Tong Ling’s research while affiliated with Chongqing University of Posts and Telecommunications and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (1)


Figure 1. The model of group key generation and the process of training.
Figure 4. The achievable key rates of SK and PK versus the distance d.
Figure 5 showcases the SK and PK rates versus the transmit power P, with d = 10 m and N = 3 or 5. As shown in Figure 5, when N = 3 and P = −10 dBm, the SK and PK rates are 0.275 BPST and 0.174 BPST, respectively. In addition, when N = 3 and P = 0 dBm, the SK and PK rates become 0.493 BPST and 0.387 BPST, respectively. One can observe that the achievable rates of the SK and PK increase as the transmit power P increases. This is because high transmit power improves the accuracy of channel measurement. Furthermore, when N = 3 or 5, a noticeable difference of about 0.1 BPST exists between the SK and PK rates, illustrating the amount of information revealed to the relay, as described in (21).
Figure 8. Performance comparison under three different key generation schemes.
Cooperative Jamming-Based Physical-Layer Group Secret and Private Key Generation
  • Article
  • Full-text available

September 2024

·

9 Reads

Entropy

Shiming Fu

·

Tong Ling

·

Jun Yang

·

Yong Li

This paper explores physical layer group key generation in wireless relay networks with a star topology. In this setup, the relay node plays the role of either a trusted or untrusted central node, while one legitimate node (Alice) acts as the reference node. The channel between the relay and Alice serves as the reference channel. To enhance security during the channel measurement stage, a cooperative jamming-based scheme is proposed in this paper. This scheme allows the relay to obtain superimposed channel observations from both the reference channel and other relay channels. Then, a public discussion is utilized to enable all nodes to obtain estimates of the reference channel. Subsequently, the legitimate nodes can agree on a secret key (SK) that remains secret from the eavesdropper (Eve), or a private key (PK) that needs to be secret from both the relay and Eve. This paper also derives the lower and upper bounds of the SK/PK capacity. Notably, it demonstrates that there exists only a small constant difference between the SK/PK upper and lower bounds in the high signal-to-noise ratio (SNR) regime. Simulation results confirm the effectiveness of the proposed scheme for ensuring security and efficiency of group key generation.

Download