CN108156102A - The blind authentication method and system of frequency selective fading channels based on smoothing technique - Google Patents

The blind authentication method and system of frequency selective fading channels based on smoothing technique Download PDF

Info

Publication number
CN108156102A
CN108156102A CN201711336107.3A CN201711336107A CN108156102A CN 108156102 A CN108156102 A CN 108156102A CN 201711336107 A CN201711336107 A CN 201711336107A CN 108156102 A CN108156102 A CN 108156102A
Authority
CN
China
Prior art keywords
signal
authentication
blind
pilot
processing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201711336107.3A
Other languages
Chinese (zh)
Other versions
CN108156102B (en
Inventor
谢宁
张莉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen University
Original Assignee
Shenzhen University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen University filed Critical Shenzhen University
Priority to CN201711336107.3A priority Critical patent/CN108156102B/en
Publication of CN108156102A publication Critical patent/CN108156102A/en
Application granted granted Critical
Publication of CN108156102B publication Critical patent/CN108156102B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L25/00Baseband systems
    • H04L25/02Details ; arrangements for supplying electrical power along data transmission lines
    • H04L25/03Shaping networks in transmitter or receiver, e.g. adaptive shaping networks
    • H04L25/03006Arrangements for removing intersymbol interference
    • H04L25/03821Inter-carrier interference cancellation [ICI]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L25/00Baseband systems
    • H04L25/02Details ; arrangements for supplying electrical power along data transmission lines
    • H04L25/0202Channel estimation
    • H04L25/0224Channel estimation using sounding signals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless

Abstract

The present invention discloses a kind of blind authentication method of the frequency selective fading channels based on smoothing technique, it is included to the frequency selective fading channels launching carrier signal with multiple paths, carrier signal includes authentication signal, pilot signal and information signal, and authentication signal is added to pilot signal;Received vector signal, blind known disturbances elimination (BKIC) processing is sequentially carried out to the carrier signal in each path and obtains echo signal, differential signal processing is carried out to echo signal to obtain target authentication signal, BKIC processing utilizes adjacent symbol, and pilot signal is eliminated by smoothing technique;Reference signal is obtained based on key and pilot signal, differential signal processing is carried out to reference signal and refers to authentication signal to obtain, and calculates target authentication signal and the correlation with reference to authentication signal, obtains test statistics;And test statistics and defined threshold are compared, so that it is determined that whether carrier signal can pass through certification.

