CN1213573C - Physical layer encryption method based on time-varying MPSK modulation in wireless local area network - Google Patents

Physical layer encryption method based on time-varying MPSK modulation in wireless local area network Download PDF

Info

Publication number
CN1213573C
CN1213573C CN 03145950 CN03145950A CN1213573C CN 1213573 C CN1213573 C CN 1213573C CN 03145950 CN03145950 CN 03145950 CN 03145950 A CN03145950 A CN 03145950A CN 1213573 C CN1213573 C CN 1213573C
Authority
CN
China
Prior art keywords
mpsk
centerdot
random
physical layer
phi
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN 03145950
Other languages
Chinese (zh)
Other versions
CN1477831A (en
Inventor
樊平毅
刘忱
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tsinghua University
Original Assignee
Tsinghua University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tsinghua University filed Critical Tsinghua University
Priority to CN 03145950 priority Critical patent/CN1213573C/en
Publication of CN1477831A publication Critical patent/CN1477831A/en
Application granted granted Critical
Publication of CN1213573C publication Critical patent/CN1213573C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Landscapes

  • Digital Transmission Methods That Use Modulated Carrier Waves (AREA)

Abstract

The present invention relates to a physical layer cryptographic method based on time-varying MPSK modulation in a wireless local area network, and belongs to the technical field of information transmission safety for a wireless local area network. The present invention is characterized in that under the precondition that a traditional random PN sequence continuously changes phase offset, a fixed modulation mode with a lower scale of QPSK or 8PSK is adopted so as to greatly enhance the performance of a system bit error rate BER on the basis of greatly enhancing the system safety. Moreover, compared with an MPSK modulation mode with a fixed random MPSK modulation mode and a lower scale, the present invention has obvious advantages in an SNR zone or a high SNR zone with a low signal-to-noise ratio.

