信息网络安全 ›› 2020, Vol. 20 ›› Issue (1): 61-66.doi: 10.3969/j.issn.1671-1122.2020.01.009

• 技术研究 • 上一篇    下一篇

一种基于PUF的物理层安全认证方法

胡蝶1,2, 马东堂1(), 龚旻2, 马召2   

  1. 1. 国防科技大学电子科学学院,长沙 410073
    2. 中国运载火箭技术研究院,北京 100076
  • 收稿日期:2019-05-30 出版日期:2020-01-10 发布日期:2020-05-11
  • 作者简介:

    作者简介:胡蝶(1996—),女,湖北,硕士研究生,主要研究方向为飞行器总体设计及通信系统;马东堂(1969—),男,安徽,教授,博士,主要研究方向为宽带通信与网络、物理层安全、认知无线电与认知网络;龚旻(1982—),男,湖南,研究员,博士,主要研究方向为飞行器总体设计及通信系统;马召(1989—),男,河南,工程师,硕士,主要研究方向为通信与数据链系统设计。

  • 基金资助:
    国家自然科学基金[61601480, 61372099]

A Physical Layer Security Authentication Method Based on PUF

HU Die1,2, MA Dongtang1(), GONG Ming2, MA Zhao2   

  1. 1. School of Electronic Science and Engineering, National University of Defense Technology, Changsha 410073, China
    2. China Academy of Launch Vehicle Technology, Beijing 100076, China
  • Received:2019-05-30 Online:2020-01-10 Published:2020-05-11

摘要:

传统无线通信的认证主要依赖于上层加密机制,无法保证系统处理的实时性与物理层的安全性。文章设计了一种基于物理不可克隆函数(Physical Unclonable Function,PUF)进行物理层安全认证的方案,利用硬件固有的激励-响应对(Challenge-Response Pair,CRP)的唯一性与发送信息的随机性实时生成验证标签,在接收端通过比较接收与生成的标签来识别接收信号与其发射端,为物理层的信息安全提供有效保护。该方法不需要复杂的密码算法,减小了通信过程中的计算量。仿真结果表明,该方法有较高的实用价值。

关键词: 物理不可克隆函数, 物理层安全, 认证, 小波变换, 哈希函数

Abstract:

The authentication method of traditional wireless communication mainly depends on the upper layer encryption mechanism, which cannot guarantee the real-time processing of the system and the security of the physical layer. This paper presents a physical layer security authentication method based on physical unclonable function(PUF), generating authentication labels in real time by using the uniqueness of challenge-response pairs (CRP), which is the intrinsic hardware feature, and the randomness of information. In the receiving end, the received signal and the transmitter are identified by comparing the received and generated tags, which provides effective protection for the information security of the physical layer. This method does not need complex cryptographic algorithm and reduces the calculation in the communication process. Simulation results show that this method has high use value.

Key words: PUF, physical layer security, authentication, wavelet transform, hash function

中图分类号: