CN110519291A - Authentication data transmission method and system based on edge calculations and channel relevancy - Google Patents

Authentication data transmission method and system based on edge calculations and channel relevancy Download PDF

Info

Publication number
CN110519291A
CN110519291A CN201910832490.4A CN201910832490A CN110519291A CN 110519291 A CN110519291 A CN 110519291A CN 201910832490 A CN201910832490 A CN 201910832490A CN 110519291 A CN110519291 A CN 110519291A
Authority
CN
China
Prior art keywords
frame
edge calculations
data
channel
channel information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910832490.4A
Other languages
Chinese (zh)
Other versions
CN110519291B (en
Inventor
陈宜
许爱东
文红
蒋屹新
张宇南
廖润发
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
University of Electronic Science and Technology of China
Research Institute of Southern Power Grid Co Ltd
Original Assignee
University of Electronic Science and Technology of China
Research Institute of Southern Power Grid Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by University of Electronic Science and Technology of China, Research Institute of Southern Power Grid Co Ltd filed Critical University of Electronic Science and Technology of China
Priority to CN201910832490.4A priority Critical patent/CN110519291B/en
Publication of CN110519291A publication Critical patent/CN110519291A/en
Application granted granted Critical
Publication of CN110519291B publication Critical patent/CN110519291B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The authentication data transmission method and system based on edge calculations and channel relevancy that the invention discloses a kind of, the following steps are included: S1. initial authentication: when terminal node and edge calculations server carry out data transmission, edge calculations server carries out upper layer certification to initial data packets, and the reference channel information that corresponding channel information is authenticated as data packet is extracted, while determining related coefficient threshold value;S2. it calculates the channel relevancy of channel information: when edge calculations server receives new continuous data frame, extracting the channel information of current data frame and calculate the channel correlation coefficient with former frame data packet respective channels information;S3. judge the legitimacy of continuous data frame: by the legitimacy of binary hypothesis test continuous data frame.The present invention is based on channel relevancies to carry out certification identification to data frame, has computation complexity low, the high advantage of data authentication accuracy rate.

