The Security Network Coding System With Physical Layer Key Generation in Two-Way Relay Networks

Network coding is one of the key technologies to improve the throughput, efficiency, and reliability of two-way relay networks (TWRNs). However, it also brings some new security problems when the physical layer security is considered. In this paper, we present security network coding schemes with ke...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE access Jg. 6; S. 40673 - 40681
Hauptverfasser: Kong, Yuanyuan, Lyu, Bin, Chen, Feng, Yang, Zhen
Format: Journal Article
Sprache:Englisch
Veröffentlicht: Piscataway IEEE 01.01.2018
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Schlagworte:
ISSN:2169-3536, 2169-3536
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:Network coding is one of the key technologies to improve the throughput, efficiency, and reliability of two-way relay networks (TWRNs). However, it also brings some new security problems when the physical layer security is considered. In this paper, we present security network coding schemes with key generation from multipath channels to enhance the security performance for TWRN. First, a joint key generation (JKG) approach is proposed, which generates secret keys based on channel impulse responses of multipath channels. Different from the traditional approaches, key exchange is not necessary for the JKG approach such that the eavesdroppers cannot obtain any information about secret keys. Then, an adaptive quantization algorithm is proposed to adaptively choose different parameters for quantization in key generation, which can improve the secret key rate with an acceptable secret key disagreement probability and can still work even if the SNR is low. Finally, security network coding systems are constructed to combine the key generation approaches with the proposed algorithm. Simulation results show that the proposed schemes are valid and secure against wiretap attacks.
Bibliographie:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ISSN:2169-3536
2169-3536
DOI:10.1109/ACCESS.2018.2858282