CN106161297A - In ofdm system, anti-pilot tone spoofing attack channel based on independent component analysis is estimated and recognition methods - Google Patents

In ofdm system, anti-pilot tone spoofing attack channel based on independent component analysis is estimated and recognition methods Download PDF

Info

Publication number
CN106161297A
CN106161297A CN201610459942.5A CN201610459942A CN106161297A CN 106161297 A CN106161297 A CN 106161297A CN 201610459942 A CN201610459942 A CN 201610459942A CN 106161297 A CN106161297 A CN 106161297A
Authority
CN
China
Prior art keywords
channel
receiver
pilot
pilot tone
attack
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610459942.5A
Other languages
Chinese (zh)
Other versions
CN106161297B (en
Inventor
任品毅
徐东阳
王熠晨
杜清河
孙黎
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xian Jiaotong University
Original Assignee
Xian Jiaotong University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xian Jiaotong University filed Critical Xian Jiaotong University
Priority to CN201610459942.5A priority Critical patent/CN106161297B/en
Publication of CN106161297A publication Critical patent/CN106161297A/en
Application granted granted Critical
Publication of CN106161297B publication Critical patent/CN106161297B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L25/00Baseband systems
    • H04L25/02Details ; arrangements for supplying electrical power along data transmission lines
    • H04L25/0202Channel estimation
    • H04L25/024Channel estimation channel estimation algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L27/00Modulated-carrier systems
    • H04L27/26Systems using multi-frequency codes
    • H04L27/2601Multicarrier modulation systems

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The present invention provides anti-pilot tone spoofing attack channel based on independent component analysis in a kind of ofdm system to estimate and recognition methods, the characteristic of random pilot is utilized to attack to weaken pilot tone spoofing attack for Pilot Interference, the legitimate channel estimated according to the autonomous behavior of channel simultaneously and identify under Pilot Interference environment between up legal transmitter and receiver.The present invention has only to spend the time resource of 3 OFDM symbol and a number of band resource, and immune to the Pilot Interference power of active listener-in.Up legal transmitter is upset the premeditated pilot tone of actively listener-in and is attacked by sending uplink random pilot tone, simultaneously, receiver is by utilizing the mutual independence between legitimate channel and attack channel, legitimate channel information is extracted from the contaminated signal received, promote the precision of channel estimation of legitimate channel, thus solve the problem that precision of channel estimation that pilot tone spoofing attack causes is low.

Description

In ofdm system anti-pilot tone spoofing attack channel based on independent component analysis estimate and Recognition methods
Technical field
The invention belongs to wireless communication field, the channel relating to anti-pilot tone spoofing attack in ofdm system is estimated and cognitron System, specially in ofdm system, anti-pilot tone spoofing attack channel based on independent component analysis is estimated and recognition methods.
Background technology
Along with the fast development of wireless communication technology, security risk the most gradually threatens and governs wireless communication technology Application and development.The broadcast characteristic of wireless channel so that unwanted signals source eavesdrop the secret of other nodes and private information or Person endangers the communication link disturbing other normal node.At present, the password encryption deciphering system on upper strata can be to a certain extent Ensureing the safety of wireless communications environment, but be as the development of computer technology, unwanted signals source often has powerful meter Calculate, eavesdropping and attacking ability, even can decode the encryption system on upper strata completely, and then cause the information of validated user to be completely exposed In oneself.Pay close attention to widely to this end, safety of physical layer mechanism causes and study, from initial theory α coefficient performance evaluation to In recent years towards the safety of physical layer Mechanism Design of practical communication system, safety of physical layer technology is evolving always, but, Particularly the most little towards the anti-interference Mechanism Design of practical communication system towards the physical layer research of anti-interference attack.OFDM system System, as the wireless communication system architecture of current main-stream, is widely used in the wireless communication system of each reality.But, due to Agreement and the relatively-stationary characteristic of framework, assailant often can obtain these information, and then system causes serious threat.
The angle estimated from physical layer channel, when a listener-in learns frame synchronization information and the pilot tone letter of legal transceiver After number, can start pilot tone spoofing attack, period, this assailant believes by synchronously sending identical pilot tone with a certain validated user Number, between the pairing of interfering legality transceiver, channel is estimated, thus reduces the security performance of system, promotes security risk.And, lead Frequently, after spoofing attack once successful implementation, legal transceiver is difficult to obtain accurate legal downlink channel state information again.? In ofdm system, channel is estimated to need to rely on the definitiveness pilot signal in different sub carrier, and these pilot signals can be hacked Person is known, and then implements pilot tone spoofing attack.Accordingly, it would be desirable to new channel estimation mechanism and pilot design mechanism are resisted and are cut The impact that channel is estimated by the pilot tone spoofing attack in weak ofdm system.
Summary of the invention
For problems of the prior art, the present invention provides based on independent component analysis anti-in a kind of ofdm system Pilot tone spoofing attack channel is estimated and recognition methods, makes full use of the channel between legal transceiver and actively listener-in's extremely reception The independence of channel between machine, in conjunction with pilot tone feedback mechanism, only need to take the time of 3 OFDM symbol, just can significantly promote The estimated accuracy of legitimate channel, and the impact of this precision the most under fire jamming power.
The present invention is to be achieved through the following technical solutions:
In ofdm system, anti-pilot tone spoofing attack channel based on independent component analysis is estimated and recognition methods, including as follows Step,
Step1, regards the pilot signal in ofdm system as linear system, and channel regards the signal source of input system as, turns Change the reception model of pilot signal;
Step2, random pilot signal launched by the legal transmitter of up-link in an ofdm system, after receiver is based on conversion The pilot signal received is analyzed by the model that receives of pilot signal, detects two kinds of behavioral pattern of actively listener-in;
Step3, according to the behavioral pattern of the assailant detected, receiver takes corresponding signal analysis strategy to carry out letter Road is estimated: if be detected that attack, and uses CS-JADE algorithm to carry out channel estimation, otherwise, uses LS algorithm to carry out channel and estimate Meter;
Step4, after channel is estimated to terminate, the random pilot signal of up legal transmitter feedback channel estimated service life is connect Receipts machine;Receiver if be detected that pilot tone is attacked, then utilizes in the channel that this random pilot signal estimates from Step3 and identifies Channel information between the pairing of legal transceiver;If be detected that occur without attacking, according to LS algorithm, receiver directly knows conjunction Channel information between method transceiver.
Preferably, ofdm system includes a pair legal transceiver and an active listener-in, and two of formation up logical Letter link is respectively 1. up legal transmitted from transmitter to receiver, is defined as legitimate channel;2. actively listener-in, to receiver, defines For attack channel;Receiver has NTRoot antenna, up legal transmitter and actively listener-in are single antenna, every uplink The every antenna on road takies N number of subcarrier in each OFDM symbol simultaneously;Channel coefficients on each subcarrier is obeyed Average be 0 variance be the independent same distribution of 1, the noise on each subcarrier obey average be 0 variance be the independent same distribution of 1 White Gaussian noise.
Further, Step1 converts the pilot signal reception model obtained as follows,
Y ~ = D ~ H + V ~ ;
Wherein,
Y ~ = y j T y k T y t T , D ~ = d L , j H d L , k H d L , t H H I d L , j H d L , k H d L , t H d E , j H d E , k H d E , t H H I I , V ~ = v L , ( 1 , j ) T ... v L , ( N T , j ) T v L , ( 1 , k ) T ... v L , ( N T , k ) T v L , ( 1 , t ) T ... v L , ( N T , t ) T ;
y j = [ y ( i , j ) T , ... , y ( N T , j ) T ] T , H = h L , ( 1 , j ) T ... h L , ( N T , j ) T I h L , ( 1 , j ) T ... h L , ( N T , j ) T h E , ( 1 , j ) T ... h E , ( N T , j ) T I I ;
J, k, t are three OFDM symbol,The signal received for receiver,For pilot signal,For receiver Receiving terminal noise, H is channel, y(i,j)The signal received at jth time slot for i-th antenna of receiver;dL,(i,j)(n), dE,(i,j)(n) be respectively up legal transceiver user and actively listener-in in jth OFDM symbol, i-th antenna, n-th The uplink pilot signal used in sub-carrier channels and between receiver;For receiver at i-th antenna jth time slot Interior noise;hL,(i,j), hE,(i,j)It is respectively descending legitimate receiver and active listener-in at jth time slot to descending legal Penetrate the sub-carrier channels of i-th antenna of machine.
Further, the CS-JADE algorithm described in Step3 comprises the steps,
3.1 any 2 the time slot j stored according to receiver, the data that k receivesUse under receiver line JADE method estimates contaminated channel matrix
3.2 according to Y, calculates weighting matrix W and makes it meet:Estimate weighting matrix S simultaneouslyH
3.3 calculate weighting matrix G makes it meet
Wherein,dL,j, dL,kObtained by the pilot signal fed back;
3.4 to estimate the uplink sub-carrier channel vector of up legal transmitter as follows:
h ^ L = P G W Y = PGS o p t H ^ ,
Wherein: P meets
Preferably, Step2 uses the method based on the noise subspace signal to receivingDetect, to judge Whether there is active attack, specific as follows,
First, rightCarry out Eigenvalues Decomposition, obtain three eigenvalue σ0≤σ1≤σ2
Next, if σ10=0, then do not occur pilot tone to attack, otherwise, there is pilot tone and attack.
Preferably, when in Step4, the random pilot signal of user feedback channel estimated service life is to receiver, according to such as ShiShimonoseki System carries out the feedback of pilot signal,
θjk0t1
Wherein, θjktIt is respectively the phase place of random pilot signal corresponding to three OFDM symbol time, and meets fixing Phase contrast, corresponding phase contrast is respectively θ01;.
Compared with prior art, the present invention has a following useful technique effect:
The present invention utilizes the characteristic of random pilot to attack to weaken pilot tone spoofing attack for Pilot Interference, simultaneously according to channel The autonomous behavior legitimate channel estimating and identify under Pilot Interference environment between up legal transmitter and receiver.This The bright time resource having only to spend 3 OFDM symbol and a number of band resource, and the pilot tone to active listener-in Jamming power immunity.Up legal transmitter is upset the premeditated pilot tone of actively listener-in and is attacked by sending uplink random pilot tone, Meanwhile, receiver is by utilizing the mutual independence between legitimate channel and attack channel, from the contaminated signal received In extract legitimate channel information, promote the precision of channel estimation of legitimate channel, thus solve the letter that pilot tone spoofing attack causes The problem that road estimated accuracy is low.The present invention uses dual stage process help system to improve the estimation to legitimate channel simultaneously;First In the stage, random pilot launched by up legal transmitter;Second stage, the pilot tone that the up legal transmitter feedback first stage uses Signal is to receiver;Receiver, if be detected that pilot tone is attacked, facilitates the channel estimated further by this information from the first stage In identify legitimate channel information;If occurred without attacking, according to traditional LS algorithm, it is legal that uplink receiver can directly be known Channel information.
Further, estimate owing to random pilot interfering legality channel may be sent first stage actively listener-in, logical Cross the signal that receiver receives by method based on noise subspace to detect, to judge whether active attack occurs, as Fruit detects attack, utilizes the CS-JADE algorithm proposed to carry out channel estimation, otherwise, uses traditional LS algorithm to carry out channel Estimate;The uplink channel estimation of validated user is as target, by according with three OFDM to improve under pilot tone attack context for the present invention Statistical Analysis of Signals received on subcarrier in number time, just can recover legal use uplink receiving end is high-precision The uplink channel information at family.Further, the impact of the precision of channel estimation brought jamming power the most under fire of being suggested plans, from And the robustness of significantly boosting algorithm.
Accompanying drawing explanation
Fig. 1 is time-frequency structure schematic diagram.
Fig. 2 is the FB(flow block) of method described in present example.
Fig. 3 is the normalized channel mean square error described in present example and legal pilot SNR curve chart.
Fig. 4 is the normalized channel mean square error described in present example and antenna and subcarrier number curve chart.
Fig. 5 is that under the disturbance power described in present example, normalized channel mean square error is believed with legal pilot tone Make an uproar and compare curve chart.
Detailed description of the invention
Below in conjunction with specific embodiment, the present invention is described in further detail, described in be explanation of the invention and It not to limit.
Method of the present invention, in system model when setting up, it is considered to a pair legal transceiver and one actively eavesdropping Person, two uplink communication links, respectively 1. upstream transmitter → receiver, it is defined as legitimate channel 2. actively listener-in → connect Receipts machine is defined as attack channel.Receiver has NTRoot antenna, upstream transmitter and actively listener-in are single antenna, such as Fig. 1 Shown in, every antenna of every up-link takies N number of subcarrier in each OFDM symbol simultaneously.On each subcarrier It is 0 that channel coefficients all obeys average, and variance is the independent same distribution of 1, and it is 0 that the noise on each subcarrier obeys average, side Difference is the independent same distribution white Gaussian noise of 1.If upstream transmitter uses definitiveness pilot tone, when pilot pollution attacks generation, Actively listener-in can launch identical pilot signal in the pilot point position identical with up legal transmitter, when up legal When transmitter uses random pilot, actively listener-in may launch random in the pilot point position identical with legal transmitter Pilot signal carries out channel and estimates interference.Wherein, the signal to noise ratio of pilot signal is respectively,
|dL,(i,j)(n)|2L,|dE,(i,j)(n)|2E,0≤n≤N-1;
In order to prevent pilot pollution, upstream transmitter uses random pilot to carry out channel estimation, and now, actively listener-in can Take two kinds of behavioral pattern: 1. have to use the channel of random pilot interfering legality channel to estimate, then, pilot tone spoofing attack The most just it is converted into Pilot Interference to attack;2. keep mourning in silence.So-called actively listener-in is the one legal transceiver of only active interference The listener-in that channel is estimated.
Fig. 2 gives the system framework figure of described method, comprises the steps:
Step 1, for the problem of channel coherency time resource-constrained, it is proposed that new pilot signal reception model;Pass through Convert and obtain new pilot signal reception model, uplink receiver is received in the jth OFDM symbol of i-th antenna Pilot signal:
y ( i , j ) = H L , ( i , j ) d L , ( i , j ) + v L , ( i , j ) I H L , ( i , j ) d L , ( i , j ) + H E , ( i , j ) d E , ( i , j ) + v L , ( i , j ) I I ;
HL,(i,j)=diag{hL,(i,j)(0),...,hL,(i,j)(N-1)}
HE,(i,j)=diag{hE,(i,j)(0),...,hE,(i,j)(N-1)};
dL,(i,j)=[dL,(i,j)(0),...,dL,(i,j)(N-1)]T
dE,(i,j)=[dE,(i,j)(0),...,dE,(i,j)(N-1)]T
vL,(i,j)=[vL,(i,j)(0),...,vL,(i,j)(N-1)]T
Wherein, I represents that not receiving pilot tone attacks, and II represents and attacked by pilot tone, hL,(i,j)(n) and dL,(i,j)N () is respectively In jth OFDM symbol, the n-th uplink sub-carrier channel between up legal transmitter to i-th antenna of receiver and upper Row pilot signal, hE,(i,j)(n) and dE,(i,j)N () is respectively in jth OFDM symbol, actively listener-in is to i-th sky of receiver The n-th uplink sub-carrier channel and ascending pilot frequency between line, vL,(i,j)N () is that receiver is in i-th sky of jth OFDM symbol The noise on the n-th uplink sub-carrier channel on line.
To this end, by making each user identical with all uplink pilot signal on antenna at each subcarrier:
dL,(i,j)(0)=...=dL,(i,j)(N-1)=dL,j
d E , ( i , j ) ( 0 ) = ... = d E , ( i , j ) ( N - 1 ) = d E , j , ∀ i ∈ { 1 , ... , N T } ;
We obtain three OFDM symbol j, pilot signal reception model new in k, t:
Y ~ = D ~ H + V ~ ;
Wherein:
Y ~ = y j T y k T y t T , D ~ = d L , j H d L , k H d L , t H H I d L , j H d L , k H d L , t H d E , j H d E , k H d E , t H H I I , V ~ = v L , ( 1 , j ) T ... v L , ( N T , j ) T v L , ( 1 , k ) T ... v L , ( N T , k ) T v L , ( 1 , t ) T ... v L , ( N T , t ) T ;
y j = [ y ( i , j ) T , ... , y ( N T , j ) T ] T , H = h L , ( 1 , j ) T ... h L , ( N T , j ) T I h L , ( 1 , j ) T ... h L , ( N T , j ) T h E , ( 1 , j ) T ... h E , ( N T , j ) T I I ;
hL,(i,j)=[hL,(i,j)(0),...,hL,(i,j)(N-1)]T;hE,(i,j)=[hE,(i,j)(0),...,hE,(i,j)(N- 1)]T
Unlike prior art, pilot signalBeing considered as linear hybrid system, H is considered as signal Source.
Based on pilot signal reception model mentioned above, the present invention anti-pilot tone based on independent component analysis spoofing attack Channel is estimated and recognition methods is divided into two stages: the first stage, up legal transmitter is launched random pilot, now actively stolen Hearer has two kinds of selections: 1. send random pilot interfering legality channel and estimate, 2. keep mourning in silence, do not send the legal letter of Pilot Interference Road is estimated;In order to detect the behavior of actively listener-in, uplink receiver uses method based on noise subspace to receiving Signal detects, to judge whether active attack occurs.If be detected that attack, uplink receiver utilizes CS-JADE algorithm Carry out channel estimation, otherwise, use traditional LS algorithm to carry out channel estimation;Second stage, up legal transmitter feedback the The pilot signal that one stage used is to receiver;Receiver if be detected that pilot tone is attacked, convenient by this information further from the The channel that one stage was estimated identifies legitimate channel information;If occurred without attacking, according to traditional LS algorithm, uplink receiving Machine can directly know legitimate channel information.It is implemented as follows:
Step2, in order to detect whether pilot tone attack exists, uses the method based on the noise subspace signal to receivingIt is analyzed: first, rightCarry out Eigenvalues Decomposition, obtain three eigenvalue: σ0≤σ1≤σ2;Next, if σ10 =0, then do not occur pilot tone to attack, otherwise, there is pilot tone and attack.
In order to improve the estimated accuracy of validated user channel, it is proposed that a kind of pilot signal feedback mechanism, this machining function After pilot tone estimation procedure, specific design mechanism is as follows:
θjk0t1
Wherein, θjktIt is respectively random pilot signal corresponding to three OFDM symbol time, but meets fixing phase Potential difference θ01
Step3, according to above result, attacks if there is pilot tone, then perform CS-JADE algorithm carry out channel estimate and Identify, otherwise, directly perform traditional LS channel and estimate;
The CS-JADE algorithm proposed carries out channel estimation and identification, and this algorithm is by means of the pilot signal of feedback so that connect Receipts machine can online under complete channel estimate and identify, estimate legal sub-carrier channels vectorSpecifically comprise the following steps that
Step3.1: according to any 2 time slot j of receiver storage, the data that k receivesUnder receiver line JADE method is used to estimate contaminated channel matrix
Step3.2: according to Y, calculates weighting matrix W and makes it meet:Estimate weighting matrix simultaneously SH
Step3.3: calculate weighting matrix G and make it meet:Wherein, dL,j, dL,kCan be obtained by the pilot signal fed back;
Step3.4: estimate the uplink sub-carrier channel vector of up legal transmitter:
h ^ L = P G W Y = PGS o p t H ^ ,
Wherein: P meets:
Step4, after estimating to terminate based on channel, the random pilot signal of up legal transmitter feedback channel estimated service life To receiver, up legal transmitter only need to feed back θjktIn some phase information, receiver is according to this phase place Information and known phase difference θ01, all pilot signals can be known.
The simulating, verifying of the present invention is expressed as Fig. 3, Fig. 4 and Fig. 5.Fig. 3 illustrates this invention in pilot tone spoofing attack High-precision can recover legitimate channel under environment, break the precision of channel estimation platform caused that pilot tone is attacked.Fig. 4 represents The present invention estimate the normalized mean squared error of channel along with antenna number and subcarrier number situation of change, along with antenna number Or the rising of subcarrier number, the precision of channel estimation of the present invention gradually tends towards stability.Fig. 5 indicates the present invention and leads in difference Frequently the robustness of the normalized mean squared error performance under the conditions of jamming power, especially, along with active attack person's jamming power Being gradually increased, the precision of channel estimation of the present invention is little affected by the impact of jamming power.

Claims (6)

  1. In 1.OFDM system, anti-pilot tone spoofing attack channel based on independent component analysis is estimated and recognition methods, and its feature exists In, comprise the steps,
    Step1, regards the pilot signal in ofdm system as linear system, and channel regards the signal source of input system as, and conversion is led Frequently the reception model of signal;
    Step2, random pilot signal launched by the legal transmitter of up-link in an ofdm system, and receiver is based on pilot tone after conversion The pilot signal received is analyzed by the model that receives of signal, detects two kinds of behavioral pattern of actively listener-in;
    Step3, according to the behavioral pattern of the assailant detected, receiver is taked corresponding signal analysis strategy to carry out channel to estimate Meter: if be detected that attack, uses CS-JADE algorithm to carry out channel estimation, otherwise, uses LS algorithm to carry out channel estimation;
    Step4, after channel is estimated to terminate, the random pilot signal of up legal transmitter feedback channel estimated service life is given and is received Machine;Receiver if be detected that pilot tone is attacked, then utilizes in the channel that this random pilot signal estimates from Step3 and identifies conjunction Channel information between the pairing of method transceiver;If be detected that occur without attacking, according to LS algorithm, it is legal that receiver is directly known Channel information between transceiver.
  2. In ofdm system the most according to claim 1 anti-pilot tone spoofing attack channel based on independent component analysis estimate and Recognition methods, it is characterised in that described ofdm system includes a pair legal transceiver and an active listener-in, formation Two uplink communication links are respectively 1. up legal transmitted from transmitter to receiver, are defined as legitimate channel;2. actively listener-in arrives Receiver, is defined as attack channel;Receiver has NTRoot antenna, up legal transmitter and actively listener-in are Dan Tian Line, every antenna of every up-link takies N number of subcarrier in each OFDM symbol simultaneously;Letter on each subcarrier Road coefficient all obey average be 0 variance be the independent same distribution of 1, the noise on each subcarrier obey average be 0 variance be 1 Independent same distribution white Gaussian noise.
  3. In ofdm system the most according to claim 2 anti-pilot tone spoofing attack channel based on independent component analysis estimate and Recognition methods, it is characterised in that convert the pilot signal reception model obtained in Step1 as follows,
    Y ~ = D ~ H + V ~ ;
    Wherein,
    Y ~ = y j T y k T y t T , D ~ = d L , j H d L , k H d L , t H H I d L , j H d L , k H d L , t H d E , j H d E , k H d E , t H H I I , V ~ = v L , ( 1 , j ) T ... v L , ( N T , j ) T v L , ( 1 , k ) T ... v L , ( N T , k ) T v L , ( 1 , t ) T ... v L , ( N T , t ) T ;
    y j = [ y ( i , j ) T , ... , y ( N T , j ) T ] T , H = h L , ( 1 , j ) T ... h L , ( N T , j ) T I h L , ( 1 , j ) T ... h L , ( N T , j ) T h E , ( 1 , j ) T ... h E , ( N T , j ) T I I ;
    J, k, t are three OFDM symbol,The signal received for receiver,For pilot signal,Receiving terminal for receiver Noise, H is channel, y(i,j)The signal received at jth time slot for i-th antenna of receiver;dL,(i,j)(n), dE,(i,j)(n) It is respectively up legal transceiver user and active listener-in in jth OFDM symbol, i-th antenna, the n-th sub-carrier channels The uplink pilot signal above and used between receiver;For receiver noise in i-th antenna jth time slot; hL,(i,j), hE,(i,j)It is respectively descending legitimate receiver and active listener-in at the i-th of jth time slot to descending legal transmitter The sub-carrier channels of root antenna.
  4. In ofdm system the most according to claim 3 anti-pilot tone spoofing attack channel based on independent component analysis estimate and Recognition methods, it is characterised in that the CS-JADE algorithm described in Step3 comprises the steps,
    3.1 any 2 the time slot j stored according to receiver, the data that k receivesJADE method is used under receiver line Estimate contaminated channel matrix
    3.2 according to Y, calculates weighting matrix W and makes it meet:Estimate weighting matrix S simultaneouslyH
    3.3 calculate weighting matrix G makes it meet
    Wherein,dL,j, dL,kObtained by the pilot signal fed back;
    3.4 to estimate the uplink sub-carrier channel vector of up legal transmitter as follows:
    h ^ L = P G W Y = PGS o p t H ^ ,
    Wherein: P meets
  5. In ofdm system the most according to claim 1 anti-pilot tone spoofing attack channel based on independent component analysis estimate and Recognition methods, it is characterised in that use the method based on the noise subspace signal to receiving in Step2Detect, It is to judge whether to occur active attack, specific as follows,
    First, rightCarry out Eigenvalues Decomposition, obtain three eigenvalue σ0≤σ1≤σ2
    Next, if σ10=0, then do not occur pilot tone to attack, otherwise, there is pilot tone and attack.
  6. In ofdm system the most according to claim 1 anti-pilot tone spoofing attack channel based on independent component analysis estimate and Recognition methods, it is characterised in that when the random pilot signal of user feedback channel estimated service life is to receiver in Step4, according to Following relation carries out the feedback of pilot signal,
    d L , j = e iθ j , d L , k = e iθ k , d L , t = e iθ t , θ j = θ k + θ 0 = θ t + θ 1 ;
    Wherein, θjktIt is respectively the phase place of random pilot signal corresponding to three OFDM symbol time, and meets fixing phase Potential difference, corresponding phase contrast is respectively θ01
CN201610459942.5A 2016-06-22 2016-06-22 Anti- pilot tone spoofing attack channel estimation and recognition methods in ofdm system based on independent component analysis Expired - Fee Related CN106161297B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610459942.5A CN106161297B (en) 2016-06-22 2016-06-22 Anti- pilot tone spoofing attack channel estimation and recognition methods in ofdm system based on independent component analysis

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610459942.5A CN106161297B (en) 2016-06-22 2016-06-22 Anti- pilot tone spoofing attack channel estimation and recognition methods in ofdm system based on independent component analysis

Publications (2)

Publication Number Publication Date
CN106161297A true CN106161297A (en) 2016-11-23
CN106161297B CN106161297B (en) 2019-03-01

Family

ID=57353532

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610459942.5A Expired - Fee Related CN106161297B (en) 2016-06-22 2016-06-22 Anti- pilot tone spoofing attack channel estimation and recognition methods in ofdm system based on independent component analysis

Country Status (1)

Country Link
CN (1) CN106161297B (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106789772A (en) * 2016-12-29 2017-05-31 深圳天珑无线科技有限公司 A kind of safety communicating method and device
CN108540413A (en) * 2018-03-19 2018-09-14 北京邮电大学 A kind of channel direction blind separating method towards pilot tone attack in communication system
CN108768901A (en) * 2018-05-30 2018-11-06 北京邮电大学 A kind of disabled user emits detection method, system and the device of eavesdropping pilot tone
CN108847911A (en) * 2018-06-14 2018-11-20 西安交通大学 A kind of OFDM channel training method for authenticating based on independence check code
CN108881217A (en) * 2018-06-14 2018-11-23 西安交通大学 A kind of safety multi-purpose family pilot tone method for authenticating based on layering two dimensional character coding
CN109302392A (en) * 2018-09-28 2019-02-01 东南大学 Authentication method based on wireless channel reciprocity and equipment physical fingerprint
CN109361448A (en) * 2018-09-30 2019-02-19 上海无线通信研究中心 A kind of vacant lot wireless communications method and its system towards Air communication platform
CN109905203A (en) * 2019-03-25 2019-06-18 伍仁勇 Resist the cooperation vector safe transmission method and system of pilot pollution attack
CN111614387A (en) * 2020-05-12 2020-09-01 西安交通大学 Safe transmission method in large-scale antenna system
CN112491826A (en) * 2020-11-13 2021-03-12 重庆大学 PSA detection method based on return mode under large-scale MIMO system
CN112769858A (en) * 2021-01-22 2021-05-07 西安交通大学 Quantum learning-based secure non-random superposition coding method in wireless communication
CN113507711A (en) * 2021-07-30 2021-10-15 华中科技大学 Pilot pollution attack detection method under NOMA scene

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2368250A (en) * 2000-07-03 2002-04-24 Hitachi Int Electric Inc Ofdm receivers
CN1972270A (en) * 2006-10-20 2007-05-30 北京泰美世纪科技有限公司 A data transmitting and receiving system and method for distinguishing cell utilizing scrambling code
CN102047749A (en) * 2008-05-27 2011-05-04 日本电气株式会社 Cognitive wireless system, cognitive wireless device, and wireless signal detection method
CN102984113A (en) * 2012-12-03 2013-03-20 西安交通大学 Fast time varying channel equalization method of OFDM system based on time varying

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2368250A (en) * 2000-07-03 2002-04-24 Hitachi Int Electric Inc Ofdm receivers
CN1972270A (en) * 2006-10-20 2007-05-30 北京泰美世纪科技有限公司 A data transmitting and receiving system and method for distinguishing cell utilizing scrambling code
CN102047749A (en) * 2008-05-27 2011-05-04 日本电气株式会社 Cognitive wireless system, cognitive wireless device, and wireless signal detection method
CN102984113A (en) * 2012-12-03 2013-03-20 西安交通大学 Fast time varying channel equalization method of OFDM system based on time varying

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
何强 等: ""大规模MIMO系统中多小区导频重用"", 《清华大学学报(自然科学版)》 *
许宏吉: ""基于独立分量分析的多天线空时盲接收方案"", 《通信学报》 *

Cited By (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106789772A (en) * 2016-12-29 2017-05-31 深圳天珑无线科技有限公司 A kind of safety communicating method and device
CN108540413A (en) * 2018-03-19 2018-09-14 北京邮电大学 A kind of channel direction blind separating method towards pilot tone attack in communication system
CN108540413B (en) * 2018-03-19 2019-06-07 北京邮电大学 A kind of channel direction blind separating method towards pilot tone attack in communication system
CN108768901A (en) * 2018-05-30 2018-11-06 北京邮电大学 A kind of disabled user emits detection method, system and the device of eavesdropping pilot tone
WO2019237476A1 (en) * 2018-06-14 2019-12-19 西安交通大学 Ofdm channel training authentication method based on independent check coding
CN108847911A (en) * 2018-06-14 2018-11-20 西安交通大学 A kind of OFDM channel training method for authenticating based on independence check code
CN108881217A (en) * 2018-06-14 2018-11-23 西安交通大学 A kind of safety multi-purpose family pilot tone method for authenticating based on layering two dimensional character coding
CN108881217B (en) * 2018-06-14 2020-10-27 西安交通大学 Safe multi-user pilot frequency authentication method based on layered two-dimensional feature coding
WO2019237475A1 (en) * 2018-06-14 2019-12-19 西安交通大学 Secure multi-user pilot authentication method based on hierarchical two dimensional feature coding
CN109302392A (en) * 2018-09-28 2019-02-01 东南大学 Authentication method based on wireless channel reciprocity and equipment physical fingerprint
CN109361448A (en) * 2018-09-30 2019-02-19 上海无线通信研究中心 A kind of vacant lot wireless communications method and its system towards Air communication platform
CN109905203A (en) * 2019-03-25 2019-06-18 伍仁勇 Resist the cooperation vector safe transmission method and system of pilot pollution attack
CN111614387A (en) * 2020-05-12 2020-09-01 西安交通大学 Safe transmission method in large-scale antenna system
CN111614387B (en) * 2020-05-12 2021-06-22 西安交通大学 Safe transmission method in large-scale antenna system
CN112491826A (en) * 2020-11-13 2021-03-12 重庆大学 PSA detection method based on return mode under large-scale MIMO system
CN112491826B (en) * 2020-11-13 2022-03-11 重庆大学 PSA detection method based on return mode under large-scale MIMO system
CN112769858A (en) * 2021-01-22 2021-05-07 西安交通大学 Quantum learning-based secure non-random superposition coding method in wireless communication
CN112769858B (en) * 2021-01-22 2022-05-20 西安交通大学 Quantum learning-based safe non-random superposition coding method in wireless communication
CN113507711A (en) * 2021-07-30 2021-10-15 华中科技大学 Pilot pollution attack detection method under NOMA scene
CN113507711B (en) * 2021-07-30 2022-05-20 华中科技大学 Pilot pollution attack detection method, base station and user equipment in NOMA scene

Also Published As

Publication number Publication date
CN106161297B (en) 2019-03-01

Similar Documents

Publication Publication Date Title
CN106161297A (en) In ofdm system, anti-pilot tone spoofing attack channel based on independent component analysis is estimated and recognition methods
Huang et al. Combating the control signal spoofing attack in UAV systems
CN106130935B (en) A kind of adaptive anti-pilot tone spoofing attack channel estimation methods based on random BPSK sequence auxiliary
EP3267617B1 (en) Signal sending method and device
CN112398556B (en) Method for detecting pilot interference in intelligent reflector communication system
CN110611528A (en) Satellite security communication robust beam forming method and system based on energy efficiency maximization
US20200169883A1 (en) Security Detection Method for Physical Layer Authentication System
CN103795479A (en) Cooperative spectrum sensing method based on characteristic values
CN106059639B (en) Transmitting antenna number blindness estimation method based on your circle of matrix lid
CN105577329A (en) Physical layer secure transmission method based on spatial modulation
CN110381510B (en) Non-orthogonal multiple access authentication system based on superimposed physical layer authentication label
CN106068032A (en) Power distribution method in collaborative network based on man made noise under the conditions of main channel imperfect channel estimation
CN108206795B (en) Blind authentication method and system of frequency selective fading channel based on confidence transfer
CN106571856A (en) Method for detecting active eavesdropping users in large-scale MIMO system by using random signal method
CN110324830B (en) Non-orthogonal multiple access authentication system based on time division multiplexing physical layer authentication label
CN103368700B (en) The Delay-dependent space-time code mode blind identification of feature based amount pre-estimation
CN108847911B (en) OFDM channel training authentication method based on independence check coding
CN110392371B (en) Optimization method of non-orthogonal multiple access authentication system based on time division multiplexing authentication label
CN105743630A (en) Physical layer parameter separation and individual identification method for single carrier communication system
Wang et al. CovertMIMO: A covert uplink transmission scheme for MIMO systems
CN101888262B (en) High-density differential frequency hopping communication method
CN114142909A (en) Passive radar assisted physical layer security satellite communication method
Wang et al. Time-frequency component-aware convolutional neural network for wireless interference classification
CN104618909A (en) Credibility-based aeronautical radio cooperative spectrum sensing method
CN108966223A (en) Physical layer authentication method and system based on single-bit concealment agreement

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20190301