CN108206795B - Blind authentication method and system of frequency selective fading channel based on confidence transfer - Google Patents

Blind authentication method and system of frequency selective fading channel based on confidence transfer Download PDF

Info

Publication number
CN108206795B
CN108206795B CN201711336109.2A CN201711336109A CN108206795B CN 108206795 B CN108206795 B CN 108206795B CN 201711336109 A CN201711336109 A CN 201711336109A CN 108206795 B CN108206795 B CN 108206795B
Authority
CN
China
Prior art keywords
signal
authentication
blind
carrier
pilot
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201711336109.2A
Other languages
Chinese (zh)
Other versions
CN108206795A (en
Inventor
谢宁
张莉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen University
Original Assignee
Shenzhen University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen University filed Critical Shenzhen University
Priority to CN201711336109.2A priority Critical patent/CN108206795B/en
Publication of CN108206795A publication Critical patent/CN108206795A/en
Application granted granted Critical
Publication of CN108206795B publication Critical patent/CN108206795B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L25/00Baseband systems
    • H04L25/02Details ; arrangements for supplying electrical power along data transmission lines
    • H04L25/0202Channel estimation
    • H04L25/0238Channel estimation using blind estimation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L25/00Baseband systems
    • H04L25/02Details ; arrangements for supplying electrical power along data transmission lines
    • H04L25/0202Channel estimation
    • H04L25/0222Estimation of channel variability, e.g. coherence bandwidth, coherence time, fading frequency
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L25/00Baseband systems
    • H04L25/02Details ; arrangements for supplying electrical power along data transmission lines
    • H04L25/0202Channel estimation
    • H04L25/0224Channel estimation using sounding signals
    • H04L25/0226Channel estimation using sounding signals sounding signals per se

Abstract

The invention discloses a blind authentication method of a frequency selective fading channel based on confidence transfer, which comprises the steps of transmitting a carrier signal to the frequency selective fading channel with a plurality of paths, wherein the carrier signal comprises an authentication signal, a pilot signal and an information signal, and the authentication signal is superposed to the pilot signal; receiving carrier signals, sequentially carrying out Blind Known Interference Cancellation (BKIC) processing on the carrier signals in each path to obtain target signals, carrying out differential signal processing on the target signals to obtain target authentication signals, and eliminating pilot signals through a confidence transfer technology by the BKIC processing by utilizing a prior probability density function and a Tanner graph of the target signals; obtaining a reference signal based on the key and the pilot signal, performing differential signal processing on the reference signal to obtain a reference authentication signal, and calculating the correlation between the target authentication signal and the reference authentication signal to obtain a test statistic; and compares the test statistic with a prescribed threshold to determine whether the carrier signal can be authenticated.

