CN106161297A - In ofdm system, anti-pilot tone spoofing attack channel based on independent component analysis is estimated and recognition methods - Google Patents
In ofdm system, anti-pilot tone spoofing attack channel based on independent component analysis is estimated and recognition methods Download PDFInfo
- Publication number
- CN106161297A CN106161297A CN201610459942.5A CN201610459942A CN106161297A CN 106161297 A CN106161297 A CN 106161297A CN 201610459942 A CN201610459942 A CN 201610459942A CN 106161297 A CN106161297 A CN 106161297A
- Authority
- CN
- China
- Prior art keywords
- channel
- receiver
- pilot
- pilot tone
- attack
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 29
- 238000012880 independent component analysis Methods 0.000 title claims abstract description 13
- 239000011159 matrix material Substances 0.000 claims description 12
- 238000004891 communication Methods 0.000 claims description 11
- 239000010977 jade Substances 0.000 claims description 11
- 230000003542 behavioural effect Effects 0.000 claims description 5
- 238000006243 chemical reaction Methods 0.000 claims description 3
- 238000000354 decomposition reaction Methods 0.000 claims description 3
- 230000015572 biosynthetic process Effects 0.000 claims description 2
- 230000007246 mechanism Effects 0.000 description 6
- 238000005516 engineering process Methods 0.000 description 5
- 238000013461 design Methods 0.000 description 4
- 230000002452 interceptive effect Effects 0.000 description 4
- 238000011144 upstream manufacturing Methods 0.000 description 4
- 238000011161 development Methods 0.000 description 3
- 230000008713 feedback mechanism Effects 0.000 description 2
- 230000001174 ascending effect Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000009977 dual effect Effects 0.000 description 1
- 235000013399 edible fruits Nutrition 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000011156 evaluation Methods 0.000 description 1
- 230000036039 immunity Effects 0.000 description 1
- 238000003754 machining Methods 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 230000000630 rising effect Effects 0.000 description 1
- 238000007619 statistical method Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L25/00—Baseband systems
- H04L25/02—Details ; arrangements for supplying electrical power along data transmission lines
- H04L25/0202—Channel estimation
- H04L25/024—Channel estimation channel estimation algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L27/00—Modulated-carrier systems
- H04L27/26—Systems using multi-frequency codes
- H04L27/2601—Multicarrier modulation systems
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Power Engineering (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The present invention provides anti-pilot tone spoofing attack channel based on independent component analysis in a kind of ofdm system to estimate and recognition methods, the characteristic of random pilot is utilized to attack to weaken pilot tone spoofing attack for Pilot Interference, the legitimate channel estimated according to the autonomous behavior of channel simultaneously and identify under Pilot Interference environment between up legal transmitter and receiver.The present invention has only to spend the time resource of 3 OFDM symbol and a number of band resource, and immune to the Pilot Interference power of active listener-in.Up legal transmitter is upset the premeditated pilot tone of actively listener-in and is attacked by sending uplink random pilot tone, simultaneously, receiver is by utilizing the mutual independence between legitimate channel and attack channel, legitimate channel information is extracted from the contaminated signal received, promote the precision of channel estimation of legitimate channel, thus solve the problem that precision of channel estimation that pilot tone spoofing attack causes is low.
Description
Technical field
The invention belongs to wireless communication field, the channel relating to anti-pilot tone spoofing attack in ofdm system is estimated and cognitron
System, specially in ofdm system, anti-pilot tone spoofing attack channel based on independent component analysis is estimated and recognition methods.
Background technology
Along with the fast development of wireless communication technology, security risk the most gradually threatens and governs wireless communication technology
Application and development.The broadcast characteristic of wireless channel so that unwanted signals source eavesdrop the secret of other nodes and private information or
Person endangers the communication link disturbing other normal node.At present, the password encryption deciphering system on upper strata can be to a certain extent
Ensureing the safety of wireless communications environment, but be as the development of computer technology, unwanted signals source often has powerful meter
Calculate, eavesdropping and attacking ability, even can decode the encryption system on upper strata completely, and then cause the information of validated user to be completely exposed
In oneself.Pay close attention to widely to this end, safety of physical layer mechanism causes and study, from initial theory α coefficient performance evaluation to
In recent years towards the safety of physical layer Mechanism Design of practical communication system, safety of physical layer technology is evolving always, but,
Particularly the most little towards the anti-interference Mechanism Design of practical communication system towards the physical layer research of anti-interference attack.OFDM system
System, as the wireless communication system architecture of current main-stream, is widely used in the wireless communication system of each reality.But, due to
Agreement and the relatively-stationary characteristic of framework, assailant often can obtain these information, and then system causes serious threat.
The angle estimated from physical layer channel, when a listener-in learns frame synchronization information and the pilot tone letter of legal transceiver
After number, can start pilot tone spoofing attack, period, this assailant believes by synchronously sending identical pilot tone with a certain validated user
Number, between the pairing of interfering legality transceiver, channel is estimated, thus reduces the security performance of system, promotes security risk.And, lead
Frequently, after spoofing attack once successful implementation, legal transceiver is difficult to obtain accurate legal downlink channel state information again.?
In ofdm system, channel is estimated to need to rely on the definitiveness pilot signal in different sub carrier, and these pilot signals can be hacked
Person is known, and then implements pilot tone spoofing attack.Accordingly, it would be desirable to new channel estimation mechanism and pilot design mechanism are resisted and are cut
The impact that channel is estimated by the pilot tone spoofing attack in weak ofdm system.
Summary of the invention
For problems of the prior art, the present invention provides based on independent component analysis anti-in a kind of ofdm system
Pilot tone spoofing attack channel is estimated and recognition methods, makes full use of the channel between legal transceiver and actively listener-in's extremely reception
The independence of channel between machine, in conjunction with pilot tone feedback mechanism, only need to take the time of 3 OFDM symbol, just can significantly promote
The estimated accuracy of legitimate channel, and the impact of this precision the most under fire jamming power.
The present invention is to be achieved through the following technical solutions:
In ofdm system, anti-pilot tone spoofing attack channel based on independent component analysis is estimated and recognition methods, including as follows
Step,
Step1, regards the pilot signal in ofdm system as linear system, and channel regards the signal source of input system as, turns
Change the reception model of pilot signal;
Step2, random pilot signal launched by the legal transmitter of up-link in an ofdm system, after receiver is based on conversion
The pilot signal received is analyzed by the model that receives of pilot signal, detects two kinds of behavioral pattern of actively listener-in;
Step3, according to the behavioral pattern of the assailant detected, receiver takes corresponding signal analysis strategy to carry out letter
Road is estimated: if be detected that attack, and uses CS-JADE algorithm to carry out channel estimation, otherwise, uses LS algorithm to carry out channel and estimate
Meter;
Step4, after channel is estimated to terminate, the random pilot signal of up legal transmitter feedback channel estimated service life is connect
Receipts machine;Receiver if be detected that pilot tone is attacked, then utilizes in the channel that this random pilot signal estimates from Step3 and identifies
Channel information between the pairing of legal transceiver;If be detected that occur without attacking, according to LS algorithm, receiver directly knows conjunction
Channel information between method transceiver.
Preferably, ofdm system includes a pair legal transceiver and an active listener-in, and two of formation up logical
Letter link is respectively 1. up legal transmitted from transmitter to receiver, is defined as legitimate channel;2. actively listener-in, to receiver, defines
For attack channel;Receiver has NTRoot antenna, up legal transmitter and actively listener-in are single antenna, every uplink
The every antenna on road takies N number of subcarrier in each OFDM symbol simultaneously;Channel coefficients on each subcarrier is obeyed
Average be 0 variance be the independent same distribution of 1, the noise on each subcarrier obey average be 0 variance be the independent same distribution of 1
White Gaussian noise.
Further, Step1 converts the pilot signal reception model obtained as follows,
Wherein,
J, k, t are three OFDM symbol,The signal received for receiver,For pilot signal,For receiver
Receiving terminal noise, H is channel, y(i,j)The signal received at jth time slot for i-th antenna of receiver;dL,(i,j)(n),
dE,(i,j)(n) be respectively up legal transceiver user and actively listener-in in jth OFDM symbol, i-th antenna, n-th
The uplink pilot signal used in sub-carrier channels and between receiver;For receiver at i-th antenna jth time slot
Interior noise;hL,(i,j), hE,(i,j)It is respectively descending legitimate receiver and active listener-in at jth time slot to descending legal
Penetrate the sub-carrier channels of i-th antenna of machine.
Further, the CS-JADE algorithm described in Step3 comprises the steps,
3.1 any 2 the time slot j stored according to receiver, the data that k receivesUse under receiver line
JADE method estimates contaminated channel matrix
3.2 according to Y, calculates weighting matrix W and makes it meet:Estimate weighting matrix S simultaneouslyH;
3.3 calculate weighting matrix G makes it meet
Wherein,dL,j, dL,kObtained by the pilot signal fed back;
3.4 to estimate the uplink sub-carrier channel vector of up legal transmitter as follows:
Wherein: P meets
Preferably, Step2 uses the method based on the noise subspace signal to receivingDetect, to judge
Whether there is active attack, specific as follows,
First, rightCarry out Eigenvalues Decomposition, obtain three eigenvalue σ0≤σ1≤σ2;
Next, if σ1-σ0=0, then do not occur pilot tone to attack, otherwise, there is pilot tone and attack.
Preferably, when in Step4, the random pilot signal of user feedback channel estimated service life is to receiver, according to such as ShiShimonoseki
System carries out the feedback of pilot signal,
θj=θk+θ0=θt+θ1;
Wherein, θj,θk,θtIt is respectively the phase place of random pilot signal corresponding to three OFDM symbol time, and meets fixing
Phase contrast, corresponding phase contrast is respectively θ0,θ1;.
Compared with prior art, the present invention has a following useful technique effect:
The present invention utilizes the characteristic of random pilot to attack to weaken pilot tone spoofing attack for Pilot Interference, simultaneously according to channel
The autonomous behavior legitimate channel estimating and identify under Pilot Interference environment between up legal transmitter and receiver.This
The bright time resource having only to spend 3 OFDM symbol and a number of band resource, and the pilot tone to active listener-in
Jamming power immunity.Up legal transmitter is upset the premeditated pilot tone of actively listener-in and is attacked by sending uplink random pilot tone,
Meanwhile, receiver is by utilizing the mutual independence between legitimate channel and attack channel, from the contaminated signal received
In extract legitimate channel information, promote the precision of channel estimation of legitimate channel, thus solve the letter that pilot tone spoofing attack causes
The problem that road estimated accuracy is low.The present invention uses dual stage process help system to improve the estimation to legitimate channel simultaneously;First
In the stage, random pilot launched by up legal transmitter;Second stage, the pilot tone that the up legal transmitter feedback first stage uses
Signal is to receiver;Receiver, if be detected that pilot tone is attacked, facilitates the channel estimated further by this information from the first stage
In identify legitimate channel information;If occurred without attacking, according to traditional LS algorithm, it is legal that uplink receiver can directly be known
Channel information.
Further, estimate owing to random pilot interfering legality channel may be sent first stage actively listener-in, logical
Cross the signal that receiver receives by method based on noise subspace to detect, to judge whether active attack occurs, as
Fruit detects attack, utilizes the CS-JADE algorithm proposed to carry out channel estimation, otherwise, uses traditional LS algorithm to carry out channel
Estimate;The uplink channel estimation of validated user is as target, by according with three OFDM to improve under pilot tone attack context for the present invention
Statistical Analysis of Signals received on subcarrier in number time, just can recover legal use uplink receiving end is high-precision
The uplink channel information at family.Further, the impact of the precision of channel estimation brought jamming power the most under fire of being suggested plans, from
And the robustness of significantly boosting algorithm.
Accompanying drawing explanation
Fig. 1 is time-frequency structure schematic diagram.
Fig. 2 is the FB(flow block) of method described in present example.
Fig. 3 is the normalized channel mean square error described in present example and legal pilot SNR curve chart.
Fig. 4 is the normalized channel mean square error described in present example and antenna and subcarrier number curve chart.
Fig. 5 is that under the disturbance power described in present example, normalized channel mean square error is believed with legal pilot tone
Make an uproar and compare curve chart.
Detailed description of the invention
Below in conjunction with specific embodiment, the present invention is described in further detail, described in be explanation of the invention and
It not to limit.
Method of the present invention, in system model when setting up, it is considered to a pair legal transceiver and one actively eavesdropping
Person, two uplink communication links, respectively 1. upstream transmitter → receiver, it is defined as legitimate channel 2. actively listener-in → connect
Receipts machine is defined as attack channel.Receiver has NTRoot antenna, upstream transmitter and actively listener-in are single antenna, such as Fig. 1
Shown in, every antenna of every up-link takies N number of subcarrier in each OFDM symbol simultaneously.On each subcarrier
It is 0 that channel coefficients all obeys average, and variance is the independent same distribution of 1, and it is 0 that the noise on each subcarrier obeys average, side
Difference is the independent same distribution white Gaussian noise of 1.If upstream transmitter uses definitiveness pilot tone, when pilot pollution attacks generation,
Actively listener-in can launch identical pilot signal in the pilot point position identical with up legal transmitter, when up legal
When transmitter uses random pilot, actively listener-in may launch random in the pilot point position identical with legal transmitter
Pilot signal carries out channel and estimates interference.Wherein, the signal to noise ratio of pilot signal is respectively,
|dL,(i,j)(n)|2=ρL,|dE,(i,j)(n)|2=ρE,0≤n≤N-1;
In order to prevent pilot pollution, upstream transmitter uses random pilot to carry out channel estimation, and now, actively listener-in can
Take two kinds of behavioral pattern: 1. have to use the channel of random pilot interfering legality channel to estimate, then, pilot tone spoofing attack
The most just it is converted into Pilot Interference to attack;2. keep mourning in silence.So-called actively listener-in is the one legal transceiver of only active interference
The listener-in that channel is estimated.
Fig. 2 gives the system framework figure of described method, comprises the steps:
Step 1, for the problem of channel coherency time resource-constrained, it is proposed that new pilot signal reception model;Pass through
Convert and obtain new pilot signal reception model, uplink receiver is received in the jth OFDM symbol of i-th antenna
Pilot signal:
HL,(i,j)=diag{hL,(i,j)(0),...,hL,(i,j)(N-1)}
HE,(i,j)=diag{hE,(i,j)(0),...,hE,(i,j)(N-1)};
dL,(i,j)=[dL,(i,j)(0),...,dL,(i,j)(N-1)]T
dE,(i,j)=[dE,(i,j)(0),...,dE,(i,j)(N-1)]T
vL,(i,j)=[vL,(i,j)(0),...,vL,(i,j)(N-1)]T;
Wherein, I represents that not receiving pilot tone attacks, and II represents and attacked by pilot tone, hL,(i,j)(n) and dL,(i,j)N () is respectively
In jth OFDM symbol, the n-th uplink sub-carrier channel between up legal transmitter to i-th antenna of receiver and upper
Row pilot signal, hE,(i,j)(n) and dE,(i,j)N () is respectively in jth OFDM symbol, actively listener-in is to i-th sky of receiver
The n-th uplink sub-carrier channel and ascending pilot frequency between line, vL,(i,j)N () is that receiver is in i-th sky of jth OFDM symbol
The noise on the n-th uplink sub-carrier channel on line.
To this end, by making each user identical with all uplink pilot signal on antenna at each subcarrier:
dL,(i,j)(0)=...=dL,(i,j)(N-1)=dL,j
We obtain three OFDM symbol j, pilot signal reception model new in k, t:
Wherein:
hL,(i,j)=[hL,(i,j)(0),...,hL,(i,j)(N-1)]T;hE,(i,j)=[hE,(i,j)(0),...,hE,(i,j)(N-
1)]T;
Unlike prior art, pilot signalBeing considered as linear hybrid system, H is considered as signal
Source.
Based on pilot signal reception model mentioned above, the present invention anti-pilot tone based on independent component analysis spoofing attack
Channel is estimated and recognition methods is divided into two stages: the first stage, up legal transmitter is launched random pilot, now actively stolen
Hearer has two kinds of selections: 1. send random pilot interfering legality channel and estimate, 2. keep mourning in silence, do not send the legal letter of Pilot Interference
Road is estimated;In order to detect the behavior of actively listener-in, uplink receiver uses method based on noise subspace to receiving
Signal detects, to judge whether active attack occurs.If be detected that attack, uplink receiver utilizes CS-JADE algorithm
Carry out channel estimation, otherwise, use traditional LS algorithm to carry out channel estimation;Second stage, up legal transmitter feedback the
The pilot signal that one stage used is to receiver;Receiver if be detected that pilot tone is attacked, convenient by this information further from the
The channel that one stage was estimated identifies legitimate channel information;If occurred without attacking, according to traditional LS algorithm, uplink receiving
Machine can directly know legitimate channel information.It is implemented as follows:
Step2, in order to detect whether pilot tone attack exists, uses the method based on the noise subspace signal to receivingIt is analyzed: first, rightCarry out Eigenvalues Decomposition, obtain three eigenvalue: σ0≤σ1≤σ2;Next, if σ1-σ0
=0, then do not occur pilot tone to attack, otherwise, there is pilot tone and attack.
In order to improve the estimated accuracy of validated user channel, it is proposed that a kind of pilot signal feedback mechanism, this machining function
After pilot tone estimation procedure, specific design mechanism is as follows:
θj=θk+θ0=θt+θ1;
Wherein, θj,θk,θtIt is respectively random pilot signal corresponding to three OFDM symbol time, but meets fixing phase
Potential difference θ0,θ1。
Step3, according to above result, attacks if there is pilot tone, then perform CS-JADE algorithm carry out channel estimate and
Identify, otherwise, directly perform traditional LS channel and estimate;
The CS-JADE algorithm proposed carries out channel estimation and identification, and this algorithm is by means of the pilot signal of feedback so that connect
Receipts machine can online under complete channel estimate and identify, estimate legal sub-carrier channels vectorSpecifically comprise the following steps that
Step3.1: according to any 2 time slot j of receiver storage, the data that k receivesUnder receiver line
JADE method is used to estimate contaminated channel matrix
Step3.2: according to Y, calculates weighting matrix W and makes it meet:Estimate weighting matrix simultaneously
SH;
Step3.3: calculate weighting matrix G and make it meet:Wherein,
dL,j, dL,kCan be obtained by the pilot signal fed back;
Step3.4: estimate the uplink sub-carrier channel vector of up legal transmitter:
Wherein: P meets:
Step4, after estimating to terminate based on channel, the random pilot signal of up legal transmitter feedback channel estimated service life
To receiver, up legal transmitter only need to feed back θj,θk,θtIn some phase information, receiver is according to this phase place
Information and known phase difference θ0,θ1, all pilot signals can be known.
The simulating, verifying of the present invention is expressed as Fig. 3, Fig. 4 and Fig. 5.Fig. 3 illustrates this invention in pilot tone spoofing attack
High-precision can recover legitimate channel under environment, break the precision of channel estimation platform caused that pilot tone is attacked.Fig. 4 represents
The present invention estimate the normalized mean squared error of channel along with antenna number and subcarrier number situation of change, along with antenna number
Or the rising of subcarrier number, the precision of channel estimation of the present invention gradually tends towards stability.Fig. 5 indicates the present invention and leads in difference
Frequently the robustness of the normalized mean squared error performance under the conditions of jamming power, especially, along with active attack person's jamming power
Being gradually increased, the precision of channel estimation of the present invention is little affected by the impact of jamming power.
Claims (6)
- In 1.OFDM system, anti-pilot tone spoofing attack channel based on independent component analysis is estimated and recognition methods, and its feature exists In, comprise the steps,Step1, regards the pilot signal in ofdm system as linear system, and channel regards the signal source of input system as, and conversion is led Frequently the reception model of signal;Step2, random pilot signal launched by the legal transmitter of up-link in an ofdm system, and receiver is based on pilot tone after conversion The pilot signal received is analyzed by the model that receives of signal, detects two kinds of behavioral pattern of actively listener-in;Step3, according to the behavioral pattern of the assailant detected, receiver is taked corresponding signal analysis strategy to carry out channel to estimate Meter: if be detected that attack, uses CS-JADE algorithm to carry out channel estimation, otherwise, uses LS algorithm to carry out channel estimation;Step4, after channel is estimated to terminate, the random pilot signal of up legal transmitter feedback channel estimated service life is given and is received Machine;Receiver if be detected that pilot tone is attacked, then utilizes in the channel that this random pilot signal estimates from Step3 and identifies conjunction Channel information between the pairing of method transceiver;If be detected that occur without attacking, according to LS algorithm, it is legal that receiver is directly known Channel information between transceiver.
- In ofdm system the most according to claim 1 anti-pilot tone spoofing attack channel based on independent component analysis estimate and Recognition methods, it is characterised in that described ofdm system includes a pair legal transceiver and an active listener-in, formation Two uplink communication links are respectively 1. up legal transmitted from transmitter to receiver, are defined as legitimate channel;2. actively listener-in arrives Receiver, is defined as attack channel;Receiver has NTRoot antenna, up legal transmitter and actively listener-in are Dan Tian Line, every antenna of every up-link takies N number of subcarrier in each OFDM symbol simultaneously;Letter on each subcarrier Road coefficient all obey average be 0 variance be the independent same distribution of 1, the noise on each subcarrier obey average be 0 variance be 1 Independent same distribution white Gaussian noise.
- In ofdm system the most according to claim 2 anti-pilot tone spoofing attack channel based on independent component analysis estimate and Recognition methods, it is characterised in that convert the pilot signal reception model obtained in Step1 as follows,Wherein,J, k, t are three OFDM symbol,The signal received for receiver,For pilot signal,Receiving terminal for receiver Noise, H is channel, y(i,j)The signal received at jth time slot for i-th antenna of receiver;dL,(i,j)(n), dE,(i,j)(n) It is respectively up legal transceiver user and active listener-in in jth OFDM symbol, i-th antenna, the n-th sub-carrier channels The uplink pilot signal above and used between receiver;For receiver noise in i-th antenna jth time slot; hL,(i,j), hE,(i,j)It is respectively descending legitimate receiver and active listener-in at the i-th of jth time slot to descending legal transmitter The sub-carrier channels of root antenna.
- In ofdm system the most according to claim 3 anti-pilot tone spoofing attack channel based on independent component analysis estimate and Recognition methods, it is characterised in that the CS-JADE algorithm described in Step3 comprises the steps,3.1 any 2 the time slot j stored according to receiver, the data that k receivesJADE method is used under receiver line Estimate contaminated channel matrix3.2 according to Y, calculates weighting matrix W and makes it meet:Estimate weighting matrix S simultaneouslyH;3.3 calculate weighting matrix G makes it meetWherein,dL,j, dL,kObtained by the pilot signal fed back;3.4 to estimate the uplink sub-carrier channel vector of up legal transmitter as follows:Wherein: P meets
- In ofdm system the most according to claim 1 anti-pilot tone spoofing attack channel based on independent component analysis estimate and Recognition methods, it is characterised in that use the method based on the noise subspace signal to receiving in Step2Detect, It is to judge whether to occur active attack, specific as follows,First, rightCarry out Eigenvalues Decomposition, obtain three eigenvalue σ0≤σ1≤σ2;Next, if σ1-σ0=0, then do not occur pilot tone to attack, otherwise, there is pilot tone and attack.
- In ofdm system the most according to claim 1 anti-pilot tone spoofing attack channel based on independent component analysis estimate and Recognition methods, it is characterised in that when the random pilot signal of user feedback channel estimated service life is to receiver in Step4, according to Following relation carries out the feedback of pilot signal,Wherein, θj,θk,θtIt is respectively the phase place of random pilot signal corresponding to three OFDM symbol time, and meets fixing phase Potential difference, corresponding phase contrast is respectively θ0,θ1。
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610459942.5A CN106161297B (en) | 2016-06-22 | 2016-06-22 | Anti- pilot tone spoofing attack channel estimation and recognition methods in ofdm system based on independent component analysis |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610459942.5A CN106161297B (en) | 2016-06-22 | 2016-06-22 | Anti- pilot tone spoofing attack channel estimation and recognition methods in ofdm system based on independent component analysis |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106161297A true CN106161297A (en) | 2016-11-23 |
CN106161297B CN106161297B (en) | 2019-03-01 |
Family
ID=57353532
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610459942.5A Expired - Fee Related CN106161297B (en) | 2016-06-22 | 2016-06-22 | Anti- pilot tone spoofing attack channel estimation and recognition methods in ofdm system based on independent component analysis |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106161297B (en) |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106789772A (en) * | 2016-12-29 | 2017-05-31 | 深圳天珑无线科技有限公司 | A kind of safety communicating method and device |
CN108540413A (en) * | 2018-03-19 | 2018-09-14 | 北京邮电大学 | A kind of channel direction blind separating method towards pilot tone attack in communication system |
CN108768901A (en) * | 2018-05-30 | 2018-11-06 | 北京邮电大学 | A kind of disabled user emits detection method, system and the device of eavesdropping pilot tone |
CN108847911A (en) * | 2018-06-14 | 2018-11-20 | 西安交通大学 | A kind of OFDM channel training method for authenticating based on independence check code |
CN108881217A (en) * | 2018-06-14 | 2018-11-23 | 西安交通大学 | A kind of safety multi-purpose family pilot tone method for authenticating based on layering two dimensional character coding |
CN109302392A (en) * | 2018-09-28 | 2019-02-01 | 东南大学 | Authentication method based on wireless channel reciprocity and equipment physical fingerprint |
CN109361448A (en) * | 2018-09-30 | 2019-02-19 | 上海无线通信研究中心 | A kind of vacant lot wireless communications method and its system towards Air communication platform |
CN109905203A (en) * | 2019-03-25 | 2019-06-18 | 伍仁勇 | Resist the cooperation vector safe transmission method and system of pilot pollution attack |
CN111614387A (en) * | 2020-05-12 | 2020-09-01 | 西安交通大学 | Safe transmission method in large-scale antenna system |
CN112491826A (en) * | 2020-11-13 | 2021-03-12 | 重庆大学 | PSA detection method based on return mode under large-scale MIMO system |
CN112769858A (en) * | 2021-01-22 | 2021-05-07 | 西安交通大学 | Quantum learning-based secure non-random superposition coding method in wireless communication |
CN113507711A (en) * | 2021-07-30 | 2021-10-15 | 华中科技大学 | Pilot pollution attack detection method under NOMA scene |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2368250A (en) * | 2000-07-03 | 2002-04-24 | Hitachi Int Electric Inc | Ofdm receivers |
CN1972270A (en) * | 2006-10-20 | 2007-05-30 | 北京泰美世纪科技有限公司 | A data transmitting and receiving system and method for distinguishing cell utilizing scrambling code |
CN102047749A (en) * | 2008-05-27 | 2011-05-04 | 日本电气株式会社 | Cognitive wireless system, cognitive wireless device, and wireless signal detection method |
CN102984113A (en) * | 2012-12-03 | 2013-03-20 | 西安交通大学 | Fast time varying channel equalization method of OFDM system based on time varying |
-
2016
- 2016-06-22 CN CN201610459942.5A patent/CN106161297B/en not_active Expired - Fee Related
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2368250A (en) * | 2000-07-03 | 2002-04-24 | Hitachi Int Electric Inc | Ofdm receivers |
CN1972270A (en) * | 2006-10-20 | 2007-05-30 | 北京泰美世纪科技有限公司 | A data transmitting and receiving system and method for distinguishing cell utilizing scrambling code |
CN102047749A (en) * | 2008-05-27 | 2011-05-04 | 日本电气株式会社 | Cognitive wireless system, cognitive wireless device, and wireless signal detection method |
CN102984113A (en) * | 2012-12-03 | 2013-03-20 | 西安交通大学 | Fast time varying channel equalization method of OFDM system based on time varying |
Non-Patent Citations (2)
Title |
---|
何强 等: ""大规模MIMO系统中多小区导频重用"", 《清华大学学报(自然科学版)》 * |
许宏吉: ""基于独立分量分析的多天线空时盲接收方案"", 《通信学报》 * |
Cited By (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106789772A (en) * | 2016-12-29 | 2017-05-31 | 深圳天珑无线科技有限公司 | A kind of safety communicating method and device |
CN108540413A (en) * | 2018-03-19 | 2018-09-14 | 北京邮电大学 | A kind of channel direction blind separating method towards pilot tone attack in communication system |
CN108540413B (en) * | 2018-03-19 | 2019-06-07 | 北京邮电大学 | A kind of channel direction blind separating method towards pilot tone attack in communication system |
CN108768901A (en) * | 2018-05-30 | 2018-11-06 | 北京邮电大学 | A kind of disabled user emits detection method, system and the device of eavesdropping pilot tone |
WO2019237476A1 (en) * | 2018-06-14 | 2019-12-19 | 西安交通大学 | Ofdm channel training authentication method based on independent check coding |
CN108847911A (en) * | 2018-06-14 | 2018-11-20 | 西安交通大学 | A kind of OFDM channel training method for authenticating based on independence check code |
CN108881217A (en) * | 2018-06-14 | 2018-11-23 | 西安交通大学 | A kind of safety multi-purpose family pilot tone method for authenticating based on layering two dimensional character coding |
CN108881217B (en) * | 2018-06-14 | 2020-10-27 | 西安交通大学 | Safe multi-user pilot frequency authentication method based on layered two-dimensional feature coding |
WO2019237475A1 (en) * | 2018-06-14 | 2019-12-19 | 西安交通大学 | Secure multi-user pilot authentication method based on hierarchical two dimensional feature coding |
CN109302392A (en) * | 2018-09-28 | 2019-02-01 | 东南大学 | Authentication method based on wireless channel reciprocity and equipment physical fingerprint |
CN109361448A (en) * | 2018-09-30 | 2019-02-19 | 上海无线通信研究中心 | A kind of vacant lot wireless communications method and its system towards Air communication platform |
CN109905203A (en) * | 2019-03-25 | 2019-06-18 | 伍仁勇 | Resist the cooperation vector safe transmission method and system of pilot pollution attack |
CN111614387A (en) * | 2020-05-12 | 2020-09-01 | 西安交通大学 | Safe transmission method in large-scale antenna system |
CN111614387B (en) * | 2020-05-12 | 2021-06-22 | 西安交通大学 | Safe transmission method in large-scale antenna system |
CN112491826A (en) * | 2020-11-13 | 2021-03-12 | 重庆大学 | PSA detection method based on return mode under large-scale MIMO system |
CN112491826B (en) * | 2020-11-13 | 2022-03-11 | 重庆大学 | PSA detection method based on return mode under large-scale MIMO system |
CN112769858A (en) * | 2021-01-22 | 2021-05-07 | 西安交通大学 | Quantum learning-based secure non-random superposition coding method in wireless communication |
CN112769858B (en) * | 2021-01-22 | 2022-05-20 | 西安交通大学 | Quantum learning-based safe non-random superposition coding method in wireless communication |
CN113507711A (en) * | 2021-07-30 | 2021-10-15 | 华中科技大学 | Pilot pollution attack detection method under NOMA scene |
CN113507711B (en) * | 2021-07-30 | 2022-05-20 | 华中科技大学 | Pilot pollution attack detection method, base station and user equipment in NOMA scene |
Also Published As
Publication number | Publication date |
---|---|
CN106161297B (en) | 2019-03-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106161297A (en) | In ofdm system, anti-pilot tone spoofing attack channel based on independent component analysis is estimated and recognition methods | |
Huang et al. | Combating the control signal spoofing attack in UAV systems | |
CN106130935B (en) | A kind of adaptive anti-pilot tone spoofing attack channel estimation methods based on random BPSK sequence auxiliary | |
EP3267617B1 (en) | Signal sending method and device | |
CN112398556B (en) | Method for detecting pilot interference in intelligent reflector communication system | |
CN110611528A (en) | Satellite security communication robust beam forming method and system based on energy efficiency maximization | |
US20200169883A1 (en) | Security Detection Method for Physical Layer Authentication System | |
CN103795479A (en) | Cooperative spectrum sensing method based on characteristic values | |
CN106059639B (en) | Transmitting antenna number blindness estimation method based on your circle of matrix lid | |
CN105577329A (en) | Physical layer secure transmission method based on spatial modulation | |
CN110381510B (en) | Non-orthogonal multiple access authentication system based on superimposed physical layer authentication label | |
CN106068032A (en) | Power distribution method in collaborative network based on man made noise under the conditions of main channel imperfect channel estimation | |
CN108206795B (en) | Blind authentication method and system of frequency selective fading channel based on confidence transfer | |
CN106571856A (en) | Method for detecting active eavesdropping users in large-scale MIMO system by using random signal method | |
CN110324830B (en) | Non-orthogonal multiple access authentication system based on time division multiplexing physical layer authentication label | |
CN103368700B (en) | The Delay-dependent space-time code mode blind identification of feature based amount pre-estimation | |
CN108847911B (en) | OFDM channel training authentication method based on independence check coding | |
CN110392371B (en) | Optimization method of non-orthogonal multiple access authentication system based on time division multiplexing authentication label | |
CN105743630A (en) | Physical layer parameter separation and individual identification method for single carrier communication system | |
Wang et al. | CovertMIMO: A covert uplink transmission scheme for MIMO systems | |
CN101888262B (en) | High-density differential frequency hopping communication method | |
CN114142909A (en) | Passive radar assisted physical layer security satellite communication method | |
Wang et al. | Time-frequency component-aware convolutional neural network for wireless interference classification | |
CN104618909A (en) | Credibility-based aeronautical radio cooperative spectrum sensing method | |
CN108966223A (en) | Physical layer authentication method and system based on single-bit concealment agreement |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20190301 |