一级黄色片免费播放|中国黄色视频播放片|日本三级a|可以直接考播黄片影视免费一级毛片

高級(jí)搜索

留言板

尊敬的讀者、作者、審稿人, 關(guān)于本刊的投稿、審稿、編輯和出版的任何問題, 您可以本頁(yè)添加留言。我們將盡快給您答復(fù)。謝謝您的支持!

姓名
郵箱
手機(jī)號(hào)碼
標(biāo)題
留言內(nèi)容
驗(yàn)證碼

基于標(biāo)簽信號(hào)的物理層安全認(rèn)證

宋華偉 金梁 張勝軍

宋華偉, 金梁, 張勝軍. 基于標(biāo)簽信號(hào)的物理層安全認(rèn)證[J]. 電子與信息學(xué)報(bào), 2018, 40(5): 1066-1071. doi: 10.11999/JEIT170672
引用本文: 宋華偉, 金梁, 張勝軍. 基于標(biāo)簽信號(hào)的物理層安全認(rèn)證[J]. 電子與信息學(xué)報(bào), 2018, 40(5): 1066-1071. doi: 10.11999/JEIT170672
SONG Huawei, JIN Liang, ZHANG Shengjun. Physical Layer Authentication Based on Tag Signal[J]. Journal of Electronics & Information Technology, 2018, 40(5): 1066-1071. doi: 10.11999/JEIT170672
Citation: SONG Huawei, JIN Liang, ZHANG Shengjun. Physical Layer Authentication Based on Tag Signal[J]. Journal of Electronics & Information Technology, 2018, 40(5): 1066-1071. doi: 10.11999/JEIT170672

基于標(biāo)簽信號(hào)的物理層安全認(rèn)證

doi: 10.11999/JEIT170672
基金項(xiàng)目: 

國(guó)家863計(jì)劃項(xiàng)目(2015AA01A708)

Physical Layer Authentication Based on Tag Signal

Funds: 

National 863 Program of China (2015AA01A708)

  • 摘要: 該文提出一種基于疊加標(biāo)簽信號(hào)進(jìn)行認(rèn)證的新方法。利用合法通信雙方預(yù)先共享密鑰和信道具有短時(shí)互易性的優(yōu)勢(shì),在發(fā)送方利用擴(kuò)譜碼和量化的信道值生成標(biāo)簽信號(hào),并與通信信號(hào)疊加發(fā)送,在接收方能夠檢測(cè)并鑒別標(biāo)簽信號(hào),而且不影響通信信號(hào)的正常解調(diào)。這種方法不需要復(fù)雜的密碼算法,減小了通信過程中的計(jì)算量,而且能夠有效地防范被動(dòng)竊聽和主動(dòng)攻擊。仿真結(jié)果表明,該方法有較高的實(shí)用價(jià)值。
  • 李中獻(xiàn), 詹榜華, 楊義先. 認(rèn)證理論與技術(shù)的發(fā)展[J]. 電子學(xué)報(bào), 1999, 27(1): 98-102.
    LI Zhongxian, ZHAN Banghua, and YANG Yixian. A survey of identification and authentication[J]. Acta Electronica Sinica, 1999, 27(1): 98-102.
    SIMMONS G J. Authentication theory/coding theory[C]. Proceedings of CRYPTO 84 on Advances in Cryptology, New York, USA, 1985: 411-431.
    MAURER U. Authentication theory and hypothesis testing [J]. IEEE Transactions on Information Theory, 2000, 46(4): 1350-1356. doi: 10.1109/18.850674.
    WANG Xianbin, HAO Peng, and HANZO Lajos. Physical- layer authentication for wireless security enhancement: current challenges and future developments[J]. IEEE Communications Magazine, 2016, 54(6): 152-158. doi: 10.1109/MCOM.2016.7498103.
    PAUL L Y, BARAS J S, and SADLER B M. Physical-layer authentication[J]. IEEE Transactions on Information Forensics and Security, 2008, 3(1): 38-51. doi: 10.1109/ TIFS.2007.916273.
    PAUL L Y, BARAS J S, and SADLER B M. Multicarrier authentication at the physical layer[C]. Proceedings of the 2008 International Symposium on a World of Wireless Mobile and Multimedia Networks, Newport Beach, CA, USA, 2008: 1-6. doi: 10.1109/WOWMOM.2008.4594926.
    LIU Jiazi and WANG Xianbin. Physical layer authentication enhancement using two-dimensional channel quantization[J]. IEEE Transactions on Wireless Communications, 2016, 15(6): 4171-4182. doi: 10.1109/TWC.2016.2535442.
    WANG Ning, JIANG Ting, L Shichao, et al. Physical- layer authentication based on extreme learning machine [J]. IEEE Communications Letters, 2017, 21(7): 1557-1560. doi: 10.1109/LCOMM.2017.2690437.
    DAI Chuping, YANG Jianxi, QIN Yongning, et al. Physical layer authentication algorithm based on SVM[C]. Proceedings of 2016 2nd IEEE International Conference on Computer and Communications (ICCC), 2016: 1597-1601.
    RAHMAN M M U, ABBASI Q H, CHOPRA N, et al. Physical layer authentication in nano networks at terahertz frequencies for biomedical applications[J]. IEEE Access, 2017, 5: 7808-7815. doi: 10.1109/ACCESS.2017.2700330.
    ZENG K, GOVINDAN K, and MOHAPATRA P. Non-cryptographic authentication and identification in wireless networks[J]. IEEE Wireless Communications, 2010, 17(5): 56-62.
    BARACCA P, LAURENTI N, and TOMASIN S. Physical layer authentication over MIMO fading wiretap channels[J]. IEEE Transactions on Wireless Communications, 2012, 11(7): 2564-2573. doi: 10.1109/TWC.2012.051512.111481.
    KUMAR V, PARK J M, CLANCY T C, et al. PHY-layer authentication by introducing controlled inter symbol interference[C]. Proceedings of IEEE Conference on Communications and Network Security (CNS), National Harbor, USA, 2013: 10-18. doi: 10.1109/CNS.2013. 6682687.
    XIAO Liang, GREENSTEIN L J, MANDAYAM N B, et al. A physical-layer technique to enhance authentication for mobile terminals[C]. Proceedings of IEEE International Conference on Communications, Beijing, 2008: 1520-1524. doi: 10.1109/ICC.2008.294.
    XIAO Liang, GREENSTEIN L, MANDAYAM N, et al. Fingerprints in the ether: Using the physical layer for wireless authentication[C]. Proceedings of IEEE International Conference on Communications, Glasgow, UK, 2007: 4646-4651. doi: 10.1109/ICC.2007.767.
    TUGNAIT J K and KIM H. A channel-based hypothesis testing approach to enhance user authentication in wireless networks[C]. Proceedings of Second International Conference on Communication Systems and Networks, Bangalore, India, 2010: 1-9. doi: 10.1109/COMSNETS. 2010.5432018.
    SHAN Dan, ZENG Kai, XIANG Weidong, et al. PHY- CRAM: Physical layer challenge-response authentication mechanism for wireless networks[J]. IEEE Journal on Selected Areas in Communications, 2013, 31(9): 1817-1827. doi: 10.1109/JSAC.2013.130914.
    DU Xianru, SHAN Dan, ZENG Kai, et al. Physical layer challenge-response authentication in wireless networks with relay[C]. IEEE INFOCOM, Toronto, Canada, 2014: 1276-1284. doi: 10.1109/INFOCOM.2014.6848060.
    MOLIRE R, DELAVEAU F, NGASSA C L K, et al. Tag signals for early authentication and secret key generation in wireless public networks[C]. European Conference on Networks and Communications, Paris, 2015: 108-112. doi: 10.1109/EuCNC.2015.7194050.
    張余, 許金勇, 柳永祥, 等. 基于相關(guān)標(biāo)識(shí)符的頻譜水印嵌入與提取方法[J]. 電波科學(xué)學(xué)報(bào), 2016, 31(1): 185-192. doi: 10.13443/j.cjors.2015031701.
    ZHANG Yu, XU Jinyong, LIU Yongxiang, et al. Spectrum watermark embedding and extracting methodbased on correlation identifier[J]. Chinese Journal of Radio Science, 2016, 31(1): 185-192. doi: 10.13443/j.cjors.2015031701.
    ZHANG Jinling, WEN Hong, SONG Huanhuan, et al. Using basis expansion model for physical layer authentication in time-variant system[C]. IEEE Conference on Communications and Network Security (CNS), Philadelphia, PA, USA, 2016: 348-349. doi: 10.1109/CNS.2016.7860505.
    曾璐, 謝曉堯. 基于MATLAB擴(kuò)譜通信系統(tǒng)誤碼率的研究[J]. 通信技術(shù), 2011, 44(11): 25-26.
    ZENG Lu and XIE Xiaoyao. Study on bit error rate of spread spectrum communication system based on MATLAB [J]. Communications Technology, 2011, 44(11): 25-26.
    JAKES W C and COX D C. Microwave Mobile Communications[M]. Wiley-IEEE Press, 1994, Ch 1.
  • 加載中
計(jì)量
  • 文章訪問數(shù):  1552
  • HTML全文瀏覽量:  291
  • PDF下載量:  143
  • 被引次數(shù): 0
出版歷程
  • 收稿日期:  2017-07-07
  • 修回日期:  2017-12-21
  • 刊出日期:  2018-05-19

目錄

    /

    返回文章
    返回