Description

Blind authentication method and system of frequency selective fading channel based on confidence transfer
Technical Field
The invention relates to the technical field of wireless communication, in particular to a frequency selective fading channel blind authentication method and system based on confidence transfer.
Background
The authentication technology of the current physical layer mainly has three types, the first authentication technology is a spread spectrum technology (Auth-SS), the basic idea is to adopt the traditional direct sequence spread spectrum or frequency modulation technology, and because different pulses adopt different frequencies, certain bandwidth needs to be sacrificed when the authentication is realized by the technology. Furthermore, a key limitation of the Auth-SS technology is to allow only users with knowledge of the a priori knowledge about the spread spectrum technology to participate in the communication. Therefore, the application range of the technology is narrow.
The second is based on time division multiplexing authentication technology (Auth-TDM), and the basic idea is that the transmitting end periodically sends information signals and authentication signals alternately. The receiving end directly extracts expected authentication information after receiving the signal to realize the purpose of authenticating the signal. Auth-TDM is an authentication technique proposed in the early development of wireless communication, and has the advantages of simple operation and no need of preprocessing the authentication signal and information (possibly encryption for security reasons) before transmitting the signal. The authentication signal is independent of the information signal transmission, so a certain bandwidth needs to be occupied, and with the continuous increase of the amount of wireless information, the further improvement of the information privacy of a user and the continuous enhancement of an attack technology of an adversary, the security of the authentication technology is greatly challenged, and the requirements of the user cannot be met.
The third authentication technology is the authentication superposition technology (Auth-SUP), and the basic idea is to superpose the authentication signal on the information signal (the superposition mode can be arbitrary and is determined by the key), and then the information signal is simultaneously transmitted by the transmitting terminal, and the receiving terminal extracts the authentication signal in the superposed signal by using the key after receiving the signal, so as to achieve the purpose of signal authentication.
Compared with the early Auth-TDM technology, the Auth-SUP authentication technology needs to process the authentication signal and the information signal before signal transmission, puts forward a certain requirement on the signal processing capability of a transmitting end, is more complicated to realize than the Auth-TDM technology, and simultaneously transmits the authentication signal and the information signal, so that extra bandwidth is not occupied. At this time, since the authentication signal is superimposed in the information signal, the receiving end needs to extract the information after receiving the signal, the signal processing difficulty is higher than that of the Auth-TDM technology, but the concealment of the authentication information is higher than that of the Auth-TDM. In addition, since the authentication signal plays a role of noise for extracting the information signal, the SNR of the receiving end is correspondingly reduced, and the extraction of the information signal is adversely affected.
The existing Auth-TDM and Auth-SUP authentication techniques transmit another pilot signal in addition to the information signal and the authentication signal. The two authentication techniques require that the receiving end estimates the channel parameters and recovers the symbols after receiving the signals, and then extracts the authentication signals, and at this time, certain requirements are also provided for the signal processing capability of the receiving end.
In addition, Auth-TDM, Auth-SS and Auth-SUP all expose the fact that the Auth-TDM, Auth-SS and Auth-TDM technologies are more likely to attract the attention of other users, especially hostile users, in a scene compared with conventional signals which do not contain authentication information, the hostile users analyze, counterfeit or tamper with the signals, and a legal receiving end cannot authenticate the expected signals. In contrast, Auth-SUP authentication techniques are significantly more covert than Auth-SS and Auth-TDM. However, this advantage is based on the premise that the computing power of the adversary user has certain limitations, and once the computing power of the adversary user is increased, the authentication information is likely to be extracted or even destroyed.
It has to be mentioned that the existing Auth-SS technology and Auth-SUP technology have a very degraded performance in the frequency selective fading channel scenario. However, with the increasing number of wireless communication users, the communication environment is also more complex and the possibility of interference is higher and higher, and with the increasing number of urban communication users and the continuous development of cities, a simple time-invariant fading channel or a simple time-variant fading channel scene is not enough to depict the current communication environment. Especially, since the blocking of urban buildings causes multipath fading to be a normal state, a wireless communication physical layer authentication technology based on a frequency selective fading channel has to be considered to improve the security of wireless communication and meet the communication security requirement of users.
Disclosure of Invention
The present invention has been made in view of the above circumstances, and an object of the present invention is to provide a method, an apparatus, and a system for blind authentication of a frequency selective fading channel based on belief propagation, which do not occupy an additional signal bandwidth, do not cause an authentication signal to be noise that affects extraction of an information signal from a carrier signal, and do not affect statistical characteristics of noise at a receiving end.
To this end, a first aspect of the present invention provides a blind authentication method for a frequency selective fading channel based on belief propagation, which is a physical layer authentication method for wireless communication in a wireless communication system having a transmitting end and a receiving end, the method comprising: the transmitting terminal transmits a carrier signal to a wireless channel, wherein the carrier signal comprises an authentication signal, a pilot signal and an information signal, the authentication signal is superposed to the pilot signal, and the wireless channel is a frequency selective fading channel with a plurality of paths; the receiving end receives the carrier signal, sequentially carries out Blind Known Interference Cancellation (BKIC) processing on the carrier signal in each path of the frequency selective fading channel to obtain a target signal, carries out differential signal processing on the target signal to obtain a target authentication signal, and utilizes a prior probability density function and a Tanner graph of the target signal to cancel the pilot signal through a confidence transfer technology in the BKIC processing; in the receiving end, obtaining a reference authentication signal based on a secret key and the pilot signal, and calculating the correlation between the target authentication signal and the reference authentication signal to obtain a test statistic; and determining whether the test statistic is not less than a prescribed threshold to determine whether the carrier signal is authentic.
In the present invention, the authentication signal is superimposed on the pilot signal. Therefore, the signal-to-interference-and-noise ratio of the receiving end can not be influenced. The BKIC processing eliminates the pilot signal by a belief transfer technique using a prior probability density function and a Tanner graph of the target signal. In this case, the pilot signal can be cancelled by a belief transfer technique without estimating the channel.
In the blind authentication method according to the first aspect of the present invention, the carrier signal is transmitted in blocks in the form of data blocks. Thereby, manipulation of data is facilitated.
In the blind authentication method according to the first aspect of the present invention, in each of the carrier signals, a sum of a signal length of the pilot signal and a signal length of the information signal is equal to a signal length of the carrier signal.
In addition, in the blind authentication method according to the first aspect of the present invention, the reference signal is obtained based on the key and the pilot signal using a hash matrix. Therefore, the reference authentication signal is obtained by processing the reference signal, and whether the target authentication signal passes the authentication can be determined according to the correlation between the reference authentication signal and the target authentication signal.
In the blind authentication method according to the first aspect of the present invention, the carrier signal is authenticated if the test statistic is not less than the predetermined threshold value.
In the blind authentication method according to the first aspect of the present invention, the predetermined threshold is obtained based on a statistical characteristic of the pilot signal and a preset upper limit of a false alarm probability.
A second aspect of the present invention provides a blind authentication device for a frequency selective fading channel based on belief propagation, comprising a processor executing a computer program stored in the memory to implement the physical layer blind authentication method of any one of the above; and a memory.
A third aspect of the invention provides a computer-readable storage medium. The computer-readable storage medium stores at least one instruction that when executed by a processor implements the blind authentication method of any of the first aspects above.
A fourth aspect of the present invention provides a blind authentication system for a frequency selective fading channel based on belief propagation, which includes a transmitting device that transmits a carrier signal to a wireless channel, the carrier signal including an authentication signal, a pilot signal, and an information signal, the authentication signal being superimposed to the pilot signal, the wireless channel being a frequency selective fading channel having a plurality of paths; the receiving device comprises a first processing module, a second processing module and a judging module, wherein the first processing module receives the carrier signal, sequentially carries out Blind Known Interference Cancellation (BKIC) processing on the carrier signal in each path of the frequency selective fading channel to obtain a target signal, carries out differential signal processing on the target signal to obtain a target authentication signal, the BKIC processing utilizes a prior probability density function and a Tanner graph of the target signal to eliminate the pilot signal through a confidence transfer technology, and the second processing module obtains a reference signal on the basis of a secret key and the pilot signal, carries out differential signal processing on the reference signal to obtain a reference authentication signal and calculates the correlation between the target authentication signal and the reference authentication signal subjected to differential signal processing to obtain a test statistic; and a decision module that compares the test statistic to a prescribed threshold to determine whether the carrier signal is authentic.
In the present invention, the transmitting device of the blind authentication system superimposes the authentication signal on the pilot signal. Therefore, extra transmission bandwidth resources can not be occupied. And the receiving device BKIC of the blind authentication system eliminates the pilot signal through a confidence transfer technology by utilizing the prior probability density function and the Tanner graph of the target signal. In this case, the receiving apparatus can cancel the pilot signal by the belief transfer technique while avoiding estimating the channel.
In the blind authentication system according to the fourth aspect of the present invention, the second processing module obtains the reference signal based on the key and the pilot signal by using a hash matrix. Therefore, the reference authentication signal is obtained by processing the reference signal, and whether the target authentication signal passes the authentication can be determined according to the correlation between the reference authentication signal and the target authentication signal.
In the blind authentication system according to the fourth aspect of the present invention, the predetermined threshold in the determination module is obtained based on a statistical characteristic of the pilot signal and a preset upper limit of a false alarm probability.
Compared with the prior art, the implementation mode of the invention has the following beneficial effects:
compared with the existing Auth-SS, Auth-SUP and Auth-TDM, the invention realizes the authentication of the physical layer of the wireless communication without occupying extra signal bandwidth, and the authentication signal does not become noise which affects the extraction of the received signal and does not affect the statistical characteristic of the noise of the receiving end. The blind authentication technology provided by the invention processes a frequency selective fading channel, and is more suitable for complex and changeable wireless communication environments in actual communication scenes. In addition, since the authentication signal is superimposed in the pilot signal, if the entirety of the signal obtained by superimposing the authentication signal and the pilot signal is used as the pilot signal for channel estimation, the accuracy of channel estimation can be improved.
Drawings
Fig. 1 is a signal transmission diagram illustrating a physical layer blind authentication method according to an embodiment of the present invention.
Fig. 2 is a schematic flow chart illustrating a physical layer blind authentication method according to an embodiment of the present invention.
Fig. 3 is a schematic diagram illustrating a structure of a signal transmitted by a transmitting end of a physical layer blind authentication method according to an embodiment of the present invention.
Fig. 4 is a schematic diagram illustrating a processing flow of Blind Known Interference Cancellation (BKIC) at a receiving end of a physical layer blind authentication method according to an embodiment of the present invention.
Fig. 5 is a schematic diagram illustrating a signal processing module at a transmitting end of a physical layer blind authentication system according to an embodiment of the present invention.
Fig. 6 is a schematic diagram illustrating a receiving end signal processing module of a physical layer blind authentication system according to an embodiment of the present invention.
Fig. 7 is a schematic structural diagram illustrating a physical layer blind authentication device according to an embodiment of the present invention.
Detailed Description
Hereinafter, preferred embodiments of the present invention will be described in detail with reference to the accompanying drawings. In the following description, the same components are denoted by the same reference numerals, and redundant description thereof is omitted. The drawings are schematic and the ratio of the dimensions of the components and the shapes of the components may be different from the actual ones.
It should be noted that the terms "first", "second", "third" and "fourth", etc. in the description and claims of the present invention and the above-mentioned drawings are used for distinguishing different objects and are not used for describing a specific order. Furthermore, the terms "include" and "have," as well as any variations thereof, are intended to cover non-exclusive inclusions. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those steps or elements listed, but may alternatively include other steps or elements not listed, or inherent to such process, method, article, or apparatus.
The embodiment discloses a blind authentication method, equipment and a system of a frequency selective fading channel based on confidence transfer, and relates to a physical layer authentication method, equipment and a system of wireless communication of a wireless communication system with a transmitting end and a receiving end. That is, the present embodiment discloses a physical layer blind authentication method, device and system for a wireless communication frequency selective fading channel based on a belief transfer technique. Which can more accurately perform physical layer authentication. The following detailed description is made with reference to the accompanying drawings.
Fig. 1 is a signal transmission diagram illustrating a physical layer blind authentication method according to an embodiment of the present invention.
In the present embodiment, as shown in fig. 1, the physical layer blind authentication method for the frequency selective fading channel of wireless communication based on the belief propagation technology is based on a general signal transmission model. In the signal transmission model, 4 users are included, wherein a sender (a transmitting end) is a legal sender, the transmitting end transmits signals to a legal receiver, namely a receiving end, and the other two receivers are a monitoring user and an enemy user in the system respectively. Once an adversary user finds that there may be authentication information in the signal sent by the transmitting end, the adversary user will analyze the signal and attempt to extract, destroy, or even tamper with the authentication information. However, the present embodiment is not limited to this, and the number of the transmitting ends may be two or more, the number of the legitimate receivers may be two or more, and the number of the listening users and the number of the enemy users may be two or more.
In the present embodiment, it is assumed that the transmitting end and the receiving end have a key for authentication in common, so that the receiving end can extract authentication information from a signal transmitted by the transmitting end using the key. The authentication signal includes authentication information. In this embodiment, the carrier signal contains the authentication signal and the regular signal does not contain the authentication signal. The monitoring user has no knowledge about the authentication method, and although the signal sent by the transmitting terminal can be received and recovered, the signal cannot be deeply analyzed, and the authentication process is not influenced. An adversary user may perceive the presence of the authentication signal by analyzing the characteristics of the signal and intend to corrupt the authentication signal.
The Base Station may be configured to translate received air frames and IP packets to and from each other as a router between the wireless terminal and the rest of the access network, wherein the rest of the access network may include an Internet Protocol (IP) network.
The user Device may include, but is not limited to, a smart Phone, a notebook computer, a Personal Computer (PC), a Personal Digital Assistant (PDA), a Mobile Internet Device (MID), a wearable Device (e.g., a smart watch, a smart bracelet, and smart glasses), and other electronic devices, wherein an operating system of the user Device may include, but is not limited to, an Android operating system, an IOS operating system, a Symbian operating system, a blackberry operating system, a Windows Phone8 operating system, and the like, and the present embodiment is not limited thereto.
In this embodiment, the transmitting end in the signal model transmits a signal to the receiving end through a wireless channel, where the receiving end may include a Base Station (e.g., an access point) may refer to a device in an access network that communicates with a wireless terminal over an air interface through one or more sectors.a Base Station may be configured to convert received air frames and IP packets into each other as a router between the wireless terminal and the rest of the access network, where the rest of the access network may include an Internet Protocol (IP) network.
The receiving end may further include a user Device, where the user Device may include but is not limited to various electronic devices such as a smart Phone, a notebook Computer, a Personal Computer (PC), a Personal Digital Assistant (PDA), a Mobile Internet Device (MID), a wearable Device (e.g., a smart watch, a smart bracelet, and smart glasses), and the like, where an operating system of the user Device may include but is not limited to an Android operating system, an IOS operating system, a Symbian operating system, a blackberry operating system, a Windows Phone8 operating system, and the like, and this embodiment is not limited.
