CN105517008A - Physical layer safety communication method based on weak signal detection - Google Patents

Physical layer safety communication method based on weak signal detection Download PDF

Info

Publication number
CN105517008A
CN105517008A CN201510881695.3A CN201510881695A CN105517008A CN 105517008 A CN105517008 A CN 105517008A CN 201510881695 A CN201510881695 A CN 201510881695A CN 105517008 A CN105517008 A CN 105517008A
Authority
CN
China
Prior art keywords
validated user
receiver
signal
transmitter
information signal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510881695.3A
Other languages
Chinese (zh)
Inventor
陈宏滨
赵峰
李春海
苗彦涛
陈泓渊
常怡亮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guilin University of Electronic Technology
Original Assignee
Guilin University of Electronic Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guilin University of Electronic Technology filed Critical Guilin University of Electronic Technology
Priority to CN201510881695.3A priority Critical patent/CN105517008A/en
Publication of CN105517008A publication Critical patent/CN105517008A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a physical layer safety communication method based on weak signal detection. The method comprises the following steps that a legal user transmitter sends an information signal to a legal user receiver while an interfering transmitter sends an artificial noise signal; and the legal user receiver adopts a chaos-based weak signal detection method to extract the information signal overwhelmed by the nose from a receiving signal according to prior information of the information signal. The method does not change the existing physical layer safety communication method and allows an interference party to send the artificial noise signal at very high power, so that wiretapping of an illegal user is effectively intervened and communication of the legal user is guaranteed to go on wheels; and the method is suitable for a wireless communication system without data encryption.

Description

Based on the safety of physical layer communication means of Detection of Weak Signals
Technical field
The present invention relates to wireless communication technology field, be specifically related to a kind of safety of physical layer communication means based on Detection of Weak Signals.
Background technology
Information security is related to the country's territorial sovereignty and people life property safety, very important effect is played in daily productive life, nowadays the safety of physical layer of radio communication draws attention all the more and pays close attention to, wireless communication media is open, any disabled user may intercept the information of validated user, and then upsets the proper communication of validated user.
Information security was mainly set about from computer network protocol and data encryption in the past, be ravesdropping to prevent information signal, there has been proposed a variety of safety of physical layer traffic model and method, common way is that interference side's artificial noise signal of transmission goes to disturb disabled user to eavesdrop the information of validated user, this way is difficult to the transmitting power determining interference side when realizing, because the position of disabled user's receiver and channel condition information are all unknown, if the transmitting power of interference side is too high, harmful interference will be brought to legal receiver user; If instead the transmitting power of interference side is too low, be just difficult to effectively disturb disabled user to eavesdrop.
Faint information signal, by utilizing the prior information of distinctive signal, can extract, be with a wide range of applications in fields such as biomedicines by Detection of Weak Signals from very noisy signal; Technique of Weak Signal Detection is applied to safety of physical layer communication, validated user receiver can when interference side use very high transmit power information signal is extracted, do not need to suppose the position of disabled user receiver and channel status known.
Summary of the invention
Do not consider the situation of the side's of interference transmitting power impact for existing safety of physical layer communication means, the invention provides a kind of safety of physical layer communication means based on Detection of Weak Signals.The present invention does not change existing safety of physical layer communication mode, interference side is allowed to send artificial noise signal with very high power, thus effectively interference disabled user eavesdropping ensures that again the communication of validated user is carried out smoothly, is applicable to the wireless communication system without data encryption.
Technical solution of the present invention is as follows:
As shown in Figure 1, in safety of physical layer communication system, there is transmitter T and the receiver R of a validated user, also have one to prepare disabled user's receiver E of eavesdropping and the jamming transmitter J of interference disabled user eavesdropping.The transmitter T of validated user sends information signal s (t) to receiver R, and it is received by disabled user's receiver E.In order to prevent this information signal from being intercepted by disabled user, jamming transmitter J sends strong man's work noise signal n (t).It is received by validated user receiver R and disabled user's receiver E simultaneously.Validated user receiver R relies on the prior information of information signal, adopts method for detecting weak signals to be extracted by the information signal flooded by very noisy.Disabled user's receiver E, owing to not having the prior information of information signal, is difficult to information signal to extract from very noisy, thus reaches the object preventing from eavesdropping.
Accompanying drawing explanation
Fig. 1 is safety of physical layer communication system schematic diagram.
Embodiment
In order to understand the present invention better, below by drawings and Examples, the present invention is described in further detail.
As shown in Figure 1, the transmitter T of validated user sends information signal s (t) to receiver R, jamming transmitter J sends strong man's work noise signal n (t) simultaneously, and the Received signal strength of validated user receiver R and disabled user's receiver E is expressed as:
x ( t ) = P T h T R s ( t ) + P J h J R n ( t ) + v ( t ) ;
y ( t ) = P T h T E s ( t ) + P J h J E n ( t ) + w ( t ) ;
Wherein: P tand P jthe transmitting power of validated user transmitter T and jamming transmitter J respectively, P tvery little and P jvery large; h tRit is the channel coefficients of validated user transmitter T to receiver R; h jRthe channel coefficients of jamming transmitter J to validated user receiver R; h tEit is the channel coefficients of validated user transmitter T to disabled user's receiver E; h jEthe channel coefficients of jamming transmitter J to disabled user's receiver E; V (t) and w (t) is average is zero, variance is σ 2additive white Gaussian noise.
Validated user receiver R relies on the prior information of information signal s (t), adopts the method for detecting weak signals based on chaos to be extracted by information signal s (t) flooded by very noisy n (t) from Received signal strength x (t).Information signal s (t) is generally cycle sinusoidal signal, utilize the exquisite sensitivity of chaotic signal to weak periodic signal and the immunity to noise, chaos system is allowed to be in critical chaotic state by the amplitude γ setting chaotic signal, then adding Received signal strength x (t) makes chaos system become periodic state from chaos state, the amplitude ρ resetting chaotic signal allows chaos system again enter critical chaotic state, then the poor γ-ρ of chaotic signal amplitude is exactly the amplitude of s (t).In like manner, first regulate chaos system to enter critical chaotic state, Received signal strength x (t) added the following equation of system: introduce proportion-plus-derivative control item, the frequency of s (t) can be found out by the power spectrum spike of chaos system.
Disabled user's receiver E does not have the prior information of information signal s (t), because the existence of very noisy n (t), be difficult to from Received signal strength y (t), information signal s (t) be extracted, thus eavesdrop less than information.

Claims (3)

1., based on a safety of physical layer communication means for Detection of Weak Signals, described method comprises:
Jamming transmitter at least respectively containing a validated user transmitter, a validated user receiver, disabled user's receiver of a preparation eavesdropping, interference disabled user eavesdropping in communication system;
Validated user transmitter sends an information signal to validated user receiver, and jamming transmitter sends an artificial noise signal simultaneously;
Validated user receiver relies on the prior information of information signal, adopts the method for detecting weak signals based on chaos to be extracted by the information signal flooded by noise from Received signal strength.
2. method according to claim 1, described method also comprises: by setting the amplitude γ of chaotic signal, chaos system is allowed to be in critical chaotic state, then adding Received signal strength makes chaos system become periodic state from chaos state, reset chaotic signal amplitude ρ, allow chaos system again enter critical chaotic state, calculate chaotic signal difference in magnitude γ-ρ, obtain the amplitude of information signal.
3. method according to claim 2, described method also comprises: regulate chaos system to enter critical chaotic state, Received signal strength is added system equation x ( t ) = P T h T R s ( t ) + P J h J R n ( t ) + v ( t ) , Introduce proportion-plus-derivative control item, by the frequency of the power spectrum spike sense information signal of chaos system;
Wherein:
X (t) represents the Received signal strength of validated user receiver;
S (t) represents the information signal that validated user transmitter sends to validated user receiver;
N (t) represents man made noise's signal that jamming transmitter sends;
P tand P jrepresent the transmitting power of validated user transmitter and jamming transmitter respectively, P t﹤ P j;
H tRthe channel coefficients of validated user transmitter to validated user receiver;
H jRthe channel coefficients of jamming transmitter to validated user receiver;
H tEthe channel coefficients of validated user transmitter to disabled user's receiver;
H jEit is the channel coefficients that jamming transmitter arrives disabled user's receiver;
V (t) and w (t) is that average is zero, variance is σ 2additive white Gaussian noise.
CN201510881695.3A 2015-12-06 2015-12-06 Physical layer safety communication method based on weak signal detection Pending CN105517008A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510881695.3A CN105517008A (en) 2015-12-06 2015-12-06 Physical layer safety communication method based on weak signal detection

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510881695.3A CN105517008A (en) 2015-12-06 2015-12-06 Physical layer safety communication method based on weak signal detection

Publications (1)

Publication Number Publication Date
CN105517008A true CN105517008A (en) 2016-04-20

Family

ID=55724571

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510881695.3A Pending CN105517008A (en) 2015-12-06 2015-12-06 Physical layer safety communication method based on weak signal detection

Country Status (1)

Country Link
CN (1) CN105517008A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106571837A (en) * 2016-11-07 2017-04-19 华南理工大学 Jamming transmitter selection method based on jamming intensity in wireless communication system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2011048269A1 (en) * 2009-10-22 2011-04-28 Valtion Teknillinen Tutkimuskeskus Application of weak signal detectors using a nonlinear oscillator for controlling and synchronizing wireless sensors and actuators
CN202903880U (en) * 2012-11-22 2013-04-24 杭州电子科技大学 Weak signal detection circuit based on chaotic oscillator
CN103136443A (en) * 2013-01-27 2013-06-05 长春理工大学 Method for estimating weak signal amplitude under alpha noise background
CN104034362A (en) * 2014-05-20 2014-09-10 广州大学 Cell mapping-based chaotic detection criterion method
CN104833850A (en) * 2015-06-08 2015-08-12 哈尔滨工业大学 Weak signal detection method of weak signal detection device based on Duffing chaotic system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2011048269A1 (en) * 2009-10-22 2011-04-28 Valtion Teknillinen Tutkimuskeskus Application of weak signal detectors using a nonlinear oscillator for controlling and synchronizing wireless sensors and actuators
CN202903880U (en) * 2012-11-22 2013-04-24 杭州电子科技大学 Weak signal detection circuit based on chaotic oscillator
CN103136443A (en) * 2013-01-27 2013-06-05 长春理工大学 Method for estimating weak signal amplitude under alpha noise background
CN104034362A (en) * 2014-05-20 2014-09-10 广州大学 Cell mapping-based chaotic detection criterion method
CN104833850A (en) * 2015-06-08 2015-08-12 哈尔滨工业大学 Weak signal detection method of weak signal detection device based on Duffing chaotic system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
杨鹏等: "人工噪声辅助的保密通信及其窃听算法", 《重庆邮电大学学报(自然科学版)》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106571837A (en) * 2016-11-07 2017-04-19 华南理工大学 Jamming transmitter selection method based on jamming intensity in wireless communication system
CN106571837B (en) * 2016-11-07 2019-01-29 华南理工大学 A kind of jamming transmitter selection method of the wireless communication system based on interference strength

Similar Documents

Publication Publication Date Title
CN108698561B (en) Method for activating at least one safety function of a vehicle safety system
RU2019115832A (en) OPTIMIZED COMBINATION OF PREAMBLE AND DATA FIELDS FOR SENSOR NETWORKS WITH LOW ELECTRICITY CONSUMPTION BASED ON TELEGRAM SEPARATION METHOD
CN106161297B (en) Anti- pilot tone spoofing attack channel estimation and recognition methods in ofdm system based on independent component analysis
US9425905B2 (en) Receiver for body channel communication and a method of operating a receiver therefrom
CN105915472B (en) Power distribution method in collaborative network based on man made noise
WO2004110078A3 (en) Receiver based saturation estimator
CN102972055A (en) Method of securing a wireless communication, receiver device and communication system implementing this method
WO2019084093A3 (en) Fuzzy logic for processing transmission meta data
RU2008139908A (en) METHOD AND DEVICE FOR DETECTING ATTEMPTS TO INTROUGHT TO THE COMMUNICATION CHANNEL BETWEEN THE AIRCRAFT AND THE TERRESTRIAL STATION
CN105577329A (en) Physical layer secure transmission method based on spatial modulation
AU2017243531A1 (en) Device and method in radio communication system, and radio communication system
ATE366942T1 (en) GPS RECEIVER WITH IMPROVED IMMUNITY AGAINST BURST SIGNALS
CN105450327B (en) A kind of wireless take of safety of physical layer can communication means
WO2001054371A3 (en) Method, system for transmitting data from a transmitter to a receiver and transmitter or receiver
PH12018502582A1 (en) Data transmission method, data transmitter, data receiver, and system
MX2018010608A (en) Methods for reducing interference in a wireless communications network.
WO2018169304A3 (en) Door lock device and control method for door lock device
CN104780035B (en) A kind of quantum key distribution system position frame synchornization method
CN105517008A (en) Physical layer safety communication method based on weak signal detection
US7929456B2 (en) Circuit for a communication device and method of controlling a transmission
CN105307185B (en) A kind of gunz cooperation spectrum sensing method based on data purification
WO2019132977A8 (en) Electromagnetic telemetry using active electrodes
CN107222441B (en) Novel differential chaos keying communication method
US9400928B2 (en) Method of compensating for signal degradation in transmission systems
CN104363092A (en) Fixed-range device authentication based on audio physical fingerprints

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20160420

WD01 Invention patent application deemed withdrawn after publication