CN102256249A - Identity authentication method and equipment applied to wireless network - Google Patents
Identity authentication method and equipment applied to wireless network Download PDFInfo
- Publication number
- CN102256249A CN102256249A CN2011100824879A CN201110082487A CN102256249A CN 102256249 A CN102256249 A CN 102256249A CN 2011100824879 A CN2011100824879 A CN 2011100824879A CN 201110082487 A CN201110082487 A CN 201110082487A CN 102256249 A CN102256249 A CN 102256249A
- Authority
- CN
- China
- Prior art keywords
- information
- authentication
- packets
- channel information
- constantly
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Abstract
The technical problem to be solved by the invention is to provide an identity authentication method for performing auxiliary authentication by using a physical layer in a wireless network and equipment for implementing the method. The method comprises an initial authentication step and a physical layer authentication step. In the initial authentication step, when receiving an information packet not passing authentication from a transmitter, a receiver performs identity authentication on the received information packet by upper-layer authentication. In the physical layer authentication step, the receiver acquires the channel information of the information packet from the pilot frequency of the information packet passing the authentication, extracts the channel information in the pilot frequency of the information packet to be authenticated, performs comparison to judge whether the channel information corresponding to the information packet passing the authentication is close to the channel information corresponding to the information packet to be authenticated or not, determines the information packet passes the authentication and returns the physical layer authentication step if the channel information corresponding to the information packet passing the authentication is close to the channel information corresponding to the information packet to be authenticated, otherwise determines the information packet does not pass the authentication and returns to the last step.
Description
Technical field
The present invention relates to the information technology security fields, as the information security technology in fields such as radio communication, mobile communication, deep space communication.
Background technology
Ripe at present identity identifying technology first-selection is utilized PKI (the Public Key Infrastructure that public key cryptography is theoretical and symmetric key technique is set up, PKIX) authentication and CBC-MAC (Cipher Block Chaining Message Authentication Code) are based on the message authentication of ciphertext).
Wireless broadcast communication has work to use very widely in next generation communication, as: mobile TV, real-time video broadcast system etc.Information is in the transmission course of wireless channel, message may be caught by some network interception instrument, and be transmitted to message recipient after being maliciously tampered, the message recipient reception can be done the operation that makes mistake or return to the result of client error, such as client call service is carried out bank transfer, this request can comprise to be produced and changes over to account No. and change the amount of money over to, if network hacker has changed corresponding number of the account or amount of money data after intercepting and capturing this message, and the request after will distorting is transmitted, if it is normal transfer request that service end is treated as the message that receives, will cause big loss.In order to ensure communication safety, need the legitimacy and the confidence level of the information source of validation of wireless communication.But, need to carry out a considerable amount of efficient real-time authentications at short notice in wireless broadcast communication because communication additional information and amount of calculation are all bigger based on the PKI authentication techniques of public key cryptography, it is not all right only adopting the PKI authentication techniques.Additional information and the amount of calculation of CBC-MAC are smaller, but because it still has the upper strata authentication feature that is guaranteed data security by a large amount of encryption and decryption computings, the demand of low complex degree with the application scenario that reaches rapid authentication of can't satisfying the demand.
In the wireless channel that real-time is had relatively high expectations, how can realize efficiently that authentication becomes the focus of a research.
Summary of the invention
Technical problem to be solved by this invention is to provide a kind of in wireless network, the equipment that uses physical layer to carry out the identity identifying method of assistant authentification and realize this method.
The present invention solves the problems of the technologies described above the technical scheme that is adopted to be, is applicable to the identity identifying method of wireless network, comprises step:
Initial authentication step: when the recipient receives the packets of information that comes from unverified successful transmit leg, the packets of information that receives is carried out authentication,, enter next step as authentication success by the upper strata authentication; As authentification failure, then return this step; The authentication of described upper strata is for operating in the identity identifying method more than the physical layer, as the authentication of data link layer, network layer authentication, transport layer authentication and application layer authentication;
The physical layer authenticating step: the recipient obtains the channel information of this packets of information from the pilot tone of the packets of information of authentication success, afterwards, extract the channel information in the pilot tone of packets of information to be certified, more whether the channel information that the channel information of the packets of information correspondence of authentication success is corresponding with packets of information to be certified is approaching, in this way, then be judged as authentication success, return this step; As not, then be judged as authentification failure, return previous step.
The present invention utilizes the wavelength of the position distance of two different transmit legs in the radio communication greater than the information of transmission, then the channel information of two different transmit leg correspondences is incoherent physical channel characteristics, confirm this reception information and received information last time whether sent by the entrained channel information of the packets of information that the recipient is received by same physical entity, whether but can only discern this correspondent based on the authentication of physical channel characteristics is identical correspondent last time, whether and can not discern initial connector is legitimate correspondence person, so the present invention will the inserting safely and authenticating in conjunction with the system of realization based on the authentication of physical channel characteristics and existing upper strata authentication mode.The present invention relies on the upper strata authentication mode relatively fully with existing, and the physical layer authentication is very quick, directly extracts channel information in physical layer, if authentification failure, to fake information do not do further processing (as, demodulation, decoding).The present invention only uses the big upper strata authentication of operand when first the access, to guarantee the legal identity of transmit leg, the physical layer authentication of use afterwards fast, complexity is low promptly guarantees authentication reliability, avoid information send in the distorting and transmitting of illegal entity, again can requirement of real time.Be fit to be applied in to real-time requirement high, but in energy and the computing capability limited wireless communication network, be particularly suitable for being applied to the authentication in the radio sensing network communication process.
The physical layer authenticating step specifically comprises:
The recipient is to the pilot extraction channel information of the packets of information of the authentication success that constantly receives at k-1 (k is a positive integer)
At the pilot extraction channel information of next moment (k constantly) recipient to a new frame information bag to be certified of reception
The channel information that compares these two moment, if twice channel information is enough approaching, think that then these two moment send same physical entity of coming from of information, if twice channel information is approaching inadequately, think that then two moment send different physical entity of coming from of information, back one packet source of (k constantly) constantly is illegal.The extraction of channel information can adopt following two methods to realize the comparison of channel information:
(1) likelihood ratio statistics:
The comparative result of the k-1 moment with k moment channel information is Λ
1, k is a positive integer:
Wherein,
The channel information that extracts the pilot tone of the bag of authentication success message that receives constantly from k-1 for the recipient,
The channel information that extracts the pilot tone of the packets of information to be certified that receives constantly from k for the recipient; K
ColBe normalization coefficient,
Be the phase difference of two packets of information that constantly receive constantly with k of k-1, ‖ ‖
2Be two norm computings;
With Λ
1With threshold value η
1Compare, wherein η
1∈ [0,1] is if Λ
1<η
1Then channel information is enough approaching constantly with k constantly for k-1, and what then two moment sent information is same entity, k authentication success constantly; If Λ
1〉=η
1What then k-1 constantly sent information constantly with k is not same entity, k authentication failure constantly.
(2) sequence probability statistics:
The sequence probability statistical method be judge k constantly channel information whether be legal on during user institute photos and sending messages, repeatedly channel information before will consider promptly can take into account k-S constantly to the comparative result Λ of the k channel information of adjacent moment in twos constantly
xK-S to k constantly in the comparative result Λ of the channel information of adjacent moment in twos
xSum is Λ
2, the packets of information that k-S to k-1 receives constantly is authentication success, and the packets of information that k receives constantly is a packets of information to be certified; K, S are positive integer, and k 〉=S 〉=1:
Wherein,
The channel information that extracts the pilot tone of the packets of information that receives constantly from k-i for the recipient,
The channel information that extracts the pilot tone of the packets of information that receives constantly from k-i+1 for the recipient, i, x are temporary variable, i=1 ..., S; X=k ..., k-S;
Be the phase difference of two packets of information that constantly receive constantly with k-i of k-i+1, ‖ ‖
2Be two norm computings;
Same relatively Λ
2With threshold value η
2∈ [0,1] is if Λ
2<η
2, then k authentication success constantly; If Λ
2〉=η
2, then k authentication failure constantly.
Threshold value η
1, η
2Choose can be by obtaining at the experiment or the emulation of different applied environments and demand for security.
Concrete, the upper strata authentication is PKI authentication or CBC-MAC.
At said method, the present invention also provides a kind of identification authentication system of realizing said method, comprises initial authentication module, physical layer authentication module, distribution module;
Distribution module is used for, and when receiving the packets of information that comes from unverified successful transmit leg, triggers the initial authentication module; When receiving the packets of information that comes from the transmit leg of authentication success, trigger the physical layer authentication module;
The initial authentication module is used for, and by upper strata authentication the packets of information that comes from unverified successful transmit leg is carried out authentication, and the return authentication result, when authentication success, triggers the physical layer authentication module; The authentication of described upper strata is for operating in the authentication more than the physical layer;
The physical layer authentication module is used for, triggered by the initial authentication module after, from the pilot tone of the packets of information of authentication success, obtain the channel information of this packets of information; After triggered by distribution module, extract the channel information in the pilot tone of packets of information to be certified, more whether the channel information that the channel information of the packets of information correspondence of authentication success is corresponding with packets of information to be certified is approaching, in this way, then is judged as authentication success; As not, then be judged as authentification failure.
The invention has the beneficial effects as follows, utilize the characteristic of wireless channel, combine with existing upper strata authentication techniques, realize the authentication of high reliability by the physical layer assistant authentification that uses low complex degree.
Description of drawings
Fig. 1 is a physical layer Verification System instance model schematic diagram;
Fig. 2 strides layer authentication example process for physical layer is auxiliary;
Fig. 3 is embodiment identifying procedure figure.
Embodiment
As shown in Figure 1, comprise in the wireless broadcast communication system of self-organization network (Ad-Hoc Network) that legitimate correspondence both sides (transmit leg A, recipient B) and conduct distort the illegal wiretapping person of forwarding side.Illegal wiretapping person distorts packets of information, and the information of distorting is sent to recipient B behind the legal information bag that recipient B sends at interception transmit leg A on the channel.Include identification authentication system among the recipient B, this identification authentication system comprises initial authentication module, physical layer authentication module, distribution module, as shown in Figure 2;
Distribution module is used for, and when receiving the packets of information that comes from unverified successful transmit leg, triggers the initial authentication module; When receiving the packets of information that comes from the transmit leg of authentication success, trigger the physical layer authentication module;
The initial authentication module is used for, and by CBC-MAC or PKI authentication the packets of information that comes from unverified successful transmit leg is carried out authentication, and the return authentication result, when authentication success, triggers the physical layer authentication module;
The physical layer authentication module is used for, triggered by the initial authentication module after, from the pilot tone of the packets of information of authentication success, obtain the channel information of this packets of information; After triggered by distribution module, extract the channel information in the pilot tone of packets of information to be certified, more whether the channel information that the channel information of the packets of information correspondence of authentication success is corresponding with packets of information to be certified is approaching, in this way, then is judged as authentication success; As not, then be judged as authentification failure.
Each packets of information of transmitting in the system channel is formed by pilot tone (pilot) and data (data);
Pilot tone (pilot) the estimated channel information of the legal information bag that expression k-1 receives constantly;
With
Represent pilot tone (pilot) the estimated channel information of distorting packets of information and legal information bag that k receives constantly respectively.Extracting channel information by the mode of channel estimating from pilot tone has been mature technology, and existing all methods of extracting channel information from pilot tone all are applicable to the present invention, and about the extraction of channel information, this paper does not give unnecessary details at this.Used the recipient B of identification authentication system can normally receive k-1 and come from transmit leg A legal information before reaching constantly, after k received the information of distorting constantly, recipient B can judge authentification failure fast, distorted and cheat generation to prevent information.
K authentication constantly can adopt following dual mode to carry out:
By k-1 constantly with k constantly the comparative result Λ of channel information compare with default threshold value and carry out authentication
K wherein
ColBe normalization coefficient,
Be k-1 constantly with the phase difference of k time information bag.Λ and threshold value η are compared, η ∈ [0,1] wherein, if Λ<η then k-1 channel information is enough approaching constantly with k constantly, then two what constantly send information is same entity, k authentication success constantly; If then k-1 constantly sends information with k to Λ 〉=η constantly is not same entity, k authentication failure constantly.
Perhaps, judge k constantly channel information whether be legal on during user institute photos and sending messages, repeatedly channel information before will consider promptly can take into account k-S constantly to k-1 each channel information constantly, wherein, k 〉=S 〉=1; K-S to k constantly in the comparative result Λ of the channel information of adjacent moment in twos
xSum is Λ:
Same comparative result Λ and threshold value η ∈ [0,1], if Λ<η, then k authentication success constantly; If Λ 〉=η, then k authentication failure constantly.
As shown in Figure 3, the identifying procedure of recipient B is as follows:
Transmit leg A transmission information is given recipient B, and it is from transmit leg A that recipient B at first needs confirmation, and transmit leg A and recipient B at first carry out access authentication by CBC-MAC:
Transmit leg A generates random sequence NA and with itself and information R
AGive recipient B together.Recipient B returns random sequence N
BWith information R
BGive transmit leg A.Allow K
A-BIt is the key between transmit leg A and the recipient B.Enciphered message has form:
M represents information, so authentication protocol can be expressed as follows:
A→B:{N
A,R
A}
Wherein T is the time tag for preventing to transmit; " | " expression beading process.Whether the recipient receives after the packets of information review time sign T and message authentication code (MAC) correct.If transmit leg A sends to the X that is expressed as of recipient B
1, X
2, L, X
N, X here
i(i=1,2 ..., N) be current transmission bag.First packets of information that transmit leg A sends to recipient B is as follows:
Key K in formula (3) and (4)
A-BWith the MAC key K
MacPeel off for the master key of sharing in advance and to get.Recipient B behind first packets of information authentication success authenticate by physical layer confirm after each frame information whether from transmit leg A, the verification process of recipient B is as follows:
Recipient B carries out MAC (Message Authentication Code) code authentication after receiving first packets of information of formula (4) form that transmit leg A sends, and recipient B extracts the channel information of first packets of information behind the authentication success from the pilot tone of packets of information
Transmit leg A is directly with the second packets of information X
2Send to recipient B, recipient B is from X
2Pilot tone extract the channel information of second packets of information
And the comparative result Λ that obtains of through type (1),
Because second packets of information and first information bag are that same physical entity sends, the channel information of two packets of information correspondences should be enough approaching, k-1 constantly with k constantly the comparative result Λ of (k=1) channel information compare with default threshold value and carry out authentication, therefore can access Λ
R<η, the physical layer authentication success.If k is constantly, the equal authentication success of the k-1 of a front packets of information, recipient B receives k packets of information X
kAfter, then extract the channel information of k packets of information
And with the channel information of before S packets of information
Compare, through type (2) authenticates, when k packets of information is to be sent by legitimate sender A, then
Can access Λ
R<η, the physical layer authentication success; If k packets of information is to send by distorting forwarding side, then
As long as the distance of distorting forwarding side and legitimate sender A surpasses the wavelength of transmission information, then the channel information of the channel information of k packets of information correspondence and legal information bag before is uncorrelated, can access Λ
E〉=η, physical layer authentification failure, transmit leg B can abandon immediately and come from the packets of information that illegal transmit leg is distorted or puppet is sent out.If S=1 then is equal to through type (1) and authenticates.The wavelength of transmission information is relevant with the centre frequency of carrier wave, and in the present embodiment, as long as two different position distances that send physical entity differ more than the 8cm, the inventive method all effectively authenticates.
Claims (10)
1. be applicable to the identity identifying method of wireless network, it is characterized in that, comprise step:
Initial authentication step: when the recipient receives the packets of information that comes from unverified successful transmit leg, the packets of information that receives is carried out authentication,, enter next step as authentication success by the upper strata authentication; As authentification failure, then return this step; The authentication of described upper strata is for operating in the identity identifying method more than the physical layer;
The physical layer authenticating step: the recipient obtains the channel information of this packets of information from the pilot tone of the packets of information of authentication success, afterwards, extract the channel information in the pilot tone of packets of information to be certified, more whether the channel information that the channel information of the packets of information correspondence of authentication success is corresponding with packets of information to be certified is approaching, in this way, then be judged as authentication success, return this step; As not, then be judged as authentification failure, return previous step.
2. be applicable to the identity identifying method of wireless network according to claim 1, it is characterized in that, in the physical layer authenticating step, whether the recipient is by relatively going up a channel information that the channel information of the packets of information correspondence of authentication success is corresponding with the packets of information to be certified of current time constantly near carrying out authentication.
3. as being applicable to the identity identifying method of wireless network as described in the claim 2, it is characterized in that whether the recipient relatively goes up a channel information that the channel information of the packets of information correspondence of authentication success is corresponding with the packets of information to be certified of current time constantly near specifically carrying out in the following manner:
The comparative result of the k-1 moment with k moment channel information is Λ
1, k is a positive integer:
Wherein,
The channel information that extracts the pilot tone of the bag of authentication success message that receives constantly from k-1 for the recipient,
The channel information that extracts the pilot tone of the packets of information to be certified that receives constantly from k for the recipient; K
ColBe normalization coefficient,
Be the phase difference of two packets of information that constantly receive constantly with k of k-1, || ||
2Be two norm computings;
With comparative result Λ
1With threshold value η
1Compare, wherein η
1∈ [0,1] is if Λ
1<η
1Then the channel information of two moment correspondences is approaching; If Λ
1〉=η
1Then two corresponding constantly channel informations are kept off.
4. be applicable to the identity identifying method of wireless network according to claim 1, it is characterized in that, in the physical layer authenticating step, whether the section channel information that the channel information of a plurality of packets of information correspondences of authentication success is corresponding with the packets of information to be certified of current time is approaching constantly carries out authentication by adjacent continuous relatively for the recipient.
5. as being applicable to the identity identifying method of wireless network as described in the claim 4, it is characterized in that the section channel information that the channel information of a plurality of packets of information correspondences of authentication success is corresponding with the packets of information to be certified of current time is whether approaching relatively continuously constantly specifically carries out in the following manner for the recipient:
K-S to k constantly in the comparative result Λ of the channel information of adjacent moment in twos
xSum is Λ
2, a packets of information that k-S to k-1 receives constantly is authentication success, and the packets of information that k receives constantly is a packets of information to be certified; K, S are positive integer, and k 〉=S 〉=1:
Wherein,
The channel information that extracts the pilot tone of the packets of information that receives constantly from k-i for the recipient,
The channel information that extracts the pilot tone of the packets of information that receives constantly from k-i+1 for the recipient, i, x are temporary variable, i=1 ..., S; X=k ..., k-S;
Be the phase difference of two packets of information that constantly receive constantly with k-i of k-i+1, || ||
2Be two norm computings;
With comparative result Λ
2With threshold value η
2Compare, wherein η
2∈ [0,1] is if Λ
2<η
2Then the channel information of two moment correspondences is approaching; If Λ
2〉=η
2Then two corresponding constantly channel informations are kept off.
6. as being applicable to the identity identifying method of wireless network as described in above-mentioned any claim, it is characterized in that the authentication of described upper strata authenticates or CBC-MAC for PKI.
7. identification authentication system is characterized in that, comprises initial authentication module, physical layer authentication module, distribution module;
Described distribution module is used for, and when receiving the packets of information that comes from unverified successful transmit leg, triggers the initial authentication module; When receiving the packets of information that comes from the transmit leg of authentication success, trigger the physical layer authentication module;
Described initial authentication module is used for, and by upper strata authentication the packets of information that comes from unverified successful transmit leg is carried out authentication, and the return authentication result, when authentication success, triggers the physical layer authentication module; The authentication of described upper strata is for operating in the authentication more than the physical layer;
Described physical layer authentication module is used for, triggered by the initial authentication module after, from the pilot tone of the packets of information of authentication success, obtain the channel information of this packets of information; After triggered by distribution module, extract the channel information in the pilot tone of packets of information to be certified, more whether the channel information that the channel information of the packets of information correspondence of authentication success is corresponding with packets of information to be certified is approaching, in this way, then is judged as authentication success; As not, then be judged as authentification failure.
8. as identification authentication system as described in the claim 7, it is characterized in that described initial authentication module is used for, carry out the upper strata authentication by PKI authentication or CBC-MAC.
9. as identification authentication system as described in claim 7 or 8, it is characterized in that, described physical layer authentication module is used for, by whether relatively going up a channel information that the channel information of the packets of information correspondence of authentication success is corresponding with the packets of information to be certified of current time constantly near carrying out authentication.
10. as identification authentication system as described in claim 7 or 8, it is characterized in that, described physical layer authentication module is used for, and whether the section channel information that the channel information of a plurality of packets of information correspondences of authentication success is corresponding with the packets of information to be certified of current time is approaching constantly carries out authentication by adjacent continuous relatively.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2011100824879A CN102256249A (en) | 2011-04-02 | 2011-04-02 | Identity authentication method and equipment applied to wireless network |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2011100824879A CN102256249A (en) | 2011-04-02 | 2011-04-02 | Identity authentication method and equipment applied to wireless network |
Publications (1)
Publication Number | Publication Date |
---|---|
CN102256249A true CN102256249A (en) | 2011-11-23 |
Family
ID=44983179
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2011100824879A Pending CN102256249A (en) | 2011-04-02 | 2011-04-02 | Identity authentication method and equipment applied to wireless network |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102256249A (en) |
Cited By (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102223637A (en) * | 2011-07-20 | 2011-10-19 | 北京邮电大学 | Identity authentication method and system based on wireless channel characteristic |
CN104168562A (en) * | 2014-08-15 | 2014-11-26 | 南京邮电大学 | Physical layer authentication method based on multi-carrier transmission |
CN104717652A (en) * | 2015-03-27 | 2015-06-17 | 江苏物联网研究发展中心 | Identity authentication method based on wireless link signature |
CN104735649A (en) * | 2015-03-25 | 2015-06-24 | 江苏物联网研究发展中心 | Wireless link signature extraction method based on Gnu Radio |
CN105162778A (en) * | 2015-08-19 | 2015-12-16 | 电子科技大学 | Radio frequency fingerprint based cross-layer authentication method |
CN105635125A (en) * | 2015-12-25 | 2016-06-01 | 电子科技大学 | Physical layer combined authentication method based on RF fingerprint and channel information |
CN105763492A (en) * | 2016-04-26 | 2016-07-13 | 电子科技大学 | Basic-expansion-model-channel-information-based physical layer authentication method |
CN105873042A (en) * | 2016-05-31 | 2016-08-17 | 西安大唐电信有限公司 | Lightweight class 5G access authentication method |
CN104010310B (en) * | 2014-05-21 | 2016-09-14 | 中国人民解放军信息工程大学 | Heterogeneous network uniform authentication method based on safety of physical layer |
CN105959337A (en) * | 2016-07-25 | 2016-09-21 | 电子科技大学 | Sybil node recognition method based on physical layer confidence degree |
CN105991631A (en) * | 2015-04-01 | 2016-10-05 | 杭州迪普科技有限公司 | Client device access authentication method and client device access authentication device |
CN108566642A (en) * | 2018-03-22 | 2018-09-21 | 成都阿莱夫信息技术有限公司 | A kind of two-dimentional union feature authentication method based on machine learning |
CN108966232A (en) * | 2018-09-28 | 2018-12-07 | 深圳大学 | Wireless internet of things physical layer hybrid authentication method and system based on service network |
CN109819444A (en) * | 2019-01-11 | 2019-05-28 | 杭州电子科技大学 | A kind of physical layer initial authentication method and system based on radio channel characteristic |
WO2019113863A1 (en) * | 2017-12-13 | 2019-06-20 | 深圳大学 | Confidence-transfer-based blind authentication method and system for frequency selective fading channel |
WO2019113865A1 (en) * | 2017-12-13 | 2019-06-20 | 深圳大学 | Belief propagation-based physical layer blind authentication method and system for time-varying fading channels |
CN111586017A (en) * | 2020-04-29 | 2020-08-25 | 北京邮电大学 | Method and device for authenticating communication user |
CN113840285A (en) * | 2021-09-09 | 2021-12-24 | 北京邮电大学 | Physical layer collaborative authentication method and system based on 5G and electronic equipment |
-
2011
- 2011-04-02 CN CN2011100824879A patent/CN102256249A/en active Pending
Non-Patent Citations (2)
Title |
---|
HONG WEN等: "Physical Layer Technique to Assist Authentication Based on PKI for Vehicular Communication Networks", 《KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS》 * |
LIANG XIAO等: "A Physical-Layer Technique to Enhance Authentication for Mobile Terminals", 《IEEE》 * |
Cited By (30)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102223637B (en) * | 2011-07-20 | 2013-06-19 | 北京邮电大学 | Identity authentication method and system based on wireless channel characteristic |
CN102223637A (en) * | 2011-07-20 | 2011-10-19 | 北京邮电大学 | Identity authentication method and system based on wireless channel characteristic |
CN104010310B (en) * | 2014-05-21 | 2016-09-14 | 中国人民解放军信息工程大学 | Heterogeneous network uniform authentication method based on safety of physical layer |
CN104168562A (en) * | 2014-08-15 | 2014-11-26 | 南京邮电大学 | Physical layer authentication method based on multi-carrier transmission |
CN104168562B (en) * | 2014-08-15 | 2018-06-22 | 南京邮电大学 | A kind of physical layer authentication method based on multi-carrier transmission |
CN104735649A (en) * | 2015-03-25 | 2015-06-24 | 江苏物联网研究发展中心 | Wireless link signature extraction method based on Gnu Radio |
CN104717652A (en) * | 2015-03-27 | 2015-06-17 | 江苏物联网研究发展中心 | Identity authentication method based on wireless link signature |
CN105991631A (en) * | 2015-04-01 | 2016-10-05 | 杭州迪普科技有限公司 | Client device access authentication method and client device access authentication device |
WO2017028323A1 (en) * | 2015-08-19 | 2017-02-23 | 电子科技大学 | Radio frequency fingerprint-based cross-layer authentication method |
CN105162778A (en) * | 2015-08-19 | 2015-12-16 | 电子科技大学 | Radio frequency fingerprint based cross-layer authentication method |
US10251058B2 (en) | 2015-08-19 | 2019-04-02 | University Of Electronic Science And Technology Of China | Cross-layer authentication method based on radio frequency fingerprint |
CN105635125A (en) * | 2015-12-25 | 2016-06-01 | 电子科技大学 | Physical layer combined authentication method based on RF fingerprint and channel information |
CN105763492A (en) * | 2016-04-26 | 2016-07-13 | 电子科技大学 | Basic-expansion-model-channel-information-based physical layer authentication method |
CN105763492B (en) * | 2016-04-26 | 2018-10-19 | 电子科技大学 | Physical layer authentication method based on basis expansion model channel information |
CN105873042A (en) * | 2016-05-31 | 2016-08-17 | 西安大唐电信有限公司 | Lightweight class 5G access authentication method |
CN105959337A (en) * | 2016-07-25 | 2016-09-21 | 电子科技大学 | Sybil node recognition method based on physical layer confidence degree |
CN105959337B (en) * | 2016-07-25 | 2019-01-29 | 电子科技大学 | A kind of Sybil node recognition methods based on physical layer degree of belief |
WO2019113865A1 (en) * | 2017-12-13 | 2019-06-20 | 深圳大学 | Belief propagation-based physical layer blind authentication method and system for time-varying fading channels |
WO2019113863A1 (en) * | 2017-12-13 | 2019-06-20 | 深圳大学 | Confidence-transfer-based blind authentication method and system for frequency selective fading channel |
US10924318B2 (en) | 2017-12-13 | 2021-02-16 | Shenzhen University | Belief propagation-based blind authentication method and system for frequency selective fading channel |
US11395140B2 (en) | 2017-12-13 | 2022-07-19 | Shenzhen University | Belief propagation-based physical layer blind authentication method and system for time-varying fading channels |
CN108566642A (en) * | 2018-03-22 | 2018-09-21 | 成都阿莱夫信息技术有限公司 | A kind of two-dimentional union feature authentication method based on machine learning |
CN108566642B (en) * | 2018-03-22 | 2021-08-13 | 成都阿莱夫信息技术有限公司 | Two-dimensional joint feature authentication method based on machine learning |
CN108966232A (en) * | 2018-09-28 | 2018-12-07 | 深圳大学 | Wireless internet of things physical layer hybrid authentication method and system based on service network |
CN108966232B (en) * | 2018-09-28 | 2021-04-20 | 深圳大学 | Service network-based wireless Internet of things physical layer hybrid authentication method and system |
CN109819444A (en) * | 2019-01-11 | 2019-05-28 | 杭州电子科技大学 | A kind of physical layer initial authentication method and system based on radio channel characteristic |
CN109819444B (en) * | 2019-01-11 | 2021-07-30 | 杭州电子科技大学 | Physical layer initial authentication method and system based on wireless channel characteristics |
CN111586017A (en) * | 2020-04-29 | 2020-08-25 | 北京邮电大学 | Method and device for authenticating communication user |
CN113840285A (en) * | 2021-09-09 | 2021-12-24 | 北京邮电大学 | Physical layer collaborative authentication method and system based on 5G and electronic equipment |
CN113840285B (en) * | 2021-09-09 | 2022-12-02 | 北京邮电大学 | Physical layer collaborative authentication method and system based on 5G and electronic equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102256249A (en) | Identity authentication method and equipment applied to wireless network | |
CN106712962B (en) | Bidirectional authentication method and system for mobile RFID system | |
CN105162778B (en) | Cross-layer authentication method based on radio-frequency fingerprint | |
KR100922906B1 (en) | Bootstrapping authentication using distinguished random challenges | |
US8208628B2 (en) | Systems and methods for key generation in wireless communication systems | |
US9450756B2 (en) | Method and system for authenticating entity based on symmetric encryption algorithm | |
CN109257346B (en) | Concealed transmission system based on block chain | |
CN109819444B (en) | Physical layer initial authentication method and system based on wireless channel characteristics | |
KR20180123091A (en) | Methods and architectures for secure ranging | |
US20030041244A1 (en) | Method for securing communications between a terminal and an additional user equipment | |
CN103338448A (en) | Wireless local area network security communication method based on quantum key distribution | |
CN106845304A (en) | A kind of method and system for realizing reader and smart-tag authentication in rfid system | |
CN102223637A (en) | Identity authentication method and system based on wireless channel characteristic | |
Kim | Location-based authentication protocol for first cognitive radio networking standard | |
CN110020524A (en) | A kind of mutual authentication method based on smart card | |
KR101284155B1 (en) | authentication process using of one time password | |
Nikooghadam et al. | A provably secure ECC-based roaming authentication scheme for global mobility networks | |
CN109862563A (en) | A kind of physical layer authentication method and system suitable for mobile wireless network environment | |
CN101925060A (en) | Entity identification method and system of energy-constrained network | |
CN104883372A (en) | Anti-cheating and anti-attack data transmission method based on wireless Ad Hoc network | |
Ghose et al. | {HELP}:{Helper-Enabled}{In-Band} Device Pairing Resistant Against Signal Cancellation | |
Asaduzzaman et al. | A security-aware near field communication architecture | |
WO2012075797A1 (en) | Method for secure communications between reader and radio frequency identification, reader and radio frequency identification | |
Ajit et al. | Formal Verification of 5G EAP-AKA protocol | |
Jadoon et al. | HB-protocol based advance security system for PKES using multiple antennas |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20111123 |