The embodiment discloses a physical layer blind authentication method of a wireless communication frequency selective fading channel based on a belief transfer technology. Fig. 2 is a schematic flow chart illustrating a physical layer blind authentication method according to an embodiment of the present invention. Fig. 3 is a schematic diagram illustrating a structure of a signal transmitted by a transmitting end of a physical layer blind authentication method according to an embodiment of the present invention.
In the present embodiment, the physical layer blind authentication method for a wireless communication frequency selective fading channel based on the belief transfer technique is a physical layer authentication method for wireless communication in a wireless communication system having a transmitting end and a receiving end. Based on the signal transmission model described above, as shown in fig. 2, the transmitting end transmits a carrier signal to a wireless channel. The carrier signal includes an authentication signal, a pilot signal and an information signal. The authentication signal is superimposed on the pilot signal. The radio channel is a frequency selective fading channel having a plurality of paths (step S101).
In step S101, as shown in fig. 3, the carrier signal includes an authentication signal, a pilot signal and an information signal, and the authentication signal is superimposed on the pilot signal. The signal length of the authentication signal is equal to the signal length of the pilot signal. Thus, the superposition of the authentication signal to the pilot signal may avoid occupying additional signal bandwidth.
In this embodiment, the information signal contains information to be communicated by the transmitting end user. The carrier signal sent by the transmitting terminal is transmitted in blocks in the form of data blocks. Each block of the carrier signal comprises a pilot part and an information part. The pilot portion includes an authentication signal and a pilot signal, and the information portion includes an information signal. In addition, the carrier signal is transmitted in blocks in the form of data blocks, which facilitates manipulation of the data.
In this embodiment, the signal length of the authentication signal or the pilot signal is a first length, the signal length of the information signal is a second length, and the length of each carrier signal is a total length. The sum of the signal length of the authentication signal or pilot signal and the signal length of the information signal is equal to the length of each carrier signal. I.e. the sum of the first length and the second length equals the total length.
In this embodiment, the authentication signal is obtained by a pilot signal and a secret key. That is, the pilot signal and the secret key obtain the authentication signal by using the hash matrix. And superposing the obtained authentication signal to a pilot signal to obtain a pilot part of each carrier signal, wherein the signal expression of the pilot part is as follows:
mi=ρspitti(1)
in the above signal expression (1) of the pilot part,
Figure BDA0001506722870000091
and
Figure BDA0001506722870000092
a factor is assigned to the power of the pilot information and the authentication signal. Assuming that the authentication signal and the pilot signal are independent of each other, there are
Figure BDA0001506722870000093
In this embodiment, the pilot part signal and the information part signal are combined to form a carrier signal for each block.
In addition, in the present embodiment, the transmission channel of the carrier signal is a radio channel and is a frequency selective fading channel having a plurality of paths, that is, the frequency selective fading channel is a multipath channel. The expression of the carrier signal after passing through the frequency selective fading channel is as follows:
yiL+k=hiL+kxiL+k+niL+k(2)
in bookIn an embodiment, the channel response h of the frequency selective fading channeliL+kObeying a mean variance of 0 to
Figure BDA0001506722870000094
The complex gaussian distribution of (a) is,
Figure BDA0001506722870000095
for the noise at the receiving end, obey the variance of 0 mean to
Figure BDA0001506722870000096
Gaussian random variable of (2).
In the present embodiment, in the channel response,
Figure BDA0001506722870000097
is dynamic noise, and
Figure BDA0001506722870000098
in many types of scenarios, the value of a is available at the receiving end, whereas in actual wireless system scenarios, the range of a is within a very small interval, such as a ∈ [0.9, 1 ] in which]。
In this embodiment, the physical layer blind authentication method further includes that the receiving end receives the carrier signal, and sequentially performs Blind Known Interference Cancellation (BKIC) processing on the carrier signal in each path of the frequency selective fading channel to obtain the target signal. In BKIC processing, the pilot signal is canceled by a belief transfer technique using the prior probability density function of the target signal and the Tanner graph (step S102).
In this embodiment, the receiving end receives the carrier signal. The carrier signal contains a pilot part and an information part. The physical layer blind authentication method according to the present embodiment is mainly to process a pilot portion of a carrier signal at a receiving end. The expression for the pilot part of the carrier signal received at the receiving end is as follows:
Figure BDA0001506722870000101
in the present embodiment, the radio channel is a frequency selective fading channel. A frequency selective fading channel has multiple paths. Wherein D ismaxFor maximum delay information in multipath, D is usually used in broadband wireless communication systemsmaxAre known. For example, in an Orthogonal Frequency Division Multiplexing (OFDM) system, a predefined cyclic prefix determines the maximum delay among all paths.
In the present embodiment, the following processing for the carrier signal refers to processing for the pilot portion of the carrier signal.
In this embodiment, blind authentication techniques are used on each potential path of the frequency selective fading channel. Specifically, first, Blind Known Interference Cancellation (BKIC) processing may be performed on the carrier signal in the first path of the frequency selective fading channel, then, similarly, the pilot signal in the carrier signal in the second path of the frequency selective fading channel may be removed using the same Blind Known Interference Cancellation (BKIC) processing method, and D is repeatedmax+1 times the above-described Blind Known Interference Cancellation (BKIC) process, so that the pilot signals in the carrier signals in each path of the frequency selective fading channel are sequentially cancelled. I.e. the carrier signals in each path of the frequency selective fading channel are processed by Blind Known Interference Cancellation (BKIC) sequentially.
In step S102, the receiving end receives the carrier signal, and sequentially performs Blind Known Interference Cancellation (BKIC) processing on the carrier signal in each path of the frequency selective fading channel to obtain a target signal. Wherein, the Blind Known Interference Cancellation (BKIC) processing is to eliminate a pilot signal by a confidence transfer technology by using a prior probability density function and a Tanner graph of a target signal. The elimination of the pilot signal in the carrier signal usually requires the estimation of the channel condition, and if the channel response cannot be estimated effectively, the pilot signal in the carrier signal is difficult to eliminate. Blind known interference cancellation methods may cancel the pilot signal by a belief transfer technique while avoiding estimating the channel.
In this embodiment, the carrier signal received by the receiving end may or may not include the authentication signal. The carrier signal is set to include the authentication information as a first condition, and the carrier signal is set to include no authentication information as a second condition.
Fig. 4 is a schematic diagram illustrating a processing flow of Blind Known Interference Cancellation (BKIC) at a receiving end of a physical layer blind authentication method according to an embodiment of the present invention.
In the present embodiment, as shown in fig. 4, the pilot signal in the carrier signal is cancelled on each path of the frequency selective fading channel in the same way. Specifically, the carrier signal on each path of the frequency selective fading channel is removed from the pilot signal by the belief transfer technique through the BKIC processing method. The BKIC processing method includes information initialization (step S401), information update of check nodes (step S402), information update of variable nodes (step S403), and target data detection (step S404).
In this embodiment, the BKIC processed carrier signal is a complex signal, and the carrier signal includes a real carrier signal and a dummy carrier signal. The processing procedure of the real carrier signal is the same as that of the virtual carrier signal, and is the four steps described above, and the processing procedure of the real carrier signal is taken as an example and explained below.
In step S401, initialization is first performed
Figure BDA0001506722870000111
The channel information is unknown, but usually the upper bound P of the signal power is setmaxIs regarded as being
Figure BDA0001506722870000112
The maximum power of (c).
Suppose that
Figure BDA0001506722870000113
Is uniformly distributed on
Figure BDA0001506722870000114
And since noise is a gaussian random variable, the signal based on this a priori information will be represented as,
Figure BDA0001506722870000115
the final estimation result can be obtained by iterating the update signal, which consists of two parallel information update parts, one from top to bottom, i.e. k 1 to k L1Is updated first
Figure BDA0001506722870000116
Then use
Figure BDA0001506722870000117
To update
Figure BDA0001506722870000118
Then is updated
Figure BDA0001506722870000119
And can be used to update
Figure BDA00015067228700001110
Similarly, another process is from bottom to top, i.e., update
Figure BDA00015067228700001111
And
Figure BDA00015067228700001112
from k to L1To k is 1. The two types of information are updated according to a variable-node updating rule and a check-node updating rule respectively.
In this embodiment, the confidence transfer technique does not involve loops, so only one iteration is needed to obtain the optimal maximum a posteriori performance.
In step S402, an input message is given if the process of updating from top to bottom is considered
Figure BDA0001506722870000121
The output signal can be expressed as
Figure BDA0001506722870000122
Wherein
Figure BDA0001506722870000123
May be set to an upper variance bound of the channel response.
