Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Article type: Research Article
Authors: Jing, Weizhea | Ma, Dongjuana | Yang, Huaa | Guo, Mina | Xue, Qianga | Liu, Wenqingb | Zhang, Yanyanb | Ju, Yunb; *
Affiliations: [a] State Grid Shanxi Electric Power Research Institute, Taiyuan, Shanxi, China | [b] North China Electric Power University, Beijing, China
Correspondence: [*] Corresponding author: Yun Ju, North China Electric Power University, Beijing, China. E-mail: [email protected].
Abstract: Third-party eavesdropping is a unsolved problem in the process of data transmission in the physical layer of IoT (Internet of Things) in Power Systems. The security encryption effect is affected by channel noise and the half-duplex nature of the wireless channel, which leads to low key consistency and key generation rate. To address this problem, a reliable solution for physical layer communication security is proposed in this paper. First, the solution improved the key consistency by dynamically adjusting the length of the training sequence during feature extraction; Second, using an iterative quantization method to quantify the RSS (Received Signal Strength) measurements to improve generation rate of the key. Finally, based on the short-time energy method for the extraction of wireless frame interval features, by monitoring the change of inter-frame interval features, we can quickly determine whether there is an eavesdropping device into the link. Simulation results show that the reciprocity of legitimate channels R (R will be explained in detail in the following) is improved by 0.1, the key generation rate is increased by about 70%, and the beacon frames are extracted from the wireless link with good results compared to the methods that do not use dynamic adjustment of the pilot signal during the channel probing phase. The result shows that this method can effectively prevents third-party eavesdropping, effectively improves the key consistency and generation rate, and effectively implements beacon frame detection.
Keywords: Security encryption mechanism, iterative quantization, physical layer keys, wireless frame interval
DOI: 10.3233/JCM-226746
Journal: Journal of Computational Methods in Sciences and Engineering, vol. 23, no. 4, pp. 1883-1895, 2023
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
[email protected]
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office [email protected]
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
如果您在出版方面需要帮助或有任何建, 件至: [email protected]