{"title":"静态环境下物理层密钥协商攻击及检测","authors":"Y. Qi, Qiao Hu","doi":"10.1109/AINIT59027.2023.10212598","DOIUrl":null,"url":null,"abstract":"The existing physical layer key generation methods overly rely on the results of channel probing, which not only weakens the randomness of the key in a static environment but also makes the physical layer key vulnerable to active attacks. At the same time, in terms of defence technology, traditional physical layer intrusion detection methods mainly focus on the abnormal transmission of physical signals, making it difficult to identify potential key attack behaviours. This article proposes an attack method for the random operator-based key negotiation model in a static environment and then proposes a key attack detection scheme that utilizes the correlation between pilot signals and random signals for the above two attack behaviours. Under low false alarm rate conditions, this detection scheme has a higher detection rate compared to traditional physical layer intrusion detection methods.","PeriodicalId":276778,"journal":{"name":"2023 4th International Seminar on Artificial Intelligence, Networking and Information Technology (AINIT)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Physical layer key negotiation attacks and detection under a static environment\",\"authors\":\"Y. Qi, Qiao Hu\",\"doi\":\"10.1109/AINIT59027.2023.10212598\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The existing physical layer key generation methods overly rely on the results of channel probing, which not only weakens the randomness of the key in a static environment but also makes the physical layer key vulnerable to active attacks. At the same time, in terms of defence technology, traditional physical layer intrusion detection methods mainly focus on the abnormal transmission of physical signals, making it difficult to identify potential key attack behaviours. This article proposes an attack method for the random operator-based key negotiation model in a static environment and then proposes a key attack detection scheme that utilizes the correlation between pilot signals and random signals for the above two attack behaviours. Under low false alarm rate conditions, this detection scheme has a higher detection rate compared to traditional physical layer intrusion detection methods.\",\"PeriodicalId\":276778,\"journal\":{\"name\":\"2023 4th International Seminar on Artificial Intelligence, Networking and Information Technology (AINIT)\",\"volume\":\"77 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-06-16\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 4th International Seminar on Artificial Intelligence, Networking and Information Technology (AINIT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/AINIT59027.2023.10212598\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 4th International Seminar on Artificial Intelligence, Networking and Information Technology (AINIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AINIT59027.2023.10212598","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Physical layer key negotiation attacks and detection under a static environment
The existing physical layer key generation methods overly rely on the results of channel probing, which not only weakens the randomness of the key in a static environment but also makes the physical layer key vulnerable to active attacks. At the same time, in terms of defence technology, traditional physical layer intrusion detection methods mainly focus on the abnormal transmission of physical signals, making it difficult to identify potential key attack behaviours. This article proposes an attack method for the random operator-based key negotiation model in a static environment and then proposes a key attack detection scheme that utilizes the correlation between pilot signals and random signals for the above two attack behaviours. Under low false alarm rate conditions, this detection scheme has a higher detection rate compared to traditional physical layer intrusion detection methods.