If a bottom-to-top update procedure is considered. Similar to (5) above, the first embodiment,
Figure BDA0001506722870000124
the probability density function of (a) can be expressed as follows:
Figure BDA0001506722870000125
in step S403, the information update procedure is the same for the variable node from top to bottom and from top to bottom. The output of each message in the variable node is updated based on the following formula:
Figure BDA0001506722870000126
where C is a normalization factor. Wherein the variable nodes and the check nodes are determined through a Tanner graph.
In the step S404,
Figure BDA0001506722870000127
the final probability density function can be expressed as follows,
Figure BDA0001506722870000128
where C is a normalization factor.
Figure BDA0001506722870000129
Can represent the estimated value ofThe following were used:
Figure BDA00015067228700001210
similarly, the virtual carrier signal can be estimated by the above steps S401 to S404
Figure BDA00015067228700001211
The final target signal estimate is expressed as follows:
Figure BDA00015067228700001212
in step S102, the carrier signal is processed by BKIC to obtain a target signal, and the target signal is processed by a differential signal to obtain a target authentication signal.
In the present embodiment, the method of differential signal processing is as follows:
under the first condition, the expression of differential signal processing is as follows:
Figure BDA0001506722870000131
wherein ΔkFor residual signals, it can be modeled approximately as a 0 mean variance of
Figure BDA0001506722870000132
Gaussian random variable of (2).
Under the second condition, the expression of differential signal processing is as follows:
Figure BDA0001506722870000133
wherein
Figure BDA0001506722870000134
Is a zero mean complex gaussian random variable.
In this embodiment, the physical layer blind authentication method further includes, at the receiving end, obtaining a reference signal based on the key and the pilot signal, performing differential signal processing on the reference signal to obtain a reference authentication signal, and calculating a correlation between the target authentication signal and the reference authentication signal to obtain a test statistic (step S103).
In step S103, obtaining the reference signal based on the key and the pilot signal means obtaining the reference signal from the key and the pilot signal using the hash matrix. Therefore, the reference authentication signal is obtained by processing the reference signal, and whether the target authentication signal passes the authentication can be determined according to the correlation between the reference authentication signal and the target authentication signal.
In step S103, the reference signal is subjected to differential signal processing to obtain a reference authentication signal, the correlation between the target authentication signal and the reference authentication signal is calculated to obtain a test statistic, and a next determination can be made based on the value of the test statistic.
In the present embodiment, differential signal processing is performed on a reference signal to obtain a reference authentication signal. The method of differential signal processing is the same as the differential processing method in step S102 described above.
In step S102, the carrier signal received by the receiving end may include an authentication signal, and it is assumed that the carrier signal includes the authentication information as a first condition and the carrier signal does not include the authentication signal as a second condition.
At a receiving end, the carrier signal sequentially performs Blind Known Interference Cancellation (BKIC) processing on the carrier signal in each path of the frequency selective fading channel to obtain a target signal, and performs differential signal processing on the target signal to obtain a target authentication signal. At the receiving end, a reference signal is obtained based on the key and the pilot signal, and the reference signal is subjected to Differential (DP) signal processing to obtain a reference authentication signal. The rule of generating the reference signal by the hash matrix, the key and the pilot signal of the receiving end is the same as the rule of generating the authentication signal by the hash matrix, the key and the pilot signal of the transmitting end. The reference authentication signal may be considered as the authentication signal in the first condition and the target authentication signal may be considered as the carrier signal in the first condition. Thus, the first condition may be expressed as the reference authentication signal being included in the target authentication signal; the second condition may be expressed as the reference authentication signal not being included in the target authentication signal.
In this embodiment, the physical layer blind authentication method further includes comparing the test statistic with a predetermined threshold value to determine whether the carrier signal can be authenticated (step S104).
In step S104, if the test statistic is not less than the predetermined threshold, it is determined that the carrier signal passes the authentication; if the test statistic is less than the prescribed threshold, the carrier signal is determined to have failed authentication.
In this embodiment, if the test statistic is not less than the predetermined threshold, the carrier signal includes the reference authentication signal, that is, the carrier signal passes the authentication; if the test statistic is less than the prescribed threshold, the carrier signal does not contain the reference authentication signal, i.e. the carrier signal is not authenticated.
In the present embodiment, the predetermined threshold is obtained by assuming the verification condition, and the first condition and the second condition are the first condition H1 and the second condition H1 of the assumed verification condition, respectively0
In the present embodiment, the first condition H1The test statistic is expressed as follows:
Figure BDA0001506722870000141
second Condition H0The test statistic is expressed as follows:
Figure BDA0001506722870000142
wherein the content of the first and second substances,
Figure BDA0001506722870000143
is 0 mean variance of
Figure BDA0001506722870000144
Gauss random variable of phiiIs 0 mean variance of
Figure BDA0001506722870000145
Gaussian random variable of (2).
In addition, a threshold value is defined
Figure BDA0001506722870000146
Is composed of (tau)i|H0) Distribution-dependent false alarm probabilitiesFAThe decision, expressed as follows:
Figure BDA0001506722870000147
wherein (tau)i|H0) Is the test statistic obtained under the second condition, i.e., the statistical characteristic of the pilot signal. Thus, the prescribed threshold may be derived based on the statistical properties of the pilot signal and a preset upper limit of the false alarm probability.
In addition, in this embodiment, if the identity of the transmitting end is authenticated, the authentication signal can be used as an additional pilot signal to recover the signal. Thereby, the performance of signal symbol recovery and the performance of channel response estimation can be improved.
In addition, in the present embodiment, the authentication signal is superimposed on the pilot signal, thereby avoiding adverse effects on the extraction of the normal signal. Thereby, the reduction of the signal to interference plus noise ratio (SINR) at the receiving end is avoided.
In the embodiment, the physical layer blind authentication method of the wireless communication frequency selective fading channel based on the belief transfer technology does not need to occupy extra signal bandwidth. In addition, when the information signal is extracted from the carrier signal at the receiving end, the authentication signal does not become noise of the information signal, that is, the authentication signal does not affect the extraction of the information signal. The authentication signal does not affect the statistical properties of the noise at the receiving end.
In this embodiment, the physical layer blind authentication method handles a frequency selective fading channel with multiple paths, that is, a multipath channel, and is more suitable for a complex and variable wireless communication environment in an actual communication scenario. In addition, the authentication signal is superposed in the pilot signal, and if the entirety of the signal obtained by superposing the authentication signal and the pilot signal is used as the pilot signal for channel estimation, the accuracy of channel estimation can be improved.
The embodiment discloses a physical layer blind authentication system of a wireless communication frequency selective fading channel based on a belief transfer technology. Fig. 5 is a schematic diagram illustrating a signal processing module at a transmitting end of a physical layer blind authentication system according to an embodiment of the present invention. Fig. 6 is a schematic diagram illustrating a receiving end signal processing module of a physical layer blind authentication system according to an embodiment of the present invention.
In the present embodiment, as shown in fig. 5, the physical layer blind authentication system includes a transmitting device 20. The transmitting apparatus 20 comprises a first generating module 201, a second generating module 202 and a synthesizing module 203.
In the present embodiment, as shown in fig. 5, the first generation module 201 generates an authentication signal. I.e. the key and the pilot signal, are passed through the first generation module 201 to generate the authentication signal. The first generation module 201 includes a hash matrix. The authentication signal is obtained by using a hash matrix for the key and the pilot signal. Wherein, the obtained authentication signal has the same signal length as the pilot signal.
In this embodiment, the second generation module 202 generates the pilot portion of the carrier signal, as shown in fig. 5. I.e. the authentication signal is loaded onto the pilot signal by the second generating module 202, generating the pilot part of the carrier signal. The expression of the pilot part of the carrier signal is formula (1), and in addition, the length of the pilot part of the carrier signal is the signal length of the authentication signal or the signal length of the pilot signal.
In this embodiment, the synthesis module 203 generates a carrier signal as shown in fig. 5. I.e. the pilot part and the information part of the carrier signal are combined together by the synthesis module 203 to generate the carrier signal. The information part of the carrier signal is an information signal.
In this embodiment, the carrier signal is transmitted in blocks of data. Each block of the carrier signal comprises a pilot part and an information part. The sum of the signal length of the authentication signal or pilot signal and the signal length of the information signal is equal to the length of each carrier signal. In addition, the carrier signal is transmitted in blocks in the form of data blocks, which facilitate manipulation of the data.
In the present embodiment, the carrier signal generated by the transmitting apparatus 20 at the transmitting end reaches the receiving apparatus 30 at the receiving end through a wireless channel. In addition, the radio channel is a frequency selective fading channel having a plurality of paths.
In the present embodiment, the physical layer blind authentication system further includes a receiving apparatus 30. The receiving device 30 includes a first processing module, a second processing module, and a determination module.
In this embodiment, the first processing module comprises a Blind Known Interference Cancellation (BKIC) module 301. The carrier signal passes through a Blind Known Interference Cancellation (BKIC) module 301. Specifically, the carrier signal in each path of the frequency selective fading channel is sequentially subjected to Blind Known Interference Cancellation (BKIC) processing by a Blind Known Interference Cancellation (BKIC) module 301, and the pilot signal in the carrier frequency signal is cancelled.
In the present embodiment, the Blind Known Interference Cancellation (BKIC) module 301 employs a BKIC processing method for canceling a pilot signal by a belief transfer technique using the prior probability density function and the Tanner graph of the target signal in step S102. As shown in fig. 4, the BKIC process includes information initialization (step S401), information update of check nodes (step S402), information update of variable nodes (step S403), and target data detection (step S404).
In this embodiment, as shown in fig. 6, the first processing module further includes a Difference (DP) processing module 302. The DP processing module 302 employs the differential signal processing method in step S102. The DP processing module 302 performs differential signal processing on the target signal to obtain a target authentication signal. Thereby eliminating h in the target authentication signalkI.e. the influence of the cancellation channel on the carrier signal.
In the DP processing block 302, under the first condition, the expression of the differential signal processing is formula (11), where ΔkFor residual signals, it can be modeled approximately as a 0 mean variance of
Figure BDA0001506722870000161
Gaussian random variable of (2). Under the second condition, the differential signalThe expression of the number process is formula (12), wherein
Figure BDA0001506722870000171
Is a zero mean complex gaussian random variable.
In this embodiment, as shown in fig. 6, the second processing module further includes a hash matrix processing module 303. The pilot signal and the key are passed through a hash matrix processing module 303 to obtain a reference signal. The hash matrix processing module 303 employs the method of generating the reference signal in step S103. The hash matrix processing module 303 includes a hash matrix.
In this embodiment, as shown in fig. 6, the second processing module further includes a Difference (DP) processing module 304. The Difference (DP) processing module 304 performs difference signal processing on the reference signal to obtain a reference authentication signal. The DP processing block 304 employs the differential signal processing method in step S103.
In this embodiment, as shown in fig. 6, the second processing module further includes an operation module 305. The operation module 305 is used to calculate the test statistic of the target authentication signal and the reference authentication signal. The calculation method used by the operation module 305 is the calculation method in step S103.
In this embodiment, as shown in fig. 6, the second processing module further includes a determination module 306. The decision block 306 determines whether the target authentication signal is authenticated by comparing the test statistic to a prescribed threshold. I.e. to determine whether the carrier signal can be authenticated.
In this embodiment, the predetermined threshold in the determination module 306 is obtained based on the statistical characteristics of the pilot signal and a preset upper limit of the false alarm probability. The predetermined threshold value is calculated in step S103.
The embodiment discloses a physical layer blind authentication device 50 of a wireless communication frequency selective fading channel based on a belief transfer technology. Fig. 7 is a schematic structural diagram illustrating a physical layer blind authentication device according to an embodiment of the present invention. In this embodiment, both the transmitting end and the receiving end include an authentication device 50 as shown in fig. 7.
In the present embodiment, as shown in fig. 7, the authentication device 50 includes a processor 501 and a memory 502. The processor 501 and the memory 502 are connected to a communication bus, respectively. The memory 502 may be a high-speed RAM memory or a non-volatile memory (non-volatile memory). Those skilled in the art will appreciate that the configuration of the authentication device 50 shown in fig. 7 is not intended to limit the present invention, and may be a bus configuration, a star configuration, a combination of more or fewer components than those shown in fig. 7, or a different arrangement of components.
The processor 501 is a control center of the authentication device, and may be a Central Processing Unit (CPU), and the processor 501 is connected to various parts of the entire authentication device by using various interfaces and lines, and executes or executes software programs and/or modules stored in the memory 502 and calls a program code stored in the memory 502 to perform the following operations:
the transmitting end transmits a carrier signal including an authentication signal superimposed to a pilot signal, and an information signal to a wireless channel which is a frequency selective fading channel having a plurality of paths (performed by the authentication device 50 of the transmitting end).
A receiving end receives carrier signals, sequentially carries out Blind Known Interference Cancellation (BKIC) processing on the carrier signals in each path of a frequency selective fading channel to obtain target signals, carries out differential signal processing on the target signals to obtain target authentication signals, and eliminates pilot signals through a belief transfer technology by utilizing a prior probability density function and a Tanner graph of the target signals in the BKIC processing; in a receiving end, obtaining a reference signal based on a secret key and a pilot signal, carrying out differential signal processing on the reference signal to obtain a reference authentication signal, and calculating the correlation between a target authentication signal and the reference authentication signal to obtain test statistic; and compares the test statistic with a prescribed threshold value to determine whether the carrier signal can pass authentication (performed by the authentication device 50 at the receiving end).
In the present embodiment, the processor 501 of the authentication device 50 at the transmitting end further performs the following operations: the carrier signal is transmitted in blocks in the form of data blocks.
In the present embodiment, the processor 501 of the authentication device 50 at the transmitting end further performs the following operations: in each block of the carrier signal, the sum of the signal length of the pilot signal and the signal length of the information signal is equal to the signal length of the carrier signal.
In the present embodiment, the processor 501 of the authentication device 50 on the receiving side further performs the following operations: a reference signal is obtained based on the key and the pilot signal using a hash matrix.
In the present embodiment, the processor 501 of the authentication device 50 on the receiving side further performs the following operations: if the test statistic is not less than the prescribed threshold, the carrier signal is authenticated.
In the present embodiment, the processor 501 of the authentication device 50 on the receiving side further performs the following operations: the prescribed threshold is obtained based on the statistical properties of the pilot signal and a preset upper limit of the false alarm probability.
In this embodiment, it should be understood that the disclosed apparatus may be implemented in other ways. For example, the above-described device embodiments are merely illustrative, and for example, the division of the units is merely a logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection of some interfaces, devices or units, and may be an electric or other form.
Units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, each functional unit in the embodiments of the present invention may be integrated into one processing unit, each unit may exist alone physically, or two or more units may be integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable memory. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a memory and includes several instructions for causing a computer device (which may be a personal computer, a server, a network device, or the like) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned memory comprises: a U-disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic or optical disk, and other various media capable of storing program codes.
The present embodiment discloses a computer readable storage medium, and those skilled in the art can understand that all or part of the steps in the various physical layer blind authentication methods of the foregoing embodiments can be implemented by a program (instructions) to instruct related hardware, where the program (instructions) can be stored in a computer readable memory (storage medium), where the memory can include: flash Memory disks, Read-Only memories (ROMs), Random Access Memories (RAMs), magnetic or optical disks, and the like.
While the invention has been specifically described above in connection with the drawings and examples, it will be understood that the above description is not intended to limit the invention in any way. Those skilled in the art can make modifications and variations to the present invention as needed without departing from the true spirit and scope of the invention, and such modifications and variations are within the scope of the invention.

Claims (11)

1. A blind authentication method of frequency selective fading channel based on confidence transfer is a physical layer authentication method of wireless communication of a wireless communication system with a transmitting end and a receiving end, characterized in that,
the method comprises the following steps:
the transmitting terminal transmits a carrier signal to a wireless channel, wherein the carrier signal comprises an authentication signal, a pilot signal and an information signal, the authentication signal is superposed to the pilot signal, and the wireless channel is a frequency selective fading channel with a plurality of paths;
the receiving end receives the carrier signals, sequentially carries out blind known interference elimination processing on the carrier signals in each path of the frequency selective fading channel to obtain target signals, carries out differential signal processing on the target signals to obtain target authentication signals, and eliminates the pilot signals through a belief transfer technology by utilizing a prior probability density function and a Tanner graph of the target signals in the blind known interference elimination processing;
in the receiving end, obtaining a reference signal based on a secret key and the pilot signal, carrying out differential signal processing on the reference signal to obtain a reference authentication signal, and calculating the correlation between the target authentication signal and the reference authentication signal to obtain a test statistic; and is
Comparing the test statistic to a prescribed threshold to determine whether the carrier signal is capable of being authenticated.
2. The blind authentication method of claim 1, wherein:
the carrier signal is transmitted in blocks in the form of data blocks.
3. The blind authentication method of claim 2, wherein:
in each of the carrier signals, a sum of a signal length of the pilot signal and a signal length of the information signal is equal to a signal length of the carrier signal.
4. The blind authentication method of claim 1,
obtaining the reference signal based on the key and the pilot signal using a hash matrix.
5. The blind authentication method of claim 1,
if the test statistic is not less than the prescribed threshold, the carrier signal is authenticated.
6. The blind authentication method of claim 1,
the prescribed threshold is obtained based on statistical characteristics of the pilot signal and a preset false alarm probability upper limit.
7. A blind authentication device for frequency selective fading channel based on belief propagation,
the method comprises the following steps:
a processor executing a memory-stored computer program to implement the blind authentication method of any one of claims 1 to 6; and
the memory.
8. A computer-readable storage medium, characterized in that,
the computer-readable storage medium stores at least one instruction that, when executed by a processor, implements the blind authentication method of any one of claims 1 to 6.
9. A blind authentication system based on a frequency selective fading channel with confidence delivery,
a transmitting device that transmits a carrier signal including an authentication signal, a pilot signal, and an information signal to a wireless channel, the authentication signal being superimposed to the pilot signal, the wireless channel being a frequency selective fading channel having a plurality of paths; and
a receiving device, comprising: a first processing module, configured to receive the carrier signal, sequentially perform blind known interference cancellation processing on the carrier signal in each path of the frequency selective fading channel to obtain a target signal, perform differential signal processing on the target signal to obtain a target authentication signal, and in the blind known interference cancellation processing, cancel the pilot signal by using a prior probability density function and a Tanner graph of the target signal through a belief transfer technique; the second processing module is used for obtaining a reference signal based on a secret key and the pilot signal, carrying out differential signal processing on the reference signal to obtain a reference authentication signal, and calculating the correlation between the target authentication signal and the reference authentication signal subjected to differential signal processing to obtain a test statistic; and a decision module that compares the test statistic to a prescribed threshold to determine whether the carrier signal is authentic.
10. The blind authentication system of claim 9,
the second processing module obtains the reference signal based on the key and the pilot signal using a hash matrix.
11. The blind authentication system of claim 9,
in the decision module, the predetermined threshold is obtained based on statistical characteristics of the pilot signal and a preset false alarm probability upper limit.
CN201711336109.2A 2017-12-13 2017-12-13 Blind authentication method and system of frequency selective fading channel based on confidence transfer Active CN108206795B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711336109.2A CN108206795B (en) 2017-12-13 2017-12-13 Blind authentication method and system of frequency selective fading channel based on confidence transfer

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711336109.2A CN108206795B (en) 2017-12-13 2017-12-13 Blind authentication method and system of frequency selective fading channel based on confidence transfer

Publications (2)

Publication Number Publication Date
CN108206795A CN108206795A (en) 2018-06-26
CN108206795B true CN108206795B (en) 2020-07-21

Family

ID=62604698

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711336109.2A Active CN108206795B (en) 2017-12-13 2017-12-13 Blind authentication method and system of frequency selective fading channel based on confidence transfer

Country Status (1)

Country Link
CN (1) CN108206795B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109168166B (en) * 2018-11-22 2020-08-18 深圳大学 Safety detection method of physical layer authentication system
CN109769258B (en) * 2019-03-05 2020-01-31 深圳大学 Resource optimization method based on secure URLLC communication protocol
WO2021003738A1 (en) * 2019-07-11 2021-01-14 深圳大学 Collaborative physical layer authentication method and system based on received signal power
CN115174220A (en) * 2022-07-06 2022-10-11 四川九洲空管科技有限责任公司 Physical layer security authentication method based on dynamic time warping

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102017745A (en) * 2008-03-06 2011-04-13 爱立信电话股份有限公司 Quick paging receivers in OFDMA telecommunication systems
CN103812804A (en) * 2012-11-13 2014-05-21 上海摩波彼克半导体有限公司 Blind interference cancellation method and system in wireless communication system
CN104660415A (en) * 2015-02-10 2015-05-27 郑州轻工业学院 Multi-inter-domain asymmetric group key agreement protocol method in mobile cloud computing environment
CN106789772A (en) * 2016-12-29 2017-05-31 深圳天珑无线科技有限公司 A kind of safety communicating method and device
CN106850472A (en) * 2017-04-10 2017-06-13 中山大学 A kind of OFDM channel estimation method based on Kalman and blind estimate
WO2017137778A1 (en) * 2016-02-10 2017-08-17 Cortex Insight Limited Security system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102017745A (en) * 2008-03-06 2011-04-13 爱立信电话股份有限公司 Quick paging receivers in OFDMA telecommunication systems
CN103812804A (en) * 2012-11-13 2014-05-21 上海摩波彼克半导体有限公司 Blind interference cancellation method and system in wireless communication system
CN104660415A (en) * 2015-02-10 2015-05-27 郑州轻工业学院 Multi-inter-domain asymmetric group key agreement protocol method in mobile cloud computing environment
WO2017137778A1 (en) * 2016-02-10 2017-08-17 Cortex Insight Limited Security system
CN106789772A (en) * 2016-12-29 2017-05-31 深圳天珑无线科技有限公司 A kind of safety communicating method and device
CN106850472A (en) * 2017-04-10 2017-06-13 中山大学 A kind of OFDM channel estimation method based on Kalman and blind estimate

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
PHY-Layer Authentication Using Hierarchical Modulation and Duobinary Signaling;Vireshwar Kumar等;《IEEE》;20140410;第782-786页 *

Also Published As

Publication number Publication date
CN108206795A (en) 2018-06-26

Similar Documents

Publication Publication Date Title
Xie et al. Blind authentication at the physical layer under time-varying fading channels
Xiao et al. PHY-layer authentication with multiple landmarks with reduced overhead
CN108206795B (en) Blind authentication method and system of frequency selective fading channel based on confidence transfer
Qiu et al. Physical layer authentication enhancement using a Gaussian mixture model
US10476678B2 (en) Methods and systems for high throughput and cyber-secure data communications
US20220116212A1 (en) Process for monovalent one-to-one extraction of keys from the propagation channel
Liao et al. A novel physical layer authentication method with convolutional neural network
Zhou et al. Design of a robust RF fingerprint generation and classification scheme for practical device identification
CN108173791B (en) Physical layer blind authentication method and system of time-varying fading channel based on smoothing technology
CN108199991B (en) Physical layer blind authentication method and system of time-varying fading channel based on confidence transfer
CN108156102B (en) Blind authentication method and system of frequency selective fading channel based on smoothing technology
Sabuj et al. Detection of intelligent malicious user in cognitive radio network by using friend or foe (FoF) detection technique
Goergen et al. Extrinsic channel-like fingerprint embedding for authenticating MIMO systems
US11412378B2 (en) Smoothing technology-based blind authentication method and system for frequency selective fading channel
Qiu et al. Wireless user authentication based on KLT and Gaussian mixture model
CN108882236B (en) Physical layer signal watermark embedding method based on S transformation
Wang et al. CovertMIMO: A covert uplink transmission scheme for MIMO systems
WO2023122629A1 (en) Waveform agnostic learning-enhanced decision engine for any radio
CN114980086A (en) Model training method, secret key generation method, training equipment, communication party and system
Fang et al. Towards phy-aided authentication via weighted fractional fourier transform
US10924318B2 (en) Belief propagation-based blind authentication method and system for frequency selective fading channel
CN111148101A (en) Physical layer group authentication method
US11510055B2 (en) Smoothing-technology-based physical layer blind authentication method and system for time-varying fading channel
US11395140B2 (en) Belief propagation-based physical layer blind authentication method and system for time-varying fading channels
Han et al. PHY-PSIONICS: Physical-layer phase secret key encapsulation in correlated subchannels

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant