention.
具体实施方式detailed description
下面结合附图对本发明详细说明,Below in conjunction with accompanying drawing the present invention is described in detail,
实施例1Example 1
现有无线通信的密钥量化协商方法中的基于上下区间阈值的量化方法,其致命弱点是密钥比特生成速率低,并且所生成的密钥熵值较低,无法高效抵御攻击者对密钥的暴力破解,降低了保密性。针对此现状,本发明展开了研究与创新,提出一种基于无线物理层信道特征的动态密钥量化协商方法,在基于802.11协议的无线网络环境架构中,一般由无线终端与接入点构成,无线终端以主动扫描模式向接入点发送探测请求帧,接入点收到探测请求帧后,发送探测响应帧以回应无线终端,这一过程通信双方便在无线空间中建立了一个无线信道,在无线通信理论物理层面上这一信道所具有的信道特征是独一无二的,两两信道不同,但是信道所连接的通信双方所接收到的信道特征是理论一致的,现实情形中会受环境噪声等因素影响,但依然具有较强的互相关性。本例中,利用这一物理层信道的互相关性,得到一组只有通信双方所共享的信道特征序列,使用这一信道特征序列作为秘密信息进行密钥量化协商。具体密钥量化协商过程参见图1,包括有如下步骤:The Achilles heel of the quantization method based on the upper and lower interval thresholds in the existing wireless communication key quantization negotiation method is that the key bit generation rate is low, and the generated key entropy value is low, which cannot effectively resist the attack of the attacker on the key. The brute force cracking reduces the confidentiality. In response to this situation, the present invention has launched research and innovation, and proposes a dynamic key quantization negotiation method based on wireless physical layer channel characteristics. In the wireless network environment architecture based on the 802.11 protocol, it is generally composed of wireless terminals and access points. The wireless terminal sends a probe request frame to the access point in active scanning mode. After receiving the probe request frame, the access point sends a probe response frame to respond to the wireless terminal. This process facilitates the establishment of a wireless channel in the wireless space for both communication parties. On the theoretical physical level of wireless communication, the channel characteristics of this channel are unique, and the two channels are different, but the channel characteristics received by the communication parties connected to the channel are theoretically consistent, and in reality, it will be affected by environmental noise, etc. factors, but still have a strong correlation. In this example, by using the mutual correlation of the physical layer channel, a set of channel characteristic sequences shared only by both communication parties is obtained, and this channel characteristic sequence is used as secret information for key quantization negotiation. See Figure 1 for the specific key quantization negotiation process, including the following steps:
步骤1:数据通信的双方预先采集通信数据信息:首先双方建立一种具有互相关性的无线信道,在固定时间内进行交互,各自获取按照固定发送速率发送固定时长所采集到的数据包,各自提取出每个数据包中的信道特征值,各自构成一串用于密钥量化的输入数据。Step 1: The two parties in the data communication pre-collect the communication data information: first, the two parties establish a wireless channel with mutual correlation, interact within a fixed time, and each obtain the data packets collected by sending a fixed time at a fixed sending rate. The channel eigenvalues in each data packet are extracted to form a string of input data for key quantization.
本例中,通过ping程序向STA与AP发送数据包进行交互,发送速率定为10数据包/秒,交互时长定为200秒,各自获取1800左右数目的数据包,各自提取出每个数据包中的RSS值,各自构成一串用于密钥量化的输入数据。In this example, the ping program is used to send data packets to the STA and the AP to interact, the sending rate is set to 10 packets/second, the interaction time is set to 200 seconds, each obtains about 1800 data packets, and extracts each data packet The RSS values in each constitute a string of input data for key quantization.
步骤2:数据通信的双方初始化密钥量化参数:双方各自对从步骤1中得到的用于密钥量化的输入数据进行分段,段长设为100-300,每段初始分组的基准点初始化为该段的第一个数据点,每段的分组序号均从1开始,并设置斜率阈值,在本例中斜率阈值定为4,段长定为100。Step 2: Both parties in the data communication initialize key quantization parameters: both parties segment the input data used for key quantization obtained in step 1, the segment length is set to 100-300, and the reference point of each initial grouping is initialized It is the first data point of the segment, the group number of each segment starts from 1, and the slope threshold is set. In this example, the slope threshold is set to 4, and the segment length is set to 100.
步骤3:数据通信的一方对分段后的每一段数据依次进行动态分组斜率量化:Step 3: One party of the data communication performs dynamic grouping slope quantification on each piece of segmented data in turn:
3.1一个分组数据的比特量化:数据通信的一方选取第一段数据,从该段的基准点开始,将之后的数据点依次与基准点进行比较,若当前数据点与基准点的差值的绝对值大于斜率阈值时,则进行密钥量化,生成一个比特,并且记录当前数据点为当前分组的终点,将当前数据点下标保存在分组下标记录中,分组序号增加1,下一分组的基准点即为上一分组的终点;否则舍弃该数据点,进行下一数据点的比较,直至结束该分组生成一个比特;这一过程完成了一个分组的比特量化。本发明采用的动态分组方法可以保证密钥生成速率较高,而且在进行量化比特生成时,不会受数据通信双方接收到的信道特征值存在的位移影响。3.1 Bit quantization of a packet data: the party of data communication selects the first segment of data, starts from the reference point of this segment, and compares the subsequent data points with the reference point in turn, if the absolute value of the difference between the current data point and the reference point When the value is greater than the slope threshold, key quantization is performed, a bit is generated, and the current data point is recorded as the end point of the current group, the subscript of the current data point is saved in the group subscript record, the group number increases by 1, and the next group The reference point is the end point of the previous group; otherwise, the data point is discarded, and the next data point is compared until the end of the group to generate a bit; this process completes the bit quantization of a group. The dynamic grouping method adopted in the present invention can ensure a high rate of key generation, and will not be affected by the displacement of channel characteristic values received by both parties of data communication when generating quantized bits.
3.2一段数据的分组比特量化:数据通信的一方将对该段数据依次按照步骤3.1进行动态分组量化,一个分组量化生成有且仅有一个比特,将每个分组量化生成的一个比特依次保存在已量化比特串中,若已量化比特串为空,则当前生成的一个比特即为已量化比特串;否则将生成的一个比特拼接到已量化比特串尾部,这一过程完成了一段数据的分组比特量化。3.2 Group bit quantization of a piece of data: the data communication party will perform dynamic group quantization on the piece of data in turn according to step 3.1. One group quantization generates one and only one bit, and one bit generated by each group quantization is stored in the existing In the quantized bit string, if the quantized bit string is empty, the currently generated bit is the quantized bit string; otherwise, the generated bit is spliced to the end of the quantized bit string, and this process completes the grouping of bits for a piece of data Quantify.
3.3得到密钥量化结果:数据通信的一方对每一段数据按照步骤3.2进行比特量化,将量化后得到的每一段已量化比特串依次进行拼接,得到密钥量化结果,即原始量化密钥和分组下标记录。3.3 Obtain the key quantization result: the data communication party performs bit quantization on each piece of data according to step 3.2, and splices each piece of quantized bit string obtained after quantization in turn to obtain the key quantization result, that is, the original quantization key and grouping subscript record.
参见图2,以第一分组为例对上述分组过程进行描述,从基准点(横坐标为1的点)开始,将之后的数据点依次与该基准点进行比较,下标为2数据点其RSS值为26dB,该点值与基准点值27dB作差,差值为-1dB,绝对值为1dB,小于斜率阈值4,不进行密钥生成,继续下一点的比较,当比较至第4数据点时,该点RSS值为32dB,差值为5dB,绝对值为5dB,大于斜率阈值4,进行密钥生成,且差值5dB>0,该分组量化比特为1,并将其保存在已量化比特串中,所以数据通信的一方将该数据点下标4作为分组下标,并保存在分组下标记录中,同时将第4点作为下一分组的基准点。这样便完成对第一分组的比特量化。Referring to Figure 2, the above grouping process is described by taking the first grouping as an example. Starting from the reference point (the point whose abscissa is 1), the subsequent data points are compared with the reference point in turn, and the subscript is 2 data points and the other The RSS value is 26dB, the difference between this point value and the reference point value of 27dB, the difference is -1dB, the absolute value is 1dB, less than the slope threshold 4, no key generation is performed, and the comparison to the next point is continued, when the comparison reaches the fourth data At this point, the RSS value at this point is 32dB, the difference is 5dB, and the absolute value is 5dB, which is greater than the slope threshold 4, and the key is generated, and the difference is 5dB>0, the quantization bit of this group is 1, and it is stored in the In the quantized bit string, the party of the data communication regards the data point subscript 4 as the group subscript and saves it in the group subscript record, and at the same time uses the 4th point as the reference point of the next group. This completes the bit quantization of the first packet.
步骤4:数据通信的双方根据分组下标记录与舍弃数组进行密钥协商过程,参见图3,本例中数据通信的一方为Alice,另一方为Bob,具体协商过程为:Step 4: The two parties in the data communication conduct the key negotiation process according to the subscript record of the group and the discarding array. See Figure 3. In this example, one party of the data communication is Alice, and the other party is Bob. The specific negotiation process is as follows:
4.1数据通信的一方Alice将密钥量化结果中的分组下标记录发送给另一方,即Bob。4.1 Alice, one party of the data communication, sends the group subscript record in the key quantization result to the other party, namely Bob.
4.2数据通信的另一方Bob收到对方Alice的分组下标记录后,根据分组下标记录对自己的用于密钥量化的输入数据依次进行分组密钥量化,若当前分组无生成比特则将该分组下标记录在舍弃数组中;否则将生成的比特保存在已量化比特串中,若已量化比特串为空,则当前生成的一个比特即为已量化比特串;否则将生成的一个比特拼接到已量化比特串尾部,量化结束后另一方Bob得到了密钥量化结果,即已量化比特串和舍弃数组,另一方Bob将舍弃数组发送给对方Alice,已量化比特串作为另一方Bob最终的量化密钥。4.2 Bob, the other party in the data communication, receives the group subscript record from Alice, and performs group key quantization on his own input data for key quantization according to the group subscript record. If there is no generated bit in the current group, the The subscript of the group is recorded in the discarded array; otherwise, the generated bit is stored in the quantized bit string. If the quantized bit string is empty, the currently generated bit is the quantized bit string; otherwise, the generated bit is concatenated At the end of the quantized bit string, after quantization, the other party Bob obtains the key quantization result, that is, the quantized bit string and the discarded array, and the other party Bob sends the discarded array to Alice, and the quantized bit string is used as the final quantization key.
4.3数据通信的对方Alice收到另一方Bob的舍弃数组后,根据舍弃数组依次对自己原始量化密钥中的相应分组量化比特进行舍弃,得到最终的量化密钥,完成双方密钥协商过程。4.3 Alice, the other party of data communication, receives the discarded array from the other party Bob, discards the corresponding grouped quantized bits in her original quantized key in turn according to the discarded array, obtains the final quantized key, and completes the key negotiation process between the two parties.
步骤5:数据通信的双方的密钥量化协商过程结束,双方各自得到一串具有足够安全长度128-256bit的01比特密钥流,在此量化协商密钥的环境下实现加密无线通信。Step 5: the key quantization negotiation process of both parties of the data communication ends, and both parties respectively obtain a string of 01 bit key streams with sufficient security length 128-256bit, and realize encrypted wireless communication under the environment of this quantization negotiation key.
在现有的固定分组密钥量化协商方法中,密钥生成速率低,其原因在于通信双方各自接收的信道特征数据在固定时长内波动幅度较小,导致有效数据点过少,生成密钥比特数目相应较少;所生成的密钥熵值较低,密钥中具有连续多个0或连续多个1的序列,降低了保密性;对于预测的信道攻击显得很脆弱,其原因在于如果信道被周期性地阻塞,信道特征值的读取将增加或减少。In the existing fixed group key quantization negotiation method, the key generation rate is low. The reason is that the channel characteristic data received by the two communication parties fluctuate less within a fixed period of time, resulting in too few valid data points. The number is relatively small; the generated key entropy value is low, and the key has a sequence of consecutive multiple 0s or consecutive multiple 1s, which reduces the confidentiality; it is very vulnerable to predicted channel attacks because if the channel is blocked periodically, the reading of the channel eigenvalue will be incremented or decremented.
本发明是在固定分组密钥生成方法的基础上提出的一种新方法,是在寻找一种动态分组提取密钥而不是从固定分组中获取密钥的新途径。The present invention is a new method proposed on the basis of the method for generating fixed group keys, and seeks a new way of extracting keys from dynamic groups instead of obtaining keys from fixed groups.
本发明在密钥量化过程中提出了动态分组斜率量化方法,由于一组信道特征值序列不可能是单调的,这样避免了生成连续0或连续1密钥的情形,对原有方法进行了一些技术改进,从固定分组改变为动态分组,引入波动参数进行阈值量化,增加了有效数据点数目,并且将量化方法从组内均值量化改为组内首尾两点差值量化,运算量降低,从而进一步提高了密钥量化生成速率。The present invention proposes a dynamic packet slope quantization method in the key quantization process. Since a group of channel eigenvalue sequences cannot be monotonous, the situation of generating continuous 0 or continuous 1 keys is avoided, and some improvements are made to the original method. Technical improvement, changing from fixed grouping to dynamic grouping, introducing fluctuation parameters for threshold quantization, increasing the number of valid data points, and changing the quantization method from the quantization of the mean value within the group to the quantization of the difference between the first and last points in the group, reducing the amount of calculation, thus The key quantization generation rate is further improved.
实施例2Example 2
基于无线物理层信道特征的动态密钥量化协商方法同实施例1,本发明步骤1中所使用的信道特征值为接收信号强度(RSS),固定发送速率一般设为10个数据包/秒,固定时常为200秒,这样做可以使得通信双方在有限的时间内采集到更多的信道特征数据信息,从而更好的体现出信道的特征,保证其密钥的不可预测性。The dynamic key quantization negotiation method based on wireless physical layer channel characteristics is the same as embodiment 1. The channel characteristic value used in step 1 of the present invention is received signal strength (RSS), and the fixed transmission rate is generally set to 10 packets/second. The fixed time is usually 200 seconds, so that the communication parties can collect more channel characteristic data information within a limited time, so as to better reflect the characteristics of the channel and ensure the unpredictability of the key.
本例中发送速率为20个数据包/秒,时长为200秒,除去丢包可以采集到3500左右个数据包,若发送速率进一步增大,超过50个数据包/秒时,丢包率将大幅度提高,达到30%左右。In this example, the sending rate is 20 packets/second, and the duration is 200 seconds. About 3,500 packets can be collected except packet loss. If the sending rate is further increased, when the sending rate exceeds 50 packets/second, the packet loss rate will decrease. A substantial increase, reaching about 30%.
实施例3Example 3
基于无线物理层信道特征的动态密钥量化协商方法同实施例1-2,步骤2中的斜率阈值由参数elps和波动参数d确定,斜率阈值(cmp)的定义式为cmp=elps/d,其中参数elps定义为临界值,为一段数据中所有相邻数据点间差值的平均值,一般取值为2-4,波动参数d用来减少较小的波动对密钥生成的影响,一般取值为0.5-1。The dynamic key quantization negotiation method based on wireless physical layer channel characteristics is the same as embodiment 1-2, and the slope threshold value in step 2 is determined by parameter elps and fluctuation parameter d, and the definition formula of slope threshold value (cmp) is cmp=elps/d, Among them, the parameter elps is defined as the critical value, which is the average value of the difference between all adjacent data points in a piece of data. Generally, the value is 2-4. The fluctuation parameter d is used to reduce the impact of small fluctuations on key generation. Generally, The value is 0.5-1.
在本例中参数elps设为2,波动参数设为1,因为本例测试环境中,双方均为静止状态,双方在同一房间进行实验,因此信道特征数据波动较小,斜率阈值也会相应减小。In this example, the parameter elps is set to 2, and the fluctuation parameter is set to 1, because in the test environment of this example, both parties are in a static state, and both parties conduct experiments in the same room, so the fluctuation of the channel characteristic data is small, and the slope threshold will be reduced accordingly. small.
实施例4Example 4
基于无线物理层信道特征的动态密钥量化协商方法同实施例1-3,步骤3.1中所述的每一分组生成一个比特时,具体为,若当前数据点与基准点的差值为正,则该分组量化比特为1;若当前数据点与基准点的差值为负,则该分组量化比特为0。The dynamic key quantization negotiation method based on wireless physical layer channel characteristics is the same as that in Embodiment 1-3, when each packet described in step 3.1 generates a bit, specifically, if the difference between the current data point and the reference point is positive, Then the group quantization bit is 1; if the difference between the current data point and the reference point is negative, the group quantization bit is 0.
本例中,参数elps设为4,波动参数设为0.5,斜率阈值计算为4/0.5=8,因为本例测试环境中,AP处于走廊,为静止状态,STA处于走廊旁的一个房间,且为运动状态,采集得到的信道特征数据波动较大,且会出现个别数据点RSS值突变现象,所以斜率阈值相应增大以减小密钥生成的误码率。In this example, the parameter elps is set to 4, the fluctuation parameter is set to 0.5, and the slope threshold is calculated as 4/0.5=8, because in the test environment of this example, the AP is in a corridor and is in a static state, and the STA is in a room next to the corridor, and In the state of motion, the collected channel characteristic data fluctuates greatly, and there will be sudden changes in the RSS value of individual data points, so the slope threshold is increased accordingly to reduce the bit error rate of key generation.
实施例5Example 5
基于无线物理层信道特征的动态密钥量化协商方法同实施例1-4,步骤3.1中的差值Δ绝对值定义为|Δ|=|array[i]-array[start]|,其中array为输入数据列,i为当前数据点下标,start为当前分组基准点。The dynamic key quantization negotiation method based on wireless physical layer channel characteristics is the same as that in Embodiment 1-4, and the absolute value of the difference Δ in step 3.1 is defined as |Δ|=|array[i]-array[start]|, where array is Enter the data column, i is the subscript of the current data point, and start is the current grouping reference point.
在本例中,斜率量化可概括为组内首尾差值量化,相较于组内均值与基准值量化,运算量小,这也从另一个角度说明了本发明的密钥生成速率高。In this example, the slope quantization can be summarized as intra-group first-to-tail difference quantization. Compared with the intra-group mean and reference value quantization, the calculation amount is small, which also illustrates the high key generation rate of the present invention from another perspective.
实施例6Example 6
基于无线物理层信道特征的动态密钥量化协商方法同实施例1-5,本发明步骤4中分组信息记录在分组下标记录数组中,分组下标数组记作segment,其中的每个元素保存的是每个分组的终点下标,segment[0]为segment数组的第一个元素,在segment[0]中保存的为分组的个数;舍弃数组记作UB,其中每个元素保存的是每个舍弃分组的终点下标,UB[0]为UB舍弃数组的第一个元素,在UB[0]中保存的为舍弃分组的个数。The dynamic key quantization negotiation method based on the channel characteristics of the wireless physical layer is the same as that in Embodiments 1-5. In Step 4 of the present invention, the grouping information is recorded in the grouping subscript record array, and the grouping subscript array is marked as segment, and each element in it is saved What is the subscript of the end point of each group, segment[0] is the first element of the segment array, and the number of groups is stored in segment[0]; the discarded array is denoted as UB, and each element saves The end subscript of each discarded group, UB[0] is the first element of the UB discarded array, and the number of discarded groups is stored in UB[0].
在本例的协商过程中的交互数据仅为上述两个数组,数组存储的为数据点的下标,而非数据点RSS值,这样做更好的保证了RSS数据的安全,即不向外界发送任何与RSS值有关的内容,窃听者即使捕获得到这两个数组,并不能从中恢复出量化密钥。In the negotiation process of this example, the interaction data is only the above two arrays, and the array stores the subscript of the data point, not the RSS value of the data point. This better ensures the security of the RSS data, that is, it does not send Send any content related to the RSS value, even if the eavesdropper captures these two arrays, he cannot recover the quantization key from them.
下边用另一实例对本发明进一步说明:The present invention is further described with another example below:
实施例7Example 7
基于无线物理层信道特征的动态密钥量化协商方法同实施例1-6,参见图1,通信双方一方为Alice,另一方为Bob,具体步骤描述如下:The dynamic key quantization negotiation method based on wireless physical layer channel characteristics is the same as that in Embodiment 1-6, referring to Fig. 1, one of the communication parties is Alice, and the other is Bob, and the specific steps are described as follows:
step1:在固定的时间段内通信双方Alice和Bob通过无线通信链路互相收发按照固定发送速率发送固定时长所采集到的数据包,固定发送速率为10数据包/秒,固定时长为300秒,双方从采集得到的2700余个数据包中各自提取出一组信道特征值并保存,本发明使用RSS作为信道特征值,并记录该组数据长度记为Len。Step1: Within a fixed period of time, Alice and Bob, both communicating parties, send and receive data packets collected by each other through a wireless communication link at a fixed sending rate for a fixed duration. The fixed sending rate is 10 packets/second, and the fixed duration is 300 seconds. Both parties extract and save a set of channel characteristic values from more than 2,700 collected data packets respectively. The present invention uses RSS as the channel characteristic value, and records the length of this group of data as Len.
step2:Alice和Bob初始化分组参数,第一个分组的基准点即为第一个数据元素,设置遍历起点start并将其初始为第二个元素的下标。Step2: Alice and Bob initialize the grouping parameters, the reference point of the first grouping is the first data element, set the traversal starting point start and initialize it as the subscript of the second element.
step3:计算斜率基准值cmp=elps/d,其中参数elps定义为临界值,参数d用来减少较小的波动对密钥生成的影响,计算出的斜率阈值目的是为了作为量化过程中的阈值来决定是否在当前分组量化生成一个比特;step3: Calculate the slope reference value cmp=elps/d, where the parameter elps is defined as the critical value, and the parameter d is used to reduce the impact of small fluctuations on key generation, and the calculated slope threshold is intended to be used as a threshold in the quantization process To decide whether to generate a bit in the current packet quantization;
step4:从start位置开始遍历,当start位置超出数据元素下标最大值,跳转执行step7;Step4: Traversing from the start position, when the start position exceeds the maximum value of the subscript of the data element, jump to step7;
step5:当遇到当前点与基准点的差值Δ的绝对值大于cmp时,执行step6,否则更新start使其指向数据下一个元素,返回执行step4。Step5: When the absolute value of the difference Δ between the current point and the reference point is greater than cmp, execute step6; otherwise, update start to point to the next element of the data, and return to execute step4.
step6:当前分组结束,分组个数增加1,记录当前start为这一分组的终点,将分组终点下标保存到segment数组中,并且更新下一分组的遍历起点start'。Step6: The current group ends, the number of groups increases by 1, records the current start as the end point of this group, saves the subscript of the end point of the group in the segment array, and updates the start' of the next group's traversal start'.
step6.1如果Δ>0,该分组的量化比特结果标记为1;step6.1 If Δ>0, the quantized bit result of the packet is marked as 1;
step6.2如果Δ<0,该分组的量化比特结果标记为0;step6.2 If Δ<0, the quantized bit result of the packet is marked as 0;
在本例中,动态分组的分组大小由所要量化的样本数据特征来决定,这样的好处在于量化结果更加贴近了数据本身的特征。当数据点与基准点的差值满足阈值要求,即可划分为一个新的分组,这样可以保证量化结果生成效率达到最大,即密钥生成速率最大。In this example, the grouping size of the dynamic grouping is determined by the characteristics of the sample data to be quantized. The advantage of this is that the quantization result is closer to the characteristics of the data itself. When the difference between the data point and the reference point meets the threshold requirement, it can be divided into a new group, which can ensure the maximum generation efficiency of quantization results, that is, the maximum key generation rate.
step7:双方开始密钥协商过程,参见图3,Alice将当前的分组个数保存在segment[0]位置,之后将分组记录数组segment与量化结果quant数组保存本地,同时将segment数组发送给Bob,Bob根据收到的segment数组对从step1中得到的RSS数据组进行量化记录在已量化比特串中,对于未能量化出比特的分组记录在舍弃数组UB中,量化结束后,已量化比特串即为最终量化密钥,Bob将UB数组发回给Alice。Step7: The two parties start the key negotiation process, see Figure 3, Alice saves the current group number in the segment[0] position, then saves the group record array segment and the quantization result quant array locally, and sends the segment array to Bob at the same time, According to the received segment array, Bob quantizes the RSS data group obtained from step 1 and records it in the quantized bit string. For the packets that cannot be quantized, record them in the discarding array UB. After quantization, the quantized bit string is For the final quantization key, Bob sends the UB array back to Alice.
step 8:Alice收到UB数组后,根据UB对自己的初始量化密钥中的相应分组量化比特进行舍弃,Alice得到最终的量化密钥。Step 8: After receiving the UB array, Alice discards the corresponding group quantization bits in her initial quantization key according to UB, and Alice obtains the final quantization key.
由于量化之前对于一组特定场景下的RSS数据特征并不清楚,采取固定分组使得算法适应性较差,具体体现在每一定长分组中的数据点单调性并不唯一,这样使得斜率算法不能发挥其最大功效,导致密钥生成量少,密钥生成速率低。如果采用本发明的动态分组斜率算法,将克服这一弱点,每一不定长分组中的数据点均为单调的。量化结果的好坏只取决于组内斜率绝对值是否超过了量化阈值,这样以来,密钥的生成速率大幅度提高,误码率也会相对降低很多。Since the characteristics of RSS data in a specific set of scenarios are not clear before quantification, the adoption of fixed grouping makes the algorithm less adaptable, and the monotonicity of data points in each fixed-length grouping is not unique, which makes the slope algorithm unable to play Its maximum efficacy, resulting in a small amount of key generation and a low rate of key generation. If the dynamic packet slope algorithm of the present invention is adopted, this weakness will be overcome, and the data points in each variable-length packet are monotonous. The quality of the quantization results only depends on whether the absolute value of the slope within the group exceeds the quantization threshold. In this way, the key generation rate is greatly improved, and the bit error rate is relatively reduced.
本发明进行量化密钥生成时不会受通信双方接收到的RSS值存在位移影响,这一点要优于已有的上下区间阈值量化算法。The present invention is not affected by the displacement of the RSS value received by both communication parties when generating the quantization key, which is superior to the existing upper and lower interval threshold quantization algorithms.
下面给出一个综合性更详尽的例子对本发明进一步说明,A comprehensive and more detailed example is given below to further illustrate the present invention,
实施例8Example 8
基于无线物理层信道特征的动态密钥量化协商方法同实施例1-7,参见实验测试结果表格,即表1,The dynamic key quantization negotiation method based on the channel characteristics of the wireless physical layer is the same as that of Embodiment 1-7, refer to the table of experimental test results, namely Table 1,
表1 两种现有量化方法与本方法在不同实验情景下量化密钥长度表Table 1 Two existing quantization methods and this method in different experimental scenarios quantization key length table
根据Bob与Alice之间收发的探针数据包,在固定的时间段200秒内便可以采集到一组足够长的信道特征值序列,以RSS值为例。According to the probe data packets sent and received between Bob and Alice, a set of sufficiently long channel characteristic value sequences can be collected within a fixed time period of 200 seconds, taking the RSS value as an example.
不同于采用上下区间固定阈值量化来产生密钥,在本发明动态分组斜率量化方法中,用相邻两个RSS值之间的相对差值确定一个密钥比特,以表1中“静/动10pkg/s”这一实验描述为例进行说明,接入点AP处于静止状态,无线终端STA处于移动状态,发送速率为10个数据包/秒,具体的步骤如下:Different from adopting the fixed threshold quantization of the upper and lower intervals to generate the key, in the dynamic grouping slope quantization method of the present invention, the relative difference between two adjacent RSS values is used to determine a key bit, and the "static/dynamic" in Table 1 10pkg/s" as an example to explain the experimental description. The access point AP is in a static state, the wireless terminal STA is in a moving state, and the sending rate is 10 packets/s. The specific steps are as follows:
1)Alice和Bob各自获得一串RSS测试序列,该测试序列长度Len=1523,并将测试序列分成m段,m=15,每段t个元素,t=100,t即为分段段长,余下的23个数据点丢弃;1) Alice and Bob each obtain a string of RSS test sequences, the length of the test sequence is Len=1523, and divide the test sequence into m segments, m=15, each segment has t elements, t=100, t is the segment length , the remaining 23 data points are discarded;
2)确定波动参数d,用来减少较小数据波动对密钥生成的影响,定为0.8;2) Determine the fluctuation parameter d, which is used to reduce the impact of small data fluctuations on key generation, and is set to 0.8;
3)确定临界值参数elps,定为3;3) Determine the critical value parameter elps, set as 3;
4)确定斜率阈值cmp=elps/d,代入数据cmp=3/0.8=3.75;4) Determine the slope threshold cmp=elps/d, and substitute the data cmp=3/0.8=3.75;
5)抽取密钥,在本发明密钥量化过程中,对每段数据将按动态方法依次进行分组,每组至少有两个元素,具体过程如下:5) extract key, in key quantization process of the present invention, will carry out grouping successively by dynamic method to each piece of data, every group has two elements at least, concrete process is as follows:
每段数据第一分组的起始元素作为一个基准值,依次将之后的数据点与基准值进行比较,若其差值的绝对值大于cmp,则认为这一数据点符合成为当前分组终点并使分组生成一个比特的条件,将该数据点记为这一分组的末尾元素,量化结果保存在已量化比特串中,同时该分组的末尾元素将作为下一分组的起始元素,继续之前的操作;而如果这一数据点无法达到成为当前分组终点并使分组生成一个比特的标准,则将当前数据点下标扩大一位,重新计算当前数据点与分组基准值的差值的绝对值,判定当前数据点是否能够成为分组终点并使该分组生成一个比特,以此类推。The starting element of the first grouping of each piece of data is used as a reference value, and the following data points are compared with the reference value in turn. If the absolute value of the difference is greater than cmp, this data point is considered to be the end point of the current grouping and used The condition for grouping to generate a bit, the data point is recorded as the end element of this group, the quantization result is stored in the quantized bit string, and the end element of the group will be used as the starting element of the next group, and the previous operation is continued ; and if this data point cannot reach the standard of becoming the end point of the current group and making the group generate one bit, the subscript of the current data point will be expanded by one bit, and the absolute value of the difference between the current data point and the grouping reference value will be recalculated, and the decision will be made. Whether the current data point can become the end point of the packet and cause the packet to generate a bit, and so on.
将每段得到的已量化比特串依次进行拼接,至此,Alice密钥的量化过程结束,Alice生成了自己的初始量化密钥,并得到分组下标记录数组segment。The quantized bit string obtained from each segment is sequentially spliced. At this point, the quantization process of Alice's key is over, and Alice generates her own initial quantized key, and obtains the group subscript record array segment.
接下来双方将进行密钥协商,其具体方法如下:Alice将segment数组发送给Bob,Bob按Alice发来segment数组进行密钥量化,对Alice确定分组的但自己不能判定分组的比特重新计算,采用更小的elps值尝试是否能匹配,从而提升了密钥生成率,若仍然无法匹配则将该分组下标记录在舍弃数组UB中;Next, the two parties will conduct key negotiation. The specific method is as follows: Alice sends the segment array to Bob, and Bob quantifies the key according to the segment array sent by Alice, and recalculates the bits that Alice has determined to group but cannot determine the group by himself. Try whether the smaller elps value can match, thereby improving the key generation rate, if it still cannot match, record the subscript of the group in the discarding array UB;
然后Bob将UB数组发给Alice,Alice再次进行调整,按照UB将自己的初始量化密钥的部分比特舍弃;Then Bob sends the UB array to Alice, and Alice adjusts again, discarding some bits of her initial quantization key according to UB;
最后,Alice和Bob得到了各自的最后量化密钥,长度为264bit,完成了整个量化协商过程。Finally, Alice and Bob get their respective final quantization keys with a length of 264 bits, and complete the whole quantization negotiation process.
本发明设计并实现的新型的基于无线物理层信道特征互相关性的动态密钥量化协商方法,采用动态分组斜率量化信道特征值并进行信息协调,最终得到一串足够安全的密钥流,效率可以保障在200秒左右时长内生成128-256bit密钥流,提高了密钥流的生成速率,同时保证了密钥流的随机熵值较高,优于传统的上下区间阈值量化算法,也优于固定分组斜率量化算法。The new type of dynamic key quantization negotiation method based on the mutual correlation of wireless physical layer channel characteristics designed and implemented by the present invention adopts the dynamic grouping slope to quantify the channel characteristic value and carry out information coordination, and finally obtains a series of sufficiently secure key streams with high efficiency. It can guarantee to generate 128-256bit key stream within about 200 seconds, which improves the key stream generation rate, and at the same time ensures that the random entropy of the key stream is high, which is better than the traditional quantization algorithm of upper and lower interval thresholds, and also excellent Based on the fixed group slope quantization algorithm.
简而言之,本发明公开了一种基于无线物理层信道特征的动态密钥量化协商方法,解决了现有量化协商算法密钥生成速率低,熵值较低的问题。量化协商过程包括:数据通信的双方预先采集通信数据信息,初始化密钥量化协商参数,数据通信的一方对分段后的每一段数据依次进行动态分组斜率量化得到初始密钥,数据通信的双方根据分组下标记录数组与舍弃数组对初始密钥进行密钥协商,最终双方各自得到最终密钥。本发明提高了密钥流的生成速率,同时保证了密钥流的熵值较高,通信双方可在200秒左右时长内生成128-256bit密钥流。In short, the invention discloses a dynamic key quantization negotiation method based on wireless physical layer channel characteristics, which solves the problems of low key generation rate and low entropy value of existing quantization negotiation algorithms. The quantization negotiation process includes: both parties of data communication collect communication data information in advance, initialize key quantization negotiation parameters, one party of data communication performs dynamic packet slope quantization on each piece of segmented data in turn to obtain the initial key, and the two parties of data communication according to The group index record array and the discarding array perform key negotiation on the initial key, and finally both parties obtain the final key. The present invention improves the generation rate of the key stream, and at the same time ensures that the entropy value of the key stream is relatively high, and both communication parties can generate a 128-256 bit key stream within about 200 seconds.
本发明应用于无线网络加密通信,具体用于密钥生成协商,得到的密钥可用作加密通信中的加密密钥,实现安全通讯。The invention is applied to wireless network encrypted communication, and is specifically used for key generation negotiation, and the obtained key can be used as an encryption key in encrypted communication to realize safe communication.
Claims (5)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710905539.5A CN107528687B (en) | 2017-09-29 | 2017-09-29 | Dynamic key based on physical layer channel cross correlation quantifies machinery of consultation |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710905539.5A CN107528687B (en) | 2017-09-29 | 2017-09-29 | Dynamic key based on physical layer channel cross correlation quantifies machinery of consultation |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107528687A true CN107528687A (en) | 2017-12-29 |
CN107528687B CN107528687B (en) | 2019-08-13 |
Family
ID=60736369
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710905539.5A Active CN107528687B (en) | 2017-09-29 | 2017-09-29 | Dynamic key based on physical layer channel cross correlation quantifies machinery of consultation |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107528687B (en) |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108696867A (en) * | 2018-05-25 | 2018-10-23 | 南京东科优信网络安全技术研究院有限公司 | Lightweight group key distribution method based on radio channel characteristic |
CN109495167A (en) * | 2018-10-26 | 2019-03-19 | 北京邮电大学 | Client and Integrity Key machinery of consultation based on the bit error rate |
CN111200817A (en) * | 2020-01-07 | 2020-05-26 | 湖南大学 | Method for automatically negotiating key between wireless devices |
CN111565090A (en) * | 2020-04-13 | 2020-08-21 | 西北工业大学 | Method for enhancing physical layer information reciprocity |
CN111800416A (en) * | 2020-07-03 | 2020-10-20 | 西南大学 | A Cryptographic Protocol Analysis Method Based on Non-monotonic Dynamic Cognitive Logic |
CN113194466A (en) * | 2021-04-23 | 2021-07-30 | 哈尔滨理工大学 | Hybrid key system and method based on wireless channel characteristic simulation |
CN113473460A (en) * | 2021-06-07 | 2021-10-01 | 西安电子科技大学 | Wireless physical layer key negotiation method based on error correcting code judgment |
CN113746624A (en) * | 2021-09-04 | 2021-12-03 | 中国人民解放军国防科技大学 | A physical layer security key extraction method based on fuzzy extractor negotiation |
WO2022089217A1 (en) * | 2020-11-02 | 2022-05-05 | 中兴通讯股份有限公司 | Key generation method and apparatus, electronic device, and storage medium |
CN119135334A (en) * | 2024-11-13 | 2024-12-13 | 北京中电汇通科技有限公司 | Method and system for detecting business secret capability of FPGA chip |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104811299A (en) * | 2015-04-03 | 2015-07-29 | 北京邮电大学 | Key generation method and device |
CN104901795A (en) * | 2015-05-12 | 2015-09-09 | 南京邮电大学 | Physical layer key extraction method based on channel characteristic |
CN105120453A (en) * | 2015-07-15 | 2015-12-02 | 中国科学院信息工程研究所 | Secret key generation method |
CN105515765A (en) * | 2015-12-09 | 2016-04-20 | 西安电子科技大学 | Biometric key generating method adapting to dynamic quantization |
CN106059758A (en) * | 2016-07-08 | 2016-10-26 | 大连理工大学 | Key generation method capable of ensuring security of wireless communication |
CN107124716A (en) * | 2017-06-05 | 2017-09-01 | 东南大学 | Wireless channel dynamic key production method based on fixed position |
-
2017
- 2017-09-29 CN CN201710905539.5A patent/CN107528687B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104811299A (en) * | 2015-04-03 | 2015-07-29 | 北京邮电大学 | Key generation method and device |
CN104901795A (en) * | 2015-05-12 | 2015-09-09 | 南京邮电大学 | Physical layer key extraction method based on channel characteristic |
CN105120453A (en) * | 2015-07-15 | 2015-12-02 | 中国科学院信息工程研究所 | Secret key generation method |
CN105515765A (en) * | 2015-12-09 | 2016-04-20 | 西安电子科技大学 | Biometric key generating method adapting to dynamic quantization |
CN106059758A (en) * | 2016-07-08 | 2016-10-26 | 大连理工大学 | Key generation method capable of ensuring security of wireless communication |
CN107124716A (en) * | 2017-06-05 | 2017-09-01 | 东南大学 | Wireless channel dynamic key production method based on fixed position |
Non-Patent Citations (1)
Title |
---|
CHRISTIAN T. ZENGER等: "A Novel Key Generating Architecture for Wireless Low-Resource Devices", 《2014 INTERNATIONAL WORKSHOP ON SECURE INTERNET OF THINGS》 * |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108696867A (en) * | 2018-05-25 | 2018-10-23 | 南京东科优信网络安全技术研究院有限公司 | Lightweight group key distribution method based on radio channel characteristic |
CN109495167A (en) * | 2018-10-26 | 2019-03-19 | 北京邮电大学 | Client and Integrity Key machinery of consultation based on the bit error rate |
CN111200817A (en) * | 2020-01-07 | 2020-05-26 | 湖南大学 | Method for automatically negotiating key between wireless devices |
CN111565090A (en) * | 2020-04-13 | 2020-08-21 | 西北工业大学 | Method for enhancing physical layer information reciprocity |
CN111800416A (en) * | 2020-07-03 | 2020-10-20 | 西南大学 | A Cryptographic Protocol Analysis Method Based on Non-monotonic Dynamic Cognitive Logic |
WO2022089217A1 (en) * | 2020-11-02 | 2022-05-05 | 中兴通讯股份有限公司 | Key generation method and apparatus, electronic device, and storage medium |
CN113194466A (en) * | 2021-04-23 | 2021-07-30 | 哈尔滨理工大学 | Hybrid key system and method based on wireless channel characteristic simulation |
CN113473460A (en) * | 2021-06-07 | 2021-10-01 | 西安电子科技大学 | Wireless physical layer key negotiation method based on error correcting code judgment |
CN113473460B (en) * | 2021-06-07 | 2022-07-01 | 西安电子科技大学 | A wireless physical layer key agreement method based on error correction code decision |
CN113746624A (en) * | 2021-09-04 | 2021-12-03 | 中国人民解放军国防科技大学 | A physical layer security key extraction method based on fuzzy extractor negotiation |
CN119135334A (en) * | 2024-11-13 | 2024-12-13 | 北京中电汇通科技有限公司 | Method and system for detecting business secret capability of FPGA chip |
CN119135334B (en) * | 2024-11-13 | 2025-01-21 | 北京中电汇通科技有限公司 | Method and system for detecting business secret capability of FPGA chip |
Also Published As
Publication number | Publication date |
---|---|
CN107528687B (en) | 2019-08-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107528687B (en) | Dynamic key based on physical layer channel cross correlation quantifies machinery of consultation | |
CN104640110B (en) | A kind of Symmetric key generation method based on the characteristic of channel in terminal direct connection communication | |
CN111566990B (en) | Secure Key Agreement with Untrusted Devices | |
Tung et al. | Deep joint source-channel and encryption coding: Secure semantic communications | |
KR101546165B1 (en) | A method and system for enhancing cryptographic capabilities of a wireless device using broadcasted random noise | |
US11722887B2 (en) | Privacy protection authentication method based on wireless body area network | |
CN115152257A (en) | Using keys derived from network access authentication apparatus and method for generating application specific key | |
CN105763492B (en) | Physical layer authentication method based on basis expansion model channel information | |
US20200015082A1 (en) | Secure Physical Layer Slope Authentication Method in Wireless Communications and Apparatus | |
CN111669730A (en) | Physical layer key generation method and update method for one-to-one proximity communication | |
CN115765968A (en) | A Homomorphic Encryption Data Security Fusion Method Based on Combined Random Numbers | |
CN110336657B (en) | Optical OFDM dynamic key generation method based on channel characteristics | |
Yue et al. | Hybrid encryption algorithm based on wireless sensor networks | |
WO2019061516A1 (en) | Concealed wireless communication physical-layer slope authentication method and apparatus | |
CN107148017B (en) | Method based on physical layer key agreement enhancing wlan security | |
CN116017423A (en) | Wireless ad hoc network safe transmission method based on USRP | |
CN104993927A (en) | Symmetric key generation method and application thereof | |
JP7329604B2 (en) | KEY GENERATION METHOD, TERMINAL DEVICE AND NETWORK DEVICE | |
Yu et al. | A secure communication protocol between sensor nodes and sink node in underwater acoustic sensor networks | |
WO2019061515A1 (en) | Robust wireless communication physical layer slope authentication method and device | |
CN113746624B (en) | Physical layer security key extraction method based on fuzzy extractor negotiation | |
Krontiris et al. | Scatter–secure code authentication for efficient reprogramming in wireless sensor networks | |
CN116961952A (en) | A secure communication method based on two-way entropy extraction technology | |
CN111200817B (en) | Method for automatically negotiating secret key between wireless devices | |
CN114553419A (en) | Quantum identity authentication method and system based on continuous variable quantum key distribution |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |