研究生: |
李後彤 Li, Hou-Tung |
---|---|
論文名稱: |
應用於無線相關性通道之向量量化密鑰生成技術 Secret Key Generation with Correlated Channels Using Vector Quantization |
指導教授: |
洪樂文
Hong, Yao-Win Peter |
口試委員: |
張正尚
葉丙成 |
學位類別: |
碩士 Master |
系所名稱: |
電機資訊學院 - 通訊工程研究所 Communications Engineering |
論文出版年: | 2012 |
畢業學年度: | 100 |
語文別: | 英文 |
論文頁數: | 31 |
中文關鍵詞: | 密鑰 、向量量化 |
外文關鍵詞: | Secret Key, Vector Quantization |
相關次數: | 點閱:1 下載:0 |
分享至: |
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
本篇論文考慮在無線衰減通道具有相關性的情況下,使用向量量化技術之密鑰生成協定。在本篇論文中,我們利用兩位合法使用者之間的共同無線通道做為密鑰的產生來源。我們提出向量量化演算法以降低密鑰錯誤率 (KDP) 及提高密鑰亂度 (Key Entropy)。在傳統的密鑰生成協定中,絕大部分均考慮數值量化 (Scalar Quantization) 演算法以利於硬體實現,其缺點為較高的KDP以及當通道具有相關性時,具有較低的Key Entropy。有鑑於此,本篇論文提出兩種基於向量量化技術的密鑰產生演算法: 最低密鑰錯誤率 (MKDP) 演算法及最低二次失真 (MQD) 演算法。在這兩個方法中,分別將密鑰錯誤率及二次失真做為考慮基礎並使用Lloyd Algorithm找出最佳的量化器。MKDP演算法具有最低的密鑰錯誤率但同時其複雜度也較高;另一方面,MQD演算法複雜度較低但具有稍高的密鑰錯誤率。在我們提出的兩個演算法中,都會使用么正變換 (Unitary Transformation) 以避免通道向量落在量化間隔的邊界上並降低密鑰錯誤率。除此之外,我們亦將亂度限制 (Entropy Constraint) 加入我們的演算法內以保證密鑰有較高的不確定性。最後,電腦模擬顯示我們所提的演算法確實擁有較佳的效能。
This thesis examines the use of vector quantization to generate secret keys over correlated wireless fading channels. In channel-based secret key generation schemes, common randomness of the channel between two users are utilized to generate secret keys at the two terminals. These key generation schemes should be designed to ensure low key disagreement probability (KDP) among the two users and also high key entropy so that the generated keys cannot be easily inferred by the eavesdropper. Conventional channel-based secret key generation schemes utilize scalar quantization over individual channel observations, which is simple to implement but yields high KDP at low SNR and low key entropy when the channel is correlated. In this thesis, two vector quantization schemes are proposed to exploit the temporal correlation of channels: the minimum quadratic distortion (MQD) and the minimum key disagreement probability (MKDP) secret key generation schemes. In these schemes, the Lloyd-Max algorithm is used with the quadratic distortion and the KDP as their respective distortion measures to compute the quantizers. The MKDP scheme achieves low KDP but requires high complexity whereas the MQD yields low complexity but slightly higher KDP. The unitary transformation is performed on the channel vectors before quantization to avoid key disagreement caused by channel vectors lying on the boundary of quantization cells. Furthermore, to ensure high entropy of the secret keys, an entropy constraint is further incorporated into the objective of the quantization design. Computer simulations are provided to demonstrate the effectiveness of the proposed vector quantization schemes.
[1] L. Zhou and Z. J. Haas, “Securing ad hoc networks,” IEEE Network, vol. 13, no. 6, pp.
24–30, Nov./Dce. 1999.
[2] C. E. Shannon, “Communication theory of secrecy systems,” Bell Syst. Tech. J., vol. 28,
pp. 656–715, Oct. 1949.
[3] U. Maurer, “Secret key agreement by public discussion from common information,”
IEEE Trans. Inform. Theory, vol. 39, pp. 733–742, May 1993.
[4] U. Maurer and S. Wolf, “Secret-key agreement over unauthenticated public channels,”
IEEE Trans. Inform. Theory, vol. 49, pp. 822–838, Apr. 2003.
[5] A. A. Hassan, W. E. Stark, J. E. Hershey, and S. Chennakeshu, “Cryptographic key
agreement for mobile radio,” in Digital Signal Processing, vol. 6. San Diego, CA:
Academic, 1996, pp. 207–212.
[6] B. Azimi-Sadjadi, A. Mercado, A. Kiayias, and B. Yener, “Robust key generation from
signal envelopes in wireless networks,” in Proc. ACM Comput. Commun. Security, Oct.
2007, pp. 401–410.
[7] Z. Li, W. Xu, R. Miller, and W. Trappe, “Securing wireless systems via lower layer
enforcements,” in Proc. Fifth ACM Workshop Wireless Security, 2006.
[8] S. Jana, S. N. Premnath, M. Clark, S. Kasera, N. Patwari, and S. V. Krishnamurthy,
“On the effectiveness of secret key extraction from wireless signal strength in real environments,”
in International Conference on Mobile Computing and Networking. Beijing,
China: ACM, 2009.
[9] A. Sayeed and A. Perrig, “Secure wireless communications: Secret keys through multipath,”
in Proc. Int. Conf. Acoustics, Speech and Signal Processing, Las Vegas, Nevada,
March 31 2008-April 4 2008, pp. 3013–3016.
[10] R. Wilson, D. Tse, and R. A. Scholtz, “Channel identification: Secret sharing using reciprocity
in ultrawideband channels,” IEEE Trans. Information Forensics and Security,
vol. 2, pp. 364–375, 2007.
[11] M. G. Madiseh, M. L. McGuire, S. S. Neville, L. Cai, and M. Horie, “Secret key generation
and agreement in uwb communication channels,” in Proc. IEEE GLOBECOM,
2008.
[12] G. D. Durgin, Space-Time Wireless Channels. Prentice Hall, Oct. 2002.
[13] N. Patwari, J. Croft, S. Jana, and S. K. Kasera, “High-rate uncorrelated bit extraction
for shared secret key generation from channel measurements,” IEEE Trans. Mobile
Computing, vol. 9, no. 1, pp. 17–30, Jan. 2009.
[14] A. Gersho and R. M. Gray, Vector quantization and signal compression. Springer, Nov.
1991.
[15] P. A. Chou, T. Lookabaugh, and R. M. Gray, “Entropy-constrained vector quantization,”
IEEE Trans. Acoustics, Speech and Signal Processing, vol. 37, pp. 31–42, Jan.
1989.