浏览全部资源
扫码关注微信
1.电子信息系统复杂电磁环境效应国家重点实验室,河南 洛阳 471000
2.国防科技大学电子科学学院,湖南 长沙 410000
3.国防科技大学第六十三研究所,江苏 南京 210007
[ "鲁信金(1994- ),女,安徽滁州人,博士,电子信息系统复杂电磁环境效应国家重点实验室助理研究员,主要研究方向为无线通信技术、无线内生安全、通信抗干扰等。" ]
[ "施育鑫(1995- ),男,福建泉州人,博士,国防科技大学第六十三研究所助理研究员,主要研究方向为无线通信、通信抗干扰等。" ]
[ "雷菁(1968- ),女,陕西西安人,国防科技大学教授、博士生导师,主要研究方向为信息论、LDPC码、空时编码、先进的多址技术、物理层安全、无线通信技术等。" ]
[ "杨志飞(1984- ),男,河南安阳人,国防科技大学副研究员,主要研究方向为认知无线电、信道编码、通信抗干扰等。" ]
[ "杨小军(1986- ),男,江西宜春人,国防科技大学助理研究员,主要研究方向为建模与仿真、评估与决策、人工智能等。" ]
收稿日期:2024-09-18,
纸质出版日期:2024-10-25
移动端阅览
鲁信金,施育鑫,雷菁等.无线通信物理层内生安全:关键技术、优势与未来挑战[J].通信学报,2024,45(Z1):87-96.
LU Xinjin,SHI Yuxin,LEI Jing,et al.Endogenous security in the physical layer of wireless communications: key technologies, advantages and future challenges[J].Journal on Communications,2024,45(Z1):87-96.
鲁信金,施育鑫,雷菁等.无线通信物理层内生安全:关键技术、优势与未来挑战[J].通信学报,2024,45(Z1):87-96. DOI: 10.11959/j.issn.1000-436x.2024210.
LU Xinjin,SHI Yuxin,LEI Jing,et al.Endogenous security in the physical layer of wireless communications: key technologies, advantages and future challenges[J].Journal on Communications,2024,45(Z1):87-96. DOI: 10.11959/j.issn.1000-436x.2024210.
无线通信的高速发展对通信的安全架构设计提出了更高的要求。无线系统的广播性和开放性,使得信息传输容易受到截获、窃听和干扰,带来了相当程度的安全威胁。无线通信物理层内生安全是从无线信号传输的最底层——物理层出发,利用无线信道内在特征和通信相关技术来补充已有的安全机制并改善无线传输的安全性。根据未来无线通信安全发展趋势,围绕无线通信物理层内生安全关键技术展开论述,概括了无线密钥生成技术、无线身份认证技术以及无线加密传输技术的研究现状,分析了无线通信物理层内生安全优势,即唯一性、兼容性、异构性以及可再生性,探讨物理层内生安全设计面临的挑战,即如何实现物理层构架的去冗余和物理层功能的再利用,最后给出了无线通信物理层内生安全关键技术的未来工作展望。
The rapid development of wireless communications has put forward higher requirements for the design of security architectures for future communications. The broadcast and openness of wireless systems make information transmission vulnerable to security threats such as interception
eavesdropping and interference. Wireless endogenous security utilizes the intrinsic characteristics of the wireless channel and communication-related technologies to complement existing security mechanisms and improve transmission security. According to the development trend of wireless security
the key technologies of endogenous security in the physical layer of wireless communication were discussed. Research overviews of wireless key generation technology
wireless authentication technology
and wireless encrypted transmission technology were given. The wireless communication physical layer endogenous security advantages
i.e.
uniqueness
compatibility
heterogeneity
and reproducibility
were analyzed. Explore how to realize the de-redundancy of the physical layer architecture and the reuse of physical layer functions. Future work on key technologies for endogenous security in the physical layer of wireless communications is outlined.
NOSOUHI M R , SOOD K , GROBLER M , et al . Towards spoofing resistant next generation IoT networks [J ] . IEEE Transactions on Information Forensics and Security , 2022 , 17 : 1669 - 1683 .
YAN W F , SHU Q , GAO P . Security risk prevention and control deployment for 5G private industrial networks [J ] . China Communications , 2021 , 18 ( 9 ): 167 - 174 .
强奇 , 武刚 , 黄开枝 , 等 . 5G安全技术研究与标准进展 [J ] . 中国科学: 信息科学 , 2021 , 51 ( 3 ): 347 - 366 .
QIANG Q , WU G , HUANG K Z , et al . Survey on research and standardization of 5G security technology [J ] . Scientia Sinica (Informationis) , 2021 , 51 ( 3 ): 347 - 366 .
张平 , 牛凯 , 田辉 , 等 . 6G移动通信技术展望 [J ] . 通信学报 , 2019 , 40 ( 1 ): 141 - 148 .
ZHANG P , NIU K , TIAN H , et al . Technology prospect of 6G mobile communications [J ] . Journal on Communications , 2019 , 40 ( 1 ): 141 - 148 .
刘国荣 , 沈军 , 白景鹏 . 可定义的6G安全架构 [J ] . 移动通信 , 2021 , 45 ( 4 ): 54 - 57 .
LIU G R , SHEN J , BAI J P . A definable 6G security architecture [J ] . Mobile Communications , 2021 , 45 ( 4 ): 54 - 57 .
MAO B M , LIU J J , WU Y Y , et al . Security and privacy on 6G network edge: a survey [J ] . IEEE Communications Surveys & Tutorials , 2023 , 25 ( 2 ): 1095 - 1127 .
鲁信金 , 黄璐莹 , 陈继林 , 等 . 6G卫星互联网通信安全抗干扰技术研究 [J ] . 无线电通信技术 , 2023 , 49 ( 1 ): 1 - 9 .
LU X J , HUANG L Y , CHEN J L , et al . Research on security anti-interference technology in 6G satellite Internet [J ] . Radio Communications Technology , 2023 , 49 ( 1 ): 1 - 9 .
CHEN H S , HAN X T , ZHANG Y Y . Endogenous security formal definition, innovation mechanisms, and experiment research in industrial Internet [J ] . Tsinghua Science and Technology , 2024 , 29 ( 2 ): 492 - 505 .
LI H Q , LI X D , ZHANG Z T , et al . ESUAV-NI: endogenous security framework for UAV perception system based on neural immunity [J ] . IEEE Transactions on Industrial Informatics , 2024 , 20 ( 1 ): 732 - 743 .
黄开枝 , 金梁 , 钟州 . 5G物理层安全技术: 以通信促安全 [J ] . 中兴通讯技术 , 2019 , 25 ( 4 ): 43 - 49 .
HUANG K Z , JIN L , ZHONG Z . 5G physical layer security technology: enhancing security by communication [J ] . ZTE Technology Journal , 2019 , 25 ( 4 ): 43 - 49 .
HARRIS B , HUNT R . TCP/IP security threats and attack methods [J ] . Computer Communications , 1999 , 22 ( 10 ): 885 - 897 .
邬江兴 . 网络空间内生安全发展范式 [J ] . 中国科学: 信息科学 , 2022 , 52 ( 2 ): 189 - 204 .
WU J X . Development paradigms of cyberspace endogenous safety and security [J ] . Scientia Sinica (Informationis) , 2022 , 52 ( 2 ): 189 - 204 .
金梁 , 楼洋明 , 孙小丽 , 等 . 6G无线内生安全理念与构想 [J ] . 中国科学: 信息科学 , 2023 , 53 ( 2 ): 344 - 364 .
JIN L , LOU Y M , SUN X L , et al . Concept and vision of 6G wireless endogenous safety and security [J ] . Scientia Sinica (Informationis) , 2023 , 53 ( 2 ): 344 - 364 .
SHANNON C E . Communication theory of secrecy systems [J ] . The Bell System Technical Journal , 1949 , 28 ( 4 ): 656 - 715 .
WYNER A D . The wire-tap channel [J ] . The Bell System Technical Journal , 1975 , 54 ( 8 ): 1355 - 1387 .
MAURER U M . Secret key agreement by public discussion from common information [J ] . IEEE Transactions on Information Theory , 1993 , 39 ( 3 ): 733 - 742 .
HUA Y B . Generalized channel probing and generalized pre-processing for secret key generation [J ] . IEEE Transactions on Signal Processing , 2023 , 71 : 1067 - 1082 .
JI Z J , ZHANG Y , HE Z W , et al . Vulnerabilities of physical layer secret key generation against environment reconstruction based attacks [J ] . IEEE Wireless Communications Letters , 2020 , 9 ( 5 ): 693 - 697 .
HU L , LI G Y , HU A Q , et al . Exploiting malicious RIS for secret key acquisition in physical-layer key generation [J ] . IEEE Wireless Communications Letters , 2024 , 13 ( 2 ): 417 - 421 .
LU X J , LEI J , SHI Y X , et al . Intelligent reflecting surface assisted secret key generation [J ] . IEEE Signal Processing Letters , 2021 , 28 : 1036 - 1040 .
SOLAIJA M S J , ZEGRAR S E , ARSLAN H . Delay-Doppler-based key generation using OTFS [J ] . IEEE Wireless Communications Letters , 2023 , 12 ( 8 ): 1474 - 1478 .
DIAMANT R , TOMASIN S , ARDIZZON F , et al . Secret key generation from route propagation delays for underwater acoustic networks [J ] . IEEE Transactions on Information Forensics and Security , 2023 , 18 : 3318 - 3333 .
ZHANG Z J , DAI L L , CHEN X B , et al . Active RIS vs. passive RIS: which will prevail in 6G? [J ] . IEEE Transactions on Communications , 2023 , 71 ( 3 ): 1707 - 1725 .
AHUJA B , MISHRA D , BOSE R . Fair subcarrier allocation for securing OFDMA in IoT against full-duplex hybrid attacker [J ] . IEEE Transactions on Information Forensics and Security , 2898 , 16 : 2898 - 2911 .
JIANG X Y , LIU X Y , CHEN R Q , et al . Efficient receive beamformers for secure spatial modulation against a malicious full-duplex attacker with eavesdropping ability [J ] . IEEE Transactions on Vehicular Technology , 2021 , 70 ( 2 ): 1962 - 1966 .
XIE N , SHA M R , HU T X , et al . Multi-user physical-layer authentication and classification [J ] . IEEE Transactions on Wireless Communications , 2023 , 22 ( 9 ): 6171 - 6184 .
WU Y M , WEI D , GUO C L , et al . Physical layer authentication based on channel polarization response in dual-polarized antenna communication systems [J ] . IEEE Transactions on Information Forensics and Security , 2023 , 18 : 2144 - 2159 .
SOLTANIEH N , NOROUZI Y , YANG Y , et al . A review of radio frequency fingerprinting techniques [J ] . IEEE Journal of Radio Frequency Identification , 2020 , 4 ( 3 ): 222 - 233 .
HE Y L , PODLESNY M . Dielectric waveguide filled with particulate media for ultrahigh frequency (UHF) radio frequency identification (RFID) applications [J ] . IEEE Journal of Radio Frequency Identification , 2022 , 7 : 27 - 37 .
KAMILI A , HURRAH N N , PARAH S A , et al . DWFCAT: dual watermarking framework for industrial image authentication and tamper localization [J ] . IEEE Transactions on Industrial Informatics , 2021 , 17 ( 7 ): 5108 - 5117 .
XIE N , CHEN J J , HUANG L . Physical-layer authentication using multiple channel-based features [J ] . IEEE Transactions on Information Forensics and Security , 2021 , 16 : 2356 - 2366 .
XIE N , LI Z Y , TAN H J . A survey of physical-layer authentication in wireless communications [J ] . IEEE Communications Surveys & Tutorials , 2021 , 23 ( 1 ): 282 - 310 .
SHAN D , ZENG K , XIANG W D , et al . PHY-CRAM: physical layer challenge-response authentication mechanism for wireless networks [J ] . IEEE Journal on Selected Areas in Communications , 2013 , 31 ( 9 ): 1817 - 1827 .
WU X F , YANG Z . Physical-layer authentication for multi-carrier transmission [J ] . IEEE Communications Letters , 2015 , 19 ( 1 ): 74 - 77 .
LU X J , LEI J , LI W , et al . Physical layer encryption algorithm based on polar codes and chaotic sequences [J ] . IEEE Access , 2019 , 7 : 4380 - 4390 .
LU X J , LEI J , LI W . A physical layer encryption algorithm based on length-compatible polar codes [C ] // Proceedings of the 2020 IEEE 92nd Vehicular Technology Conference (VTC2020-Fall) . Piscataway : IEEE Press , 2020 : 1 - 7 .
鲁信金 , 雷菁 , 施育鑫 . 基于旋转置乱的索引跳频抗干扰加密方法 [J ] . 通信学报 , 2021 , 42 ( 12 ): 27 - 34 .
LU X J , LEI J , SHI Y X . Index modulation aided frequency hopping anti-jamming and encryption method based on rotation scrambling [J ] . Journal on Communications , 2021 , 42 ( 12 ): 27 - 34 .
LU X J , LEI J , LI W , et al . A joint scheme for PAPR reduction of OFDM signals based on 3-D constellation rotation encryption [C ] // Proceedings of the 2020 International Conference on Wireless Communications and Signal Processing (WCSP) . Piscataway : IEEE Press , 2020 : 766 - 770 .
KEBEDE T , WONDIE Y , STEINBRUNN J , et al . Multi-carrier waveforms and multiple access strategies in wireless networks: performance, applications, and challenges [J ] . IEEE Access , 2022 , 10 : 21120 - 21140 .
LI H Y , YANG N , HUANG Y H , et al . A multi-antenna pilot predistortion scheme and channel estimation algorithm for LTE-based terrestrial broadcast system [J ] . IEEE Transactions on Broadcasting , 2023 , 69 ( 1 ): 215 - 223 .
HAMA Y , OCHIAI H . Binary-input ternary-output turbo codes forternary PSK transmission [J ] . IEEE Communications Letters , 2022 , 26 ( 9 ): 1974 - 1978 .
LI Y X , QU D M . Modified SC decoding for BDPSK modulated polar codes [J ] . IEEE Communications Letters , 2023 , 27 ( 1 ): 46 - 49 .
0
浏览量
59
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构