Paper
1 June 2023 A key extraction method based on an improved CQG algorithm
Jie Wang
Author Affiliations +
Proceedings Volume 12718, International Conference on Cyber Security, Artificial Intelligence, and Digital Economy (CSAIDE 2023); 127180X (2023) https://doi.org/10.1117/12.2681648
Event: International Conference on Cyber Security, Artificial Intelligence, and Digital Economy (CSAIDE 2023), 2023, Nanjing, China
Abstract
Due to the sporadic alienation of the underwater sensor, the node deployment is very scattered, and the physical safety of the node is difficult to get guaranteed. Traditional solutions to ensure security encryption algorithms will increase energy consumption. The reliability of traditional encryption solutions based on difficult mathematical problems with difficulty mathematics issues is getting lower and lower. In order to ensure the secure transmission of communication data, a physical layer security solution is proposed. This scheme through the legal communication between the two parties to develop channel detection sequences, extract channel status information, obtain channel feature value, pre-process the feature value, and use the improved CQG algorithm to generate key. Finally, key negotiation and privacy enhancement are performed on the key. The simulation results show that compared with the traditional CQG algorithm, the improved CQG algorithm can make the key generation rate significantly improved when the key inconsistent rate is slightly reduced.
© (2023) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Jie Wang "A key extraction method based on an improved CQG algorithm", Proc. SPIE 12718, International Conference on Cyber Security, Artificial Intelligence, and Digital Economy (CSAIDE 2023), 127180X (1 June 2023); https://doi.org/10.1117/12.2681648
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Quantization

Wavelets

Computer security

Network security

Signal to noise ratio

Wireless communications

Information security

Back to Top