4.6 Article

Non-Reconciled Physical-Layer Keys-Assisted Secure Communication Scheme Based on Channel Correlation

期刊

ENTROPY
卷 24, 期 8, 页码 -

出版社

MDPI
DOI: 10.3390/e24081167

关键词

physical-layer security; key generation; channel correlation; information reconciliation

资金

  1. National Natural Science Foundation of China [61871404]

向作者/读者索取更多资源

Non-reconciled physical-layer key generation technology enables secure communication without increasing communication overhead and the risk of information leakage. In this study, we propose a secure communication scheme based on non-reconciled keys and channel correlation, utilizing adaptive coding and key generation from channel correlation to ensure reliable transmission.
Physical-layer key generation technology requires information reconciliation to correct channel estimation errors between two legitimate users. However, sending the reconciliation signals over the public channel increases the communication overhead and the risk of information leakage. Aiming at the problem, integrated secure communication schemes using non-reconciled keys have attracted extensive attention. These schemes exploit channel coding to correct both inconsistent keys and transmission error bits. Meanwhile, more redundant code bits must be added to correct errors, which results in a lower secure transmission rate. To address the problem, we analyze the merit of channel correlation between non-reconciled key generation and secure transmission. Inspired by this, we propose a non-reconciled physical-layer keys-assisted secure communication scheme based on channel correlation. First of all, the signal frame is designed to make use of channel correlation between non-reconciled key generation and secure transmission. Based on the channel correlation, non-reconciled keys are then generated from the wireless channel to encrypt transmitted data. Moreover, an adaptive coding algorithm based on the equivalent channel is presented to encode the data bits before encryption, to guarantee reliable transmission. Finally, theoretical analysis and simulations demonstrate the significant performance of the proposed scheme in terms of low bit error ratio and high secure transmission rate.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据