帳號:guest(18.219.140.44)          離開系統
字體大小: 字級放大   字級縮小   預設字形  

詳目顯示

以作者查詢圖書館館藏以作者查詢臺灣博碩士論文系統以作者查詢全國書目
作者(中文):黃霖銘
作者(外文):Huang, Lin Ming
論文名稱(中文):應用於實體層密鑰產生器之叢集式向量量化技術
論文名稱(外文):Clustered Vector Quantization Scheme for Physical Layer Secret Key Generation
指導教授(中文):洪樂文
指導教授(外文):Hong, Yao Win
口試委員(中文):伍紹勳
蔡育仁
口試委員(外文):Wu, Sau Hsuan
Tsai, Yuh Ren
學位類別:碩士
校院名稱:國立清華大學
系所名稱:通訊工程研究所
學號:101064531
出版年(民國):104
畢業學年度:103
語文別:英文
論文頁數:45
中文關鍵詞:向量量化通道估測密鑰量化器選擇取樣選擇叢集
外文關鍵詞:vector quantizationchannel estimationsecret keyquantizer selectionsample selectionclustering
相關次數:
  • 推薦推薦:0
  • 點閱點閱:430
  • 評分評分:*****
  • 下載下載:0
  • 收藏收藏:0
本論文旨在在分散式系統中使用者們可以藉由共同的通道技術經由所提出的向量量化技術產生密鑰以達到資訊保密的效果。 根據之前所提出的向量量化技術,額外在上層加上量化器選擇與取樣選擇的功能,以進一步地降低使用者間密鑰生成不同的機率,其中,在量化器選擇與取樣選擇中,最主要的設計概念在於使得所估測的通道向量最遠離所產生的量化器的邊界。除此之外,在設計向量量化技術的同時,加入了叢集式密鑰映射函數的設計,使得在給定竊聽者的觀察下,進一步提升了條件熵 。其中,條件熵主要是在反映著在給定竊聽者的觀察下,所產生密鑰的隨機性的程度。映射函數是將多個量化的區間形成一個叢集,如此一個量化器中將會有多個叢集,並且重複使用相同的密鑰在不同的叢集之間,使得竊聽者不能清楚解析叢集內的區間,僅能辨別叢集與叢集的差別。藉由向量量化的設計並且於設計中加入叢集式密鑰映射函數,故產生了叢集式向量量化器。其概念相似於在通道編碼中的自然隨意分群法。最後,藉由模擬結果,來展現我們所提出的方法的效果。
In this work, vector quantization schemes were proposed for the generation of shared secret keys between two terminals, called Alice and Bob, using their local channel measurements. Building upon our proposed vector quantization schemes, quantizer, sample and rotation selection schemes are further proposed on top of the conventional secret key generation procedure to reduce the key disagreement probability (KDP). The key idea is to choose from a bank of quantizers the one whose boundaries are farthest away from the locally observed channel vector. Moreover, a clustered key mapping function was proposed for the quantizer design to further increase the conditional key entropy at the eavesdropper. The conditional key entropy provided a measure of the randomness of the secret key at the eavesdropper given its observation. The mapping effectively groups together multiple quantization regions into one cluster, so that the regions within the cluster are not distinguishable by the eavesdropper, and reuse the same set of secret keys among different clusters. The resulting quantizer is thus called a clustered vector quantizer. The idea is similar to the concept of random binning in the channel coding literature. The effectiveness of the proposed schemes were demonstrated through computer simulations.
Abstract i
Contents ii
1 Introduction 1
1.1 Motivation and Related Work . . . . . . . . . . . . . . . . . . . . . . . . . . 4
1.2 Contributions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
2 System Model 8
3 Secret Key Generation Procedure with Clustered Vector Quantization 12
4 Clustered Vector Quantizer Design 17
4.1 Entropy-Constrained Fine Quantizer Design . . . . . . . . . . . . . . . . . . 18
4.1.1 Entropy-Constrained Minimum Quadratic Distortion (EC-MQD) Fine
Quantizer Design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
4.1.2 Entropy-Constrained Minimum Key Disagreement Probability (ECMKDP)
Fine Quantizer Design . . . . . . . . . . . . . . . . . . . . . 23
4.2 Clustered Key Mapping Design . . . . . . . . . . . . . . . . . . . . . . . . . 26
5 Simulation Results and Performance Comparison 30
6 Conclusion 38
[1] L. Atzoria, A. Ierab, and G. Morabitoc, “The internet of things: A survey,” Computer Networks, vol. 54, pp. 2787–2805, 2010.
[2] L. Atzori, A. Iera, and G. Morabito, “From ”smart objects” to ”social objects”: The next evolutionary step of the internet of things,” Communications Magazine, IEEE, vol. 52, no. 1, pp. 97–105, January 2014.
[3] A. Asadi, Q. Wang, and V. Mancuso, “A survey on device-to-device communication in cellular networks,” Communications Surveys Tutorials, IEEE, vol. 16, no. 4, pp. 1801–1819, Fourthquarter 2014.
[4] I. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “A survey on sensor networks,” Communications Magazine, IEEE, vol. 40, no. 8, pp. 102–114, Aug 2002.
[5] S. Androutsellis-Theotokis and D. Spinellis, “A survey of peerto-peer content distribution technologies,” Proc. ACM Comput. Surv., vol. 36, no. 4, pp. 335–371, 2004.
[6] C. E. Shannon, “Communication theory of secrecy systems,” Bell Syst. Tech. J., vol. 28, pp. 656–715, Oct. 1949.
[7] U. Maurer, “Secret key agreement by public discussion from common information,” IEEE Trans. Inform. Theory, vol. 39, pp. 733–742, May 1993.
[8] U. Maurer and S. Wolf, “Secret-key agreement over unauthenticated public channels,” IEEE Trans. Inform. Theory, vol. 49, pp. 822–838, Apr. 2003.
[9] A. A. Hassan, W. E. Stark, J. E. Hershey, and S. Chennakeshu, “Cryptographic key agreement for mobile radio,” Elsevier Digital Signal Processing, vol. 6, pp. 207–212, 1996.
[10] B. Azimi-Sadjadi, A. Mercado, A. Kiayias, and B. Yener, “Robust key generation from signal envelopes in wireless networks,” in Proc. ACM Comput. Commun. Security , pp. 401–410, Oct. 2007.
[11] Z. Li, W. Xu, R. Miller, and W. Trappe, “Securing wireless systems via lower layer enforcements,” Proc. Fifth ACM Workshop Wireless Security, 2006.
[12] S. Jana, S. N. Premnath, M. Clark, S. Kasera, N. Patwari, and S. V. Krishnamurthy, “On the effectiveness of secret key extraction from wireless signal strength in real environments,” in International Conference on Mobile Computing and Networking. Beijing, China: ACM, 2009.
[13] A. Sayeed and A. Perrig, “Secure wireless communications: Secret keys through multipath,” Proc. Int. Conf. Acoustics, Speech and Signal Processing, pp. 3013–3016, 2008.
[14] R. Wilson, D. Tse, and R. A. Scholtz, “Channel identification: Secret sharing using reciprocity in ultrawideband channels,” IEEE Trans. Information Forensics and Security, vol. 2, pp. 364–375, 2007.



[15] S. Mathur, W. Trappe, N. Mandayam, C. Ye, and A. Reznik, “Radio-telepathy: Extracting a secret key from an unauthenticated wireless channel,” Proceedings of the 14th ACM International Conference on Mobile Computing and Networking, pp. 128–139, 2008.
[16] M. G. Madiseh, M. L. McGuire, S. S. Neville, L. Cai, and M. Horie, “Secret key generation and aggreement in uwb communication channels,” Proc. IEEE GLOBECOM, 2008.
[17] K. Zeng, D. Wu, C. A., and P. Mohapatra, “Exploiting multiple-antenna diversity for shared secret key generation in wireless networks,” Proc. IEEE INFOCOM, 2010.
[18] Q. Wang, H. Su, K. Ren, and K. Kim, “Fast and scalable secret key generation exploiting channel phase eandomness in wireless networks,” Proc. IEEE INFOCOM, 2011.
[19] Q. Wang, K. Xu, and K. Ren, “Cooperative secret key generation from phase estimation in narrowband fading channels,” Selected Areas in Communications, IEEE Journal on, vol. 30, no. 9, pp. 1666–1674, October 2012.
[20] H. Liu, J. Yang, Y. Wang, Y. Chen, and C. Koksal, “Group secret key generation via received signal strength: Protocols, achievable rates, and implementation,” Mobile Computing, IEEE Transactions on, vol. 13, no. 12, pp. 2820–2835, Dec 2014.
[21] C.-W. Huang, T.-H. Chang, X. Zhou, and Y.-W. Hong, “Two-way training for discriminatory channel estimation in wireless mimo systems,” Signal Processing, IEEE Transactions on, vol. 61, no. 10, pp. 2724–2738, May 2013.
[22] G. Brassard and L. Salvail, “Secret-key reconciliation by public discussion,” in Advances in Cryptology Proc. Eurocrypt, pp. 410–423, 1994.
[23] C. Bennett, G. Brassard, C. Crepeau, and U. Maurer, “Generalized privacy amplification,” Information Theory, IEEE Transactions on, vol. 41, no. 6, pp. 1915–1923, Nov 1995.
[24] N. Patwari, J. Croft, S. Jana, and S. K. Kasera, “High-rate uncorrelated bit extraction for shared secret key generation from channel measurements,” IEEE Trans. Mobile Computing, vol. 9, no. 1, pp. 17–30, Jan. 2010.
[25] H.-T. Li and Y.-W. P. Hong, “Secret key generation over correlated wireless fading channels using vector quantization,” Proc. of Asia-Pacific Signal & Information Processing Association Annual Summit and Conference, 2012.
[26] A. Gersho and R. M. Gray, Vector quantization and signal compression. Springer, Nov. 1991.
[27] M. MikkoI and F. Pasi, “Balanced k-means for clustering,” Structural and Syntactic and Statistical Pattern Recognition, pp. 32–41, 2014.
(此全文未開放授權)
電子全文
摘要
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
* *