Description

The blind authentication method and system of frequency selective fading channels based on smoothing technique
Technical field
The present invention relates to wireless communication technology fields, and in particular to a kind of frequency selective fading letter based on smoothing technique The blind authentication method and system in road.
Background technology
There are mainly three types of current physical layer authentication techniques, the first authentication techniques is spread spectrum (Auth-SS), basic to think Think it is to use traditional Direct Sequence Spread Spectrum or frequency modulation technology, since different pulses employs different frequencies, this Kind technology realizes that certification needs to sacrifice certain bandwidth.In addition, a crucial limitation of Auth-SS technologies is only to allow to understand The user of spread spectrum correlation priori participates in communication.Therefore the scope of application of this technology is narrow.
Second is based on time division multiplexing authentication techniques (Auth-TDM), and basic thought is that transmitting terminal periodically replaces Send information signal and authentication signal.Receiving terminal directly extracts the certification that desired authentication information realizes signal after receiving signal Purpose.Auth-TDM be Development of Wireless Communications early stage propose authentication techniques, it the advantages of be it is easy to operate, emit signal before It does not need to pre-process authentication signal and information and (may be encrypted for security consideration).Authentication signal is independently of Information signal send, it is therefore desirable to occupy certain bandwidth, with wireless messages quantity be continuously increased and user is to information The continuous enhancing further improved with adverse party attack technology of privacy, the safety of this authentication techniques are greatly chosen War, can not meet the needs of users.
The third authentication techniques is certification superimposing technique (Auth-SUP), and basic thought is that authentication signal is superimposed upon information On signal (mode of superposition can be arbitrary, is determined by key), then launched simultaneously by transmitting terminal, receiving terminal receives signal It is extracted later using the authentication signal in key pair superposed signal, achievees the purpose that signal authentication.
Compared with the Auth-TDM technologies of early stage, Auth-SUP authentication techniques are needed before signal transmitting to authentication signal and letter Information signal is handled, and certain requirement is proposed to the signal handling capacity of transmitting terminal, is implemented than Auth-TDM technology More complex, authentication signal and information signal are sent simultaneously, therefore will not occupy additional bandwidth.At this point, due to will Authentication signal is superimposed upon in information signal, and receiving terminal needs to extract information after receiving signal, and signal processing difficulty will It is higher than Auth-TDM technology, but the concealment of authentication information is compared with Auth-TDM high.Further, since authentication signal is for information signal Extraction for be equivalent to the effect for playing noise so that the SNR of receiving terminal is accordingly reduced, and the extraction of information signal is brought Adverse effect.
Existing Auth-TDM and Auth-SUP authentication techniques also transmit another in addition to transmitting information signal and authentication signal One pilot signal.This is because, both authentication techniques are required for receiving terminal to be carried out after receiving signal to channel parameter Estimate and carry out symbol recovery, authentication signal could be extracted later, the signal handling capacity of receiving terminal is also carried at this time Certain requirement is gone out, in some specific occasions, these signal processing technologies are possible and infeasible, and estimate to channel parameter Estimation error is easily caused during meter and symbol recovery, adverse effect will be brought to the extraction of final authentication signal.
In addition, Auth-TDM, Auth-SS and Auth-SUP be comprising the fact that authentication information being exposed, Middle Auth-SS and Auth-TDM technologies easily cause other users in scene compared to the normal signal not comprising authentication information Especially hostile user's note that hostile user analyzes signal, palms off or distorts, legitimate receipt end will be unable to the phase Signal is hoped to be authenticated.In contrast, the concealment of Auth-SUP authentication techniques will be apparently higher than Auth-SS and Auth-TDM. However, this superiority be the computing capability based on hostile user have certain restrictions under the premise of, once hostile user count Calculation ability improves, and is likely to extraction and even destroys authentication information.
Have to be mentioned that, under existing Auth-SS technologies and Auth-SUP technology frequency selective fading channels scenes Performance degradation obtains terribly.And reality is, with being continuously increased for wireless communication user quantity, communication environment can also answer further Miscellaneous, disturbed possibility is increasing, and with the increase of urban district communication user number and the continuous development in city, when simple Constant fading channel or simple time-varying fading channels have been not enough to portray current communication environment.Especially because urban architecture The blocking of object so that multipath fading becomes normality, therefore has to take into account that based on the channel radio under frequency selective fading channels Believe physical layer authentication techniques, to improve the safety of wireless communication, meet the communications security requirement of user.
Invention content
The present invention is proposed in view of above-mentioned situation, does not need to occupy additional letter its purpose is to provide a kind of Number bandwidth and authentication signal does not become the noise for influencing that information signal extracts in carrier signal, does not influence the system of receiving terminal noise Count the blind authentication method and system of the frequency selective fading channels based on smoothing technique of characteristic.
Recognize for this purpose, the first aspect of the present invention provides a kind of the blind of the frequency selective fading channels based on smoothing technique Card method, is the physical layer authentication method of the wireless communication of the wireless communication system with transmitting terminal and receiving terminal, and feature exists In, including:The transmitting terminal to wireless channel launching carrier signal, the carrier signal include authentication signal, pilot signal and Information signal, the authentication signal are added to the pilot signal, and the wireless channel is that the frequency with multiple paths selects Property fading channel;The receiving terminal receives the carrier signal, sequentially to each road of the frequency selective fading channels The carrier signal in diameter carries out blind known disturbances elimination (Blind Known Interference Cancellation, letter Claim BKIC) processing obtain echo signal, to the echo signal carry out differential signal processing to obtain target authentication signal, in institute It states in BKIC processing, using adjacent symbol, the pilot signal is eliminated by smoothing technique;In the receiving terminal, it is based on Key and the pilot signal are obtained with reference to authentication signal, and calculate the target authentication signal and described with reference to authentication signal Correlation obtains test statistics;And whether the test statistics is judged not less than defined threshold, so that it is determined that the load Whether body signal can pass through certification.
In the present invention, the authentication signal is added to the pilot signal.Thus, it is possible to the letter for not influencing receiving terminal is done It makes an uproar ratio.The BKIC processing utilizes adjacent symbol, and the pilot signal is eliminated by smoothing technique.In this case, energy Enough in the case where avoiding estimation channel situation, pilot signal is eliminated.
In the blind authentication method involved by first aspect present invention, carrier signal piecemeal in the form of data block is sent out It penetrates.It is convenient for operating data as a result,.
In the blind authentication method involved by first aspect present invention, in every piece of carrier signal, the pilot tone letter Number signal length and described information signal signal length and the signal length equal to the carrier signal.
In addition, in the blind authentication method involved by first aspect present invention, using Hash matrix, based on the key and The pilot signal obtains the reference signal.Reference signal is obtained by processing with reference to authentication signal as a result, can be according to ginseng The correlation of authentication signal and target authentication signal is examined, determines whether target authentication signal passes through certification.
In the blind authentication method involved by first aspect present invention, if the test statistics is not less than the regulation threshold Value, then the carrier signal passes through certification.
In the blind authentication method involved by first aspect present invention, system of the defined threshold based on the pilot signal Meter characteristic and the preset false-alarm probability upper limit obtain.
The second aspect of the present invention provides a kind of blind certification of the frequency selective fading channels based on smoothing technique and sets It is standby, including processor, the computer program of the memory storage is performed to realize physical layer described in any one of the above embodiments Blind authentication method;And memory.
The third aspect of the present invention provides a kind of computer readable storage medium.The computer readable storage medium is deposited At least one instruction is contained, at least one instruction realizes that above-mentioned first aspect any one of them is blind when being executed by processor Authentication method.
The fourth aspect of the present invention provides a kind of blind certification system of frequency selective fading channels based on smoothing technique System, including emitter, to wireless channel launching carrier signal, the carrier signal includes authentication signal, pilot signal And information signal, the authentication signal are added to the pilot signal, the wireless channel is that the frequency with multiple paths is selected Selecting property fading channel;Reception device includes first processing module, Second processing module and determination module, the first processing module The carrier signal is received, sequentially the carrier signal in each path of the frequency selective fading channels is carried out Blind known disturbances eliminate (BKIC) processing and obtain echo signal, and differential signal processing is carried out to the echo signal to obtain target In BKIC processing, using adjacent symbol, the pilot signal is eliminated by smoothing technique for authentication signal;At second Manage module, reference signal obtained based on key and the pilot signal, the reference signal is carried out differential signal processing with It obtains with reference to authentication signal, and calculates the target authentication signal and by the described with reference to authentication signal of differential signal processing Correlation obtains test statistics;And determination module, the test statistics is compared with defined threshold, so as to Determine whether the carrier signal can pass through certification.
In the present invention, authentication signal is added to pilot signal by the emitter of blind Verification System.Thereby, it is possible to not account for With additional transmitted bandwidth resource.The reception device BKIC processing of blind Verification System utilizes adjacent symbol, is disappeared by smoothing technique Except the pilot signal.In this case, reception device can eliminate pilot signal in the case where avoiding estimation channel situation.
In the blind Verification System involved by fourth aspect present invention, the Second processing module utilizes Hash matrix, base The reference signal is obtained in the key and the pilot signal.Reference signal obtains believing with reference to certification by processing as a result, Number, it can determine whether target authentication signal passes through certification according to the correlation with reference to authentication signal and target authentication signal.
In the blind Verification System involved by fourth aspect present invention, defined threshold described in the determination module is based on institute The statistical property and the preset false-alarm probability upper limit for stating pilot signal obtain.
Compared with prior art, embodiment of the present invention has following advantageous effect:
Compared with existing Auth-SS, Auth-SUP, Auth-TDM, the present invention realizes recognizing for the physical layer of wireless communication Card does not need to occupy additional signal bandwidth, and authentication signal does not become the noise for influencing to receive signal extraction, do not influence receiving terminal The statistical property of noise.Blind authentication techniques processing proposed by the present invention is frequency selective fading channels, is adaptive to reality Wireless communications environment complicated and changeable in the communication scenes of border.Further, since in the present invention, authentication signal is to be superimposed upon pilot signal In, if by the entirety of the signal after authentication signal and pilot superimposition as pilot signal, for carrying out channel estimation, moreover it is possible to Improve the accuracy of channel estimation.
Description of the drawings
Fig. 1 is the signal transmission schematic diagram for showing the blind authentication method of physical layer involved by embodiments of the present invention.
Fig. 2 is the blind authentication method flow diagram of physical layer shown involved by embodiments of the present invention.
Fig. 3 is the knot for showing the blind authentication method transmitting terminal transmitting signal of physical layer involved by embodiments of the present invention Structure schematic diagram.
Fig. 4 is to show that the blind blind known disturbances of authentication method receiving terminal of physical layer involved by embodiments of the present invention disappear Except (BKIC) process flow schematic diagram.
Fig. 5 is the blind Verification System transmitting terminal signal processing module of physical layer shown involved by embodiments of the present invention Schematic diagram.
Fig. 6 is the blind Verification System receiving end signal processing module of physical layer shown involved by embodiments of the present invention Schematic diagram.
Fig. 7 is the structure diagram for showing the blind authenticating device of a kind of physical layer involved by embodiments of the present invention.
Specific embodiment
Hereinafter, refer to the attached drawing, explains the preferred embodiment of the present invention in detail.In the following description, for identical Component assign identical symbol, the repetitive description thereof will be omitted.Scheme in addition, attached drawing is only schematical, the mutual ruler of component Very little ratio or the shape of component etc. can be with practical differences.
It should be noted that term " first " in description and claims of this specification and above-mentioned attached drawing, " Two ", " third " and " the 4th " etc. are for distinguishing different objects rather than for describing particular order.In addition, term " comprising " " having " and their any deformations, it is intended that cover non-exclusive include.Such as contain series of steps or unit Process, method, system, product or equipment the step of being not limited to list or unit, but optionally further including does not have The step of listing or unit are optionally further included for the intrinsic other steps of these processes, method, product or equipment or list Member.
Present embodiment discloses a kind of blind authentication method, the equipment of the frequency selective fading channels based on smoothing technique And system, it is the physical layer authentication method of the wireless communication of the wireless communication system with transmitting terminal and receiving terminal, equipment and is System.Namely to disclose a kind of physical layer of the wireless communication frequency Selective Fading Channel based on smoothing technique blind for present embodiment Authentication method, equipment and system.It can be more accurately to carrying out physical layer certification.It is retouched in detail below in conjunction with attached drawing It states.
Fig. 1 is the signal transmission schematic diagram for showing the blind authentication method of physical layer involved by embodiments of the present invention.
In the present embodiment, as shown in Figure 1, the object of the wireless communication frequency Selective Fading Channel based on smoothing technique The blind authentication method of layer is managed based on a general signal transmission model.In this signal transmission model, altogether comprising 4 users, Wherein sender's (transmitting terminal) is legitimate sender, and transmitting terminal transmits signals to legitimate receipt side, i.e. receiving terminal, other two connects Debit is respectively monitoring users and hostile user in system.Hostile user recognizes once may have in the signal that discovery transmitting terminal is sent out Information is demonstrate,proved, which will be analyzed and be attempted to extract, destroy, even distort authentication information.But present embodiment is not limited to This, transmitting terminal can be two or more, and legitimate receipt side can be two or more, monitoring users and hostile use Family can also be two or more respectively.
In the present embodiment, it is assumed that transmitting terminal and receiving terminal co-own the key for certification so that receiving terminal can To extract authentication information from the signal that transmitting terminal emits using the key.Authentication signal includes authentication information.In this implementation In mode, carrier signal includes authentication signal, and normal signal does not include authentication signal.Monitoring users are for authentication method one without institute Know, although can receive and restore the signal of transmitting terminal transmission, deep analysis will not be carried out to signal, does not influence certification Process.The characteristics of hostile user passes through signal Analysis can perceive the presence of authentication signal, and be intended to destroy authentication signal.
In the present embodiment, the transmitting terminal in above-mentioned signal model can include base station or user equipment.Base station (example Such as access point) can refer to the accession in net in the air on interface by one or more sectors and the equipment of wireless terminal communications. Base station can be used for by the air frame received and IP grouping is mutually converted, as wireless terminal with access net rest part it Between router, wherein, accessing the rest part of net may include Internet protocol (IP) network.Base station can also coordinate to connecing in the air The attribute management of mouth.For example, base station can be the base station (BTS, Base Transceiver Station) in GSM or CDMA, Can also be the base station (NodeB) in WCDMA, can also be in LTE evolved base station (NodeB or eNB or e-NodeB, Evolutional Node B), present embodiment does not limit.
User equipment can include but is not limited to smart mobile phone, laptop, personal computer (Personal Computer, PC), personal digital assistant (Personal Digital Assistant, PDA), mobile internet device (Mobile Internet Device, MID), wearable device (such as smartwatch, Intelligent bracelet, intelligent glasses) each electron-like Equipment, wherein, the operating system of the user equipment may include but be not limited to Android operation system, IOS operating system, Symbian (Saipan) operating system, Black Berry (blackberry, blueberry) operating system, Windows Phone8 operating systems etc., this Embodiment does not limit.
In the present embodiment, the transmitting terminal in above-mentioned signal model sends signal and reaches reception by wireless channel End, wherein, receiving terminal can include base station.Base station (such as access point) can be referred to the accession in net in the air on interface by one A or multiple sectors and the equipment of wireless terminal communications.Base station can be used for mutually being turned the air frame received and IP groupings Change, as wireless terminal and access net rest part between router, wherein, access the rest part of net may include it is internet Agreement (IP) network.Base station can also coordinate the attribute management to air interface.For example, base station can be in GSM or CDMA Base station (NodeB) in base station (BTS, Base Transceiver Station) or WCDMA, can also be in LTE Evolved base station (NodeB or eNB or e-NodeB, evolutional Node B), present embodiment does not limit.
Receiving terminal can also include user equipment, user equipment can include but is not limited to smart mobile phone, laptop, Personal computer (Personal Computer, PC), personal digital assistant (Personal Digital Assistant, PDA), mobile internet device (Mobile Internet Device, MID), wearable device (such as smartwatch, Intelligent bracelet, Intelligent glasses) etc. each class of electronic devices, wherein, the operating system of the user equipment may include but be not limited to Android operations system System, IOS operating system, Symbian (Saipan) operating system, Black Berry (blackberry, blueberry) operating system, Windows Phone8 Operating system etc., present embodiment do not limit.
It is blind that present embodiment discloses a kind of physical layer of the wireless communication frequency Selective Fading Channel based on smoothing technique Authentication method.Fig. 2 is the blind authentication method flow diagram of physical layer shown involved by embodiments of the present invention.Fig. 3 is Show the structure diagram of the blind authentication method transmitting terminal transmitting signal of physical layer involved by embodiments of the present invention.
In the present embodiment, the blind certification of physical layer of the wireless communication frequency Selective Fading Channel based on smoothing technique Method is the physical layer authentication method of the wireless communication of the wireless communication system with transmitting terminal and receiving terminal.Based on above-mentioned letter Number mode, as shown in Fig. 2, transmitting terminal is to wireless channel launching carrier signal.Carrier signal includes authentication signal, pilot tone is believed Number and information signal.Authentication signal is added to pilot signal.Wireless channel is that the frequency selective fading with multiple paths is believed Road (step S101).
In step S101, as shown in figure 3, carrier signal includes authentication signal, pilot signal and information signal, certification letter It number is added in pilot signal.The signal length of authentication signal is equal to the signal length of pilot signal.Authentication signal is superimposed as a result, It can be to avoid the additional signal bandwidth of occupancy to pilot signal.
In the present embodiment, information signal includes the transmitting information to be transmitted of end subscriber.The carrier that transmitting terminal is sent Signal is that piecemeal emits in the form of data block.Every piece of carrier signal includes pilot portion and message part.Pilot portion packet Authentication signal and pilot signal are included, message part includes information signal.In addition, carrier signal piecemeal in the form of data block is sent out It penetrates, is conducive to operate data.
In the present embodiment, the signal length of authentication signal or pilot signal is the first length, the signal of information signal Length is the second length, and the length of every piece of carrier signal is total length.The signal length and information of authentication signal or pilot signal The signal length of signal and the length equal to every piece of carrier signal.That is the first length and the second length and equal to total length.
In the present embodiment, authentication signal is obtained by pilot signal and key.Namely pilot signal and key Authentication signal has been obtained using Hash matrix.Obtained authentication signal is added in pilot signal, has obtained every piece of carrier letter Number pilot portion, the signal expression of pilot portion is as follows:
mispitti (1)
In the signal expression (1) of above-mentioned pilot portion,WithFor the power distribution of pilot frequency information and authentication signal because Son.Assuming that authentication signal and pilot signal are independent from each other, then have
In the present embodiment, the information signal of the signal of pilot portion and message part is combined, constituted Every piece of carrier signal.
In addition, in the present embodiment, the transmission channel of carrier signal is wireless channel, and is frequency selective fading Channel.Frequency selective fading channels have multiple paths, i.e. frequency selective fading channels are multi-path channels.Through overfrequency Carrier signal expression is as follows after Selective Fading Channel:
yiL+k=hiL+kxiL+k+niL+k (2)
In the present embodiment, the channel response h of frequency selective fading channelsiL+k, obeying 0 mean variance isAnswer Gaussian Profile,For the noise of receiving terminal, obeying 0 mean variance isGaussian random variable.
In the present embodiment, in channel response,For dynamic noise, and Under normal circumstances, the decline related coefficient a of frequency selective fading channels, is determined by channel Doppler spread and transmitted bandwidth It is fixed.Particularly, rapid fading is represented when a values are smaller, a values represent slow fading when larger.In the scene of many types, the value of a exists Receiving terminal can obtain.And in practical wireless systems scene, the value range of a is in a very small section, such as a ∈ [0.9,1].
In the present embodiment, the blind authentication method of physical layer further includes receiving terminal received vector signal, sequentially to frequency Carrier signal in each path of Selective Fading Channel carries out blind known disturbances elimination (BKIC) processing and obtains echo signal. In BKIC processing, using adjacent symbol, pilot signal (step S102) is eliminated by smoothing technique.
In the present embodiment, receiving terminal received vector signal.Pilot portion and message part are included in carrier signal.This The blind authentication method of physical layer involved by embodiment is handled in receiving terminal primarily directed to the pilot portion of carrier signal. The expression formula of the pilot portion for the carrier signal that receiving terminal receives is as follows:
In the present embodiment, wireless channel is frequency selective fading channels.Frequency selective fading channels have more A path.Wherein, DmaxFor delayed data maximum in multipath, in a broadband wireless communication system usually DmaxAll it is known. For example, in Orthogonal Frequency Division Multiplexing (OFDM) system, predefined cyclic prefix determines delay maximum in all paths.
In the present embodiment, following processing for carrier signal refer to the place of the pilot portion for carrier signal Reason.
In the present embodiment, to using blind authentication techniques on each potential path of frequency selective fading channels. Specifically, disappear it is possible, firstly, to carry out blind known disturbances to the carrier signal in the first path of frequency selective fading channels Except (BKIC) processing, then, similar (BKIC) processing method that can be eliminated with identical blind known disturbances removes frequency selection Property fading channel the second path in carrier signal in pilot signal, repeat Dmax+ 1 time above-mentioned blind known disturbances are eliminated (BKIC) processing procedure so that the pilot signal in the carrier signal in each path of frequency selective fading channels is by sequence It eliminates on ground.Namely blind known disturbances elimination sequentially is carried out to the carrier signal in each path of frequency selective fading channels (BKIC) it handles.
In step S102, receiving terminal received vector signal, sequentially in each path of frequency selective fading channels Carrier signal carry out the processing of blind known disturbances elimination (BKIC) and obtain echo signal.Wherein, blind known disturbances eliminate (BKIC) Processing is using adjacent symbol, and the pilot signal in carrier signal is eliminated by smoothing technique.It usually will be in carrier signal Pilot signal eliminates the need for estimation channel situation, if channel response cannot effectively be estimated, the pilot signal in carrier signal It is difficult to eliminate.Blind known disturbances removing method can eliminate pilot signal in the case where avoiding estimation channel situation.
In the present embodiment, the carrier signal that receiving terminal receives may include authentication signal, it is also possible to not comprising recognizing Demonstrate,prove signal.If it is first condition that carrier signal, which includes authentication information, if it is second condition that carrier signal, which does not include authentication signal,.
Fig. 4 is to show that the blind blind known disturbances of authentication method receiving terminal of physical layer involved by embodiments of the present invention disappear Except (BKIC) process flow schematic diagram.
In the present embodiment, as shown in figure 4, on each path of frequency selective fading channels, carrier letter is eliminated The method of pilot signal is the same in number.Specifically, the carrier signal on each path of frequency selective fading channels is Pilot signal is eliminated by BKIC processing methods.BKIC processing methods include the expression formula for determining each code element under different condition (step S401) and the expression formula using symbol, estimation echo signal (step S402).
In step S401, the expression formula of each code element under different condition is determined.
Wherein, in the first condition, the expression formula of each code element is as follows:
K ∈ { 1,2 ..., L1-1}
Under a second condition, the expression formula of each code element is as follows:
From above-mentioned formula as can be seen that there are correlated noise between adjacent symbol, the correlated noise in expression formula (4) It cannot be corrected with common noise-whitening techniques, need to eliminate correlated noise by step S402, estimate hkρttk+nk
In step S402, using the expression formula of symbol, echo signal is estimated, above-mentioned expression formula (4) is represented as follows:
It is as follows can to obtain estimation result:
Wherein, ε in expression formula (9)kIt is since BKIC modules carry out the residue signal generated in interference cancellation process, εkIt can To be modeled as Gaussian Profile, for slow fading, (a → 1), εkVariance very little, therefore can be by ykIn εkRemoval, The h estimatedkρttk+nk.The h that will be estimated in each pathkρttk+nkIt is added, the target without pilot signal estimated Signal.
In addition, in step s 102, carrier signal obtains echo signal after BKIC is handled, echo signal carries out difference Signal processing obtains target authentication signal.
In the present embodiment, the method for differential signal processing is as follows:
Under first condition, the expression formula of differential signal processing is as follows:
Wherein ΔkFor residue signal, can be by 0 mean variance of approximate modelingGaussian random variable.
Under a second condition, the expression formula of differential signal processing is as follows:
WhereinFor zero-mean complex Gaussian stochastic variable.
In the present embodiment, the blind authentication method of physical layer further includes in the receiving end, is obtained based on key and pilot signal Reference signal, to reference signal carry out differential signal processing with obtain refer to authentication signal, and calculate target authentication signal and With reference to the correlation of authentication signal, test statistics (step S103) is obtained.
In step s 103, reference signal is obtained based on key and pilot signal to refer to using Hash matrix, by key and Pilot signal obtains reference signal.Reference signal is obtained by processing with reference to authentication signal as a result, can be believed according to reference to certification Correlation number with target authentication signal, determines whether target authentication signal passes through certification.
In step s 103, differential signal processing is carried out to reference signal and refers to authentication signal to obtain, calculated target and recognize Signal and the correlation with reference to authentication signal are demonstrate,proved, obtains test statistics, can be carried out in next step according to the value of test statistics Judge.
In the present embodiment, differential signal processing is carried out to reference signal and refers to authentication signal to obtain.Differential signal The method of processing is identical with the difference processing method in above-mentioned steps S102.
In above-mentioned steps S102, the carrier signal that receiving terminal receives may include authentication signal, if carrier signal packet It is first condition containing authentication information, if it is second condition that carrier signal, which does not include authentication signal,.
Wherein, in receiving terminal, carrier signal sequentially believes the carrier in each path of frequency selective fading channels Number carrying out the processing of blind known disturbances elimination (BKIC) obtains echo signal, and differential signal processing is carried out to echo signal to obtain mesh Mark authentication signal.In receiving terminal, reference signal is obtained based on key and pilot signal, reference signal is by difference (DP) signal It is obtained after reason with reference to authentication signal.The Hash matrix of receiving terminal, the rule of key and pilot signal generation reference signal and transmission The rule that Hash matrix, key and the pilot signal at end generate authentication signal is identical.It can regard first as with reference to authentication signal Authentication signal in condition, target authentication signal can regard the carrier signal in first condition as.First condition can be with as a result, Target authentication signal is expressed as to include with reference to authentication signal;Second condition can be expressed as in target authentication signal not including ginseng Examine authentication signal.
In the present embodiment, the blind authentication method of physical layer, which further includes, is compared test statistics and defined threshold, So that it is determined that whether carrier signal can pass through certification (step S104).
In step S104, if test statistics is not less than defined threshold, judge that carrier signal passes through certification;If it examines Statistic is less than defined threshold, then judges carrier signal not over certification.
In the present embodiment, it if test statistics is not less than defined threshold, includes in carrier signal and believes with reference to certification Number, i.e., carrier signal passes through certification;If test statistics is less than defined threshold, does not include in carrier signal and believe with reference to certification Number, i.e., carrier signal is not over certification.
In addition, in the present embodiment, it is specified that threshold value is by assuming that verification condition obtains, above-mentioned first condition and Second condition assumes that the first condition H of verification condition respectively1With second condition H0
In the present embodiment, first condition H1Under, the expression formula of test statistics is as follows:
Second condition H0Under, the expression formula of test statistics is as follows:
Wherein,It is for 0 mean varianceGaussian random variable, φiIt is 0 mean value Variance isGaussian random variable.
In addition, defined thresholdBy (τi|H0) the relevant false-alarm probability ε of distributionFAIt determines, represents as follows:
Wherein (τi|H0) be the test statistics namely pilot signal obtained under a second condition statistical property.As a result, Defined threshold can be based on pilot signal statistical property and the preset false-alarm probability upper limit obtain.
In addition, in the present embodiment, if after the identity of transmitting terminal is certified, authentication signal can be treated as additionally Pilot signal restores signal.Thus, it is possible to the performance and the estimation performance to channel response that improve signal element recovery.
In addition, in the present embodiment, authentication signal is added to pilot signal, avoids and the extraction of normal signal is brought Adverse effect.Avoid reducing the Signal to Interference plus Noise Ratio (SINR) of receiving terminal as a result,.
In present embodiment, the blind authenticating party of physical layer of the wireless communication frequency Selective Fading Channel based on smoothing technique Method does not need to occupy additional signal bandwidth.In addition, in receiving terminal, when carrying out information signal extraction to carrier signal, certification letter It number will not become the noise of information signal, authentication authorization and accounting signal not interfere with the extraction of information signal.Authentication signal does not influence to receive Hold the statistical property of noise.
In the present embodiment, the blind authentication method processing of physical layer is that the frequency selective fading with multiple paths is believed Road namely multi-path channel are adaptive to wireless communications environment complicated and changeable in practical communication scene.In addition, certification is believed It number is superimposed upon in pilot signal, if the entirety of the signal after authentication signal and pilot superimposition used as pilot signal To carry out channel estimation, moreover it is possible to improve the accuracy of channel estimation.
It is blind that present embodiment discloses a kind of physical layer of the wireless communication frequency Selective Fading Channel based on smoothing technique Verification System.Fig. 5 is the blind Verification System transmitting terminal signal processing mould of physical layer shown involved by embodiments of the present invention Block schematic diagram.Fig. 6 is the blind Verification System receiving end signal processing mould of physical layer shown involved by embodiments of the present invention Block schematic diagram.
In the present embodiment, as shown in figure 5, the blind Verification System of physical layer includes emitter 20.Emitter 20 wraps Include the first generation module 201, the second generation module 202 and synthesis module 203.
In the present embodiment, as shown in figure 5, the first generation module 201 generates authentication signal.Namely key and pilot tone are believed Number the first generation module of process 201 generates authentication signal.Hash matrix is included in first generation module 201.Authentication signal is close What key and pilot signal were obtained using Hash matrix.Wherein, the authentication signal obtained is identical with the signal length of pilot signal.
In the present embodiment, as shown in figure 5, the second generation module 202 generates the pilot portion of carrier signal.Namely Authentication signal is loaded by the second generation module 202 in pilot signal, generates the pilot portion of carrier signal.Carrier signal The expression formula of pilot portion be formula (1), in addition, the length of the pilot portion of carrier signal for authentication signal signal length or The signal length of pilot signal.
In the present embodiment, as shown in figure 5, synthesis module 203 generates carrier signal.Namely the pilot tone of carrier signal Part and message part are combined by synthesis module 203, generate carrier signal.The message part of carrier signal is information Signal.
In the present embodiment, carrier signal is sent by data block piecemeal.Every piece of carrier signal includes pilot portion And message part.The signal length of the signal length and information signal of authentication signal or pilot signal and equal to every piece carrier signal Length.In addition, carrier signal is that piecemeal transmitting is conducive to operate data in the form of data block.
In the present embodiment, the carrier signal that the emitter 20 of transmitting terminal generates reaches receiving terminal by wireless channel Reception device 30.In addition, wireless channel is the frequency selective fading channels for having multiple paths.
In the present embodiment, the blind Verification System of physical layer further includes reception device 30.Reception device 30 is included at first Manage module, Second processing module and determination module.
In the present embodiment, first processing module includes blind known disturbances elimination (BKIC) module 301.Carrier signal passes through It crosses blind known disturbances and eliminates (BKIC) module 301.Specifically, the carrier letter in each path of frequency selective fading channels It number flows serially through blind known disturbances and eliminates (BKIC) module 301 and carry out blind known disturbances elimination (BKIC) processing, eliminate load Pilot signal in frequency signal.
In the present embodiment, blind known disturbances are eliminated (BKIC) module 301 and have been used in step S102 using adjacent Symbol eliminates the BKIC processing methods of pilot signal by smoothing technique.Specific steps are as shown in figure 4, BKIC processing is included really The expression formula (step S401) and the expression formula using symbol for determining each code element under different condition, estimate echo signal (step S402)。
In the present embodiment, as shown in fig. 6, first processing module further includes difference (DP) processing module 302.DP processing Module 302 has used differential signal processing method in step S102.DP processing modules 302 carry out at differential signal echo signal Reason, obtains target authentication signal.H in target authentication signal is eliminated as a result,kInfluence namely eliminate channel to carrier signal Influence.
In DP processing modules 302, under first condition, the expression formula of differential signal processing is formula (10), wherein ΔkFor Residue signal can be by 0 mean variance of approximate modelingGaussian random variable.Under a second condition, differential signal is handled Expression formula for formula (11), whereinFor zero-mean complex Gaussian stochastic variable.
In the present embodiment, as shown in fig. 6, Second processing module further includes Hash matrix disposal module 303.Pilot tone is believed Number and key reference signal is obtained by Hash matrix disposal module 303.Hash matrix disposal module 303 has used step S103 The method of middle production reference signal.Hash matrix disposal module 303 includes Hash matrix.
In the present embodiment, as shown in fig. 6, Second processing module further includes difference (DP) processing module 304.Difference (DP) processing module 304 carries out differential signal processing to reference signal, obtains with reference to authentication signal.DP processing modules 304 are used Differential signal processing method in step S103.
In the present embodiment, as shown in fig. 6, Second processing module further includes computing module 305.Computing module 305 is used To calculate target authentication signal and the test statistics with reference to authentication signal.Computing module 305 with computational methods be step Computational methods in S103.
In the present embodiment, as shown in fig. 6, Second processing module further includes determination module 306.Determination module 306 is logical Comparing check statistic and defined threshold are crossed, determines whether target authentication signal passes through certification.Namely determining carrier signal whether Certification can be passed through.
In the present embodiment, the defined threshold in determination module 306 is statistical property based on pilot signal and pre- If the false-alarm probability upper limit obtain.The computational methods of defined threshold are the threshold value calculation method in step S103.
It is blind that present embodiment discloses a kind of physical layer of the wireless communication frequency Selective Fading Channel based on smoothing technique Authenticating device 50.Fig. 7 is the structural representation for showing the blind authenticating device of a kind of physical layer involved by embodiments of the present invention Figure.In the present embodiment, transmitting terminal and receiving terminal all include authenticating device 50 as shown in Figure 7.
In the present embodiment, as shown in fig. 7, authenticating device 50 includes processor 501 and memory 502.Wherein, it handles Device 501 and memory 502 distinguish connection communication bus.Memory 502 can be high-speed RAM memory or it is non-easily The memory (non-volatile memory) for the property lost.It will be understood by those skilled in the art that the authenticating device shown in Fig. 7 50 structure does not form limitation of the invention, it can also be wrapped either busbar network or hub-and-spoke configuration It includes and either combines certain components or different components arrangement than more or fewer components shown in Fig. 7.
Wherein, processor 501 is the control centre of authenticating device, can be central processing unit (Central Processing Unit, CPU), processor 501 is led to using the various pieces of various interfaces and the entire authenticating device of connection It crosses operation or performs the software program being stored in memory 502 and/or module and call and be stored in 502 memory of memory The program code of storage, for performing the following operations:
Transmitting terminal includes authentication signal, pilot signal and information signal to wireless channel launching carrier signal, carrier signal, Authentication signal is added to pilot signal, and wireless channel is that have the frequency selective fading channels in multiple paths (by transmitting terminal Authenticating device 50 performs).
Receiving terminal received vector signal, sequentially to the carrier signal in each path of frequency selective fading channels into The blind known disturbances of row eliminate (BKIC) processing and obtain echo signal, and differential signal processing is carried out to echo signal and is recognized with obtaining target Signal is demonstrate,proved, in BKIC processing, using adjacent symbol, pilot signal is eliminated by smoothing technique;In the receiving end, based on close Key and pilot signal obtain reference signal, and differential signal processing is carried out to reference signal and refers to authentication signal, and calculate to obtain Target authentication signal and the correlation with reference to authentication signal, obtain test statistics;And by test statistics and defined threshold It is compared, so that it is determined that whether carrier signal (can be performed) by certification by the authenticating device 50 of receiving terminal.
In the present embodiment, it is operated below the also execution of the processor 501 of the authenticating device 50 of transmitting terminal:Carrier signal Piecemeal emits in the form of data block.
In the present embodiment, it is operated below the also execution of the processor 501 of the authenticating device 50 of transmitting terminal:In every piece of load In body signal, the signal length of pilot signal and the signal length of information signal and the signal length equal to carrier signal.
In the present embodiment, it is operated below the also execution of the processor 501 of the authenticating device 50 of receiving terminal:Utilize Hash Matrix obtains reference signal based on key and pilot signal.
In the present embodiment, it is operated below the also execution of the processor 501 of the authenticating device 50 of receiving terminal:If examine system Metering passes through certification not less than defined threshold, then carrier signal.
In the present embodiment, it is operated below the also execution of the processor 501 of the authenticating device 50 of receiving terminal:Defined threshold Statistical property and the preset false-alarm probability upper limit based on pilot signal obtain.
In the present embodiment, it should be understood that disclosed equipment can be realized by another way.More than for example, Described equipment embodiment is only schematical, such as the division of the unit, only a kind of division of logic function, There can be other dividing mode in actual implementation, such as multiple units or component may be combined or can be integrated into another System or some features can be ignored or does not perform.Another point, shown or discussed mutual coupling or direct coupling Conjunction or communication connection can be by some interfaces, the INDIRECT COUPLING or communication connection of device or unit, can be electrical or its Its form.
The unit illustrated as separating component may or may not be physically separate, be shown as unit Component may or may not be physical unit, you can be located at a place or can also be distributed to multiple networks On unit.Some or all of unit therein can be selected according to the actual needs to realize the purpose of this embodiment scheme.
In addition, each functional unit in embodiments of the present invention can be integrated in a processing unit or Each unit is individually physically present, can also two or more units integrate in a unit.Above-mentioned integrated unit Both the form that hardware may be used is realized, can also be realized in the form of SFU software functional unit.
If the integrated unit is realized in the form of SFU software functional unit and is independent product sale or uses When, it can be stored in a computer-readable access to memory.Based on such understanding, technical scheme of the present invention substantially or Person say the part contribute to the prior art or the technical solution all or part can in the form of software product body Reveal and, which is stored in a memory, is used including some instructions so that a computer equipment (can be personal computer, server or network equipment etc.) performs all or part of each embodiment the method for the present invention Step.And aforementioned memory includes:USB flash disk, read-only memory (ROM, Read-Only Memory), random access memory The various media that can store program code such as (RAM, Random Access Memory), mobile hard disk, magnetic disc or CD.
Present embodiment discloses a kind of computer readable storage medium, one of ordinary skill in the art will appreciate that above-mentioned reality It is that can instruct correlation by program (instruction) to apply all or part of step in the blind authentication method of various physical layers of mode Hardware complete, which can be stored in computer-readable memory (storage medium), memory can wrap It includes:Flash disk, read-only memory (English:Read-Only Memory, referred to as:ROM), random access device (English:Random Access Memory, referred to as:RAM), disk or CD etc..
Although being illustrated above in association with drawings and examples to the present invention, it will be appreciated that above description The invention is not limited in any way.Those skilled in the art without departing from the true spirit and scope of the present invention may be used To be deformed and be changed to the present invention as needed, these deformations and variation are within the scope of the present invention.

Claims (11)

1. a kind of blind authentication method of the frequency selective fading channels based on smoothing technique, has transmitting terminal and receiving terminal The physical layer authentication method of the wireless communication of wireless communication system, which is characterized in that
Including:
The transmitting terminal includes authentication signal, pilot signal and information to wireless channel launching carrier signal, the carrier signal Signal, the authentication signal are added to the pilot signal, and the wireless channel is that the frequency selectivity with multiple paths declines Fall channel;
The receiving terminal receives the carrier signal, sequentially to the institute in each path of the frequency selective fading channels It states blind known disturbances elimination (BKIC) processing of carrier signal progress and obtains echo signal, differential signal is carried out to the echo signal Processing is to obtain target authentication signal, in BKIC processing, using adjacent symbol, by smoothing technique eliminate described in lead Frequency signal;
In the receiving terminal, reference signal is obtained based on key and the pilot signal, difference is carried out to the reference signal Signal processing refers to authentication signal to obtain, and calculates the target authentication signal and the correlation with reference to authentication signal, Obtain test statistics;And
The test statistics is compared with defined threshold, so that it is determined that whether the carrier signal can pass through certification.
2. blind authentication method according to claim 1, it is characterised in that:
Carrier signal piecemeal in the form of data block emits.
3. blind authentication method according to claim 2, it is characterised in that:
In every piece of carrier signal, the signal length of the pilot signal and the signal length of described information signal and it is equal to The signal length of the carrier signal.
4. blind authentication method according to claim 1, which is characterized in that
Using Hash matrix, the reference signal is obtained based on the key and the pilot signal.
5. blind authentication method according to claim 1, which is characterized in that
If the test statistics is not less than the defined threshold, the carrier signal passes through certification.
6. blind authentication method according to claim 1, which is characterized in that
Statistical property and the preset false-alarm probability upper limit of the defined threshold based on the pilot signal obtain.
7. a kind of blind authenticating device of the frequency selective fading channels based on smoothing technique, which is characterized in that
Including:
Processor performs the computer program of the memory storage to realize as claim 1 to 6 any one of them is blind Authentication method;And
Memory.
8. a kind of computer readable storage medium, which is characterized in that
The computer-readable recording medium storage has at least one instruction, and at least one instruction is real when being executed by processor Now such as the blind authentication method of claim 1 to 6 any one of them.
9. a kind of blind Verification System of the frequency selective fading channels based on smoothing technique, which is characterized in that
Emitter, to wireless channel launching carrier signal, the carrier signal includes authentication signal, pilot signal and information Signal, the authentication signal are added to the pilot signal, and the wireless channel is that the frequency selectivity with multiple paths declines Fall channel;And
Reception device, including:First processing module receives the carrier signal, sequentially declines to the frequency selectivity The carrier signal fallen in each path of channel carries out blind known disturbances elimination (BKIC) processing and obtains echo signal, to institute It states echo signal and carries out differential signal processing to obtain target authentication signal, in BKIC processing, using adjacent symbol, The pilot signal is eliminated by smoothing technique;Second processing module is obtained based on key and the pilot signal with reference to letter Number, to the reference signal carry out differential signal processing with obtain refer to authentication signal, and calculate the target authentication signal and By the correlation with reference to authentication signal that differential signal is handled, test statistics is obtained;And determination module, by institute It states test statistics to be compared with defined threshold, so that it is determined that whether the carrier signal can pass through certification.
10. Verification System according to claim 9, which is characterized in that
The Second processing module is based on the key using Hash matrix and the pilot signal obtains the reference signal.
11. blind Verification System according to claim 9, which is characterized in that
In the determination module, in statistical property and preset false-alarm probability of the defined threshold based on the pilot signal Limit obtains.
CN201711336107.3A 2017-12-13 2017-12-13 Blind authentication method and system of frequency selective fading channel based on smoothing technology Active CN108156102B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711336107.3A CN108156102B (en) 2017-12-13 2017-12-13 Blind authentication method and system of frequency selective fading channel based on smoothing technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711336107.3A CN108156102B (en) 2017-12-13 2017-12-13 Blind authentication method and system of frequency selective fading channel based on smoothing technology

Publications (2)

Publication Number Publication Date
CN108156102A true CN108156102A (en) 2018-06-12
CN108156102B CN108156102B (en) 2020-06-26

Family

ID=62467197

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711336107.3A Active CN108156102B (en) 2017-12-13 2017-12-13 Blind authentication method and system of frequency selective fading channel based on smoothing technology

Country Status (1)

Country Link
CN (1) CN108156102B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109068284A (en) * 2018-09-28 2018-12-21 深圳大学 The physical layer authentication method and system connected based on group between internet of things equipment
CN109168166A (en) * 2018-11-22 2019-01-08 深圳大学 The safety detecting method of physical layer Verification System

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130159722A1 (en) * 2011-12-16 2013-06-20 University Of Maryland Active sensing for dynamic spectrum access
CN103733560A (en) * 2011-08-12 2014-04-16 交互数字专利控股公司 Flexible bandwidth operation in wireless systems
CN105635125A (en) * 2015-12-25 2016-06-01 电子科技大学 Physical layer combined authentication method based on RF fingerprint and channel information
CN106664194A (en) * 2014-04-04 2017-05-10 尼克根合伙Ip有限责任公司 System and method for communication using orbital angular momentum with multiple layer overlay modulation
CN107196920A (en) * 2017-04-28 2017-09-22 中国人民解放军信息工程大学 A kind of key towards wireless communication system produces distribution method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103733560A (en) * 2011-08-12 2014-04-16 交互数字专利控股公司 Flexible bandwidth operation in wireless systems
US20130159722A1 (en) * 2011-12-16 2013-06-20 University Of Maryland Active sensing for dynamic spectrum access
CN106664194A (en) * 2014-04-04 2017-05-10 尼克根合伙Ip有限责任公司 System and method for communication using orbital angular momentum with multiple layer overlay modulation
CN105635125A (en) * 2015-12-25 2016-06-01 电子科技大学 Physical layer combined authentication method based on RF fingerprint and channel information
CN107196920A (en) * 2017-04-28 2017-09-22 中国人民解放军信息工程大学 A kind of key towards wireless communication system produces distribution method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
季新生等: ""基于哈希方法的物理层认证机制"", 《电子与信息学报》 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109068284A (en) * 2018-09-28 2018-12-21 深圳大学 The physical layer authentication method and system connected based on group between internet of things equipment
CN109068284B (en) * 2018-09-28 2021-05-25 深圳大学 Physical layer authentication method and system based on group connection among Internet of things devices
CN109168166A (en) * 2018-11-22 2019-01-08 深圳大学 The safety detecting method of physical layer Verification System
CN109168166B (en) * 2018-11-22 2020-08-18 深圳大学 Safety detection method of physical layer authentication system

Also Published As

Publication number Publication date
CN108156102B (en) 2020-06-26

Similar Documents

Publication Publication Date Title
Babun et al. Z-iot: Passive device-class fingerprinting of zigbee and z-wave iot devices
CN108206795A (en) Blind authentication method and system based on the frequency selective fading channels that confidence is transmitted
CN107872290A (en) A kind of mark UE method, network side equipment, UE and system
CN110381510B (en) Non-orthogonal multiple access authentication system based on superimposed physical layer authentication label
CN112261021B (en) DDoS attack detection method under software defined Internet of things
CN108173791A (en) The blind authentication method of physical layer and system of time-varying fading channels based on smoothing technique
Zhang et al. Reed-Muller sequences for 5G grant-free massive access
CN110324830B (en) Non-orthogonal multiple access authentication system based on time division multiplexing physical layer authentication label
CN108156102A (en) The blind authentication method and system of frequency selective fading channels based on smoothing technique
CN110381511A (en) Non-orthogonal multiple Verification System based on shared physical layer authenticating tag
CN108199991A (en) The blind authentication method of physical layer and system based on the time-varying fading channels that confidence is transmitted
CN109348477A (en) Wireless internet of things physical layer authentication method based on service network
CN110392371B (en) Optimization method of non-orthogonal multiple access authentication system based on time division multiplexing authentication label
CN110312255B (en) Parameter optimization method of non-orthogonal multiple access authentication system based on superimposed authentication tags
US11412378B2 (en) Smoothing technology-based blind authentication method and system for frequency selective fading channel
US20230328545A1 (en) Waveform agnostic learning-enhanced decision engine for any radio
WO2013075484A1 (en) Method and device for detecting interference
Ma et al. A LSTM-Based Channel Fingerprinting Method for Intrusion Detection
CN109600742B (en) Hidden wireless communication physical layer slope authentication method and device
CN108966223A (en) Physical layer authentication method and system based on single-bit concealment agreement
Sharma et al. Deep Learning-Based Authentication Framework for Secure Terrestrial Communications in Next Generation Heterogeneous Networks
CN110380798A (en) The parameter optimization method of non-orthogonal multiple Verification System based on shared authenticating tag
Shorna Performance Analysis of 5G DDoS Attack Using Machine Learning
US10924318B2 (en) Belief propagation-based blind authentication method and system for frequency selective fading channel
CN108282282A (en) The method and apparatus of transmission data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant