{"title":"基于链中定位信息的密钥生成和基于混合拓扑的无线移动网络多媒体数据安全","authors":"Aditi Vyas, Jung-Hyeon Kim, Qiang Wu","doi":"10.1109/BMSB58369.2023.10211219","DOIUrl":null,"url":null,"abstract":"This study focuses on improving an existing technique of securing multimedia data transmission in a wireless network using a secret key. The proposed secret key generation algorithm extracts the key using localization information of the nodes participating in the communication in presence of an eavesdropper in which legitimate nodes could agree on a synchronized secret key, while eavesdroppers can only overhear limited information through the channel. Theoretical analysis of maximum secret key generation rate (MSR) for chain and hybrid topology has been done to evaluate the performance of the algorithm. Mathematical simulation has been done for MSR in terms of signal to noise ratio (SNR) and wireless network size which provides better insight to the localization based key extraction process. Results of simulations for small-scale and large-scale wireless models including an eavesdropper under Gaussian noise confirm the feasibility of the proposed algorithm, which can further be applied to multiple node mobile wireless network.","PeriodicalId":13080,"journal":{"name":"IEEE international Symposium on Broadband Multimedia Systems and Broadcasting","volume":"71 1","pages":"1-5"},"PeriodicalIF":0.0000,"publicationDate":"2023-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Localization Information based Secret Key Generation in Chain and Hybrid Topology based Wireless Mobile Network to secure Multimedia Data\",\"authors\":\"Aditi Vyas, Jung-Hyeon Kim, Qiang Wu\",\"doi\":\"10.1109/BMSB58369.2023.10211219\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This study focuses on improving an existing technique of securing multimedia data transmission in a wireless network using a secret key. The proposed secret key generation algorithm extracts the key using localization information of the nodes participating in the communication in presence of an eavesdropper in which legitimate nodes could agree on a synchronized secret key, while eavesdroppers can only overhear limited information through the channel. Theoretical analysis of maximum secret key generation rate (MSR) for chain and hybrid topology has been done to evaluate the performance of the algorithm. Mathematical simulation has been done for MSR in terms of signal to noise ratio (SNR) and wireless network size which provides better insight to the localization based key extraction process. Results of simulations for small-scale and large-scale wireless models including an eavesdropper under Gaussian noise confirm the feasibility of the proposed algorithm, which can further be applied to multiple node mobile wireless network.\",\"PeriodicalId\":13080,\"journal\":{\"name\":\"IEEE international Symposium on Broadband Multimedia Systems and Broadcasting\",\"volume\":\"71 1\",\"pages\":\"1-5\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-06-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE international Symposium on Broadband Multimedia Systems and Broadcasting\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/BMSB58369.2023.10211219\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE international Symposium on Broadband Multimedia Systems and Broadcasting","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/BMSB58369.2023.10211219","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Localization Information based Secret Key Generation in Chain and Hybrid Topology based Wireless Mobile Network to secure Multimedia Data
This study focuses on improving an existing technique of securing multimedia data transmission in a wireless network using a secret key. The proposed secret key generation algorithm extracts the key using localization information of the nodes participating in the communication in presence of an eavesdropper in which legitimate nodes could agree on a synchronized secret key, while eavesdroppers can only overhear limited information through the channel. Theoretical analysis of maximum secret key generation rate (MSR) for chain and hybrid topology has been done to evaluate the performance of the algorithm. Mathematical simulation has been done for MSR in terms of signal to noise ratio (SNR) and wireless network size which provides better insight to the localization based key extraction process. Results of simulations for small-scale and large-scale wireless models including an eavesdropper under Gaussian noise confirm the feasibility of the proposed algorithm, which can further be applied to multiple node mobile wireless network.