CN109417469A - The safe matching method of mimo system - Google Patents

The safe matching method of mimo system Download PDF

Info

Publication number
CN109417469A
CN109417469A CN201580083630.2A CN201580083630A CN109417469A CN 109417469 A CN109417469 A CN 109417469A CN 201580083630 A CN201580083630 A CN 201580083630A CN 109417469 A CN109417469 A CN 109417469A
Authority
CN
China
Prior art keywords
key
channel
mimo equipment
pilot frequency
frequency sequence
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201580083630.2A
Other languages
Chinese (zh)
Other versions
CN109417469B (en
Inventor
斯特凡诺·托马辛
英马尔·兰德
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Publication of CN109417469A publication Critical patent/CN109417469A/en
Application granted granted Critical
Publication of CN109417469B publication Critical patent/CN109417469B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0875Generation of secret information including derivation or calculation of cryptographic keys or passwords based on channel impulse response [CIR]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/002Countermeasures against attacks on cryptographic mechanisms

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Radio Transmission System (AREA)

Abstract

A kind of the first MIMO equipment for channel estimation and verifying, the first MIMO equipment includes: transmitter, for sending the first pilot frequency sequence;Receiver, for receiving the second pilot frequency sequence;Channel estimator estimates the first channel for being based on received second pilot frequency sequence;Key generator generates first key for the first channel based on the estimation;Key confirmation unit, for determining whether the first key corresponds to the second key of the 2nd MIMO equipment.

Description

The safe matching method of mimo system
Technical field
The present invention relates to a kind of first MIMO equipment, the 2nd MIMO equipment, systems and for the method for channel estimation.
The invention further relates to a kind of computer readable storage medium for storing program code, which includes referring to It enables, for executing this method.
Background technique
It in order to guarantee the safety of communication system, is had been presented for recently using safety of physical layer technology: by having sent Signal is suitably encoded, and allows specified receiver in the feelings not by any information leakage of the message to interception facility Under condition, the signal is decoded completely.This technology is believed between the random nature and user for influencing the noise of physical layer transmission is utilized The specific feature in road.When terminal can get more antennas, then it can get multiple-input and multiple-output and eavesdrop (multiple- more Input-multiple-output-multiple-eavesdropper, abbreviation MIMOME) channel, multi channel availability into And increase the safe potential of communication.To all technology reasonable functions, then all channel state between legitimate receipt device is needed Information (channel state information, abbreviation CSI).
For example, giving legitimate receipt device by shaping signal beam, eavesdropping side, which (will be likely to) see, leads to transmitter Channel is poor, thus, signal-to-noise ratio (signal-to-noise ratio, letter between resulting legitimate receipt device and eavesdropping side Claim SNR) gap will become larger.Since the spectrum efficiency of classified information transmission is related to the SNR gap, so reasonable according to CSI It is particularly important to design beam forming.It is worth noting that, if the channel for leading to eavesdropping side it is known that if may be implemented to protect completely It is close.When eavesdropping side can not obtain CSI, data still be can get, then can assess eavesdropping side and obtain the information for having transmitted message A possibility that.
In order to obtain CSI when channel reciprocity can get, receiver can be in training stage pilot signal transmitted, transmitter It will estimate channel.However, having outlined pilot pollution attack in document, the principle is as follows: assuming that a kind of situation, Alice's Purpose is that, to Bob progress beam forming, Eve purpose is to obtain the information of some classified information.All users are equipped with N Root antenna.Assuming that H is the N x N channel matrix for describing the plural number of channel between Alice and Bob, if G1 and G2 are respectively The matrix of Alice-Eve channel and Bob-Eve channel.Frequency pilot sign be it is well known, therefore, when Bob send pilot tone when, Eve Same pilot can be sent.The channel of Alice estimation is then the sum of channel between Bob and Eve, that is, channel H+G1.Therefore, exist Under this attack, Eve can modify channel estimation, and obtain advantage.When Alice carries out beam forming again, she will be in channel H It is transmitted on+G1.Correspondingly, launching beam part flows to G1, and Eve can also receive some letters for being intended to be only sent to Bob Breath.Therefore, transmission will be no longer safe.
The practical application of safety of physical layer technology only is just starting to increase recently.The pilot pollution of the extensive MIMO of safety is special Different problem is also only inquired into the literature in the past few years.
A large amount of solutions are had proposed in document, with detect pilot pollution attack, but these schemes have high complexity and/ Or pilot pollution attack can not be reliably prevented.
Summary of the invention
The purpose of the present invention is to provide a kind of equipment for channel estimation, system and method, solve above-mentioned refer to Problems one or more in the prior art.
First aspect present invention provides a kind of the first MIMO equipment for channel estimation and verifying, the first MIMO Equipment includes:
Transmitter, for sending the first pilot frequency sequence;
Receiver, for receiving the second pilot frequency sequence;
Channel estimator estimates the first channel for being based on received second pilot frequency sequence;
Key generator generates first key for the first channel based on the estimation;
Key confirmation unit, for determining whether the first key corresponds to the second key of the 2nd MIMO equipment.
The first MIMO equipment according to first aspect can be interacted with another MIMO equipment, for example, as follows The 2nd MIMO equipment, to safely check (based on channel estimation) first He again by interaction pilot frequency sequence Whether the second key is unanimously estimated and authenticated channel.In order to avoid to eavesdropping side and preventing the forgery of the side of eavesdropping from disappearing channel leakage Breath interaction, the comparison are carried out there is no open.On the contrary, two equipment extract private key from estimated result, then by close Key confirms that process checks whether key is consistent.After completing to confirm process, the first MIMO equipment will detect eavesdropping side Attempt modification channel.
The estimation and verifying of channel between two equipment are also referred to as device pairing.
In the first implementation of the first MIMO equipment according to first aspect, the key confirmation unit is used In:
Generate random number;
The random number is encrypted using the first key, to obtain the first bit sequence;
Send first bit sequence;
Receive the second bit sequence;
Second bit sequence is decrypted using the first key;
If the mapping of the second bit sequence and the random number of decryption matches, it is determined that the first key corresponds to Second key.
Therefore, the key confirmation unit can safely determine the first close of the first MIMO equipment with the 2nd MIMO equipment Whether key corresponds to the second key of the 2nd MIMO equipment.Since first key is raw according to the channel estimation of the first MIMO equipment At, and the second key is the 2nd MIMO equipment the channel estimation based on the 2nd MIMO equipment generates, so can determine the Whether one MIMO equipment and the 2nd MIMO equipment have estimated same channel.Therefore, first according to the first implementation MIMO equipment is able to carry out safe lane verifying.
In one embodiment, the mapping is a kind of reversible, functions such as not.The mapping can be, for example, a kind of the One MIMO equipment and the known random function of the 2nd MIMO equipment.
In second of implementation of the first MIMO equipment according to first aspect, the key confirmation unit is used In: if the first key is identical at least predetermined portions of bit in second key, it is determined that the first key pair Second key described in Ying Yu.
The advantage is that can carry out key comparison more quickly.For example, predetermined portions can be the first and second keys The fixation first part of middle bit.If the first part of key is corresponding, it may be considered that entire key pair is answered.In addition, In two kinds of implementations, security classification and/or the robustness of verifying process are improved.
In the third implementation of the MIMO equipment according to first aspect, the first MIMO equipment be used for from First pilot frequency sequence is selected in one group of first pilot frequency sequence, the transmitter is used to send first pilot frequency sequence Afterwards, the index of selected first pilot frequency sequence is sent.
The advantages of allowing the first MIMO equipment to select first pilot frequency sequence from one group of first pilot frequency sequence, is to add The degree of difficulty that big eavesdropping side launches a offensive.It eavesdropping side can not be using pilot frequency sequence identical with the first MIMO equipment come " covering " Channel, reason are that eavesdropping side can not know which pilot frequency sequence will be the first MIMO equipment will use in advance.
In addition, the first MIMO equipment can be used for receiving the index of selected second pilot frequency sequence, the channel estimator is also used In based on the received index of institute, first channel is estimated.
It the advantage is that the 2nd MIMO equipment can select pilot frequency sequence from one group of pilot frequency sequence, to make the side's of eavesdropping nothing Method covers the pilot frequency sequence that the 2nd MIMO equipment is sent.
In the 4th kind of implementation of the first MIMO equipment according to first aspect,
The receiver is for receiving another the second pilot frequency sequence;
The channel estimator is used to be based on another described received second pilot frequency sequence, estimates another the first letter Road;
The key generator is used for based between estimated the first channel and another estimated first channel Difference generates another first key;
The key confirmation unit is for determining whether another described first key corresponds to the 2nd MIMO equipment Another second key.
This provides a kind of effective safe lane tracking mode, wherein only estimates the variation of channel.It particularly, can be with Using data-signal as pilot frequency sequence (once decoding data).
Second aspect of the present invention refers to that a kind of the 2nd MIMO for carrying out channel estimation and verifying for the first MIMO equipment is set Standby, the MIMO equipment includes:
Receiver, for receiving the first pilot frequency sequence;
Transmitter, for sending the second pilot frequency sequence;
Channel estimator estimates second channel for being based on received first pilot frequency sequence;
Key generator generates the second key for the second channel based on the estimation;
Key confirmation response unit, for being communicated with the first MIMO equipment, so that first equipment determines Whether second key corresponds to the first key of the first MIMO equipment.
2nd MIMO equipment is for making the first MIMO equipment can determine whether the first key of the first MIMO equipment corresponds to In the second key of the 2nd MIMO equipment.Therefore, the 2nd MIMO equipment enables the first MIMO equipment to interfere in no eavesdropping side In the case where, whether authenticated channel estimation is correct.
2nd MIMO equipment can have the effect of opposite " passive " in channel estimation, that is, the 2nd MIMO equipment is available In request of the response from the first MIMO equipment.
It is worth noting that, key confirmation can be carried out, so that the first MIMO equipment knows key after key confirmation It is whether corresponding, but the 2nd MIMO equipment is not aware that whether key is corresponding.
MIMO equipment can be configured, so that the equipment is for the first MIMO equipment according to first aspect and according to second 2nd MIMO equipment described in aspect.In other words, MIMO equipment may include the spy of the first MIMO equipment and the 2nd MIMO equipment Sign.Therefore, MIMO equipment can be used as the promoter of channel estimation and verifying and the response list of channel estimation and verifying simultaneously Member.
In the first implementation of the 2nd MIMO equipment according to second aspect, the key confirmation response is single Member is used for:
Receive the first bit sequence;
First bit sequence is decrypted using second key;
The mapping of the first decrypted bit sequence is encrypted, using second key to obtain the second bit sequence;
Send second bit sequence.
Therefore, the 2nd MIMO equipment can assist the key confirmation unit of the first MIMO equipment to carry out key confirmation.
In second of implementation of the 2nd MIMO equipment according to second aspect, the transmitter is for connecing After receiving first pilot frequency sequence, second pilot frequency sequence is sent, the 2nd MIMO equipment is used for: based on estimated Second channel selects second pilot frequency sequence from one group of candidate sequence.
It the advantage is that the second pilot frequency sequence can be used for knowing the 2nd MIMO equipment by receiving from the first MIMO equipment And assess the first pilot frequency sequence and the channel that obtains.
In the third implementation of the 2nd MIMO equipment according to second aspect,
The receiver is for receiving another the first pilot frequency sequence;
The channel estimator is used to be based on another described received first pilot frequency sequence, estimates another the second letter Road;
The key generator is used for based between estimated former second channel and another estimated second channel Difference, generate another the second key;
The key confirmation response unit is used for and the first MIMO equipment is communicated, with determine it is described another the Whether two keys correspond to another first key of the first MIMO equipment.
In the 4th kind of implementation of the 2nd MIMO equipment according to first or second aspect, the key is generated Device is used to, by carrying out advantage distillation, information synergism and secrecy enhancing stage, generate first based on estimated second channel And/or second key.
This represent a kind of extremely effective modes for generating the first and/or second key.Particularly, key can be generated, Allow to estimate for similar channel to generate same key.The advantage is that has slightly not even if the first and second MIMO equipment Same channel estimation, for example, as caused by measurement error, but channel verifying can still succeed.
In another implementation of the MIMO equipment according to second aspect, the 2nd MIMO equipment be used for from Second pilot frequency sequence is selected in one group of second pilot frequency sequence, the transmitter is used to send second pilot frequency sequence Afterwards, the index of selected second pilot frequency sequence is sent.
In addition, the 2nd MIMO equipment can be used for receiving the index of selected first pilot frequency sequence, the channel estimator is also used In based on a received index, the second channel is estimated.
Third aspect present invention refers to that one kind includes according to any one of first aspect or first aspect implementation institute 2nd MIMO equipment described in the first MIMO equipment and any one of second aspect or second aspect implementation stated is System, it is preferable that the first MIMO equipment and the 2nd MIMO equipment are used to use same map function.
The system according to the third aspect may include the first MIMO equipment and the 2nd MIMO equipment, in which:
The transmitter of first MIMO equipment is used to send the first pilot frequency sequence to the 2nd MIMO equipment;
The receiver of first MIMO equipment is used to receive the second pilot frequency sequence of the 2nd MIMO equipment transmission;
The channel estimator of first MIMO equipment is used to be based on received second pilot frequency sequence, estimates the first channel; The channel estimator of 2nd MIMO equipment is used to be based on received first pilot frequency sequence, estimates second channel;
The key generator of first MIMO equipment is used for the first channel based on the estimation, generates first key;Second The key generator of MIMO equipment is used for the second channel based on the estimation, generates the second key;
The key confirmation response unit of 2nd MIMO equipment is used for and the first MIMO equipment is communicated, another to determine Whether one the second key corresponds to another first key of the first MIMO equipment.
The mapping function can be predefined in the first and second MIMO equipment, can also use secure communication channel, for example, Encryption channel distributes to equipment.
Fourth aspect present invention refers to a kind of method for channel estimation and verifying, which comprises
Send the first pilot frequency sequence;
Receive the second pilot frequency sequence;
Based on received second pilot frequency sequence, the first channel is estimated;
The first channel based on the estimation generates first key;
It is communicated with the 2nd MIMO equipment, whether corresponds to the second of the 2nd MIMO equipment with the determination first key Key.
The method can be set by the first described according to a first aspect of the present invention MIMO according to a fourth aspect of the present invention It is standby to execute.Other features of the method or implementation are able to carry out according to the present invention first according to a fourth aspect of the present invention The function of first MIMO equipment described in aspect and its above-mentioned different implementation.
Fifth aspect present invention refers to a kind of method for carrying out channel estimation and verifying for the first MIMO equipment, the side Method includes:
Receive the first pilot frequency sequence;
Send the second pilot frequency sequence;
Based on received first pilot frequency sequence, second channel is estimated;
Based on the second channel of the estimation, the second key is generated;
It is communicated with the first MIMO equipment, is set so that whether determination second key corresponds to the first MIMO Standby first key.
The method can be set by the 2nd described according to a second aspect of the present invention MIMO according to a fifth aspect of the present invention It is standby to execute.Other features of the method or implementation are able to carry out according to the present invention second according to a fifth aspect of the present invention The function of 2nd MIMO equipment described in aspect and its above-mentioned different implementation.
Sixth aspect present invention refers to that one kind carries out channel estimation for the first MIMO equipment and the 2nd MIMO equipment and tests The method of card, which comprises
The first MIMO equipment sends the first pilot frequency sequence;
The 2nd MIMO equipment receives first pilot frequency sequence;Based on received first pilot frequency sequence, estimation Second channel;Based on the second channel of the estimation, the second key is generated;
The 2nd MIMO equipment sends the second pilot frequency sequence;
The first MIMO equipment receives second pilot frequency sequence;Based on received second pilot frequency sequence, estimation First channel;The first channel based on the estimation generates first key;
Whether the first MIMO equipment and the 2nd MIMO equipment are communicated, corresponded to the determination first key In second key.
Seventh aspect present invention refers to a kind of computer readable storage medium for storing program code, said program code Including instruction, to execute method described in any one of fourth aspect, the 5th aspect, the 6th aspect or its implementation.
Detailed description of the invention
Technical characteristic in order to illustrate the embodiments of the present invention more clearly will make below to required in embodiment description Attached drawing is briefly described.Drawings in the following description are only some embodiments of the invention, these embodiments are not In the case where violating protection scope as defined in the appending claims of the invention, it can modify.
Fig. 1 is the block diagram provided in an embodiment of the present invention for describing a kind of first MIMO equipment;
Fig. 2 is the block diagram for describing a kind of 2nd MIMO equipment that another embodiment of the present invention provides;
Fig. 3 is a kind of block diagram of system provided in an embodiment of the present invention;
Fig. 4 is a kind of method flow diagram for channel estimation that another embodiment of the present invention provides;
Fig. 5 is a kind of method stream for the first MIMO equipment safety estimation channel that another embodiment of the present invention provides Cheng Tu;
Fig. 6 is a kind of side used for the first MIMO equipment and the 2nd MIMO equipment that another embodiment of the present invention provides Method flow chart;
Fig. 7 is a kind of block diagram for system that another embodiment of the present invention provides;
Fig. 8 is a kind of method flow diagram for safe lane estimation that another embodiment of the present invention provides;
Fig. 9 is a kind of method flow diagram for security key verifying that another embodiment of the present invention provides.
Specific embodiment
Fig. 1 shows a kind of the first MIMO equipment 100 for channel estimation and verifying, comprising: transmitter 110 receives Device 120, channel estimator 130, key generator 140 and key confirmation unit 150.
Transmitter 110 is for sending the first pilot frequency sequence.First pilot frequency sequence can be predetermined pilot sequence, be also possible to The pilot frequency sequence that transmitter is selected from one group of pilot frequency sequence.
Receiver 120 is for receiving the second pilot frequency sequence.Transmitter 110 and receiver 120 can be used for using same antenna Send and receive the first and second pilot frequency sequences.
Channel estimator 130 is used to be based on received second pilot frequency sequence, estimates the first channel.For example, channel is estimated Gauge 130 can be used for estimating channel matrix based on received second pilot frequency sequence.
Key generator 140 is used for the first channel based on the estimation, generates first key.Preferably, key is carried out Estimation, so that identical first key can be generated in the first slightly different channel estimation.The length of first key can be, For example, 128 bits or 256 bits.Key generator 140 can pass through transmitter 110 and receiver 120 and the 2nd MIMO equipment It interacts.
Key confirmation unit 150 is for determining whether the first key corresponds to the second key of the 2nd MIMO equipment. Key confirmation unit 150 can be used for being communicated with the 2nd MIMO equipment, for example, passing through transmitter 110 and receiver 120. Preferably, key confirmation unit is for being communicated, so that eavesdropping side can not identify the first and/or second key.
Fig. 2 shows a kind of the 2nd MIMO equipment 200 that channel estimation and verifying are carried out for the first MIMO equipment, packets It includes: receiver 210, transmitter 220, channel estimator 230, key generator 240 and key confirmation response unit 250.
Receiver 210 is for receiving the first pilot frequency sequence, for example, the pilot tone that the first MIMO equipment as shown in Figure 1 is sent Sequence.
Transmitter 220 is for sending the second pilot frequency sequence.Second pilot frequency sequence can be predetermined second pilot frequency sequence, can also To be pilot frequency sequence that the 2nd MIMO equipment 200 is selected from one group of pilot frequency sequence.
Channel estimator 230 is used to be based on received first pilot frequency sequence, estimates second channel.Channel estimator 230 can be similarly configured or identical with the channel estimator 130 of the first MIMO equipment 100.
Key generator 240 is used for the second channel based on the estimation, generates the second key.Key generator 240 can It is similarly configured with the key generator 140 with the first MIMO equipment 100 or identical.
Key confirmation response unit 250 is used for and the first MIMO equipment 100 is communicated, so that the first MIMO Equipment 100 determines whether second key corresponds to the first key of the first MIMO equipment 100.
It includes the first MIMO equipment 100 that Fig. 3, which is shown a kind of, for example, MIMO equipment and the 2nd MIMO equipment in Fig. 1 200, for example, the MIMO equipment in Fig. 2, system 300.Wherein, the first MIMO equipment 100 and the 2nd MIMO equipment 200 are used for Use same map function.
2nd MIMO equipment 200 is used to send pilot frequency sequence to the first MIMO equipment 100, so that the first MIMO equipment 100 Estimate the first channel 310.First MIMO equipment 100 is used to send pilot frequency sequence to the 2nd MIMO equipment 200, so that the 2nd MIMO Equipment 200 estimates second channel 320.
First MIMO equipment 100 can be, for example, the access node of communication network, 200 company of can be of the 2nd MIMO equipment It is connected to the mobile device of the access node.Alternatively, the 2nd MIMO equipment 200 can be the access node of communication network, first MIMO equipment 100 can be the mobile device for being connected to the access node.
Fig. 4 shows a kind of for channel estimation and the method for verifying 400.
This method includes second step for sending first step 410 of the first pilot frequency sequence and receiving the second pilot frequency sequence Rapid 420.Preferably, this method includes another step (being not shown in Fig. 4), wherein receiver is in transmitter receipt to first After pilot frequency sequence, opens and receive channel, to receive the second pilot frequency sequence.In other words, it is assumed that the second pilot frequency sequence is only first Pilot frequency sequence just receives after sending.
Third step 430 includes: to estimate the first channel based on received second pilot frequency sequence.
In 4th step 440, the first channel based on the estimation generates first key.Known use can be used Carry out key generation in the transmitting for generating estimation or one of the method for receiving key corresponding to channel, for example, transmitting or Receiving channel can be identified by channel matrix.
It is communicated in 5th step 450 with the 2nd MIMO equipment, whether corresponds to the determination first key Second key of two MIMO equipment.The communication may include: to send to the 2nd MIMO equipment and receive from the 2nd MIMO equipment Encryption information.
Method in Fig. 4 presents a kind of plain mode of detection pilot pollution attack, which is that safety of physical layer is answered Chief threat in.With other methods on the contrary, the method in Fig. 4 relies only on the pairing based on key and binary map, and Independent of the signal processing method for being easy to appear error because of noise and interference.
The application of this method includes: base station (i) and equipped with the communication between the mobile terminal of more antennas;(ii) it uses More antennas keep WiFi transmission safer.Particularly, application of this method in extensive MIMO is also considered as a kind of related application, Reason is that beam forming plays a significant role in the presence of a large amount of antennas.
Fig. 5 shows a kind of method 500 that channel estimation and verifying are carried out for the first MIMO equipment 100.This method can To be executed by the 2nd MIMO equipment, for example, the 2nd MIMO equipment 200 shown in Fig. 2.
This method includes receiving first step 510 of the first pilot frequency sequence.Initial step before first step 510 Suddenly in (being not shown in Fig. 5), reception channel can be opened.When receiving the first pilot frequency sequence, this method starts.
In second step 520, the second pilot frequency sequence is sent;In third step 530, led based on described received first Frequency sequence estimates second channel.The second pilot frequency sequence can be sent based on received first pilot frequency sequence of institute.For this purpose, third Step 530 can execute before second step 520.
In 4th step 540, based on the second channel of the estimation, the second key is generated.
Communicated in 5th step 550 with the first MIMO equipment 100, with determination second key whether First key corresponding to the first MIMO equipment 100.It is preferred here that the communication is to received from the first MIMO equipment The response of 100 order.
Fig. 6 shows a kind of method for carrying out channel estimation and verifying for the first MIMO equipment and the 2nd MIMO equipment 600。
First step 610 includes: that the first MIMO equipment 100 sends the first pilot frequency sequence.
Second step 620 includes: that the 2nd MIMO equipment 200 receives first pilot frequency sequence;It is connect based on described The first pilot frequency sequence received estimates second channel;Based on the second channel of the estimation, the second key is generated.
Third step 630 includes: that the 2nd MIMO equipment 200 sends the second pilot frequency sequence.
4th step 640 includes: that the first MIMO equipment 100 receives second pilot frequency sequence;It is connect based on described The second pilot frequency sequence received estimates the first channel;The first channel based on the estimation generates first key.
5th step 650 includes: that the first MIMO equipment 100 and the 2nd MIMO equipment 200 are communicated, with Determine whether the first key corresponds to second key.
It includes the first equipment (" Alice ") shown in legend numbers 710 that Fig. 7, which is a kind of, second shown in legend numbers 720 The system 700 of interception facility (" Eve ") shown in equipment (" Bob ") and legend numbers 730.Letter between Alice and Bob Road 712 is indicated by channel matrix H.Channel 732 between Alice and Eve is indicated by channel matrix G1.Letter between Eve and Bob Road 734 is indicated by channel matrix G2.
Fig. 8 is the flow chart of another method 800 for safe lane estimation.In conjunction with the scene in Fig. 7, there are two led Keep pouring in the defeated stage: firstly, Alice sends pilot tone (step 810) to Bob, secondly, Bob sends pilot tone (step 820) to Alice, These pilot tones are regarded as well known.
Based on the received pilot tone of institute, Alice and Bob estimate channel.It is worth noting that, if Eve has initiated pilot tone dirt Dye attack, then channel estimated by Alice and Bob will be different, and reason is that an estimation is H+G1, and another estimation is H+G2.It is further noted that Eve is not aware that H, therefore, it is impossible to keep H+G1 and H+G2 equal.In order to not to Eve (its It is subsequent to be benefited and knowing channel) consistency between two channels, step 830 are checked in the case where leakage channel In, Alice and Bob extract private key from the channel of estimation (specific private key extract process, refers to Cambridge University Publishing house Bloch in 2011, " safety of physical layer " of J.Barros).By this technology, two people obtain ratio from channel estimation Special sequence (key).The key that Alice is generated is indicated with a, indicates the key that Bob is generated with b.Assuming that M is extracted key Length (being indicated with bit number).
If do not attacked, despite the presence of the noise for influencing estimation, two bit sequences or identical.Occurring Attack and the attack modified channel cause the difference between channel estimation be greater than noise level in the case where, Alice and Bob Two bit sequences (key) will be different.
Therefore, in step 840, key confirmation process is used to check whether the key of two extractions to be consistent.If extracted Key is inconsistent, then matches unsuccessfully (step 850).If extracted key agreement, successful matching (step 860).
Fig. 9 is a kind of flow chart of the whether corresponding exemplary method 900 of private key for confirming Alice and Bob. Alice generates the sequence of M random bit, is indicated with r, using key a (two modulus of step-by-step and) by its exclusive or, to obtain x=a + r, that is, Alice carries out primary filling coding to random bit.Bit x in step 910, after coding is sent by channel.Step In rapid 920, Bob detects the bit after these codings, and it is decrypted using the key b that itself is extracted, to obtain The random bit sequence that Alice is generated: r '=x+b (two moduluses and).Then, Bob passes through a kind of reversible, functions h such as or not application The bit map of decryption is another sequence of M-bit by (), to obtain mapping value h (r ').Bob uses the key of itself The mapping value is once filled, and sends encryption message y=h (r ')+b to Alice in step 930.In step 940, Alice checks whether the received message of institute is itself by removing primary filling decryption message z=y+a in step s 950 The random correct mapping value for generating bit, that is, Alice checks whether h (r) is equal to z.If two mapping values are equal, Alice Conclude that there is no pilot pollutions to attack, successful matching.
If the mapping is same map, and the first and second key agreements, then the second equipment will send back r '=r, from And original series are revealed to Eve.Then Eve can simply calculate x+r=a, to obtain a, it means that Eve knows channel Some information, and the information can be used to promote the attack of itself.It is therefore preferred that this is mapped as Random Maps, prevent Eve knows the information of sequence r when Bob is transmitted.
The following is worth noting: first, when Alice and Bob estimation same channel, extracted key is identical , and whole flow process facilitates successful matching.On the contrary, if key that Alice and Bob are extracted and not corresponding to each other, Bob into Capable solution secret meeting generates another message, to generate another mapping value, causes to match procedure failure.Second, Eve are in the mistake Channel H is not aware that in journey.Third, if stage of the Eve after the training stage launches a offensive, Eve can not know that secret is close Key, so that pairing process can not be destroyed.
Channel reciprocity between Alice and Bob is critically important.However, this is not only related with pilot pollution detection, also with Alice will use to channel estimation it is related, that is, by private message beam forming to Bob.If since hardware damage causes Channel is different, then Alice will not be correct by the channel estimation used after pairing process.In fact, Alice will use channel Estimation, signal beam is shaped to Bob, but if channel estimation is incorrect, then signal will be unable to reach Bob, and Bob can not be solved Code goes out the private information.Therefore, the medium hypothesis of hardware damage degree is to the estimation using related.This method is considered when specific When to the robustness of (moderate) mismatch, it is notable that channel H is for extracting private key, and in existing literature It includes that Alice and Bob has the fact that different channels estimation that obtainable private key, which extracts process,.It is therefore contemplated that The program has robustness to hardware damage.However, damage can reduce the defence degree to attack due to underlying cause: making an uproar Sound level is higher or the extent of damage is bigger, then the bit that can be extracted from channel is fewer, and therefore, private key is shorter.
Some variations of universal method are explained below.
Pilot frequency sequence selection
The pilot frequency sequence that first MIMO equipment is sent can be randomly choosed from one group of (a large amount of) sequence to be come out.By pilot tone Sequence is sent to after the 2nd MIMO equipment, and the first MIMO equipment indicates another data of the pilot sequence index by sending Packet.Hereafter, the 2nd MIMO equipment another pilot frequency sequence of random selection place from one group of (a large amount of) sequence, and it is sent to first MIMO equipment.After pilot frequency sequence is sent to the first MIMO equipment, the 2nd MIMO equipment will send instruction this selected second Another data packet of pilot sequence index.
The attack of third equipment initiation can be more readily detected out in the program, and reason is that there is no know third equipment in advance Pilot frequency sequence, so that pilot frequency sequence " can not be covered ".
Use private key
Extracted first and/or second key can be used for encrypted data transmission or for selecting private key, That is, the first and second keys can also be used for conventional security purpose.Particularly, first and/or the 2nd MIMO equipment can be used for adopting It is encrypted with the first and/or second key pair message, and sends the message encrypted.
Channel tracking
It, can be with track channel change after initial channel estimation and verifying.This tracking can continue to carry out, to permit Perhaps following lasting key authentication:
It can be using data-signal as pilot tone (once decoding data).This data guiding channel estimation avoids use and leads Frequently.Still pilot tone (for example, to simplify channel estimation for data guidance method) can be interacted between the terminals.
First MIMO equipment and the 2nd MIMO equipment can calculate the channel of new estimation between the channel previously estimated Difference.
The two carries out private key extraction to calculated channel differences.
The two carries out key authentication according to two keys being described above to extraction.
Integrate private key extraction and key authentication
First private key is extracted and two steps of key authentication can be with thin consolidation together.It is above-mentioned to be used for secret The method of cipher key-extraction provides that the first MIMO equipment sends bit sequence to the 2nd MIMO equipment, so that the 2nd MIMO equipment can be with Correct a certain amount of difference between the key of the first MIMO equipment and the key of the 2nd MIMO equipment.Then, pass through key authentication Process checks that whether practical the key of acquisition is identical.
Optinal plan provides that the first MIMO equipment sends bit sequence to the 2nd MIMO equipment, so that the first MIMO equipment can With detection error, rather than correction error.By these bits, the 2nd MIMO equipment can be by determining the difference between two sequences Whether value quantity is greater than threshold value, directly execution key authentication step.In general, bit number needed for detection error is less than correction error Required bit number.In fact, this demonstrate an advantages (also simplifying algorithm).
Key confirmation process
Key confirmation process can be by, for example, the key confirmation unit of the first MIMO equipment and the 2nd MIMO equipment Key confirmation response unit executes as follows:
A. the first MIMO equipment generates the sequence of M random bit, is indicated with r, using private key (two modulus of step-by-step and) By its exclusive or, to obtain x=a+r.
B. bit x is sent by channel, the 2nd MIMO equipment solves these bits using the key b that itself is extracted It is close.
C. the 2nd MIMO equipment pass through application it is a kind of it is reversible, etc. the bit map of decryption is not M-bit by functions h () Another sequence, to obtain mapping value h (r ').
D. the 2nd MIMO equipment sends encryption by the bit exclusive or of mapping, and to the first MIMO equipment using the key of itself Message y=h (r ')+b.
E. the first MIMO equipment is by removing primary filling decryption message z=y+a, and whether checks the received message of institute For itself random correct mapping value for generating bit, that is, whether detection h (r) is equal to z.
F. pass through if checked, successful matching.
To sum up, safety of physical layer allows to by realizing effective encrypted transmission using the characteristic of wireless channel.Just True channel state information (channel state information, abbreviation CSI) in the method for safety of physical layer very It is important, especially in the case where equipment is equipped with more antennas.In channel acquisition stage, attacker can initiate pilot pollution Attack implements mistake CSI, to can obtain information in subsequent transmission.
The present invention allow by prevent attacker initiate pilot pollution attack, two equipment equipped with more antennas it Between carry out safety pairing process, to ensure that two legitimate device channel estimations obtained are consistent, can obtain correct CSI, so that subsequent transmission is safe.
All the above description is only embodiments of the present invention, and the range that the present invention is protected is not limited to that.This Field technical staff can carry out any change or replacement easily.Therefore, protection scope of the present invention is answered described with claim Protection scope is.

Claims (15)

1. a kind of the first MIMO equipment for channel estimation and verifying, which is characterized in that the first MIMO equipment includes:
Transmitter, for sending the first pilot frequency sequence;
Receiver, for receiving the second pilot frequency sequence;
Channel estimator estimates the first channel for being based on received second pilot frequency sequence;
Key generator generates first key for the first channel based on the estimation;
Key confirmation unit, for determining whether the first key corresponds to the second key of the 2nd MIMO equipment.
2. the first MIMO equipment according to claim 1, which is characterized in that the key confirmation unit is used for:
Generate random number;
The random number is encrypted using the first key, to obtain the first bit sequence;
Send first bit sequence;
Receive the second bit sequence;
Second bit sequence is decrypted using the first key;
If the mapping of the second bit sequence and the random number of decryption matches, it is determined that the first key corresponds to described Second key.
3. the first MIMO equipment according to claim 1 or 2, which is characterized in that the key confirmation unit is used for: if institute It is identical at least predetermined portions of bit in second key to state first key, it is determined that the first key corresponds to described Second key.
4. the first MIMO equipment according to preceding claims any one, which is characterized in that the first MIMO equipment For selecting first pilot frequency sequence from one group of first pilot frequency sequence, the transmitter is used to send first pilot tone The index for sending selected first pilot frequency sequence after sequence and/or the first MIMO equipment are for receiving selected second pilot tone sequence The index of column, the channel estimator are also used to estimate first channel based on the received index of institute.
5. the first MIMO equipment according to preceding claims any one, which is characterized in that
The receiver is for receiving another the second pilot frequency sequence;
The channel estimator is used to be based on another described received second pilot frequency sequence, estimates another the first channel;
The key generator is used for based on the difference between estimated the first channel and another estimated first channel, Generate another first key;
The key confirmation unit is for determining whether another described first key corresponds to the another of the 2nd MIMO equipment One the second key.
6. a kind of the 2nd MIMO equipment for carrying out channel estimation and verifying for the first MIMO equipment, which is characterized in that described MIMO equipment includes:
Receiver, for receiving the first pilot frequency sequence;
Transmitter, for sending the second pilot frequency sequence;
Channel estimator estimates second channel for being based on received first pilot frequency sequence;
Key generator generates the second key for the second channel based on the estimation;
Key confirmation response unit, for being communicated with the first MIMO equipment, so that described in first equipment is determining Whether the second key corresponds to the first key of the first MIMO equipment.
7. the 2nd MIMO equipment according to claim 6, which is characterized in that the key confirmation response unit is used for:
Receive the first bit sequence;
First bit sequence is decrypted using second key;
The mapping of the first decrypted bit sequence is encrypted, using second key to obtain the second bit sequence;
Send second bit sequence.
8. the 2nd MIMO equipment according to any one of claim 6 to 7, which is characterized in that the transmitter is used for After receiving first pilot frequency sequence, second pilot frequency sequence is sent, the 2nd MIMO equipment is used for: based on being estimated The second channel of meter selects second pilot frequency sequence from one group of candidate sequence.
9. the 2nd MIMO equipment according to claim 6 to 8 any one, which is characterized in that
The receiver is for receiving another the first pilot frequency sequence;
The channel estimator is used to be based on another described received first pilot frequency sequence, estimates another second channel;
The key generator is used for based on the difference between estimated former second channel and another estimated second channel Value, generates another first key;
The key confirmation response unit is used for and the first MIMO equipment is communicated, to determine that described another is second close Whether key corresponds to another first key of the first MIMO equipment.
10. according to MIMO equipment described in preceding claims any one, which is characterized in that the key generator is used for base In estimated second channel, by carrying out advantage distillation, information synergism and secrecy enhancing stage, first and/or the is generated Two keys.
11. one kind include the first MIMO equipment as claimed in any of claims 1 to 5 and according to claim 6 to The system of 2nd MIMO equipment described in any one of 10, which is characterized in that the first MIMO equipment and described second MIMO equipment is used to use same map function.
12. a kind of method for channel estimation and verifying, which is characterized in that the described method includes:
Send the first pilot frequency sequence;
Receive the second pilot frequency sequence;
Based on received second pilot frequency sequence, the first channel is estimated;
The first channel based on the estimation generates first key;
It is communicated with the 2nd MIMO equipment, whether the second close of the 2nd MIMO equipment is corresponded to the determination first key Key.
13. a kind of method for carrying out channel estimation and verifying for the first MIMO equipment, which is characterized in that the described method includes:
Receive the first pilot frequency sequence;
Send the second pilot frequency sequence;
Based on received first pilot frequency sequence, second channel is estimated;
Based on the second channel of the estimation, the second key is generated;
It is communicated with the first MIMO equipment, whether the first MIMO equipment is corresponded to determination second key First key.
14. a kind of method for carrying out channel estimation and verifying for the first MIMO equipment and the 2nd MIMO equipment, which is characterized in that The described method includes:
The first MIMO equipment sends the first pilot frequency sequence;
The 2nd MIMO equipment receives first pilot frequency sequence;Based on received first pilot frequency sequence, estimation second Channel;Based on the second channel of the estimation, the second key is generated;
The 2nd MIMO equipment sends the second pilot frequency sequence;
The first MIMO equipment receives second pilot frequency sequence;Based on received second pilot frequency sequence, estimation first Channel;The first channel based on the estimation generates first key;
The first MIMO equipment and the 2nd MIMO equipment are communicated, and whether correspond to institute with the determination first key State the second key.
15. a kind of computer readable storage medium for storing program code, which is characterized in that said program code includes referring to It enables, to execute method described in any one of 2 to 14 according to claim 1.
CN201580083630.2A 2015-10-16 2015-10-16 MIMO system secure pairing method Active CN109417469B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/EP2015/074037 WO2017063716A1 (en) 2015-10-16 2015-10-16 Secure paring method for mimo systems

Publications (2)

Publication Number Publication Date
CN109417469A true CN109417469A (en) 2019-03-01
CN109417469B CN109417469B (en) 2021-09-07

Family

ID=54364273

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201580083630.2A Active CN109417469B (en) 2015-10-16 2015-10-16 MIMO system secure pairing method

Country Status (2)

Country Link
CN (1) CN109417469B (en)
WO (1) WO2017063716A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111953362A (en) * 2020-07-16 2020-11-17 深圳安吉尔饮水产业集团有限公司 Communication method, communication device, communication transceiver and readable storage medium

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10447725B1 (en) 2017-01-24 2019-10-15 Apple Inc. Secure ranging wireless communication
WO2022234454A1 (en) * 2021-05-03 2022-11-10 Lenovo (Singapore) Pte. Ltd. Key establishment using wireless channel information

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1891007A (en) * 2003-12-12 2007-01-03 艾利森电话股份有限公司 Method and apparatus for allocating a pilot signal adapted to the channel characteristics
CN1993924A (en) * 2004-08-04 2007-07-04 松下电器产业株式会社 Radio communication device, radio communication system, and radio communication method
CN101288260A (en) * 2005-01-27 2008-10-15 美商内数位科技公司 Method and system for deriving an encryption key using jointrandomness not shared by others
CN101433010A (en) * 2006-04-18 2009-05-13 交互数字技术公司 Method and system for securing wireless communications
US20110085453A1 (en) * 2009-10-13 2011-04-14 Qualcomm Incorporated Methods and apparatus for selecting and transmitting pilots
US20110085620A1 (en) * 2009-10-13 2011-04-14 Qualcomm Incorporated Methods and apparatus for communicating information using non-coherent and coherent modulation
CN102869013A (en) * 2012-08-29 2013-01-09 北京邮电大学 Secure communication system based on wireless channel characteristic
CN103167490A (en) * 2013-04-12 2013-06-19 中国人民解放军信息工程大学 Method, device and system for distributing wireless secret key
CN103460639A (en) * 2010-11-03 2013-12-18 华为技术有限公司 System and method for securing wireless communications
US20150036516A1 (en) * 2013-07-31 2015-02-05 Huawei Technologies Co., Ltd. Method for detecting eavesdroppers in a wireless communication system
CN107018576A (en) * 2017-03-28 2017-08-04 西安电子科技大学 Accidental access method based on grid chart
CN107437984A (en) * 2016-05-27 2017-12-05 华为技术有限公司 Information transferring method and device

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101951383B (en) * 2005-01-27 2013-06-19 美商内数位科技公司 Method and system for deriving an encryption key using joint randomness not shared by others

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1891007A (en) * 2003-12-12 2007-01-03 艾利森电话股份有限公司 Method and apparatus for allocating a pilot signal adapted to the channel characteristics
CN1993924A (en) * 2004-08-04 2007-07-04 松下电器产业株式会社 Radio communication device, radio communication system, and radio communication method
CN101288260A (en) * 2005-01-27 2008-10-15 美商内数位科技公司 Method and system for deriving an encryption key using jointrandomness not shared by others
CN101433010A (en) * 2006-04-18 2009-05-13 交互数字技术公司 Method and system for securing wireless communications
US20110085453A1 (en) * 2009-10-13 2011-04-14 Qualcomm Incorporated Methods and apparatus for selecting and transmitting pilots
US20110085620A1 (en) * 2009-10-13 2011-04-14 Qualcomm Incorporated Methods and apparatus for communicating information using non-coherent and coherent modulation
CN103460639A (en) * 2010-11-03 2013-12-18 华为技术有限公司 System and method for securing wireless communications
CN102869013A (en) * 2012-08-29 2013-01-09 北京邮电大学 Secure communication system based on wireless channel characteristic
CN103167490A (en) * 2013-04-12 2013-06-19 中国人民解放军信息工程大学 Method, device and system for distributing wireless secret key
US20150036516A1 (en) * 2013-07-31 2015-02-05 Huawei Technologies Co., Ltd. Method for detecting eavesdroppers in a wireless communication system
CN107437984A (en) * 2016-05-27 2017-12-05 华为技术有限公司 Information transferring method and device
CN107018576A (en) * 2017-03-28 2017-08-04 西安电子科技大学 Accidental access method based on grid chart

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
JUNQING ZHANG ET AL: ""On the Key Generation From Correlated Wireless Channels"", 《IEEE COMMUNICATIONS LETTERS》 *
WEILE ZHANG ET AL: ""Detection of Pilot Contamination Attack based on Uncoordinated Frequency Shifts"", 《IEEE TRANSACTIONS ON COMMUNICATIONS》 *
李古月 等: ""无线信道的密钥生成方法"", 《密码学报》 *
楼洋明 等: ""基于MIMO接收信号空间的密钥生成方案"", 《中国科学:信息科学》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111953362A (en) * 2020-07-16 2020-11-17 深圳安吉尔饮水产业集团有限公司 Communication method, communication device, communication transceiver and readable storage medium
CN111953362B (en) * 2020-07-16 2022-01-14 深圳安吉尔饮水产业集团有限公司 Communication method, communication device, communication transceiver and readable storage medium

Also Published As

Publication number Publication date
CN109417469B (en) 2021-09-07
WO2017063716A1 (en) 2017-04-20

Similar Documents

Publication Publication Date Title
US9161214B2 (en) Wireless communication method and system for transmission authentication at the physical layer
Paul et al. Physical-layer authentication
US20100246825A1 (en) Wireless communication method and system for transmission authentication at the physical layer
TWI305092B (en) Orthogonal frequency division multiplexing (ofdm) method and apparatus for protecting and authenticating wirelessly transmitted digital information
KR101351012B1 (en) Method and apparatus for authentication user in multiparty quantum communications
US8688996B2 (en) Multipad encryption
US20050220322A1 (en) Watermarks/signatures for wireless communications
CN106161032A (en) A kind of identity authentication method and device
US20080185434A1 (en) Method for Communicating Between a Reader and a Wireless Identification Marker, Associated Reader and Marker
EP2692085B1 (en) Guard spot beams to deter satellite-based authentication system spoofing
KR20090039549A (en) Tag authentication method using rotation and tag and reader for executing the method
US10735963B1 (en) Wireless communication method for secure side-channel signaling and authentication at the physical layer
CN105846994B (en) A kind of physical layer steganography method and system
CN109417469A (en) The safe matching method of mimo system
Horsch et al. PALPAS--PAssword Less PAssword Synchronization
CN106102049B (en) A kind of safe transmission message approach using the characteristic of channel
CN104125562A (en) Wireless communication encryption method capable of changing passwords
CN104113414B (en) A kind of RFID label tag authentication method of untraceable
CN109996231A (en) A kind of secret communication method in multiaerial system
CN108882236B (en) Physical layer signal watermark embedding method based on S transformation
CN116017451A (en) IPv6 terminal identity authentication method utilizing 5G NR physical layer information
CN113765856B (en) Identity authentication method, device, equipment and medium
CN109274493A (en) Authentication method based on channel-aware
Xu et al. Post-quantum phy-layer authentication for secure initial access in v2x communications
Hancke Noisy carrier modulation for HF RFID

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant