نوع مقاله : مقاله پژوهشی
نویسندگان
1 استادیار پژوهشگاه فناوری اطلاعات و ارتباطات، مرکز تحقیقات مخابرات ایران، تهران، ایران، ایمیل: mrkeshavarzi@itrc.ac.ir
2 استادیار گروه مهندسی مخابرات دانشگاه صنعتی قم، ایمیل: kuhestani@qut.ac.ir
3 دانشجوی دکتری رشته مهندسی مخابرات دانشگاه امام حسین(ع) ایمیل: ieee.madadi@gmail.com
چکیده
کلیدواژهها
موضوعات
عنوان مقاله [English]
نویسندگان [English]
In this paper, a secret key generation scheme for a group of users based on wireless channel is presented in which legal nodes are connected under star topology. Instead of using the characteristics of the channel domain such as received signal strength (RSS), the channel phase is used in the proposed scheme; Because in channels with low mobility or channels with low dispersion that do not have a large entropy channel range, the channel phase can show significant changes. Based on this, in this article, a group key generation scheme based on channel phase is proposed. The proposed key generation scheme, compared to the similar scheme, needs less time intervals for execution and therefore has a high speed of the algorithm. As a result, the key production rate will be higher, which is very desirable. In the following, we will analyze and examine the proposed protocol in terms of some criteria such as the probability of generating the correct group key, scalability and vulnerable areas.
کلیدواژهها [English]
[11] M. Ragheb, A. Kuhestani, M. Kazemi, H. Ahmadi and L. Hanzo, “RIS-aided secure millimeter-wave communication under RF-chain impairments,” IEEE Trans. Veh. Technol., doi: 10.1109/TVT.2023.330745.
[12] M. Letafati, A. Kuhestani, and H. Behroozi, “Three-hop untrusted relay networks with hardware imperfections and channel estimation errors for Internet of Things,” IEEE Trans. Inf. Forensics Security, vol. 15, pp. 2856–2868, Mar. 2020.
[13] M. Ragheb, S. M. S. Hemami, A. Kuhestani, D. W. K. Ng and L. Hanzo, “On the physical layer security of untrusted millimeter wave relaying networks: A stochastic geometry Approach,” IEEE Trans. Inf. Foren. Sec., vol. 17, pp. 53-68, Feb. 2022.
[14] M. Letafati, A. Kuhestani, K. -K. Wong and M. J. Piran, “A lightweight secure and resilient transmission scheme for the Internet of Things in the presence of a hostile jammer,” IEEE Internet of Things Journal, vol. 8, no. 6, pp. 4373-4388, 15 Mar. 2021.
[15] X. Yuan, Y. Jiang, G. Li and A. Hu, "Wireless Channel Key Generation Based on Multi-subcarrier Phase Difference," IEEE Internet of Things Journal, vol. 11, no. 20, pp. 32939-32955, Oct. 2024.
ارسال نظر در مورد این مقاله