Description

In the WLAN (wireless local area network) based on the time become the encryption in physical layer method of MPSK modulation
Technical field
In the WLAN (wireless local area network) based on the time become the MPSK modulation the encryption in physical layer method belong to wireless local area information transmission security technical field.
Background technology
As the important component part of wireless communication networks, wireless lan (wlan) has become the main developing direction of following radio communication, particularly wireless access technology.Along with the continuous improvement of performance, interoperability and the ease of manageability of WLAN, fail safe has become assembles WLAN (wireless local area network) on a large scale and presses for one of problem of solution.Because WLAN (wireless local area network) is used the wireless mode transmission of data signals, transmission medium is open, so be vulnerable to attack.On the other hand, the physics controlled range of WLAN (wireless local area network) is uncertain, and this is because radio wave can penetrate wall and dividing plate, propagates into sometimes outside the application region, makes the hacker have an opportunity to intercept and capture electric wave and enter in the not protected local area network (LAN).Because these difference of network infrastructure, the fail safe that causes WLAN (wireless local area network) and wired network is not in same level.
At present, the IEEE802.11 committee has recognized the safety defect that WLAN (wireless local area network) is intrinsic, thereby has introduced WEP (WiredEquivalent Privacy) algorithm.But the WEP algorithm also has defective and the weakness of self, can not guarantee the validity of encrypted transmission fully, also can't guarantee the fail safe of WLAN.
Introduce our invention the time modified tone system mode encryption in physical layer algorithm before, be necessary simply to introduce traditional MPSK modulation system.MPSK is with a kind of multi-system digital modulation mode of carrier phase as the parameter of the information of carrying.In M system (for example: M=8, expression octal system) phase shift keyed signal, carrier phase has M kind value, and the pairing M kind duration is T sSymbol can be expressed as:
S i ( t ) = 2 E s T s cos ( ω c t + φ i ) 0 ≤ t ≤ T s , i = 0,1 , · · · , M - 1 - - - ( 1 )
Here, E sBe the signal energy of unit symbol, promptly at 0≤t≤T sSignal energy in the time interval; ω CBe carrier angular frequencies; φ iBe phase place, M kind value is arranged.
The theoretical Bit Error Rate Computation formula of mpsk signal is as follows:
During M=2, P b , BPSK = Q ( 2 E b N 0 ) - - - ( 2 )
During M=4, P b , QPSK = 2 Q ( 2 E b N 0 ) [ 1 - 1 4 Q ( 2 E b N 0 ) ] - - - ( 3 )
During M=8, P b , 8 PSK = 2 Q ( 6 E b N 0 sin π 8 ) - - - ( 4 )
During M=16, P b , 16 PSK = 2 Q ( 8 E b N 0 sin π 16 ) - - - ( 5 )
Here, Q represents the Q function, and its mathematics implication is: Q ( a ) = ∫ a ∞ 1 2 π e x 2 2 dx , It is the tail area of Gaussian Profile density function.E bRepresent but the energy of bit signal N 0The power spectral density of expression noise.
Under normal conditions, the M value that the MPSK modulation system is adopted is constant, phase deviation φ iSpan also be constant.Like this, in a single day the signal after the modulation is intercepted and captured, and just easily by demodulation, causes leakage of information.For this reason, when proposing, we become the modulation system of MPSK, to increase the security performance of system.Further, for the error rate that reduces system and the complexity of realization, we also to the time MPSK modulation system that becomes make some and improve, to increase the availability of this method.
Summary of the invention
The object of the present invention is to provide a kind of can on the basis of improving security of system greatly, keep than in the wireless local area of low error rate based on the time become the encryption in physical layer algorithm of MPSK.
Based on the time become the MPSK modulation system the encryption in physical layer basic idea be: produces two PN pseudo random sequences, constantly change the value of multi-system M according to first PN sequence, while value and second PN sequence according to M constantly changes phase deviation φ iValue.Each M and φ iChange a back modulating data once.Like this, the signal after the modulation is at M and φ iAll do not have statistical law to say on two parameters, have very strong confidentiality, reached the purpose of encrypting.Concrete condition, referring to Fig. 1, existing based on the time MPSK modulation system that becomes the encryption in physical layer algorithm be expressed as follows:
(1) generation of random PN sequence
(i) { 0, the 1} sequence is used for the M value of selected MPSK modulation system to PN1:2bits, and its corresponded manner is as shown in table 1 at random.
(ii) PN2:log 2{ 0, the 1} sequence is used for selected phase deviation φ to M bits at random iValue, its corresponded manner is as follows:
With log 2M bits { 0, the 1} sequence is regarded a binary number as, is designated as (PN2) 2, be converted into decimal number after, be designated as (PN2) 10Then:
φ i = 2 π ( PN 2 ) 10 M - - - ( 6 )
(2) (Encode) encrypted in modulation
Simplify modulating mode, utilize the planisphere of MPSK modulation system to come the mark enciphered data, data encrypted is selected on the unit circle.
For MPSK modulation system and selected M, enciphered data m should satisfy: 0≤m≤M-1 has:
SIGNAL = m , ENCODE = exp [ j · ( 2 π m M + φ i ) ] - - - ( 7 )
(3) demodulation deciphering (Decode)
(i) deciphering foundation
Adopt complex plane, mark constellation point on unit circle.Because phase deviation φ iExistence, constellation point can rotate skew.The mark mode of constellation point is as follows:
CONSTELLATIONPOINTS = exp [ j · ( 2 π K M + φ i ) ] - - - ( 8 )
( K = 0,1,2 , · · · , M - 1 )
The data (RECEIVE) that receive are compared with each constellation point, and nearest point is as the value of these data;
That is to say, will with data point on complex plane the nearest pairing K value of constellation point as decrypted data.
(ii) decryption method
Get M constellation point CP 1, CP 2..., CP MThe corresponding K=0 of difference, 1,2 ..., this M of M-1 point, decryption method is as follows:
IF|RECEIVE-CP K|=Min(RECEIVE-CP 1,...,RECEIVE-CP M)
(9)
THEN DECODE=K
Should be noted that, though said method improves a lot on security of system, but because BPSK, QPSK, 8PSK and these 4 kinds of modulation systems of 16PSK all occur with 1/4 probability, the complexity that causes whole system to realize increases, the error rate is also higher, thereby limited the range of application of system, promptly required the signal to noise ratio of system higher (greater than 12dB).For this reason, we will become some improvement of do on the MPSK modulation system encryption in physical layer algorithm when existing, to enlarge its scope of application.
The invention is characterized in: it be a kind of adopt fixing QPSK modulation system the time become the encryption in physical layer method of MPSK, contain following steps successively:
1. the generation of random PN sequence
4 01 sequences at random.Selected phase deviation φ iValue, its corresponded manner is as follows:
01 sequence binary number representation with 4 is designated as PN 2, be converted into decimal number after, be designated as PN 10Then:
φ i = 2 π P N 10 16 .
2. (Encode) encrypted in modulation
Come the mark enciphered data with planisphere, data encrypted is selected on the unit circle, selected enciphered data is represented with m.M should satisfy: 0≤m≤3.Then:
SIGNAL = m , ENCODE QPSK = exp [ j · ( 2 π m 4 + φ i ) ] .
3. demodulation deciphering (Decode)
Adopt complex plane, mark constellation point on unit circle.Mark mode is as follows:
CONSTELLATION POINTS QPSK = exp [ j · ( 2 π K 4 + φ i ) ] , ( K = 0,1,2 , 3 ) ;
Will with data point on complex plane the nearest pairing K value of constellation point as decrypted data.
Feature of the present invention also is: it be a kind of adopt 8PSK modulation mode the time become the encryption in physical layer method of MPSK, contain following steps successively:
1. the generation of random PN sequence
4 01 sequences at random.Selected phase deviation φ iValue, its corresponded manner is as follows:
01 sequence binary number representation with 4 is designated as PN 2, be converted into decimal number after, be designated as PN 10Then:
φ i = 2 π P N 10 16 .
2. (Encode) encrypted in modulation
Come the mark enciphered data with planisphere, data encrypted is selected on the unit circle, selected enciphered data is represented with m.M should satisfy: 0≤m≤7.Then:
SIGNAL = m , ENCODE 8 PSK = exp [ j · ( 2 π m 8 + φ i ) ] .
3. demodulation deciphering (Decode)
Adopt complex plane, mark constellation point on unit circle.Mark mode is as follows:
CONSTELLATION POINTS 8 PSK = exp [ j · ( 2 π K 8 + φ i ) ] , ( K = 0,1,2 , · · · , 7 ) ;
Will with data point on complex plane the nearest pairing K value of constellation point as decrypted data.
L-G simulation test proves: on the basis of improving the system safety performance greatly, can improve error rate of system BER performance greatly with the MPSK modulation system of hanging down system.
Description of drawings
Fig. 1 existing based on the time become the theory diagram of the encryption in physical layer/decryption method of MPSK modulation system
Fig. 2 improved based on the time become the theory diagram of the encryption in physical layer/decryption method of MPSK modulation system
The constellation point diagram of Fig. 3 16PSK modulation system
Become the simulation flow of MPSK encryption in physical layer algorithm during Fig. 4
Become the theoretical BER performance curve of MPSK modulation system during Fig. 5
Become the theoretical BER performance curve of MPSK modulation system during Fig. 6
Become the actual emulation BER performance curve of MPSK modulation system during Fig. 7
Become the actual emulation BER performance curve of MPSK modulation system during Fig. 8
Become the theoretical BER performance of MPSK modulation system and the comparison of actual emulation BER performance during Fig. 9
Embodiment
To the time become the improved basic thought of MPSK modulation system encryption in physical layer algorithm and be: system does not adopt random PN sequence to change the value of M, and adopts fixing QPSK or 8PSK modulation mode; But, phase deviation φ iRemain randomly changing and φ in its randomness and the former method iRandomness be suitable.Like this, owing to there be not the existence of 16PSK modulation system in system, the complexity of system and the error rate all reduce greatly; And since the modulation after signal at φ iDo not have statistical law on this parameter, still have suitable confidentiality.Concrete condition, referring to Fig. 2, based on the time become MPSK modulation system encryption in physical layer algorithm improvement be expressed as follows:
(1) generation of random PN sequence
{ 0, the 1} sequence is selected phase deviation φ to PN:4bits at random iValue, its corresponded manner is as follows:
With 4bits { 0, the 1} sequence is regarded a binary number as, is designated as PN 2, be converted into decimal number after, be designated as PN 10Then:
φ i = 2 π P N 10 16 - - - ( 10 )
(2) (Encode) encrypted in modulation
Simplify modulating mode, utilize planisphere to come the mark enciphered data, data encrypted is selected on the unit circle.
For the QPSK modulation system, enciphered data m should correspondingly satisfy: 0≤m≤3 have:
SIGNAL QPSK = m , ENCODE QPSK = exp [ j · ( 2 π m 4 + φ i ) ] - - - ( 11 )
For 8PSK modulation mode, enciphered data m should correspondingly satisfy: 0≤m≤7 have:
S IGNAL 8 PSK = m , ENCODE 8 PSK = exp [ j · ( 2 π m 8 + φ i ) ] - - - ( 12 )
(3) demodulation deciphering (Decode)
Adopt complex plane, mark constellation point on unit circle.Because phase deviation φ iExistence, constellation point can rotate skew.For QPSK, the mark mode of constellation point is as follows:
CONSTELLATION POINTS QPSK = exp [ j · ( 2 π K 4 + φ i ) ] ( K = 0,1,2,3 ) - - - ( 13 )
For 8PSK, the mark mode of constellation point is as follows:
CONSTELLATION POINTS 8 PSK = exp [ j · ( 2 π k 8 + φ i ) ] ( K = 0,1 , · · · , 7 ) - - - ( 14 )
The data and each constellation point that receive are compared, and nearest point is as the value of these data; That is to say, will with data point on complex plane the nearest pairing K value of constellation point as decrypted data.
Compare with existing encryption in physical layer algorithm, the encryption in physical layer algorithm major advantage after the improvement is as follows:
(1) form of signal appearance is identical, and the two has all adopted the planisphere (as shown in Figure 3) of 16PSK modulation system, and user profile contained in the signal is protected.
(2) owing to adopt fixing MPSK modulation system (8PSK or QPSK), so the demodulating process of received signal, just decrypting process is more simple.
(3) owing to adopted than the MPSK modulation system of hanging down system, so the error rate of system reduces greatly.
But, be at random mixing MPSK modulation system because existing encryption in physical layer algorithm adopts, and the algorithm after improving has changed fixing MPSK modulation system into, so on encryption performance, compare slightly loss with original method.
From the bit error rate formula of MPSK modulation system, the bit error rate of mpsk signal depends primarily on M and E b/ N 0Value.Usually, M is big more, and the bit error rate of signal is just high more, and the complexity of simultaneity factor is also just high more, and when M was excessive, system can can't realize because of complexity is too high.Simultaneously, E b/ N 0Big more, the bit error rate of signal is just low more, works as E b/ N 0In the time of fully big, channel trends towards not having the ideal communication channel of noise, and the difference that different M values is brought will be no longer obvious.So for the influence of these two factors for the algorithm availability is discussed, we only consider MPSK modulation system commonly used and E generally b/ N 0Scope is carried out Monte Carlo emulation.
System emulation
By the comparison of Monte Carlo emulation and simulation result, our invention the time become MPSK modulation system encryption in physical layer algorithm and have very strong application potential.In the experiment simulation, we consider AWGN (Additive White Gauss Noise, additive white Gaussian noise) channel, pass through E b/ N 0Value noise energy is controlled; Then noise (NOISE) is superimposed upon above the coded signal (ENCODE) as received signal (RECEIVE), the initial data that obtains sending by deciphering at last.Definition
Figure C0314595000101
Span be 5dB ~ 15dB.The flow process principle of experiment simulation as shown in Figure 4.
About the control of generating noise and noise energy, concrete grammar is expressed as follows:
(1) generating noise
Produce white multiple noise, i.e. n=n 1+ jn 2Note the normalization of mould, promptly noise is zero-mean equally again, and variance is 1 white noise.
So, if n 1, n 2Be zero-mean, variance is 1 white noise, has:
n = 1 2 ( n 1 + j · n 2 ) - - - ( 15 )
(2) to the control of noise energy
According to formula: SNR = log 2 M · E b N 0 = E s E n , And signal energy E s=1.Input
Figure C0314595000104
Then:
E s E n = SNR = log 2 M · 10 ( E b N 0 ) dB 10 - - - ( 16 )
Have:
E n = E s SNR = 1 SNR - - - ( 17 )
(3) in sum: received signal RECEIVE=ENCODE+NOISE
Wherein:
NOISE = n SNR , SNR = log 2 M · 10 ( E b E 0 ) dB 10 , n = 1 2 ( n 1 + j · n 2 ) .
In order to compare, we have listed theoretic mpsk signal BER performance in simulation result.At first, we consider Fig. 5 and Fig. 6, and it has provided 16PSK, and 8PSK and QPSK BER performance in theory relatively.As can be seen, when M reduced, the corresponding error rate also reduced greatly, that is to say, the MPSK modulation system of low system can improve the BER performance of system greatly.For example, when ( E b N 0 ) dB = 7 dB The time, the bit error rate of 16PSK, 8PSK, QPSK is respectively 5.42%, 1.20%, 0.15%.In addition, along with E b/ N 0Increase, the MPSK modulation system of low system trends towards the BER performance of ideal communication channel at faster speed.So, still be high SNR district no matter in low SNR district, the difference of 3 kinds of MPSK modulation systems all is tangible.
Fig. 7 and Fig. 8 are the Monte Carlo simulation results of 200,000 characters on computers, and it has provided MPSK at random, and 8PSK and QPSK BER performance in actual applications relatively.As can be seen, adopt the fixedly MPSK modulation system of hanging down system can improve the BER performance of system greatly.In addition, along with E b/ N 0Increase, the fixedly MPSK modulation system of low system trends towards the BER performance of ideal communication channel at faster speed.So, still be high SNR district no matter in low SNR district, the MPSK modulation system all is tangible with the difference of fixing low system MPSK modulation system at random.
When having provided, Fig. 9 becomes the theoretical BER performance of MPSK modulation system and the comparison of actual emulation BER performance.As can be seen, adopt the BER performance of the BER performance of MPSK modulation system at random and 16PSK modulation system very approaching.Can draw thus, for the time become the BER performance of MPSK modulation system, 16PSK modulation system decisive role.That is to say, because the existence of 16PSK modulation system makes the bit error rate of whole system increase greatly.Therefore, in system, adopt the fixedly MPSK modulation system of low system, can improve the BER performance of whole system widely.In addition, the simulation curve of 8PSK and QPSK and theoretical curve are very identical, have also further confirmed the correctness of simulation result.
PN1 00 01 10 11
M 2 4 8 16
MPSK BPSK QPSK 8PSK 16PSK
The selection corresponding relation of table 1 PN1 random sequence and modulation system

Claims (2)

1, in the WLAN (wireless local area network) based on the time become the encryption in physical layer method of MPSK modulation system, adopt random PN sequence constantly to change phase deviation φ iValue, it is characterized in that: it be a kind of adopt fixing QPSK modulation system the time become the encryption in physical layer method of MPSK, contain following steps successively:
The generation of step 1. random PN sequence
4 01 sequences at random, selected phase deviation φ iValue, its corresponded manner is as follows:
01 sequence binary number representation with 4 is designated as PN 2, be converted into decimal number after, be designated as PN 10, then:
φ i = 2 π P N 10 16 .
Step 2. modulation is encrypted
Come the mark enciphered data with planisphere, data encrypted is selected on the unit circle, selected enciphered data represents that with m m should satisfy: 0≤m≤3, then:
SIGNAL=m, ENCODE QPSK = exp [ j · ( 2 π m 4 + φ i ) ] ·
Step 3. demodulation deciphering
Adopt complex plane, mark constellation point on unit circle, mark mode is as follows:
CONSTELLATIONPOINT S QPSK = exp [ j · ( 2 π K 4 + φ i ) ] , K = 0,1,2,3 ;
Will with data point on complex plane the nearest pairing K value of constellation point as decrypted data.
2, in the WLAN (wireless local area network) based on the time become the encryption in physical layer method of MPSK modulation system, adopt random PN sequence constantly to change phase deviation φ iValue, it is characterized in that: it be a kind of adopt 8PSK modulation mode the time become the encryption in physical layer method of MPSK, contain following steps successively:
The generation of step 1. random PN sequence
4 01 sequences at random, selected phase deviation φ iValue, its corresponded manner is as follows:
01 sequence binary number representation with 4 is designated as PN 2, be converted into decimal number after, be designated as PN 10, then:
φ i = 2 π PN 10 16 .
Step 2. modulation is encrypted
Come the mark enciphered data with planisphere, data encrypted is selected on the unit circle, selected enciphered data represents that with m m should satisfy: 0≤m≤7, then:
SIGNAL=m, ENCODE 8 PSK = exp [ j · ( 2 π m 8 + φ i ) ] ·
Step 3. demodulation deciphering
Adopt complex plane, mark constellation point on unit circle, mark mode is as follows:
CONSTELLATIONPOINTS 8 PSK = exp [ j · ( 2 π K 8 + φ i ) ] , K = 0,1,2 , . . . , 7 ;
Will with data point on complex plane the nearest pairing K value of constellation point as decrypted data.
CN 03145950 2003-07-18 2003-07-18 Physical layer encryption method based on time-varying MPSK modulation in wireless local area network Expired - Fee Related CN1213573C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 03145950 CN1213573C (en) 2003-07-18 2003-07-18 Physical layer encryption method based on time-varying MPSK modulation in wireless local area network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 03145950 CN1213573C (en) 2003-07-18 2003-07-18 Physical layer encryption method based on time-varying MPSK modulation in wireless local area network

Publications (2)

Publication Number Publication Date
CN1477831A CN1477831A (en) 2004-02-25
CN1213573C true CN1213573C (en) 2005-08-03

Family

ID=34155934

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 03145950 Expired - Fee Related CN1213573C (en) 2003-07-18 2003-07-18 Physical layer encryption method based on time-varying MPSK modulation in wireless local area network

Country Status (1)

Country Link
CN (1) CN1213573C (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7564908B2 (en) * 2004-09-23 2009-07-21 Motorola, Inc. Method and apparatus for encryption of over-the-air communications in a wireless communication system
EP1670171A1 (en) * 2004-12-10 2006-06-14 Tata Consultancy Services Limited Method and apparatus for a security system for wireless networks
WO2009137529A2 (en) 2008-05-05 2009-11-12 North Carolina State University Methods, systems, and computer readable media for scrambled communication of data to, from, or over a medium
US9350489B2 (en) 2008-11-17 2016-05-24 Thomson Licensing FEC frame header design for cable television signals
WO2010068270A1 (en) 2008-12-10 2010-06-17 Thomson Licensing Method and apparatus for transmitting and receiving fec frame headers with variable header modulation
CN106452719B (en) * 2016-07-15 2019-07-30 浙江工业大学 Safety communicating method based on the modulation of artificial Rayleigh fading combining adaptive
CN108234062A (en) * 2017-12-19 2018-06-29 中国电子科技集团公司第三十研究所 A kind of safe transmission method based on signal characteristic complication of eating dishes without rice or wine

Also Published As

Publication number Publication date
CN1477831A (en) 2004-02-25

Similar Documents

Publication Publication Date Title
CN1300963C (en) Apparatus and method for transmitting and receiving additional information of partial transmission sequence at orthogonal frequency division multiplexing communication system
CN1134932C (en) Establishment of cryptographic keys in radio networks
US20060133338A1 (en) Method and system for securing wireless communications
CN1969499A (en) Communication system and communication device
Kumar et al. Steg-OFDM blend for highly secure multi-user communication
CN1612519A (en) Method and system for providing communications security
Praveenkumar et al. Phase for face saving-a multicarrier stego
CN1213573C (en) Physical layer encryption method based on time-varying MPSK modulation in wireless local area network
CN101051902A (en) Agent signcryption method and system
US20160366004A1 (en) Modulation method and apparatus for signal transmission and reception in mobile communication system
CN113225174A (en) Quantum noise stream encryption system based on one-dimensional chaotic sequence and encoding and decoding method
CN105846946A (en) Physical layer safety transmission method based on subcarrier index modulation
Ludant et al. SigUnder: A stealthy 5G low power attack and defenses
CN101047402A (en) Expansion latin square family sequence generating method/device and communication control method/system
Huang et al. Reliable and secure constellation shifting aided differential radio frequency watermark design for NB-IoT systems
Raheema et al. Performance Comparison of Hybrid Chaotic Maps Based on Speech Scrambling for OFDM Techniques
Komeylian et al. Deploying an OFDM physical layer security with high rate data for 5G wireless networks
CN1614964A (en) Method for global digital broadcasting based on differential amplitude and phase combining modulation
Deng et al. Security enhancement for OFDM-UWOC system using three-layer chaotic encryption and chaotic DFT precoding
CN1890934A (en) Device and method for correcting a data error in communication path
Tran et al. Performance evaluation of 802.11 ah physical layer phase encryption for IoT applications
US10432356B2 (en) Data transmitting or receiving method and device for dual TBs, transmitter and receiver
CN1949707A (en) Key transmission method and system for multi-stage intelligent key apparatus
Ameen et al. Hyperchaotic based encrypted audio transmission via massive MIMO-GFDM system using DNA coding in the antenna index of PSM
CN101060381A (en) Signal receiving and transmitting method and its device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20050803

Termination date: 20100718