Description

Authentication data transmission method and system based on edge calculations and channel relevancy
Technical field
The present invention relates to the safety certification protection of data transmission, more particularly to based on edge calculations and channel relevancy Authentication data transmission method and system.
Background technique
With the fast development of technology of Internet of things, widely applied various terminal equipment will generate the data of magnanimity.Tradition Cloud computing system match magnanimity edge data, real-time control, network flow load, cloud data-privacy in terms of Functional need is no longer satisfied, and executing the emerging edge computing technique calculated in network edge side can just set for Internet of Things It is standby that Edge intelligence service is provided.For edge calculations server close to terminal node, access node is numerous, is subject to various attacks. The security and privacy protection that data are transmitted between communication end node and edge calculations server is the key that application, if data Safety cannot ensure, system will without Practical significance, therefore, it is necessary to design one be suitable for edge calculations scene data Transmit safeguard protection certificate scheme.
Traditional its high intensity of data safety and secret protection based on cryptography just faces big computation complexity, this makes Energy and the limited terminal node of computing capability are difficult to use, and edge calculations server its computing resource etc. also can not show a candle to cloud Computing system, in face of the data of numerous nodes and magnanimity, traditional data safety based on cryptography and secret protection are not It is able to satisfy functional need.Uniqueness when physical layer channel feature verification is the sky using channel information, from received data packet Channel characteristic information is directly extracted, certification is realized by comparing the similitude of channel characteristics;Without complicated upper layer encryption and decryption Operation has fast and efficiently advantage, is very suitable to the legitimacy certification of the lightweight data packet under edge calculations system.With Cloud computing system compares, and edge calculations server is close to terminal node, and terminal node is with short distance descriscent edge calculations server Transmit data packet, this make channel information entrained by data packet data packet reach Edge Server when distort it is small, be easy to mention It takes.Channel information includes feature abundant, and the channel characteristics that data frame carries in coherence time have high correlation, therefore believe The channel relevancy of road information is the statistical indicator that can more reflect channel characteristics variation.
Summary of the invention
It is an object of the invention to overcome the deficiencies of the prior art and provide a kind of based on edge calculations and channel relevancy Authentication data transmission method and system carry out certification identification to data frame based on channel relevancy, have computation complexity low, number According to the high advantage of certification accuracy rate.
The purpose of the present invention is achieved through the following technical solutions: the data based on edge calculations and channel relevancy Transmission authentication method, comprising the following steps:
S1. initial authentication: when terminal node and edge calculations server carry out data transmission, edge calculations server is to first Beginning data packet carries out upper layer certification, and extracts the reference channel information that corresponding channel information is authenticated as data packet, while really Phased relationship number threshold value;
S2. calculate the channel relevancy of channel information: when edge calculations server receives new continuous data frame, extraction is worked as The channel information of preceding data frame and the channel correlation coefficient of calculating and former frame data packet respective channels information;
S3. judge the legitimacy of continuous data frame: by the legitimacy of binary hypothesis test continuous data frame:
If the channel relevancy of current data frame is greater than related coefficient threshold value, current data frame is legal, edge calculations Server receives the data frame, and old reference channel information is then replaced with the channel information of current data frame, returns again to step S2 carries out channel relevancy calculating to next frame data packet;
If the channel relevancy of current data frame is less than related coefficient threshold value, current data frame is illegal, edge meter It calculates server and abandons the data frame, and return step S1, re-start initial authentication.
Wherein, the step S1 includes following sub-step:
S101. when terminal node and edge calculations server carry out data transmission, edge calculations server is to preceding 2 frame data Packet carries out upper layer certification:
If authentification failure, front cross frame data packet, return step S101, using next frame data packet as the 1st are directly abandoned Frame data packet (setting 1 for the index of next frame data packet) continues upper layer certification;
If continuous 2 frame data packet authenticates successfully, Edge Server receives this 2 frame data packet, according to the signal received The corresponding channel information of waveform extractingWithWherein,What expression was extracted from the signal waveform of the 1st frame data packet Channel information of the terminal node to edge calculations server;What expression was extracted from the signal waveform of the 2nd frame data packet Terminal node to edge calculations server channel information,WithIt is the complex matrix that m row 1 arranges;
S102. initial channel correlation coefficient ρ is calculated:
Wherein,ForWithCovariance,ForVariance,ForVariance,ForWithRelated coefficient, be a plural number,Expression pairCarry out modulo operation;
S103. related coefficient threshold value is determined: by ρ and η0It is compared, if ρ is less than η0, then by η0It is set as authenticating Related coefficient threshold judgement threshold value, even η=η0If ρ is greater than η0, then ρ is set to the related coefficient threshold judgement of certification Threshold value, even η=ρ, wherein η is the related coefficient threshold judgement threshold value of data frame certification, η0For the correlation of system initial setting up Coefficient threshold value.
Preferably, the method that the upper layer certification uses includes but is not limited to that symmetric cryptographic algorithm and asymmetric cryptography are calculated Method, it includes but is not limited to that LS channel estimation algorithm and least mean-square error channel are estimated that channel information, which extracts the method used, Calculating method.
The step S2 includes following sub-step:
S201. when edge calculations server receives+1 frame data of kth, k is the integer not less than 2, extracts corresponding channel Information
S202. it calculatesWithCorrelationWherein,For channel informationWithCovariance,ForVariance,For Variance,ForWithRelated coefficient, be a plural number,Expression pairCarry out modulo operation.
The step S3 includes following sub-step:
Edge calculations server passes through dualism hypothesisExamine the legitimacy of continuous data frame, wherein η represents number The related coefficient threshold judgement threshold value authenticated according to frame:
Null hypothesisWork as ρkWhen < η, channel information is indicatedWithCorrelation be less than related coefficient threshold judgement Threshold value ,+1 frame data packet of kth is illegal, and edge calculations server abandons the data frame and return step S1, by next frame data Packet re-starts initial authentication and reference channel information as the 1st frame data packet (setting 1 for the index of next frame data packet) It extracts;
Alternative hypothesisWork as ρkWhen > η, channel information is indicatedWithCorrelation be greater than related coefficient thresholding sentence Certainly threshold value, i.e. channel informationWithHighly relevant ,+1 frame data of kth include method, and edge calculations server receives the data Frame, then with new channel informationReplace old reference channel informationIt returns again to step S2 and carries out next frame data packet Channel correlation coefficient calculate and legitimate verification.
Authentication data transmission system based on edge calculations and channel relevancy, including edge calculations server and pass through net The terminal device that network is connect with edge calculations server;
The terminal device is realized and is transmitted to the data of edge calculations server for interacting with edge calculations server;
Edge calculations server completes primary data with terminal device based on upper layer certification for interacting with terminal device Packet certification determines related coefficient threshold value, and realizes based on the certification of the physical layer channel of channel relevancy and verify consecutive numbers According to the legitimacy of packet.
Wherein, the edge calculations server includes:
Initial authentication establishes authentication model, for when receiving the data from terminal device, to initial data packets into The certification of row upper layer, and the reference that corresponding channel information is authenticated as data packet is extracted, while determining related coefficient threshold value;
Channel relevancy computing module, the channel for when receiving new continuous data frame, extracting current data frame are believed It ceases and calculates the channel relevancy with former frame legal data packet respective channels information;
Data frame validity judgement module, for passing through the legitimacy of binary hypothesis test continuous data frame: current data The channel relevancy of frame is greater than related coefficient threshold judgement threshold value, judges that current data frame is legal, receives the data frame, then use The channel information of current data frame replaces old reference channel information, continues the certification of next frame data;Current data frame Channel relevancy be less than related coefficient threshold judgement threshold value, judge that current data frame is illegal, abandon the data frame, and again Carry out initial authentication.
The beneficial effects of the present invention are: edge calculations server extracts channel information, base when receiving signal in the present invention Carry out the legitimacy of verify data frame in the channel relevancy of channel information, have computation complexity low, data authentication accuracy rate is high Advantage, improve the safety of system authentication data;Access node is numerous, computing resource edge calculations system not abundant In, it realizes that the data packet transmitted between edge calculations server and terminal node is fast and accurately authenticated, is very suitable to big Real-time application of the scale terminal mass data under edge calculations scene.
Detailed description of the invention
Fig. 1 is flow chart of the method for the present invention;
Fig. 2 is the data authentication success rate schematic diagram based on channel relevancy in embodiment;
Fig. 3 is system principle diagram of the invention.
Specific embodiment
Technical solution of the present invention is described in further detail with reference to the accompanying drawing, but protection scope of the present invention is not limited to It is as described below.
As shown in Figure 1, the authentication data transmission method based on edge calculations and channel relevancy, comprising the following steps:
S1. initial authentication: when terminal node and edge calculations server carry out data transmission, edge calculations server is to first Beginning data packet carries out upper layer certification, and extracts the reference channel information that corresponding channel information is authenticated as data packet, while really Phased relationship number threshold value:
Wherein, the step S1 includes following sub-step:
S101. when terminal node and edge calculations server carry out data transmission, edge calculations server is to preceding 2 frame data Packet carries out upper layer certification:
If authentification failure, front cross frame data packet, return step S101, using next frame data packet as the 1st are directly abandoned Frame data packet (setting 1 for the index of next frame data packet) continues upper layer certification;
If continuous 2 frame data packet authenticates successfully, Edge Server receives this 2 frame data packet, according to the signal received The corresponding channel information of waveform extractingWithWherein,What expression was extracted from the signal waveform of the 1st frame data packet Channel information of the terminal node to edge calculations server;What expression was extracted from the signal waveform of the 2nd frame data packet Terminal node to edge calculations server channel information,WithIt is the complex matrix that m row 1 arranges;
S102. initial channel correlation coefficient ρ is calculated:
Wherein,ForWithCovariance,ForVariance,ForVariance,ForWithRelated coefficient, be a plural number,Expression pairCarry out modulo operation;
S103. related coefficient threshold value is determined: by ρ and η0It is compared, if ρ is less than η0, then by η0It is set as authenticating Related coefficient threshold judgement threshold value, even η=η0If ρ is greater than η0, then ρ is set to the related coefficient threshold judgement of certification Threshold value, even η=ρ, wherein η is the related coefficient threshold judgement threshold value of data frame certification, η0For the correlation of system initial setting up Coefficient threshold value.
In embodiments herein, upper layer certification can be the identifying algorithm using password, including but not limited to symmetrically Cryptographic algorithm and asymmetric cryptographic algorithm: RC4, AES, ECC, etc.;.Channel information extracting method includes but is not limited to minimum two Multiply channel estimation method and least mean-square error channel estimation method and its algorithm improved and optimizated etc..
S2. calculate the channel relevancy of channel information: when edge calculations server receives new continuous data frame, extraction is worked as The channel information of preceding data frame and the channel correlation coefficient of calculating and former frame data packet respective channels information;
S3. judge the legitimacy of continuous data frame: by the legitimacy of binary hypothesis test continuous data frame:
If the channel relevancy of current data frame is greater than related coefficient threshold value, current data frame is legal, edge calculations Server receives the data frame, and old reference channel information is then replaced with the channel information of current data frame, returns again to step S2 carries out channel relevancy calculating to next frame data packet;
If the channel relevancy of current data frame is less than related coefficient threshold value, current data frame is illegal, edge meter It calculates server and abandons the data frame, and return step S1, re-start initial authentication.
For the 3rd frame data, the implementation process of step S2~S3 is as follows: edge calculations server receives the 3rd frame data packet When, extract corresponding channel informationThen the channel information obtained according to step S1Calculate channel correlation coefficientWherein,For channel informationWithAssociation Variance,ForVariance,ForVariance,ForWithPhase relation Number, is a plural number,Expression pairCarry out modulo operation;Pass through dualism hypothesisInspection Test the legitimacy of continuous data frame, wherein η represents the related coefficient threshold judgement threshold value of data frame certification, null hypothesisWork as ρ2 When < η, channel information is indicatedWithCorrelation be less than related coefficient threshold judgement threshold value, the 3rd frame data packet do not conform to Method, edge calculations server abandon the data frame (setting 1 for the index of next frame data packet) and return step S1;Alternative vacation IfWork as ρ2When > η, channel information is indicatedWithCorrelation be greater than related coefficient threshold judgement threshold value, i.e., channel believe BreathWithHighly relevant, the 3rd frame data include method, and edge calculations server receives the data frame, then with new channel InformationReplace old reference channel informationReturn again to the legitimate verification that step S2 carries out next frame data packet;
Similarly, for+1 frame data of kth, the implementation process of step S2~S3 is as follows: edge calculations server receives kth+1 When frame data, k is the integer not less than 2, extracts corresponding channel informationIt calculatesWithCorrelationWherein,For channel informationWith's Covariance,ForVariance,ForVariance,ForWithCorrelation Coefficient is a plural number,Expression pairCarry out modulo operation;
Pass through dualism hypothesisExamine the legitimacy of continuous data frame, wherein η represents the correlation of data frame certification Coefficient threshold judgement threshold value, null hypothesisWork as ρkWhen < η, channel information is indicatedWithCorrelation be less than related coefficient Threshold judgement threshold value ,+1 frame data packet of kth is illegal, and edge calculations server abandons the data frame (by next frame data packet Index is set as 1), re-starting initial authentication and reference channel information extracting.In fact, being exactly the 3rd frame data as k=2 Processing mode;
Alternative hypothesisWork as ρkWhen > η, channel information is indicatedWithCorrelation be greater than related coefficient thresholding sentence Certainly threshold value, i.e. channel informationWithHighly relevant ,+1 frame data of kth include method, and edge calculations server receives the data Frame, then with new channel informationReplace old reference channel informationIt returns again to step S2 and carries out next frame data packet Legitimate verification.
As shown in Fig. 2, for the data authentication success rate schematic diagram based on channel relevancy in embodiment, it is seen then that in difference Under industrial scene, the data transmission security authentication method of the invention based on channel relevancy physical layer channel number with higher According to certification success rate.Terminal device, which sends data, has the characteristics that continuity in the intermittent, short time;Within coherence time, number The channel information carried according to frame is approximately uniform;When the mobile change bit of terminal device postpones, channel information is also with variation;Difference is set Even if standby in same position, channel information is also different.Based on the channel relevancy of channel information come the legal of verify data frame Property, have computation complexity low, the high advantage of data authentication accuracy rate is suitable for the real-time edge of mass termination mass data Application scenarios are calculated, not only the safety of system authentication data can be improved with the legitimacy of fast verification data packet.
As shown in figure 3, the authentication data transmission system based on edge calculations and channel relevancy, including edge calculations service Device and the terminal device being connect by network with edge calculations server;
The terminal device is realized and is transmitted to the data of edge calculations server for interacting with edge calculations server;
Edge calculations server completes primary data with terminal device based on upper layer certification for interacting with terminal device Packet certification determines related coefficient threshold value, and realizes based on the certification of the physical layer channel of channel relevancy and verify consecutive numbers According to the legitimacy of packet.
Wherein, the edge calculations server includes:
Initial authentication establishes authentication model, for when receiving the data from terminal device, to initial data packets into The certification of row upper layer, and the reference that corresponding channel information is authenticated as data packet is extracted, while determining related coefficient threshold value;
Channel relevancy computing module, the channel for when receiving new continuous data frame, extracting current data frame are believed It ceases and calculates the channel relevancy with former frame legal data packet respective channels information;
Data frame validity judgement module, for passing through the legitimacy of binary hypothesis test continuous data frame: current data The channel relevancy of frame is greater than related coefficient threshold judgement threshold value, judges that current data frame is legal, receives the data frame, then use The channel information of current data frame replaces old reference channel information, continues the certification of next frame data;Current data frame Channel relevancy be less than related coefficient threshold judgement threshold value, judge that current data frame is illegal, abandon the data frame, and again Carry out initial authentication.
To sum up, the present invention it is succinct, flexibly, do not depend on Third Party Authentication mechanism, solve the difficulty of initial setting up decision threshold Topic such as can resist playback, personation, eavesdrop, distort at the common attack;Edge calculations server extracts channel when receiving signal Information solves the edge of mass termination mass data based on the correlation of channel information come the legitimacy of verify data frame The real-time application problem under scene is calculated, has computation complexity low, the high advantage of data authentication accuracy rate, the system of improving is recognized Demonstrate,prove the safety of data.
Finally, it should be noted that the above is a preferred embodiment of the present invention, it should be understood that the present invention is not office It is limited to form disclosed herein, should not be viewed as excluding other embodiments, and can be used for other combinations, modification and ring Border, and can be in contemplated scope described herein, modifications can be made through the above teachings or related fields of technology or knowledge.And this The modifications and changes that field personnel are carried out do not depart from the spirit and scope of the present invention, then all should be in appended claims of the present invention Protection scope in.

Claims (7)

1. the authentication data transmission method based on edge calculations and channel relevancy, it is characterised in that: the following steps are included:
S1. initial authentication: when terminal node and edge calculations server carry out data transmission, edge calculations server is to initial number Upper layer certification is carried out according to packet, and extracts the reference channel information that corresponding channel information is authenticated as data packet, while determining phase Relationship number threshold value;
S2. it calculates the channel relevancy of channel information: when edge calculations server receives new continuous data frame, extracting current number According to the channel information of frame and the channel correlation coefficient of calculating and former frame data packet respective channels information;
S3. judge the legitimacy of continuous data frame: by the legitimacy of binary hypothesis test continuous data frame:
If the channel relevancy of current data frame is greater than related coefficient threshold value, current data frame is legal, edge calculations service Device receives the data frame, and old reference channel information is then replaced with the channel information of current data frame, returns again to S2 pairs of step Next frame data packet carries out channel relevancy calculating;
If the channel relevancy of current data frame is less than related coefficient threshold value, current data frame is illegal, edge calculations clothes Business device abandons the data frame, and return step S1, re-starts initial authentication.
2. the authentication data transmission method according to claim 1 based on edge calculations and channel relevancy, feature exist In: the step S1 includes following sub-step:
S101. when terminal node and edge calculations server carry out data transmission, edge calculations server to preceding 2 frame data packet into The certification of row upper layer:
If authentification failure, front cross frame data packet, return step S101, using next frame data packet as the 1st frame number are directly abandoned Continue upper layer certification according to packet;
If continuous 2 frame data packet authenticates successfully, Edge Server receives this 2 frame data packet, according to the signal waveform received Extract corresponding channel informationWithWherein,Indicate the terminal extracted from the signal waveform of the 1st frame data packet Channel information of the node to edge calculations server;Indicate the terminal extracted from the signal waveform of the 2nd frame data packet Node to edge calculations server channel information,WithIt is the complex matrix that m row 1 arranges;
S102. initial channel correlation coefficient ρ is calculated:
Wherein,ForWithCovariance,ForVariance,For's Variance,ForWithRelated coefficient, be a plural number,Expression pairInto Row modulo operation;
S103. related coefficient threshold value is determined: by ρ and η0It is compared, if ρ is less than η0, then by η0It is set as the phase of certification Relationship number threshold judgement threshold value, even η=η0If ρ is greater than η0, then ρ is set to the related coefficient threshold judgement threshold of certification Value, even η=ρ, wherein η is the related coefficient threshold judgement threshold value of data frame certification, η0For the phase relation of system initial setting up Number threshold value.
3. the authentication data transmission method according to claim 1 based on edge calculations and channel relevancy, feature exist In: the method that the upper layer certification uses includes but is not limited to symmetric cryptographic algorithm and asymmetric cryptographic algorithm, and channel information mentions The method for taking use includes but is not limited to LS channel estimation algorithm and least mean-square error channel estimation method.
4. the authentication data transmission method according to claim 1 based on edge calculations and channel relevancy, feature exist In: the step S2 includes following sub-step:
S201. when edge calculations server receives+1 frame data of kth, k is the integer not less than 2, extracts corresponding channel information
S202. it calculatesWithCorrelationWherein,For channel informationWithCovariance,ForVariance,For's Variance,ForWithRelated coefficient, be a plural number,Expression pair Carry out modulo operation.
5. the authentication data transmission method according to claim 1 based on edge calculations and channel relevancy, feature exist In: the step S3 includes following sub-step:
Edge calculations server passes through dualism hypothesisExamine the legitimacy of continuous data frame, wherein η represents data frame The related coefficient threshold judgement threshold value of certification:
Null hypothesisWork as ρkWhen < η, channel information is indicatedWithCorrelation be less than related coefficient threshold judgement threshold value, + 1 frame data packet of kth is illegal, and edge calculations server abandons the data frame and return step S1, using next frame data packet as 1st frame data packet, re-starts initial authentication and reference channel information extracts;
Alternative hypothesisWork as ρkWhen > η, channel information is indicatedWithCorrelation be greater than related coefficient threshold judgement threshold Value, i.e. channel informationWithHighly relevant ,+1 frame data of kth include method, and edge calculations server receives the data frame, Then with new channel informationReplace old reference channel informationIt returns again to step S2 and carries out next frame data packet Channel correlation coefficient calculates and legitimate verification.
6. the authentication data transmission system based on edge calculations and channel relevancy, it is characterised in that: including edge calculations service Device and the terminal device being connect by network with edge calculations server;
The terminal device is realized and is transmitted to the data of edge calculations server for interacting with edge calculations server;
Edge calculations server is completed initial data packets with terminal device based on upper layer certification and is recognized for interacting with terminal device Card determines related coefficient threshold value, and realizes based on the certification of the physical layer channel of channel relevancy and verify continuous data packet Legitimacy.
7. the authentication data transmission system according to claim 6 based on edge calculations and channel relevancy, feature exist In: the edge calculations server includes:
Initial authentication establishes authentication model, for being carried out to initial data packets when receiving the data from terminal device Layer certification, and the reference that corresponding channel information is authenticated as data packet is extracted, while determining related coefficient threshold value;
Channel relevancy computing module, for extracting the channel information of current data frame simultaneously when receiving new continuous data frame Calculate the channel relevancy with former frame legal data packet respective channels information;
Data frame validity judgement module, for passing through the legitimacy of binary hypothesis test continuous data frame: current data frame Channel relevancy is greater than related coefficient threshold judgement threshold value, judges that current data frame is legal, receives the data frame, then with current The channel information of data frame replaces old reference channel information, continues the certification of next frame data;The letter of current data frame Road correlation is less than related coefficient threshold judgement threshold value, judges that current data frame is illegal, abandons the data frame, and re-start Initial authentication.
CN201910832490.4A 2019-09-04 2019-09-04 Data transmission authentication method and system based on edge calculation and channel correlation Active CN110519291B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910832490.4A CN110519291B (en) 2019-09-04 2019-09-04 Data transmission authentication method and system based on edge calculation and channel correlation

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910832490.4A CN110519291B (en) 2019-09-04 2019-09-04 Data transmission authentication method and system based on edge calculation and channel correlation

Publications (2)

Publication Number Publication Date
CN110519291A true CN110519291A (en) 2019-11-29
CN110519291B CN110519291B (en) 2020-04-03

Family

ID=68630807

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910832490.4A Active CN110519291B (en) 2019-09-04 2019-09-04 Data transmission authentication method and system based on edge calculation and channel correlation

Country Status (1)

Country Link
CN (1) CN110519291B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116647843A (en) * 2023-06-16 2023-08-25 广东省通信产业服务有限公司 Method and system for zero-trust dynamic access authentication

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100331007A1 (en) * 2009-06-30 2010-12-30 Yong Wang Method and apparatus for suppressing inter-cell interference
CN102439868A (en) * 2009-03-16 2012-05-02 华为技术有限公司 Method, communication system and related equipments for data transmission
CN103650563A (en) * 2013-06-27 2014-03-19 华为技术有限公司 Interference control method and network equipment thereof
CN106160822A (en) * 2015-04-01 2016-11-23 普天信息技术有限公司 A kind of cooperative beam shaping method and base station
CN107046468A (en) * 2017-06-14 2017-08-15 电子科技大学 A kind of physical layer certification thresholding determines method and system
CN107872823A (en) * 2016-09-28 2018-04-03 维布络有限公司 The method and system of communication operational mode in the mobile edge calculations environment of identification
CN108810026A (en) * 2018-07-20 2018-11-13 电子科技大学 A kind of terminal device access authentication method and system based on edge calculations
CN108932535A (en) * 2018-07-13 2018-12-04 南方电网科学研究院有限责任公司 A kind of edge calculations clone's node recognition methods based on machine learning
CN109819444A (en) * 2019-01-11 2019-05-28 杭州电子科技大学 A kind of physical layer initial authentication method and system based on radio channel characteristic

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102439868A (en) * 2009-03-16 2012-05-02 华为技术有限公司 Method, communication system and related equipments for data transmission
US20100331007A1 (en) * 2009-06-30 2010-12-30 Yong Wang Method and apparatus for suppressing inter-cell interference
CN103650563A (en) * 2013-06-27 2014-03-19 华为技术有限公司 Interference control method and network equipment thereof
CN106160822A (en) * 2015-04-01 2016-11-23 普天信息技术有限公司 A kind of cooperative beam shaping method and base station
CN107872823A (en) * 2016-09-28 2018-04-03 维布络有限公司 The method and system of communication operational mode in the mobile edge calculations environment of identification
CN107046468A (en) * 2017-06-14 2017-08-15 电子科技大学 A kind of physical layer certification thresholding determines method and system
CN108932535A (en) * 2018-07-13 2018-12-04 南方电网科学研究院有限责任公司 A kind of edge calculations clone's node recognition methods based on machine learning
CN108810026A (en) * 2018-07-20 2018-11-13 电子科技大学 A kind of terminal device access authentication method and system based on edge calculations
CN109819444A (en) * 2019-01-11 2019-05-28 杭州电子科技大学 A kind of physical layer initial authentication method and system based on radio channel characteristic

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
RUN-FA LIAO,ET AL: "Security Enhancement for Mobile Edge Computing Through Physical Layer Authentication", 《WEB OF KNOWLEDGE》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116647843A (en) * 2023-06-16 2023-08-25 广东省通信产业服务有限公司 Method and system for zero-trust dynamic access authentication
CN116647843B (en) * 2023-06-16 2024-02-09 广东省通信产业服务有限公司 Method and system for zero-trust dynamic access authentication

Also Published As

Publication number Publication date
CN110519291B (en) 2020-04-03

Similar Documents

Publication Publication Date Title
Das et al. Provably secure ECC-based device access control and key agreement protocol for IoT environment
Das et al. Biometrics-based privacy-preserving user authentication scheme for cloud-based industrial Internet of Things deployment
Tanveer et al. LAKE-IoD: Lightweight authenticated key exchange protocol for the Internet of Drone environment
Srinivas et al. Designing anonymous signature-based authenticated key exchange scheme for Internet of Things-enabled smart grid systems
Aman et al. Low power data integrity in IoT systems
Yu et al. SLAP-IoD: Secure and lightweight authentication protocol using physical unclonable functions for internet of drones in smart city environments
CN110069918B (en) Efficient double-factor cross-domain authentication method based on block chain technology
CN109756893B (en) Chaos mapping-based crowd sensing Internet of things anonymous user authentication method
Taher et al. Low-overhead remote user authentication protocol for IoT based on a fuzzy extractor and feature extraction
Kalra et al. Advanced password based authentication scheme for wireless sensor networks
Das et al. AI-envisioned blockchain-enabled signature-based key management scheme for industrial cyber–physical systems
Alzuwaini et al. An Efficient Mechanism to Prevent the Phishing Attacks.
Acar et al. A privacy‐preserving multifactor authentication system
Zhang et al. Sapfs: An efficient symmetric-key authentication key agreement scheme with perfect forward secrecy for industrial internet of things
Carcia et al. Blockchain-based system for e-voting using blind signature protocol
CN108390866A (en) Trusted remote method of proof based on the two-way anonymous authentication of dual-proxy
Irshad et al. A low-cost privacy preserving user access in mobile edge computing framework
Mir et al. Decentralized, privacy-preserving, single sign-on
CN110519291A (en) Authentication data transmission method and system based on edge calculations and channel relevancy
Zhou et al. Efficient construction of verifiable timed signatures and its application in scalable payments
Kungpisdan et al. A secure offline key generation with protection against key compromise
Nogia et al. Multifactor Authentication Schemes for Multiserver Based Wireless Application: A Review
CN113422681B (en) Block chain digital signature method, device and system based on quantum cryptography
Zhang et al. RRV-BC: Random Reputation Voting Mechanism and Blockchain Assisted Access Authentication for Industrial Internet of Things
Xie et al. Provably Secure and Lightweight Patient Monitoring Protocol for Wireless Body Area Network in IoHT

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant