CN104284330A - Physical layer encryption technique based on unreliable wireless channel - Google Patents
Physical layer encryption technique based on unreliable wireless channel Download PDFInfo
- Publication number
- CN104284330A CN104284330A CN201410578477.8A CN201410578477A CN104284330A CN 104284330 A CN104284330 A CN 104284330A CN 201410578477 A CN201410578477 A CN 201410578477A CN 104284330 A CN104284330 A CN 104284330A
- Authority
- CN
- China
- Prior art keywords
- password
- bag
- sequence number
- physical layer
- alice
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
Abstract
The invention provides a physical layer encryption technique based on an unreliable wireless channel. According to the physical layer encryption technique based on the unreliable wireless channel, an expected user and an eavesdropper receive completely different password packets in the password negotiation stage according to the physical characteristics of wireless channels by means of the packet loss difference caused by packet loss randomness and packet loss independence of different wireless channels, in this way, the eavesdropper can not obtain the password between normal communication users, and the purpose of guaranteeing safety transmission of data is achieved. The physical layer encryption technique based on the unreliable wireless channel has the advantages that the password generating method is simple, the complexity is extremely low, and the encryption safety is guaranteed through the randomness of the technique.
Description
1. application
The present invention relates to the encryption in physical layer problem in secure wireless communication, particularly a kind of encryption technology based on unreliable wireless transmission channel packet loss otherness.
2. background technology
In recent years, various wireless communication technology emerges in an endless stream, the appearance of these technology makes computer, mobile phone, sensor terminal equipment be provided with the ability of mobile access, solves the line restriction of traditional wire access, for user provides the cut-in method of efficient high-speed more.Along with the improving constantly of message transmission rate of wireless communication system support, the scale of wireless user constantly expands, and wireless communication system progressively replaces the inexorable trend that conventional wireline communication system has become Communication Development in a lot.Meanwhile, along with extensively universal in civilian of radio communication, the secure wireless communication problem relating to trade secret also becomes more and more important.
Although radio communication has broken away from wired constraint, its open communication medium has brought huge hidden danger to the safety of radio communication.Therefore, people design various encryption technology and protect information.Information generally can through stages such as message sink coding, chnnel coding, transmission, channel-decoding and source codings in communication process, traditional wire communication requires communicating pair necessary " wired connection " in transmission process, just can not obtaining information if third party does not have " wired connection ", and once connect the data just likely stealing communicating pair completely.Therefore, wire communication must be ensured information safety by the method for data encryption beyond channel, and this is ensured information safety by message sink coding in fact.But, in a wireless communication system, due to the broadcast characteristic of electromagnetic signal propagation and the opening of wireless channel, signal is propagated arbitrarily in space by radio wave, lose the constraint of " wired ", make the receiver be in arbitrarily in coverage not need to use any line, just can receive the information that transmitter is launched, the communication information is very easily obtained by other disabled users beyond legal desired user.Therefore in this sense, wireless communication system has larger potential safety hazard than conventional wired systems.Therefore in wireless communications, how to ensure the fail safe of information, prevent the wireless leakage of information, also become and become more and more important.
The fail safe of communication is the important means weighing communication quality always, and along with the fast development of radio communication, network service is had higher requirement to fail safe.In recent years, wireless communication system physical layer resource is enriched constantly, ensures that the safety of radio communication becomes the focus of concern by the diversity and uniqueness utilizing physical layer resources, makes safety of physical layer technology be able to development.Safety of physical layer (physical-layer secrecy) is proposed from information theory view first by Wyner.Realize safety of physical layer, mainly utilize the physical characteristic of channel.
In wireless communication system, the physical characteristic of channel determines randomness and the independence of packet loss, thus makes two different wireless channels have packet loss otherness.A kind of encryption in physical layer technology is proposed herein according to the otherness of channel packet loss.
3. summary of the invention
The present invention proposes a kind of simple and safe encryption in physical layer technology based on wireless channel packet loss otherness.
Suppose that proper communication both sides are Alice and Bob, illegal third party and listener-in are Eve.The communication process of Alice and Bob is divided into three steps: ciphersuite negotiation process, and password sequence number announces process and encrypted data transmission process.In ciphersuite negotiation process, Alice and Bob presses time slot and alternately sends password bag.Alice sends to the password bag content of Bob to comprise: password bag sequence number, and pseudorandom produces the code content that length is L bit, CRC check code and other transmission necessary informations.Bob sends to the password bag content of Alice to comprise: password bag sequence number, and pseudorandom produces the code content that length is L bit, CRC check code, whether receives password bag and other transmission necessary informations of the other side's transmission.
Before each transmission data, communicating pair Alice, Bob first carry out ciphersuite negotiation process.
(1) Alice uses pseudo-random method to produce an Integer n, as the total number of password bag.
(2) Alice produces a satisfactory password bag, and wherein password bag sequence number is 1.
(3) Alice time slot 1 by this password bag through packet loss be p
achannel send to Bob.
(4) Bob produces a satisfactory password bag, and wherein password bag sequence number is 1, and the password Bao Ze whether receiving the other side's transmission determines according to actual reception condition.If Bob correctly have received the password bag that sequence number that Alice sends is 1, then this position is set to 1, and all the other situations are set to 0.
(5) Bob time slot 2 by this password bag through packet loss be p
bchannel send to Alice.
(6) Alice continues to produce the password bag that sequence number is 2.After password bag is sent to Bob by time slot 3, Bob to send sequence number to Alice at time slot 4 according to reception condition be 2 password bag.Alice and Bob so alternately send, until all have sent n password bag.
(7) Alice is according to the information " whether receiving the password bag that the other side sends " in reception condition and the password bag that receives, forms password sequence number sequence and issues.Namely in the password bag sequence number that sent by the Bob correctly received of Alice and password bag, " whether receiving the password bag that the other side sends " position is the password bag sequence number formation sequence of 1 (namely showing that Bob correctly have received the password bag of the same sequence number that Alice sends), sends to Bob.
(8) Alice and Bob is all according to password bag sequence number sequence, take out corresponding code content, and step-by-step mould two adds, then generate the password of L bit, can realize safe transmission after utilizing it to be encrypted data.
If listener-in Eve carries out interception eavesdropping in this communication process, according to the otherness of channel, the packet loss between Alice-Eve and Alice-Bob, Bob-Eve and Bob-Alice is incomplete same.Suppose that the channel packet loss of Alice to Eve is q
a, the channel packet loss of Bob to Eve is q
b, then the probability of the successful decryption of Eve energy is:
Crack rate
Crack rate P to reduce along with the increase of the total number n of password bag, as n=50, the rate P of cracking can lower than 10
-10.
The present invention is compared with encryption in physical layer technology conventional at present, and the method for generating cipher is simple, and complexity is very low, and meanwhile, its randomness ensure that the fail safe of encryption.
4. accompanying drawing explanation
(1) Fig. 1 is principle schematic of the present invention.
(2) Fig. 2 is communication process schematic diagram.
(3) Fig. 3 is ciphersuite negotiation process schematic.
(4) Fig. 4 is the password pack arrangement schematic diagram that Alice sends to Bob.
(5) Fig. 5 is the password pack arrangement schematic diagram that Bob sends to Alice.
5. specific implementation method citing
In order to further illustrate implementation method of the present invention, providing one below and implementing example.This example only represents schematic illustration of the present invention, does not represent any restriction of the present invention.
Suppose that certain sensors A lice wants the information wireless of 1k bit to be transferred to another transducer Bob, then:
(1) Alice determines Password Length L=10 (bit), and pseudorandom selects an integer 5, as the total number of password bag.
(2) Alice produces a satisfactory password bag, and wherein password bag sequence number is 1, and the code content that pseudorandom produces is A
1=1011001101.
(3) Alice time slot 1 by this password bag through packet loss be p
athe channel of=0.5 sends to Bob.
(4) Bob correctly receives this password bag, and produces a satisfactory password bag, and wherein password bag sequence number is 1, and the code content that pseudorandom produces is B
1=0101011101, the password bag whether receiving the other side's transmission is set to 1.
(5) Bob time slot 2 by this password bag through packet loss be p
bthe channel of=0.5 sends to Alice.
(6) Alice continues to produce the password bag that sequence number is 2, and the code content that wherein pseudorandom produces is A
2=0111101010.Password is wrapped in after time slot 3 sends to Bob, Bob to send sequence number to Alice at time slot 4 according to reception condition be 2 password bag.Alice and Bob so alternately send, until all have sent 5 password bags.
(7) Alice receives the sequence number that Bob sends is 1,2,5 totally 3 password bags, and its code content is respectively B
1=0101011101, B
2=0001110111, B
5=1001100011.Can determine according to the information of " whether receive the other side send password bag " in password bag, Bob have received that the sequence number that Alice sends is 1, content is A
1the password bag of=1011001101.Alice by password bag sequence number Bob-1,2,5 and Alice-1 formation sequence send to Bob.
(8) Alice and Bob is all according to password bag sequence number sequence, take out corresponding code content, and step-by-step mould two adds, and generates the password of 10 bits, key
(9) customer information of 1k bit is divided into 100 parts by L=10 bit by Alice, and every part of information all adds generation ciphertext with key k step-by-step mould two.
(10) ciphertext is correctly transferred to Bob by channel by Alice;
(11) Bob utilizes key k to carry out step-by-step mould two encryption and decryption to ciphertext, can obtain cleartext information.
Claims (8)
1. the encryption in physical layer technology based on unreliable wireless transmission channel, it is according to the physical characteristic of wireless channel, utilize the packet loss otherness that the randomness of packet loss between different radio channel and independence cause, desired user and listener-in is made to receive incomplete same password bag in the ciphersuite negotiation stage, thus cause listener-in cannot obtain password between proper communication user, reach the object ensureing Security Data Transmission.
2. the desired user described in claim 1, listener-in and proper communication user, refer to that mobile phone, sensor are any and carry out the equipment of wireless transmission or use people or the thing of this equipment, the present invention does not do special restriction.
3. in the ciphersuite negotiation stage described in claim 1, refer in communication process, proper communication user both sides carry out the mutual process with consulting of password.
4. the password bag described in claim 1, refer to the packet containing code content, wherein comprised " whether receiving the password bag that the other side sends " can be ACK/NACK, and can be Bit-map etc., concrete form the present invention of password bag do special restriction yet.
5. the password described in claim 1, refers to the private information for data encryption, and produced by pseudorandom or additive method, the present invention of its generating mode does not do special restriction.
6. the communication process described in claim 3, comprise ciphersuite negotiation process, password sequence number announces process and encrypted data transmission process, other transinformation contents related in communication process, the present invention does not do special restriction.
7. the password sequence number described in claim 6 announces process, a direction the opposing party referred in proper communication user both sides sends the password bag sequence number sequence forming key, can be other any password bag characteristic sequences one to one with forming key, the present invention do special restriction yet.
8., in the password sequence number announcement process described in claim 6, for guaranteeing that reception correctly can receive password bag sequence number sequence, transmit leg can be taked to retransmit, strengthen the methods such as transmitted power, and the present invention does not do special restriction.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410578477.8A CN104284330A (en) | 2014-10-24 | 2014-10-24 | Physical layer encryption technique based on unreliable wireless channel |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410578477.8A CN104284330A (en) | 2014-10-24 | 2014-10-24 | Physical layer encryption technique based on unreliable wireless channel |
Publications (1)
Publication Number | Publication Date |
---|---|
CN104284330A true CN104284330A (en) | 2015-01-14 |
Family
ID=52258707
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410578477.8A Pending CN104284330A (en) | 2014-10-24 | 2014-10-24 | Physical layer encryption technique based on unreliable wireless channel |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104284330A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104270750A (en) * | 2014-10-24 | 2015-01-07 | 北京邮电大学 | Password negotiation technology based on packet loss difference |
CN104660377A (en) * | 2015-03-19 | 2015-05-27 | 北京邮电大学 | Random linear coding and packet loss difference-based physical layer safety transmission technology |
CN106899970A (en) * | 2017-01-21 | 2017-06-27 | 西北工业大学 | Wireless communication encryption method based on angular momentum |
CN113422769A (en) * | 2021-06-21 | 2021-09-21 | 北京邮电大学 | Transmission method based on real-time physical state of optical fiber channel and DNA coding technology |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1223705A2 (en) * | 2001-01-16 | 2002-07-17 | Microsoft Corporation | Methods and systems for generating encryption keys using random bit sequences |
US6975729B1 (en) * | 2000-08-15 | 2005-12-13 | Sun Microsystems, Inc. | Method and apparatus for facilitating use of a pre-shared secret key with identity hiding |
CN101404577A (en) * | 2008-10-30 | 2009-04-08 | 南京大学 | Secret communication method for amalgamating multi-secrecy technology |
CN101540760A (en) * | 2009-04-23 | 2009-09-23 | 上海交通大学 | Quantum key agreement method |
CN102075931A (en) * | 2011-01-14 | 2011-05-25 | 中国科学技术大学 | Information theoretical security-based key agreement method in satellite network |
CN102833748A (en) * | 2012-09-20 | 2012-12-19 | 北京邮电大学 | Wireless network lightweight class authentication key negotiation protocol based on digital certificate |
CN103095452A (en) * | 2011-11-01 | 2013-05-08 | 刘海云 | Random encryption method needing to adopt exhaustion method for deciphering |
CN103338448A (en) * | 2013-06-07 | 2013-10-02 | 国家电网公司 | Wireless local area network security communication method based on quantum key distribution |
CN104270750A (en) * | 2014-10-24 | 2015-01-07 | 北京邮电大学 | Password negotiation technology based on packet loss difference |
-
2014
- 2014-10-24 CN CN201410578477.8A patent/CN104284330A/en active Pending
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6975729B1 (en) * | 2000-08-15 | 2005-12-13 | Sun Microsystems, Inc. | Method and apparatus for facilitating use of a pre-shared secret key with identity hiding |
EP1223705A2 (en) * | 2001-01-16 | 2002-07-17 | Microsoft Corporation | Methods and systems for generating encryption keys using random bit sequences |
CN101404577A (en) * | 2008-10-30 | 2009-04-08 | 南京大学 | Secret communication method for amalgamating multi-secrecy technology |
CN101540760A (en) * | 2009-04-23 | 2009-09-23 | 上海交通大学 | Quantum key agreement method |
CN102075931A (en) * | 2011-01-14 | 2011-05-25 | 中国科学技术大学 | Information theoretical security-based key agreement method in satellite network |
CN103095452A (en) * | 2011-11-01 | 2013-05-08 | 刘海云 | Random encryption method needing to adopt exhaustion method for deciphering |
CN102833748A (en) * | 2012-09-20 | 2012-12-19 | 北京邮电大学 | Wireless network lightweight class authentication key negotiation protocol based on digital certificate |
CN103338448A (en) * | 2013-06-07 | 2013-10-02 | 国家电网公司 | Wireless local area network security communication method based on quantum key distribution |
CN104270750A (en) * | 2014-10-24 | 2015-01-07 | 北京邮电大学 | Password negotiation technology based on packet loss difference |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104270750A (en) * | 2014-10-24 | 2015-01-07 | 北京邮电大学 | Password negotiation technology based on packet loss difference |
CN104270750B (en) * | 2014-10-24 | 2018-04-17 | 北京邮电大学 | A kind of ciphersuite negotiation method based on packet loss otherness |
CN104660377A (en) * | 2015-03-19 | 2015-05-27 | 北京邮电大学 | Random linear coding and packet loss difference-based physical layer safety transmission technology |
CN106899970A (en) * | 2017-01-21 | 2017-06-27 | 西北工业大学 | Wireless communication encryption method based on angular momentum |
CN106899970B (en) * | 2017-01-21 | 2020-03-31 | 西北工业大学 | Wireless communication encryption method based on angular momentum |
CN113422769A (en) * | 2021-06-21 | 2021-09-21 | 北京邮电大学 | Transmission method based on real-time physical state of optical fiber channel and DNA coding technology |
CN113422769B (en) * | 2021-06-21 | 2022-03-29 | 北京邮电大学 | Transmission method based on real-time physical state of optical fiber channel and DNA coding technology |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11025414B2 (en) | Key exchange method and apparatus | |
CN102869013B (en) | Based on the safe communication system of radio channel characteristic | |
CN107113594B (en) | Method for securely transmitting and receiving discovery messages in a device-to-device communication system | |
CN101523796B (en) | Method and system for enhancing cryptographic capabilities of wireless device using broadcasted random noise | |
CN103402198B (en) | A kind of method that radio communication terminal encryption parameter transmits | |
CN105577680A (en) | Key generation method, encrypted data analyzing method, devices and key managing center | |
CN111835767A (en) | Method of performing device-to-device communication between user equipments | |
CN105306492A (en) | Asynchronous key negotiation method and device aiming at secure instant messaging | |
CN105163309A (en) | Method for secure communication of wireless sensor network based on combined password | |
CN103096304A (en) | Method for encryption and decryption of secure voice tendencies of internet protocol (IP) network communication terminal | |
CN101379758A (en) | Authenticated group key agreement in groups such as AD-HOC scenarios | |
CN104284330A (en) | Physical layer encryption technique based on unreliable wireless channel | |
CN109462471A (en) | The method of information transmission encryption based on national secret algorithm in conjunction with Technique on Quantum Communication | |
CN103167494B (en) | Method for sending information and system | |
CN104270750A (en) | Password negotiation technology based on packet loss difference | |
US10601586B2 (en) | Method and apparatus for key management of end encrypted transmission | |
KR20180096189A (en) | LPWA Module performing Encrypted Communication and method thereof | |
CN105992203B (en) | A kind of voice communication encrypted key exchange method and the system based on this method | |
CN108206738B (en) | Quantum key output method and system | |
CN101867930B (en) | Rapid authentication method for wireless Mesh network backbone node switching | |
CN105187203A (en) | Shared secret key establishment method between wireless equipment based on receiving signal intensity | |
CN110278537A (en) | A kind of incoherent transmission plan of safety for move vehicle system | |
CN104993927A (en) | Symmetric key generation method and application thereof | |
WO2017128746A1 (en) | Secure microwave communication apparatus and method | |
CN107124270B (en) | Wireless communication-oriented shared random source generation method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20150114 |
|
WD01 | Invention patent application deemed withdrawn after publication |