Jun Yang’s research while affiliated with Chongqing University of Posts and Telecommunications and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (3)


Figure 1. The model of group key generation and the process of training.
Figure 4. The achievable key rates of SK and PK versus the distance d.
Figure 5 showcases the SK and PK rates versus the transmit power P, with d = 10 m and N = 3 or 5. As shown in Figure 5, when N = 3 and P = −10 dBm, the SK and PK rates are 0.275 BPST and 0.174 BPST, respectively. In addition, when N = 3 and P = 0 dBm, the SK and PK rates become 0.493 BPST and 0.387 BPST, respectively. One can observe that the achievable rates of the SK and PK increase as the transmit power P increases. This is because high transmit power improves the accuracy of channel measurement. Furthermore, when N = 3 or 5, a noticeable difference of about 0.1 BPST exists between the SK and PK rates, illustrating the amount of information revealed to the relay, as described in (21).
Figure 8. Performance comparison under three different key generation schemes.
Cooperative Jamming-Based Physical-Layer Group Secret and Private Key Generation
  • Article
  • Full-text available

September 2024

·

9 Reads

Entropy

Shiming Fu

·

Tong Ling

·

Jun Yang

·

Yong Li

This paper explores physical layer group key generation in wireless relay networks with a star topology. In this setup, the relay node plays the role of either a trusted or untrusted central node, while one legitimate node (Alice) acts as the reference node. The channel between the relay and Alice serves as the reference channel. To enhance security during the channel measurement stage, a cooperative jamming-based scheme is proposed in this paper. This scheme allows the relay to obtain superimposed channel observations from both the reference channel and other relay channels. Then, a public discussion is utilized to enable all nodes to obtain estimates of the reference channel. Subsequently, the legitimate nodes can agree on a secret key (SK) that remains secret from the eavesdropper (Eve), or a private key (PK) that needs to be secret from both the relay and Eve. This paper also derives the lower and upper bounds of the SK/PK capacity. Notably, it demonstrates that there exists only a small constant difference between the SK/PK upper and lower bounds in the high signal-to-noise ratio (SNR) regime. Simulation results confirm the effectiveness of the proposed scheme for ensuring security and efficiency of group key generation.

Download


Physical-Layer Secret and Private Key Generation in Wireless Relay Networks With Correlated Eavesdropping Channels

January 2023

·

2 Reads

·

9 Citations

IEEE Transactions on Information Forensics and Security

Peng Xu

·

Jun Yang

·

·

[...]

·

Moe Z. Win

This paper investigates the performance of key generation between two nodes assisted by a relay in the presence of correlated eavesdropping channels. A cooperative jamming scheme is utilized to impose superimposed channel measurements on the relay and eavesdropper. Both lower and upper bounds on key capacities for both secret key (SK) and private key (PK) generation are evaluated, where the lower bounds are derived by using minimum mean square error and zero forcing methods for channel estimation, and the upper bounds are derived by formulating several enhanced discrete memoryless source (DMS) models. The analytical expressions are further simplified in the high signal-to-noise ratio (SNR) regime. We discover that one of the two legitimate channels should specialize in playing a role of jamming the relay or eavesdropper. We also demonstrate that the derived lower and upper bounds are tight when the eavesdropping channels are lowly or highly correlated. When the eavesdropping channels are uncorrelated, the SK and PK capacities can be determined since the corresponding upper and lower bounds are equal. Moreover, at high SNRs, a constant gap exists between the SK/PK upper and lower bounds as the correlation coefficient becomes one.

Citations (1)


... Terminals with the same clearance level should share a common key while remaining unaware of keys at higher levels. Several studies have addressed the generation of multiple keys with different security levels [10,[18][19][20][21][22][23][24]. Refs. ...

Reference:

Cooperative Jamming-Based Physical-Layer Group Secret and Private Key Generation
Physical-Layer Secret and Private Key Generation in Wireless Relay Networks With Correlated Eavesdropping Channels
  • Citing Article
  • January 2023

IEEE Transactions on Information Forensics and Security