CN104284330A - Physical layer encryption technique based on unreliable wireless channel - Google Patents

Physical layer encryption technique based on unreliable wireless channel Download PDF

Info

Publication number
CN104284330A
CN104284330A CN201410578477.8A CN201410578477A CN104284330A CN 104284330 A CN104284330 A CN 104284330A CN 201410578477 A CN201410578477 A CN 201410578477A CN 104284330 A CN104284330 A CN 104284330A
Authority
CN
China
Prior art keywords
password
bag
sequence number
physical layer
alice
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410578477.8A
Other languages
Chinese (zh)
Inventor
张娜娜
杨鸿文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing University of Posts and Telecommunications
Original Assignee
Beijing University of Posts and Telecommunications
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing University of Posts and Telecommunications filed Critical Beijing University of Posts and Telecommunications
Priority to CN201410578477.8A priority Critical patent/CN104284330A/en
Publication of CN104284330A publication Critical patent/CN104284330A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]

Abstract

The invention provides a physical layer encryption technique based on an unreliable wireless channel. According to the physical layer encryption technique based on the unreliable wireless channel, an expected user and an eavesdropper receive completely different password packets in the password negotiation stage according to the physical characteristics of wireless channels by means of the packet loss difference caused by packet loss randomness and packet loss independence of different wireless channels, in this way, the eavesdropper can not obtain the password between normal communication users, and the purpose of guaranteeing safety transmission of data is achieved. The physical layer encryption technique based on the unreliable wireless channel has the advantages that the password generating method is simple, the complexity is extremely low, and the encryption safety is guaranteed through the randomness of the technique.

Description

A kind of encryption in physical layer technology based on unreliable wireless channel
1. application
The present invention relates to the encryption in physical layer problem in secure wireless communication, particularly a kind of encryption technology based on unreliable wireless transmission channel packet loss otherness.
2. background technology
In recent years, various wireless communication technology emerges in an endless stream, the appearance of these technology makes computer, mobile phone, sensor terminal equipment be provided with the ability of mobile access, solves the line restriction of traditional wire access, for user provides the cut-in method of efficient high-speed more.Along with the improving constantly of message transmission rate of wireless communication system support, the scale of wireless user constantly expands, and wireless communication system progressively replaces the inexorable trend that conventional wireline communication system has become Communication Development in a lot.Meanwhile, along with extensively universal in civilian of radio communication, the secure wireless communication problem relating to trade secret also becomes more and more important.
Although radio communication has broken away from wired constraint, its open communication medium has brought huge hidden danger to the safety of radio communication.Therefore, people design various encryption technology and protect information.Information generally can through stages such as message sink coding, chnnel coding, transmission, channel-decoding and source codings in communication process, traditional wire communication requires communicating pair necessary " wired connection " in transmission process, just can not obtaining information if third party does not have " wired connection ", and once connect the data just likely stealing communicating pair completely.Therefore, wire communication must be ensured information safety by the method for data encryption beyond channel, and this is ensured information safety by message sink coding in fact.But, in a wireless communication system, due to the broadcast characteristic of electromagnetic signal propagation and the opening of wireless channel, signal is propagated arbitrarily in space by radio wave, lose the constraint of " wired ", make the receiver be in arbitrarily in coverage not need to use any line, just can receive the information that transmitter is launched, the communication information is very easily obtained by other disabled users beyond legal desired user.Therefore in this sense, wireless communication system has larger potential safety hazard than conventional wired systems.Therefore in wireless communications, how to ensure the fail safe of information, prevent the wireless leakage of information, also become and become more and more important.
The fail safe of communication is the important means weighing communication quality always, and along with the fast development of radio communication, network service is had higher requirement to fail safe.In recent years, wireless communication system physical layer resource is enriched constantly, ensures that the safety of radio communication becomes the focus of concern by the diversity and uniqueness utilizing physical layer resources, makes safety of physical layer technology be able to development.Safety of physical layer (physical-layer secrecy) is proposed from information theory view first by Wyner.Realize safety of physical layer, mainly utilize the physical characteristic of channel.
In wireless communication system, the physical characteristic of channel determines randomness and the independence of packet loss, thus makes two different wireless channels have packet loss otherness.A kind of encryption in physical layer technology is proposed herein according to the otherness of channel packet loss.
3. summary of the invention
The present invention proposes a kind of simple and safe encryption in physical layer technology based on wireless channel packet loss otherness.
Suppose that proper communication both sides are Alice and Bob, illegal third party and listener-in are Eve.The communication process of Alice and Bob is divided into three steps: ciphersuite negotiation process, and password sequence number announces process and encrypted data transmission process.In ciphersuite negotiation process, Alice and Bob presses time slot and alternately sends password bag.Alice sends to the password bag content of Bob to comprise: password bag sequence number, and pseudorandom produces the code content that length is L bit, CRC check code and other transmission necessary informations.Bob sends to the password bag content of Alice to comprise: password bag sequence number, and pseudorandom produces the code content that length is L bit, CRC check code, whether receives password bag and other transmission necessary informations of the other side's transmission.
Before each transmission data, communicating pair Alice, Bob first carry out ciphersuite negotiation process.
(1) Alice uses pseudo-random method to produce an Integer n, as the total number of password bag.
(2) Alice produces a satisfactory password bag, and wherein password bag sequence number is 1.
(3) Alice time slot 1 by this password bag through packet loss be p achannel send to Bob.
(4) Bob produces a satisfactory password bag, and wherein password bag sequence number is 1, and the password Bao Ze whether receiving the other side's transmission determines according to actual reception condition.If Bob correctly have received the password bag that sequence number that Alice sends is 1, then this position is set to 1, and all the other situations are set to 0.
(5) Bob time slot 2 by this password bag through packet loss be p bchannel send to Alice.
(6) Alice continues to produce the password bag that sequence number is 2.After password bag is sent to Bob by time slot 3, Bob to send sequence number to Alice at time slot 4 according to reception condition be 2 password bag.Alice and Bob so alternately send, until all have sent n password bag.
(7) Alice is according to the information " whether receiving the password bag that the other side sends " in reception condition and the password bag that receives, forms password sequence number sequence and issues.Namely in the password bag sequence number that sent by the Bob correctly received of Alice and password bag, " whether receiving the password bag that the other side sends " position is the password bag sequence number formation sequence of 1 (namely showing that Bob correctly have received the password bag of the same sequence number that Alice sends), sends to Bob.
(8) Alice and Bob is all according to password bag sequence number sequence, take out corresponding code content, and step-by-step mould two adds, then generate the password of L bit, can realize safe transmission after utilizing it to be encrypted data.
If listener-in Eve carries out interception eavesdropping in this communication process, according to the otherness of channel, the packet loss between Alice-Eve and Alice-Bob, Bob-Eve and Bob-Alice is incomplete same.Suppose that the channel packet loss of Alice to Eve is q a, the channel packet loss of Bob to Eve is q b, then the probability of the successful decryption of Eve energy is:
Crack rate
Crack rate P to reduce along with the increase of the total number n of password bag, as n=50, the rate P of cracking can lower than 10 -10.
The present invention is compared with encryption in physical layer technology conventional at present, and the method for generating cipher is simple, and complexity is very low, and meanwhile, its randomness ensure that the fail safe of encryption.
4. accompanying drawing explanation
(1) Fig. 1 is principle schematic of the present invention.
(2) Fig. 2 is communication process schematic diagram.
(3) Fig. 3 is ciphersuite negotiation process schematic.
(4) Fig. 4 is the password pack arrangement schematic diagram that Alice sends to Bob.
(5) Fig. 5 is the password pack arrangement schematic diagram that Bob sends to Alice.
5. specific implementation method citing
In order to further illustrate implementation method of the present invention, providing one below and implementing example.This example only represents schematic illustration of the present invention, does not represent any restriction of the present invention.
Suppose that certain sensors A lice wants the information wireless of 1k bit to be transferred to another transducer Bob, then:
(1) Alice determines Password Length L=10 (bit), and pseudorandom selects an integer 5, as the total number of password bag.
(2) Alice produces a satisfactory password bag, and wherein password bag sequence number is 1, and the code content that pseudorandom produces is A 1=1011001101.
(3) Alice time slot 1 by this password bag through packet loss be p athe channel of=0.5 sends to Bob.
(4) Bob correctly receives this password bag, and produces a satisfactory password bag, and wherein password bag sequence number is 1, and the code content that pseudorandom produces is B 1=0101011101, the password bag whether receiving the other side's transmission is set to 1.
(5) Bob time slot 2 by this password bag through packet loss be p bthe channel of=0.5 sends to Alice.
(6) Alice continues to produce the password bag that sequence number is 2, and the code content that wherein pseudorandom produces is A 2=0111101010.Password is wrapped in after time slot 3 sends to Bob, Bob to send sequence number to Alice at time slot 4 according to reception condition be 2 password bag.Alice and Bob so alternately send, until all have sent 5 password bags.
(7) Alice receives the sequence number that Bob sends is 1,2,5 totally 3 password bags, and its code content is respectively B 1=0101011101, B 2=0001110111, B 5=1001100011.Can determine according to the information of " whether receive the other side send password bag " in password bag, Bob have received that the sequence number that Alice sends is 1, content is A 1the password bag of=1011001101.Alice by password bag sequence number Bob-1,2,5 and Alice-1 formation sequence send to Bob.
(8) Alice and Bob is all according to password bag sequence number sequence, take out corresponding code content, and step-by-step mould two adds, and generates the password of 10 bits, key k = A 1 ⊕ B 1 ⊕ B 2 ⊕ B 5 = 0110000100 .
(9) customer information of 1k bit is divided into 100 parts by L=10 bit by Alice, and every part of information all adds generation ciphertext with key k step-by-step mould two.
(10) ciphertext is correctly transferred to Bob by channel by Alice;
(11) Bob utilizes key k to carry out step-by-step mould two encryption and decryption to ciphertext, can obtain cleartext information.

Claims (8)

1. the encryption in physical layer technology based on unreliable wireless transmission channel, it is according to the physical characteristic of wireless channel, utilize the packet loss otherness that the randomness of packet loss between different radio channel and independence cause, desired user and listener-in is made to receive incomplete same password bag in the ciphersuite negotiation stage, thus cause listener-in cannot obtain password between proper communication user, reach the object ensureing Security Data Transmission.
2. the desired user described in claim 1, listener-in and proper communication user, refer to that mobile phone, sensor are any and carry out the equipment of wireless transmission or use people or the thing of this equipment, the present invention does not do special restriction.
3. in the ciphersuite negotiation stage described in claim 1, refer in communication process, proper communication user both sides carry out the mutual process with consulting of password.
4. the password bag described in claim 1, refer to the packet containing code content, wherein comprised " whether receiving the password bag that the other side sends " can be ACK/NACK, and can be Bit-map etc., concrete form the present invention of password bag do special restriction yet.
5. the password described in claim 1, refers to the private information for data encryption, and produced by pseudorandom or additive method, the present invention of its generating mode does not do special restriction.
6. the communication process described in claim 3, comprise ciphersuite negotiation process, password sequence number announces process and encrypted data transmission process, other transinformation contents related in communication process, the present invention does not do special restriction.
7. the password sequence number described in claim 6 announces process, a direction the opposing party referred in proper communication user both sides sends the password bag sequence number sequence forming key, can be other any password bag characteristic sequences one to one with forming key, the present invention do special restriction yet.
8., in the password sequence number announcement process described in claim 6, for guaranteeing that reception correctly can receive password bag sequence number sequence, transmit leg can be taked to retransmit, strengthen the methods such as transmitted power, and the present invention does not do special restriction.
CN201410578477.8A 2014-10-24 2014-10-24 Physical layer encryption technique based on unreliable wireless channel Pending CN104284330A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410578477.8A CN104284330A (en) 2014-10-24 2014-10-24 Physical layer encryption technique based on unreliable wireless channel

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410578477.8A CN104284330A (en) 2014-10-24 2014-10-24 Physical layer encryption technique based on unreliable wireless channel

Publications (1)

Publication Number Publication Date
CN104284330A true CN104284330A (en) 2015-01-14

Family

ID=52258707

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410578477.8A Pending CN104284330A (en) 2014-10-24 2014-10-24 Physical layer encryption technique based on unreliable wireless channel

Country Status (1)

Country Link
CN (1) CN104284330A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104270750A (en) * 2014-10-24 2015-01-07 北京邮电大学 Password negotiation technology based on packet loss difference
CN104660377A (en) * 2015-03-19 2015-05-27 北京邮电大学 Random linear coding and packet loss difference-based physical layer safety transmission technology
CN106899970A (en) * 2017-01-21 2017-06-27 西北工业大学 Wireless communication encryption method based on angular momentum
CN113422769A (en) * 2021-06-21 2021-09-21 北京邮电大学 Transmission method based on real-time physical state of optical fiber channel and DNA coding technology

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1223705A2 (en) * 2001-01-16 2002-07-17 Microsoft Corporation Methods and systems for generating encryption keys using random bit sequences
US6975729B1 (en) * 2000-08-15 2005-12-13 Sun Microsystems, Inc. Method and apparatus for facilitating use of a pre-shared secret key with identity hiding
CN101404577A (en) * 2008-10-30 2009-04-08 南京大学 Secret communication method for amalgamating multi-secrecy technology
CN101540760A (en) * 2009-04-23 2009-09-23 上海交通大学 Quantum key agreement method
CN102075931A (en) * 2011-01-14 2011-05-25 中国科学技术大学 Information theoretical security-based key agreement method in satellite network
CN102833748A (en) * 2012-09-20 2012-12-19 北京邮电大学 Wireless network lightweight class authentication key negotiation protocol based on digital certificate
CN103095452A (en) * 2011-11-01 2013-05-08 刘海云 Random encryption method needing to adopt exhaustion method for deciphering
CN103338448A (en) * 2013-06-07 2013-10-02 国家电网公司 Wireless local area network security communication method based on quantum key distribution
CN104270750A (en) * 2014-10-24 2015-01-07 北京邮电大学 Password negotiation technology based on packet loss difference

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6975729B1 (en) * 2000-08-15 2005-12-13 Sun Microsystems, Inc. Method and apparatus for facilitating use of a pre-shared secret key with identity hiding
EP1223705A2 (en) * 2001-01-16 2002-07-17 Microsoft Corporation Methods and systems for generating encryption keys using random bit sequences
CN101404577A (en) * 2008-10-30 2009-04-08 南京大学 Secret communication method for amalgamating multi-secrecy technology
CN101540760A (en) * 2009-04-23 2009-09-23 上海交通大学 Quantum key agreement method
CN102075931A (en) * 2011-01-14 2011-05-25 中国科学技术大学 Information theoretical security-based key agreement method in satellite network
CN103095452A (en) * 2011-11-01 2013-05-08 刘海云 Random encryption method needing to adopt exhaustion method for deciphering
CN102833748A (en) * 2012-09-20 2012-12-19 北京邮电大学 Wireless network lightweight class authentication key negotiation protocol based on digital certificate
CN103338448A (en) * 2013-06-07 2013-10-02 国家电网公司 Wireless local area network security communication method based on quantum key distribution
CN104270750A (en) * 2014-10-24 2015-01-07 北京邮电大学 Password negotiation technology based on packet loss difference

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104270750A (en) * 2014-10-24 2015-01-07 北京邮电大学 Password negotiation technology based on packet loss difference
CN104270750B (en) * 2014-10-24 2018-04-17 北京邮电大学 A kind of ciphersuite negotiation method based on packet loss otherness
CN104660377A (en) * 2015-03-19 2015-05-27 北京邮电大学 Random linear coding and packet loss difference-based physical layer safety transmission technology
CN106899970A (en) * 2017-01-21 2017-06-27 西北工业大学 Wireless communication encryption method based on angular momentum
CN106899970B (en) * 2017-01-21 2020-03-31 西北工业大学 Wireless communication encryption method based on angular momentum
CN113422769A (en) * 2021-06-21 2021-09-21 北京邮电大学 Transmission method based on real-time physical state of optical fiber channel and DNA coding technology
CN113422769B (en) * 2021-06-21 2022-03-29 北京邮电大学 Transmission method based on real-time physical state of optical fiber channel and DNA coding technology

Similar Documents

Publication Publication Date Title
US11025414B2 (en) Key exchange method and apparatus
CN102869013B (en) Based on the safe communication system of radio channel characteristic
CN107113594B (en) Method for securely transmitting and receiving discovery messages in a device-to-device communication system
CN101523796B (en) Method and system for enhancing cryptographic capabilities of wireless device using broadcasted random noise
CN103402198B (en) A kind of method that radio communication terminal encryption parameter transmits
CN105577680A (en) Key generation method, encrypted data analyzing method, devices and key managing center
CN111835767A (en) Method of performing device-to-device communication between user equipments
CN105306492A (en) Asynchronous key negotiation method and device aiming at secure instant messaging
CN105163309A (en) Method for secure communication of wireless sensor network based on combined password
CN103096304A (en) Method for encryption and decryption of secure voice tendencies of internet protocol (IP) network communication terminal
CN101379758A (en) Authenticated group key agreement in groups such as AD-HOC scenarios
CN104284330A (en) Physical layer encryption technique based on unreliable wireless channel
CN109462471A (en) The method of information transmission encryption based on national secret algorithm in conjunction with Technique on Quantum Communication
CN103167494B (en) Method for sending information and system
CN104270750A (en) Password negotiation technology based on packet loss difference
US10601586B2 (en) Method and apparatus for key management of end encrypted transmission
KR20180096189A (en) LPWA Module performing Encrypted Communication and method thereof
CN105992203B (en) A kind of voice communication encrypted key exchange method and the system based on this method
CN108206738B (en) Quantum key output method and system
CN101867930B (en) Rapid authentication method for wireless Mesh network backbone node switching
CN105187203A (en) Shared secret key establishment method between wireless equipment based on receiving signal intensity
CN110278537A (en) A kind of incoherent transmission plan of safety for move vehicle system
CN104993927A (en) Symmetric key generation method and application thereof
WO2017128746A1 (en) Secure microwave communication apparatus and method
CN107124270B (en) Wireless communication-oriented shared random source generation method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20150114

WD01 Invention patent application deemed withdrawn after publication