CN108156102B - Blind authentication method and system of frequency selective fading channel based on smoothing technology - Google Patents

Blind authentication method and system of frequency selective fading channel based on smoothing technology Download PDF

Info

Publication number
CN108156102B
CN108156102B CN201711336107.3A CN201711336107A CN108156102B CN 108156102 B CN108156102 B CN 108156102B CN 201711336107 A CN201711336107 A CN 201711336107A CN 108156102 B CN108156102 B CN 108156102B
Authority
CN
China
Prior art keywords
signal
authentication
blind
pilot
carrier
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201711336107.3A
Other languages
Chinese (zh)
Other versions
CN108156102A (en
Inventor
谢宁
张莉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen University
Original Assignee
Shenzhen University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen University filed Critical Shenzhen University
Priority to CN201711336107.3A priority Critical patent/CN108156102B/en
Publication of CN108156102A publication Critical patent/CN108156102A/en
Application granted granted Critical
Publication of CN108156102B publication Critical patent/CN108156102B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L25/00Baseband systems
    • H04L25/02Details ; arrangements for supplying electrical power along data transmission lines
    • H04L25/03Shaping networks in transmitter or receiver, e.g. adaptive shaping networks
    • H04L25/03006Arrangements for removing intersymbol interference
    • H04L25/03821Inter-carrier interference cancellation [ICI]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L25/00Baseband systems
    • H04L25/02Details ; arrangements for supplying electrical power along data transmission lines
    • H04L25/0202Channel estimation
    • H04L25/0224Channel estimation using sounding signals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a smoothing technology-based blind authentication method for a frequency selective fading channel, which comprises the steps of transmitting a carrier signal to the frequency selective fading channel with a plurality of paths, wherein the carrier signal comprises an authentication signal, a pilot signal and an information signal, and the authentication signal is superposed to the pilot signal; receiving carrier signals, sequentially carrying out Blind Known Interference Cancellation (BKIC) processing on the carrier signals in each path to obtain target signals, carrying out differential signal processing on the target signals to obtain target authentication signals, and eliminating pilot signals by using adjacent code elements through a smoothing technology through the BKIC processing; obtaining a reference signal based on the key and the pilot signal, performing differential signal processing on the reference signal to obtain a reference authentication signal, and calculating the correlation between the target authentication signal and the reference authentication signal to obtain a test statistic; and comparing the test statistic with a prescribed threshold to determine whether the carrier signal can be authenticated.

Description

Blind authentication method and system of frequency selective fading channel based on smoothing technology
Technical Field
The invention relates to the technical field of wireless communication, in particular to a smoothing technology-based blind authentication method and system for a frequency selective fading channel.
Background
The authentication technology of the current physical layer mainly has three types, the first authentication technology is a spread spectrum technology (Auth-SS), the basic idea is to adopt the traditional direct sequence spread spectrum or frequency modulation technology, and because different pulses adopt different frequencies, certain bandwidth needs to be sacrificed when the authentication is realized by the technology. Furthermore, a key limitation of the Auth-SS technology is to allow only users with knowledge of the a priori knowledge about the spread spectrum technology to participate in the communication. Therefore, the application range of the technology is narrow.
The second is based on time division multiplexing authentication technology (Auth-TDM), and the basic idea is that the transmitting end periodically sends information signals and authentication signals alternately. The receiving end directly extracts expected authentication information after receiving the signal to realize the purpose of authenticating the signal. Auth-TDM is an authentication technique proposed in the early development of wireless communication, and has the advantages of simple operation and no need of preprocessing the authentication signal and information (possibly encryption for security reasons) before transmitting the signal. The authentication signal is independent of the information signal transmission, so a certain bandwidth needs to be occupied, and with the continuous increase of the amount of wireless information, the further improvement of the information privacy of a user and the continuous enhancement of an attack technology of an adversary, the security of the authentication technology is greatly challenged, and the requirements of the user cannot be met.
The third authentication technology is the authentication superposition technology (Auth-SUP), and the basic idea is to superpose the authentication signal on the information signal (the superposition mode can be arbitrary and is determined by the key), and then the information signal is simultaneously transmitted by the transmitting terminal, and the receiving terminal extracts the authentication signal in the superposed signal by using the key after receiving the signal, so as to achieve the purpose of signal authentication.
Compared with the early Auth-TDM technology, the Auth-SUP authentication technology needs to process the authentication signal and the information signal before signal transmission, puts forward a certain requirement on the signal processing capability of a transmitting end, is more complicated to realize than the Auth-TDM technology, and simultaneously transmits the authentication signal and the information signal, so that extra bandwidth is not occupied. At this time, since the authentication signal is superimposed in the information signal, the receiving end needs to extract the information after receiving the signal, the signal processing difficulty is higher than that of the Auth-TDM technology, but the concealment of the authentication information is higher than that of the Auth-TDM. In addition, since the authentication signal plays a role of noise for extracting the information signal, the SNR of the receiving end is correspondingly reduced, and the extraction of the information signal is adversely affected.
The existing Auth-TDM and Auth-SUP authentication techniques transmit another pilot signal in addition to the information signal and the authentication signal. The two authentication techniques require that the receiving end estimates the channel parameters and recovers the symbols after receiving the signals, and then extracts the authentication signals, and at this time, certain requirements are also provided for the signal processing capability of the receiving end.
In addition, Auth-TDM, Auth-SS and Auth-SUP all expose the fact that the Auth-TDM, Auth-SS and Auth-TDM technologies are more likely to attract the attention of other users, especially hostile users, in a scene compared with conventional signals which do not contain authentication information, the hostile users analyze, counterfeit or tamper with the signals, and a legal receiving end cannot authenticate the expected signals. In contrast, Auth-SUP authentication techniques are significantly more covert than Auth-SS and Auth-TDM. However, this advantage is based on the premise that the computing power of the adversary user has certain limitations, and once the computing power of the adversary user is increased, the authentication information is likely to be extracted or even destroyed.
It has to be mentioned that the performance of the existing Auth-SS technology and Auth-SUP technology in frequency selective fading channel scenarios is degraded significantly. However, as the number of wireless communication users increases, the communication environment becomes more complex and the possibility of interference increases, and as the number of urban communication users increases and cities develop, a simple time-invariant fading channel or a simple time-varying fading channel is not enough to depict the current communication environment. Especially, since the blocking of urban buildings causes multipath fading to be a normal state, a wireless communication physical layer authentication technology based on a frequency selective fading channel has to be considered to improve the security of wireless communication and meet the communication security requirement of users.
Disclosure of Invention
The present invention has been made in view of the above circumstances, and an object of the present invention is to provide a blind authentication method and system for a frequency selective fading channel based on a smoothing technique, which do not occupy an extra signal bandwidth, do not cause an authentication signal to be noise that affects extraction of an information signal from a carrier signal, and do not affect statistical characteristics of noise at a receiving end.
To achieve the above object, a first aspect of the present invention provides a blind authentication method for frequency selective fading channels based on a smoothing technique, which is a physical layer authentication method for wireless communication in a wireless communication system having a transmitting end and a receiving end, the blind authentication method comprising: the transmitting terminal transmits a carrier signal to a wireless channel, wherein the carrier signal comprises an authentication signal, a pilot signal and an information signal, the authentication signal is superposed to the pilot signal, and the wireless channel is a frequency selective fading channel with a plurality of paths; the receiving end receives the carrier signal, sequentially performs Blind Known Interference Cancellation (BKIC) processing on the carrier signal in each path of the frequency selective fading channel to obtain a target signal, performs differential signal processing on the target signal to obtain a target authentication signal, and in the BKIC processing, eliminates the pilot signal by using adjacent code elements through a smoothing technique; in the receiving end, obtaining a reference authentication signal based on a secret key and the pilot signal, and calculating the correlation between the target authentication signal and the reference authentication signal to obtain a test statistic; and determining whether the test statistic is not less than a prescribed threshold to determine whether the carrier signal is authentic.
In the present invention, the authentication signal is superimposed on the pilot signal. Therefore, the signal-to-interference-and-noise ratio of the receiving end can not be influenced. The BKIC processing removes the pilot signal by a smoothing technique using adjacent symbols. In this case, the pilot signal can be canceled while avoiding estimating the channel.
In the blind authentication method according to the first aspect of the present invention, the carrier signal is transmitted in blocks in the form of data blocks. Thereby, manipulation of data is facilitated.
In the blind authentication method according to the first aspect of the present invention, in each of the carrier signals, a sum of a signal length of the pilot signal and a signal length of the information signal is equal to a signal length of the carrier signal.
In addition, in the blind authentication method according to the first aspect of the present invention, the reference signal is obtained based on the key and the pilot signal using a hash matrix. Therefore, the reference authentication signal is obtained by processing the reference signal, and whether the target authentication signal passes the authentication can be determined according to the correlation between the reference authentication signal and the target authentication signal.
In the blind authentication method according to the first aspect of the present invention, the carrier signal is authenticated if the test statistic is not less than the predetermined threshold value.
In the blind authentication method according to the first aspect of the present invention, the predetermined threshold is obtained based on a statistical characteristic of the pilot signal and a preset upper limit of a false alarm probability.
A second aspect of the present invention provides a blind authentication device for a frequency selective fading channel based on a smoothing technique, comprising a processor executing a computer program stored in the memory to implement the physical layer blind authentication method of any one of the above; and a memory.
A third aspect of the invention provides a computer-readable storage medium. The computer-readable storage medium stores at least one instruction that when executed by a processor implements the blind authentication method of any of the first aspects above.
A fourth aspect of the present invention provides a blind authentication system for a frequency selective fading channel based on a smoothing technique, which includes a transmitting device that transmits a carrier signal to a wireless channel, the carrier signal including an authentication signal, a pilot signal, and an information signal, the authentication signal being superimposed to the pilot signal, the wireless channel being a frequency selective fading channel having a plurality of paths; the receiving device comprises a first processing module, a second processing module and a decision module, wherein the first processing module receives the carrier signal, sequentially carries out Blind Known Interference Cancellation (BKIC) processing on the carrier signal in each path of the frequency selective fading channel to obtain a target signal, carries out differential signal processing on the target signal to obtain a target authentication signal, and utilizes adjacent code elements to eliminate the pilot signal through a smoothing technology in the BKIC processing; the second processing module is used for obtaining a reference signal based on a secret key and the pilot signal, carrying out differential signal processing on the reference signal to obtain a reference authentication signal, and calculating the correlation between the target authentication signal and the reference authentication signal subjected to differential signal processing to obtain a test statistic; and a decision module that compares the test statistic to a prescribed threshold to determine whether the carrier signal is authentic.
In the present invention, the transmitting device of the blind authentication system superimposes the authentication signal on the pilot signal. Therefore, extra transmission bandwidth resources can not be occupied. The BKIC processing of the receiving device of the blind authentication system uses adjacent symbols to cancel the pilot signal by a smoothing technique. In this case, the receiving apparatus can cancel the pilot signal while avoiding estimating the channel.
In the blind authentication system according to the fourth aspect of the present invention, the second processing module obtains the reference signal based on the key and the pilot signal by using a hash matrix. Therefore, the reference authentication signal is obtained by processing the reference signal, and whether the target authentication signal passes the authentication can be determined according to the correlation between the reference authentication signal and the target authentication signal.
In the blind authentication system according to the fourth aspect of the present invention, the predetermined threshold in the determination module is obtained based on a statistical characteristic of the pilot signal and a preset upper limit of a false alarm probability.
Compared with the prior art, the implementation mode of the invention has the following beneficial effects:
compared with the existing Auth-SS, Auth-SUP and Auth-TDM, the invention realizes the authentication of the physical layer of the wireless communication without occupying extra signal bandwidth, and the authentication signal does not become noise which affects the extraction of the received signal and does not affect the statistical characteristic of the noise of the receiving end. The blind authentication technology provided by the invention processes a frequency selective fading channel, and is more suitable for complex and changeable wireless communication environments in actual communication scenes. In addition, since the authentication signal is superimposed in the pilot signal, if the entirety of the signal obtained by superimposing the authentication signal and the pilot signal is used as the pilot signal for channel estimation, the accuracy of channel estimation can be improved.
Drawings
Fig. 1 is a signal transmission diagram illustrating a physical layer blind authentication method according to an embodiment of the present invention.
Fig. 2 is a schematic flow chart illustrating a physical layer blind authentication method according to an embodiment of the present invention.
Fig. 3 is a schematic diagram illustrating a structure of a signal transmitted by a transmitting end of a physical layer blind authentication method according to an embodiment of the present invention.
Fig. 4 is a schematic diagram illustrating a processing flow of Blind Known Interference Cancellation (BKIC) at a receiving end of a physical layer blind authentication method according to an embodiment of the present invention.
Fig. 5 is a schematic diagram illustrating a signal processing module at a transmitting end of a physical layer blind authentication system according to an embodiment of the present invention.
Fig. 6 is a schematic diagram illustrating a receiving end signal processing module of a physical layer blind authentication system according to an embodiment of the present invention.
Fig. 7 is a schematic structural diagram illustrating a physical layer blind authentication device according to an embodiment of the present invention.
Detailed Description
Hereinafter, preferred embodiments of the present invention will be described in detail with reference to the accompanying drawings. In the following description, the same components are denoted by the same reference numerals, and redundant description thereof is omitted. The drawings are schematic and the ratio of the dimensions of the components and the shapes of the components may be different from the actual ones.
It should be noted that the terms "first", "second", "third" and "fourth", etc. in the description and claims of the present invention and the above-mentioned drawings are used for distinguishing different objects and are not used for describing a specific order. Furthermore, the terms "include" and "have," as well as any variations thereof, are intended to cover non-exclusive inclusions. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those steps or elements listed, but may alternatively include other steps or elements not listed, or inherent to such process, method, article, or apparatus.
The embodiment discloses a blind authentication method, equipment and a system of a frequency selective fading channel based on a smoothing technology, and relates to a physical layer authentication method, equipment and a system of wireless communication of a wireless communication system with a transmitting end and a receiving end. That is, the present embodiment discloses a physical layer blind authentication method, device and system for a wireless communication frequency selective fading channel based on a smoothing technique. Which can more accurately perform physical layer authentication. The following detailed description is made with reference to the accompanying drawings.
Fig. 1 is a signal transmission diagram illustrating a physical layer blind authentication method according to an embodiment of the present invention.
In the present embodiment, as shown in fig. 1, the physical layer blind authentication method for the frequency selective fading channel of wireless communication based on the smoothing technique is based on a general signal transmission model. In the signal transmission model, 4 users are included, wherein a sender (a transmitting end) is a legal sender, the transmitting end transmits signals to a legal receiver, namely a receiving end, and the other two receivers are a monitoring user and an enemy user in the system respectively. Once an adversary user finds that there may be authentication information in the signal sent by the transmitting end, the adversary user will analyze the signal and attempt to extract, destroy, or even tamper with the authentication information. However, the present embodiment is not limited to this, and the number of the transmitting ends may be two or more, the number of the legitimate receivers may be two or more, and the number of the listening users and the number of the enemy users may be two or more.
In the present embodiment, it is assumed that the transmitting end and the receiving end have a key for authentication in common, so that the receiving end can extract authentication information from a signal transmitted by the transmitting end using the key. The authentication signal includes authentication information. In this embodiment, the carrier signal contains the authentication signal and the regular signal does not contain the authentication signal. The monitoring user has no knowledge about the authentication method, and although the signal sent by the transmitting terminal can be received and recovered, the signal cannot be deeply analyzed, and the authentication process is not influenced. An adversary user may perceive the presence of the authentication signal by analyzing the characteristics of the signal and intend to corrupt the authentication signal.
In this embodiment, the transmitting end in the signal model may include a base station or a user equipment. A base station (e.g., access point) can refer to a device in an access network that communicates over the air-interface, through one or more sectors, with wireless terminals. The base station may be configured to interconvert received air frames and IP packets as a router between the wireless terminal and the rest of the access network, which may include an Internet Protocol (IP) network. The base station may also coordinate management of attributes for the air interface. For example, the Base Station may be a Base Transceiver Station (BTS) in GSM or CDMA, a Base Station (NodeB) in WCDMA, or an evolved Node B (NodeB or eNB or e-NodeB) in LTE, and this embodiment is not limited thereto.
The user Device may include, but is not limited to, various electronic devices such as a smart Phone, a notebook computer, a Personal Computer (PC), a Personal Digital Assistant (PDA), a Mobile Internet Device (MID), a wearable Device (e.g., a smart watch, a smart bracelet, and smart glasses), wherein an operating system of the user Device may include, but is not limited to, an Android operating system, an IOS operating system, a Symbian operating system, a blackberry operating system, a Windows Phone8 operating system, and the like, and the present embodiment is not limited thereto.
In this embodiment, the transmitting end in the signal model transmits a signal to the receiving end through a wireless channel, wherein the receiving end may include a base station. A base station (e.g., access point) can refer to a device in an access network that communicates over the air-interface, through one or more sectors, with wireless terminals. The base station may be configured to interconvert received air frames and IP packets as a router between the wireless terminal and the rest of the access network, which may include an Internet Protocol (IP) network. The base station may also coordinate management of attributes for the air interface. For example, the Base Station may be a Base Transceiver Station (BTS) in GSM or CDMA, a Base Station (NodeB) in WCDMA, or an evolved Node B (NodeB or eNB or e-NodeB) in LTE, and this embodiment is not limited thereto.
The receiving end may further include a user Device, where the user Device may include but is not limited to various electronic devices such as a smart Phone, a notebook Computer, a Personal Computer (PC), a Personal Digital Assistant (PDA), a Mobile Internet Device (MID), a wearable Device (e.g., a smart watch, a smart bracelet, and smart glasses), and the like, where an operating system of the user Device may include but is not limited to an Android operating system, an IOS operating system, a Symbian operating system, a blackberry operating system, a Windows Phone8 operating system, and the like, and this embodiment is not limited.
The embodiment discloses a physical layer blind authentication method of a wireless communication frequency selective fading channel based on a smoothing technology. Fig. 2 is a schematic flow chart illustrating a physical layer blind authentication method according to an embodiment of the present invention. Fig. 3 is a schematic diagram illustrating a structure of a signal transmitted by a transmitting end of a physical layer blind authentication method according to an embodiment of the present invention.
In the present embodiment, the physical layer blind authentication method for a wireless communication frequency selective fading channel based on the smoothing technique is a physical layer authentication method for wireless communication in a wireless communication system having a transmitting end and a receiving end. Based on the signal transmission model described above, as shown in fig. 2, the transmitting end transmits a carrier signal to a wireless channel. The carrier signal includes an authentication signal, a pilot signal and an information signal. The authentication signal is superimposed on the pilot signal. The radio channel is a frequency selective fading channel having a plurality of paths (step S101).
In step S101, as shown in fig. 3, the carrier signal includes an authentication signal, a pilot signal and an information signal, and the authentication signal is superimposed on the pilot signal. The signal length of the authentication signal is equal to the signal length of the pilot signal. Thus, the superposition of the authentication signal to the pilot signal may avoid occupying additional signal bandwidth.
In this embodiment, the information signal contains information to be communicated by the transmitting end user. The carrier signal sent by the transmitting terminal is transmitted in blocks in the form of data blocks. Each block of the carrier signal comprises a pilot part and an information part. The pilot portion includes an authentication signal and a pilot signal, and the information portion includes an information signal. In addition, the carrier signal is transmitted in blocks in the form of data blocks, which facilitates manipulation of the data.
In this embodiment, the signal length of the authentication signal or the pilot signal is a first length, the signal length of the information signal is a second length, and the length of each carrier signal is a total length. The sum of the signal length of the authentication signal or pilot signal and the signal length of the information signal is equal to the length of each carrier signal. I.e. the sum of the first length and the second length equals the total length.
In this embodiment, the authentication signal is obtained by a pilot signal and a secret key. That is, the pilot signal and the secret key obtain the authentication signal by using the hash matrix. And superposing the obtained authentication signal to a pilot signal to obtain a pilot part of each carrier signal, wherein the signal expression of the pilot part is as follows:
mi=ρspitti(1)
in the above signal expression (1) of the pilot part,
Figure BDA0001506843960000091
and
Figure BDA0001506843960000092
a factor is assigned to the power of the pilot information and the authentication signal. Assuming that the authentication signal and the pilot signal are independent of each other, there are
Figure BDA0001506843960000093
In this embodiment, the pilot part signal and the information part signal are combined to form a carrier signal for each block.
In addition, in the present embodiment, the transmission channel of the carrier signal is a radio channel and is a frequency selective fading channel. The frequency selective fading channel has multiple paths, i.e., the frequency selective fading channel is a multi-path channel. The expression of the carrier signal after passing through the frequency selective fading channel is as follows:
yiL+k=hiL+kxiL+k+niL+k(2)
in the present embodiment, the channel response h of the frequency selective fading channeliL+kObeying a mean variance of 0 to
Figure BDA0001506843960000094
The complex gaussian distribution of (a) is,
Figure BDA0001506843960000095
for the noise at the receiving end, obey the variance of 0 mean to
Figure BDA0001506843960000096
Gaussian random variable of (2).
In the present embodiment, in the channel response,
Figure BDA0001506843960000097
is dynamic noise, and
Figure BDA0001506843960000098
in many types of scenarios, the value of a is available at the receiving end, whereas in actual wireless system scenarios, the range of a is within a very small interval, such as a ∈ [0.9, 1 ] in which]。
In this embodiment, the physical layer blind authentication method further includes that the receiving end receives the carrier signal, and sequentially performs Blind Known Interference Cancellation (BKIC) processing on the carrier signal in each path of the frequency selective fading channel to obtain the target signal. In the BKIC process, the pilot signal is canceled by a smoothing technique using adjacent symbols (step S102).
In this embodiment, the receiving end receives the carrier signal. The carrier signal contains a pilot part and an information part. The physical layer blind authentication method according to the present embodiment is mainly to process a pilot portion of a carrier signal at a receiving end. The expression for the pilot part of the carrier signal received at the receiving end is as follows:
Figure BDA0001506843960000101
in the present embodiment, the radio channel is a frequency selective fading channel. A frequency selective fading channel has multiple paths. Wherein D ismaxFor maximum delay information in multipath, D is usually used in broadband wireless communication systemsmaxAre known. For example, in an Orthogonal Frequency Division Multiplexing (OFDM) system, a predefined cyclic prefix determines the maximum delay among all paths.
In the present embodiment, the following processing for the carrier signal refers to processing for the pilot portion of the carrier signal.
In this embodiment, blind authentication techniques are used on each potential path of the frequency selective fading channel. Specifically, first, Blind Known Interference Cancellation (BKIC) processing may be performed on the carrier signal in the first path of the frequency selective fading channel, then, similarly, the pilot signal in the carrier signal in the second path of the frequency selective fading channel may be removed using the same Blind Known Interference Cancellation (BKIC) processing method, and D is repeatedmax+1 times the above-described Blind Known Interference Cancellation (BKIC) process, so that the pilot signals in the carrier signals in each path of the frequency selective fading channel are sequentially cancelled. I.e. the carrier signals in each path of the frequency selective fading channel are processed by Blind Known Interference Cancellation (BKIC) sequentially.
In step S102, the receiving end receives the carrier signal, and sequentially performs Blind Known Interference Cancellation (BKIC) processing on the carrier signal in each path of the frequency selective fading channel to obtain a target signal. Therein, the Blind Known Interference Cancellation (BKIC) process is to cancel the pilot signal in the carrier signal by a smoothing technique using adjacent symbols. The elimination of the pilot signal in the carrier signal usually requires the estimation of the channel condition, and if the channel response cannot be estimated effectively, the pilot signal in the carrier signal is difficult to eliminate. Blind known interference cancellation methods may cancel the pilot signal while avoiding estimating the channel.
In this embodiment, the carrier signal received by the receiving end may or may not include the authentication signal. The carrier signal is set to include the authentication information as a first condition, and the carrier signal is set to include no authentication information as a second condition.
Fig. 4 is a schematic diagram illustrating a processing flow of Blind Known Interference Cancellation (BKIC) at a receiving end of a physical layer blind authentication method according to an embodiment of the present invention.
In the present embodiment, as shown in fig. 4, the pilot signal in the carrier signal is cancelled on each path of the frequency selective fading channel in the same way. Specifically, the carrier signal on each path of the frequency selective fading channel is removed from the pilot signal by the BKIC processing method. The BKIC processing method includes determining an expression for each symbol under different conditions (step S401) and estimating a target signal using the expressions for the symbols (step S402).
In step S401, an expression for each symbol under different conditions is determined.
Under a first condition, the expression of each code element is as follows:
Figure BDA0001506843960000111
k∈{1,2,…,L1-1}
under the second condition, the expression for each symbol is as follows:
Figure BDA0001506843960000112
as can be seen from the above formula, there is correlated noise between adjacent symbols, the correlated noise in expression (4) cannot be corrected by the ordinary noise whitening technique, and the correlated noise needs to be removed by step S402, and h is estimatedkρttk+nk
In step S402, the target signal is estimated using the expression of the symbol, and the above expression (4) is expressed as follows:
Figure BDA0001506843960000113
Figure BDA0001506843960000114
the estimation results can be obtained as follows:
Figure BDA0001506843960000115
Figure BDA0001506843960000116
wherein ε in the expression (9)kIs due to the residual signal, epsilon, generated in the process of interference elimination by the BKIC modulekCan be modeled as a Gaussian distribution, for slow fading, (a → 1), εkHas a small variance of (a), so that y can be expressedkOfkRemoving to obtain an estimated hkρttk+nk. H estimated in each pathkρttk+nkAnd adding to obtain the estimated target signal without the pilot signal.
In step S102, the carrier signal is processed by BKIC to obtain a target signal, and the target signal is processed by a differential signal to obtain a target authentication signal.
In the present embodiment, the method of differential signal processing is as follows:
under the first condition, the expression of differential signal processing is as follows:
Figure BDA0001506843960000121
wherein ΔkFor residual signals, it can be modeled approximately as a 0 mean variance of
Figure BDA0001506843960000124
Gaussian random variable of (2).
Under the second condition, the expression of differential signal processing is as follows:
Figure BDA0001506843960000122
wherein
Figure BDA0001506843960000123
Is a zero mean complex gaussian random variable.
In this embodiment, the physical layer blind authentication method further includes, at the receiving end, obtaining a reference signal based on the key and the pilot signal, performing differential signal processing on the reference signal to obtain a reference authentication signal, and calculating a correlation between the target authentication signal and the reference authentication signal to obtain a test statistic (step S103).
In step S103, obtaining the reference signal based on the key and the pilot signal means obtaining the reference signal from the key and the pilot signal using the hash matrix. Therefore, the reference authentication signal is obtained by processing the reference signal, and whether the target authentication signal passes the authentication can be determined according to the correlation between the reference authentication signal and the target authentication signal.
In step S103, the reference signal is subjected to differential signal processing to obtain a reference authentication signal, the correlation between the target authentication signal and the reference authentication signal is calculated to obtain a test statistic, and a next determination can be made based on the value of the test statistic.
In the present embodiment, differential signal processing is performed on a reference signal to obtain a reference authentication signal. The method of differential signal processing is the same as the differential processing method in step S102 described above.
In step S102, the carrier signal received by the receiving end may include an authentication signal, and it is assumed that the carrier signal includes the authentication information as a first condition and the carrier signal does not include the authentication signal as a second condition.
At a receiving end, the carrier signal sequentially performs Blind Known Interference Cancellation (BKIC) processing on the carrier signal in each path of the frequency selective fading channel to obtain a target signal, and performs differential signal processing on the target signal to obtain a target authentication signal. At the receiving end, a reference signal is obtained based on the key and the pilot signal, and the reference signal is subjected to Differential (DP) signal processing to obtain a reference authentication signal. The rule of generating the reference signal by the hash matrix, the key and the pilot signal of the receiving end is the same as the rule of generating the authentication signal by the hash matrix, the key and the pilot signal of the transmitting end. The reference authentication signal may be considered as the authentication signal in the first condition and the target authentication signal may be considered as the carrier signal in the first condition. Thus, the first condition may be expressed as the reference authentication signal being included in the target authentication signal; the second condition may be expressed as the reference authentication signal not being included in the target authentication signal.
In this embodiment, the physical layer blind authentication method further includes comparing the test statistic with a predetermined threshold value to determine whether the carrier signal can be authenticated (step S104).
In step S104, if the test statistic is not less than the predetermined threshold, it is determined that the carrier signal passes the authentication; if the test statistic is less than the prescribed threshold, the carrier signal is determined to have failed authentication.
In this embodiment, if the test statistic is not less than the predetermined threshold, the carrier signal includes the reference authentication signal, that is, the carrier signal passes the authentication; if the test statistic is less than the prescribed threshold, the carrier signal does not contain the reference authentication signal, i.e. the carrier signal is not authenticated.
In the present embodiment, the predetermined threshold is obtained by assuming the verification condition, and the first condition and the second condition are the first condition H of the assumption verification condition, respectively1And a second condition H0
In the present embodiment, the first condition H1The test statistic is expressed as follows:
Figure BDA0001506843960000131
second Condition H0The test statistic is expressed as follows:
Figure BDA0001506843960000132
wherein,
Figure BDA0001506843960000133
is 0 mean variance of
Figure BDA0001506843960000134
Gauss random variable of phiiIs 0 mean variance of
Figure BDA0001506843960000135
Gaussian random variable of (2).
In addition, a threshold value is defined
Figure BDA0001506843960000136
Is composed of (tau)i|H0) Distribution-dependent false alarm probability epsilonFAThe decision, expressed as follows:
Figure BDA0001506843960000137
wherein (tau)i|H0) Is the test statistic obtained under the second condition, i.e., the statistical characteristic of the pilot signal. Thus, the prescribed threshold may be derived based on the statistical properties of the pilot signal and a preset upper limit of the false alarm probability.
In addition, in this embodiment, if the identity of the transmitting end is authenticated, the authentication signal can be used as an additional pilot signal to recover the signal. Thereby, the performance of signal symbol recovery and the performance of channel response estimation can be improved.
In addition, in the present embodiment, the authentication signal is superimposed on the pilot signal, thereby avoiding adverse effects on the extraction of the normal signal. Thereby, the reduction of the signal to interference plus noise ratio (SINR) at the receiving end is avoided.
In the embodiment, the physical layer blind authentication method of the wireless communication frequency selective fading channel based on the smoothing technology does not need to occupy extra signal bandwidth. In addition, when the information signal is extracted from the carrier signal at the receiving end, the authentication signal does not become noise of the information signal, that is, the authentication signal does not affect the extraction of the information signal. The authentication signal does not affect the statistical properties of the noise at the receiving end.
In this embodiment, the physical layer blind authentication method handles a frequency selective fading channel with multiple paths, that is, a multipath channel, and is more suitable for a complex and variable wireless communication environment in an actual communication scenario. In addition, the authentication signal is superposed in the pilot signal, and if the entirety of the signal obtained by superposing the authentication signal and the pilot signal is used as the pilot signal for channel estimation, the accuracy of channel estimation can be improved.
The embodiment discloses a physical layer blind authentication system of a wireless communication frequency selective fading channel based on a smoothing technology. Fig. 5 is a schematic diagram illustrating a signal processing module at a transmitting end of a physical layer blind authentication system according to an embodiment of the present invention. Fig. 6 is a schematic diagram illustrating a receiving end signal processing module of a physical layer blind authentication system according to an embodiment of the present invention.
In the present embodiment, as shown in fig. 5, the physical layer blind authentication system includes a transmitting device 20. The transmitting apparatus 20 comprises a first generating module 201, a second generating module 202 and a synthesizing module 203.
In the present embodiment, as shown in fig. 5, the first generation module 201 generates an authentication signal. I.e. the key and the pilot signal, are passed through the first generation module 201 to generate the authentication signal. The first generation module 201 includes a hash matrix. The authentication signal is obtained by using a hash matrix for the key and the pilot signal. Wherein, the obtained authentication signal has the same signal length as the pilot signal.
In this embodiment, the second generation module 202 generates the pilot portion of the carrier signal, as shown in fig. 5. I.e. the authentication signal is loaded onto the pilot signal by the second generating module 202, generating the pilot part of the carrier signal. The expression of the pilot part of the carrier signal is formula (1), and in addition, the length of the pilot part of the carrier signal is the signal length of the authentication signal or the signal length of the pilot signal.
In this embodiment, the synthesis module 203 generates a carrier signal as shown in fig. 5. I.e. the pilot part and the information part of the carrier signal are combined together by the synthesis module 203 to generate the carrier signal. The information part of the carrier signal is an information signal.
In this embodiment, the carrier signal is transmitted in blocks of data. Each block of the carrier signal comprises a pilot part and an information part. The sum of the signal length of the authentication signal or pilot signal and the signal length of the information signal is equal to the length of each carrier signal. In addition, the carrier signal is transmitted in blocks in the form of data blocks, which facilitate manipulation of the data.
In the present embodiment, the carrier signal generated by the transmitting apparatus 20 at the transmitting end reaches the receiving apparatus 30 at the receiving end through a wireless channel. In addition, the radio channel is a frequency selective fading channel having a plurality of paths.
In the present embodiment, the physical layer blind authentication system further includes a receiving apparatus 30. The receiving device 30 includes a first processing module, a second processing module, and a determination module.
In this embodiment, the first processing module comprises a Blind Known Interference Cancellation (BKIC) module 301. The carrier signal passes through a Blind Known Interference Cancellation (BKIC) module 301. Specifically, the carrier signal in each path of the frequency selective fading channel is sequentially subjected to Blind Known Interference Cancellation (BKIC) processing by a Blind Known Interference Cancellation (BKIC) module 301, and the pilot signal in the carrier frequency signal is cancelled.
In the present embodiment, the Blind Known Interference Cancellation (BKIC) module 301 employs a BKIC processing method of canceling a pilot signal by using adjacent symbols in step S102 and using a smoothing technique. As shown in fig. 4, the BKIC process includes determining an expression for each symbol under different conditions (step S401) and estimating a target signal using the expression for the symbol (step S402).
In this embodiment, as shown in fig. 6, the first processing module further includes a Difference (DP) processing module 302. The DP processing module 302 employs the differential signal processing method in step S102. The DP processing module 302 performs differential signal processing on the target signal to obtain a target authentication signal. Thereby eliminating h in the target authentication signalkI.e. the influence of the cancellation channel on the carrier signal.
In the DP processing block 302, under a first condition, differential signalsThe expression of the process is formula (10), where ΔkFor residual signals, it can be modeled approximately as a 0 mean variance of
Figure BDA0001506843960000151
Gaussian random variable of (2). Under a second condition, the expression of the differential signal processing is formula (11), where
Figure BDA0001506843960000161
Is a zero mean complex gaussian random variable.
In this embodiment, as shown in fig. 6, the second processing module further includes a hash matrix processing module 303. The pilot signal and the key are passed through a hash matrix processing module 303 to obtain a reference signal. The hash matrix processing module 303 employs the method of generating the reference signal in step S103. The hash matrix processing module 303 includes a hash matrix.
In this embodiment, as shown in fig. 6, the second processing module further includes a Difference (DP) processing module 304. The Difference (DP) processing module 304 performs difference signal processing on the reference signal to obtain a reference authentication signal. The DP processing block 304 employs the differential signal processing method in step S103.
In this embodiment, as shown in fig. 6, the second processing module further includes an operation module 305. The operation module 305 is used to calculate the test statistic of the target authentication signal and the reference authentication signal. The calculation method used by the operation module 305 is the calculation method in step S103.
In this embodiment, as shown in fig. 6, the second processing module further includes a determination module 306. The decision block 306 determines whether the target authentication signal is authenticated by comparing the test statistic to a prescribed threshold. I.e. to determine whether the carrier signal can be authenticated.
In this embodiment, the predetermined threshold in the determination module 306 is obtained based on the statistical characteristics of the pilot signal and a preset upper limit of the false alarm probability. The predetermined threshold value is calculated in step S103.
The present embodiment discloses a physical layer blind authentication device 50 for a wireless communication frequency selective fading channel based on a smoothing technique. Fig. 7 is a schematic structural diagram illustrating a physical layer blind authentication device according to an embodiment of the present invention. In this embodiment, both the transmitting end and the receiving end include an authentication device 50 as shown in fig. 7.
In the present embodiment, as shown in fig. 7, the authentication device 50 includes a processor 501 and a memory 502. The processor 501 and the memory 502 are connected to a communication bus, respectively. The memory 502 may be a high-speed RAM memory or a non-volatile memory (non-volatile memory). Those skilled in the art will appreciate that the configuration of the authentication device 50 shown in fig. 7 is not intended to limit the present invention, and may be a bus configuration, a star configuration, a combination of more or fewer components than those shown in fig. 7, or a different arrangement of components.
The processor 501 is a control center of the authentication device, and may be a Central Processing Unit (CPU), and the processor 501 is connected to various parts of the entire authentication device by using various interfaces and lines, and executes or executes software programs and/or modules stored in the memory 502 and calls a program code stored in the memory 502 to perform the following operations:
the transmitting end transmits a carrier signal including an authentication signal superimposed to a pilot signal, and an information signal to a wireless channel which is a frequency selective fading channel having a plurality of paths (performed by the authentication device 50 of the transmitting end).
A receiving end receives a carrier signal, sequentially carries out Blind Known Interference Cancellation (BKIC) processing on the carrier signal in each path of a frequency selective fading channel to obtain a target signal, carries out differential signal processing on the target signal to obtain a target authentication signal, and eliminates a pilot signal by using adjacent code elements through a smoothing technology in the BKIC processing; in a receiving end, obtaining a reference signal based on a secret key and a pilot signal, carrying out differential signal processing on the reference signal to obtain a reference authentication signal, and calculating the correlation between a target authentication signal and the reference authentication signal to obtain test statistic; and compares the test statistic with a prescribed threshold value to determine whether the carrier signal can pass authentication (performed by the authentication device 50 at the receiving end).
In the present embodiment, the processor 501 of the authentication device 50 at the transmitting end further performs the following operations: the carrier signal is transmitted in blocks in the form of data blocks.
In the present embodiment, the processor 501 of the authentication device 50 at the transmitting end further performs the following operations: in each block of the carrier signal, the sum of the signal length of the pilot signal and the signal length of the information signal is equal to the signal length of the carrier signal.
In the present embodiment, the processor 501 of the authentication device 50 on the receiving side further performs the following operations: a reference signal is obtained based on the key and the pilot signal using a hash matrix.
In the present embodiment, the processor 501 of the authentication device 50 on the receiving side further performs the following operations: if the test statistic is not less than the prescribed threshold, the carrier signal is authenticated.
In the present embodiment, the processor 501 of the authentication device 50 on the receiving side further performs the following operations: the prescribed threshold is obtained based on the statistical properties of the pilot signal and a preset upper limit of the false alarm probability.
In this embodiment, it should be understood that the disclosed apparatus may be implemented in other ways. For example, the above-described device embodiments are merely illustrative, and for example, the division of the units is merely a logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection of some interfaces, devices or units, and may be an electric or other form.
Units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, each functional unit in the embodiments of the present invention may be integrated into one processing unit, each unit may exist alone physically, or two or more units may be integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable memory. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a memory and includes several instructions for causing a computer device (which may be a personal computer, a server, a network device, or the like) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned memory comprises: a U-disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic or optical disk, and other various media capable of storing program codes.
The present embodiment discloses a computer readable storage medium, and those skilled in the art can understand that all or part of the steps in the various physical layer blind authentication methods of the foregoing embodiments can be implemented by a program (instructions) to instruct related hardware, where the program (instructions) can be stored in a computer readable memory (storage medium), where the memory can include: flash Memory disks, Read-Only memories (ROMs), Random Access Memories (RAMs), magnetic or optical disks, and the like.
While the invention has been specifically described above in connection with the drawings and examples, it will be understood that the above description is not intended to limit the invention in any way. Those skilled in the art can make modifications and variations to the present invention as needed without departing from the true spirit and scope of the invention, and such modifications and variations are within the scope of the invention.

Claims (11)

1. A blind authentication method of frequency selective fading channel based on smoothing technique is a physical layer authentication method of wireless communication system with transmitting end and receiving end,
the method comprises the following steps:
the transmitting terminal transmits a carrier signal to a wireless channel, wherein the carrier signal comprises an authentication signal, a pilot signal and an information signal, the authentication signal is superposed to the pilot signal, and the wireless channel is a frequency selective fading channel with a plurality of paths;
the receiving end receives the carrier signal, sequentially carries out blind known interference elimination processing on the carrier signal in each path of the frequency selective fading channel to obtain a target signal, carries out differential signal processing on the target signal to obtain a target authentication signal, and eliminates the pilot signal by using adjacent code elements through a smoothing technology in the blind known interference elimination processing;
in the receiving end, obtaining a reference signal based on a secret key and the pilot signal, carrying out differential signal processing on the reference signal to obtain a reference authentication signal, and calculating the correlation between the target authentication signal and the reference authentication signal to obtain a test statistic; and is
Comparing the test statistic to a prescribed threshold to determine whether the carrier signal is capable of being authenticated.
2. The blind authentication method of claim 1, wherein:
the carrier signal is transmitted in blocks in the form of data blocks.
3. The blind authentication method of claim 2, wherein:
in each of the carrier signals, a sum of a signal length of the pilot signal and a signal length of the information signal is equal to a signal length of the carrier signal.
4. The blind authentication method of claim 1,
obtaining the reference signal based on the key and the pilot signal using a hash matrix.
5. The blind authentication method of claim 1,
if the test statistic is not less than the prescribed threshold, the carrier signal is authenticated.
6. The blind authentication method of claim 1,
the prescribed threshold is obtained based on statistical characteristics of the pilot signal and a preset false alarm probability upper limit.
7. A blind authentication device for frequency selective fading channel based on smoothing technique is characterized in that,
the method comprises the following steps:
a processor executing a memory-stored computer program to implement the blind authentication method of any one of claims 1 to 6; and
the memory.
8. A computer-readable storage medium, characterized in that,
the computer-readable storage medium stores at least one instruction that, when executed by a processor, implements the blind authentication method of any one of claims 1 to 6.
9. A blind authentication system of frequency selective fading channel based on smoothing technique is characterized in that,
a transmitting device that transmits a carrier signal including an authentication signal, a pilot signal, and an information signal to a wireless channel, the authentication signal being superimposed to the pilot signal, the wireless channel being a frequency selective fading channel having a plurality of paths; and
a receiving device, comprising: a first processing module, configured to receive the carrier signal, sequentially perform blind known interference cancellation processing on the carrier signal in each path of the frequency selective fading channel to obtain a target signal, perform differential signal processing on the target signal to obtain a target authentication signal, and in the blind known interference cancellation processing, cancel the pilot signal by using adjacent symbols through a smoothing technique; the second processing module is used for obtaining a reference signal based on a secret key and the pilot signal, carrying out differential signal processing on the reference signal to obtain a reference authentication signal, and calculating the correlation between the target authentication signal and the reference authentication signal subjected to differential signal processing to obtain a test statistic; and a decision module that compares the test statistic to a prescribed threshold to determine whether the carrier signal is authentic.
10. The blind authentication system of claim 9,
the second processing module obtains the reference signal based on the key and the pilot signal using a hash matrix.
11. The blind authentication system of claim 9,
in the decision module, the predetermined threshold is obtained based on statistical characteristics of the pilot signal and a preset false alarm probability upper limit.
CN201711336107.3A 2017-12-13 2017-12-13 Blind authentication method and system of frequency selective fading channel based on smoothing technology Active CN108156102B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711336107.3A CN108156102B (en) 2017-12-13 2017-12-13 Blind authentication method and system of frequency selective fading channel based on smoothing technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711336107.3A CN108156102B (en) 2017-12-13 2017-12-13 Blind authentication method and system of frequency selective fading channel based on smoothing technology

Publications (2)

Publication Number Publication Date
CN108156102A CN108156102A (en) 2018-06-12
CN108156102B true CN108156102B (en) 2020-06-26

Family

ID=62467197

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711336107.3A Active CN108156102B (en) 2017-12-13 2017-12-13 Blind authentication method and system of frequency selective fading channel based on smoothing technology

Country Status (1)

Country Link
CN (1) CN108156102B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109068284B (en) * 2018-09-28 2021-05-25 深圳大学 Physical layer authentication method and system based on group connection among Internet of things devices
CN109168166B (en) * 2018-11-22 2020-08-18 深圳大学 Safety detection method of physical layer authentication system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103733560A (en) * 2011-08-12 2014-04-16 交互数字专利控股公司 Flexible bandwidth operation in wireless systems
CN105635125A (en) * 2015-12-25 2016-06-01 电子科技大学 Physical layer combined authentication method based on RF fingerprint and channel information
CN106664194A (en) * 2014-04-04 2017-05-10 尼克根合伙Ip有限责任公司 System and method for communication using orbital angular momentum with multiple layer overlay modulation
CN107196920A (en) * 2017-04-28 2017-09-22 中国人民解放军信息工程大学 A kind of key towards wireless communication system produces distribution method

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9538040B2 (en) * 2011-12-16 2017-01-03 University Of Maryland, College Park Active sensing for dynamic spectrum access

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103733560A (en) * 2011-08-12 2014-04-16 交互数字专利控股公司 Flexible bandwidth operation in wireless systems
CN106664194A (en) * 2014-04-04 2017-05-10 尼克根合伙Ip有限责任公司 System and method for communication using orbital angular momentum with multiple layer overlay modulation
CN105635125A (en) * 2015-12-25 2016-06-01 电子科技大学 Physical layer combined authentication method based on RF fingerprint and channel information
CN107196920A (en) * 2017-04-28 2017-09-22 中国人民解放军信息工程大学 A kind of key towards wireless communication system produces distribution method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
"基于哈希方法的物理层认证机制";季新生等;《电子与信息学报》;20160719;全文 *

Also Published As

Publication number Publication date
CN108156102A (en) 2018-06-12

Similar Documents

Publication Publication Date Title
Xie et al. Blind authentication at the physical layer under time-varying fading channels
US9538040B2 (en) Active sensing for dynamic spectrum access
CN108206795B (en) Blind authentication method and system of frequency selective fading channel based on confidence transfer
CN110381510B (en) Non-orthogonal multiple access authentication system based on superimposed physical layer authentication label
EP3991370B1 (en) Method, transmitter device and receiver device for securing channel training on a power domain non- orthogonal multiple access system
US20220116212A1 (en) Process for monovalent one-to-one extraction of keys from the propagation channel
CN108173791B (en) Physical layer blind authentication method and system of time-varying fading channel based on smoothing technology
CN108156102B (en) Blind authentication method and system of frequency selective fading channel based on smoothing technology
CN110324830B (en) Non-orthogonal multiple access authentication system based on time division multiplexing physical layer authentication label
CN108199991B (en) Physical layer blind authentication method and system of time-varying fading channel based on confidence transfer
Sabuj et al. Detection of intelligent malicious user in cognitive radio network by using friend or foe (FoF) detection technique
US11412378B2 (en) Smoothing technology-based blind authentication method and system for frequency selective fading channel
CN110392371B (en) Optimization method of non-orthogonal multiple access authentication system based on time division multiplexing authentication label
CN110312255B (en) Parameter optimization method of non-orthogonal multiple access authentication system based on superimposed authentication tags
CN108882236B (en) Physical layer signal watermark embedding method based on S transformation
Wang et al. CovertMIMO: A covert uplink transmission scheme for MIMO systems
Fang et al. Towards phy-aided authentication via weighted fractional fourier transform
La Pan et al. Physical layer orthogonal frequency‐division multiplexing acquisition and timing synchronization security
CN108966223B (en) Physical layer authentication method and system based on single-bit covert protocol
US11510055B2 (en) Smoothing-technology-based physical layer blind authentication method and system for time-varying fading channel
CN111683363A (en) Physical layer authentication method and system in spatial domain modulation system
US10924318B2 (en) Belief propagation-based blind authentication method and system for frequency selective fading channel
CN111148101A (en) Physical layer group authentication method
CN109600742A (en) Hidden wireless communication physical layer slope authentication method and device
Peng et al. Channel-Robust Radio Frequency Fingerprint Identification for Cellular Uplink LTE Devices

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant