CN108366370B - A kind of information transferring method quantifying privately owned asymmetric key based on radio channel characteristic - Google Patents
A kind of information transferring method quantifying privately owned asymmetric key based on radio channel characteristic Download PDFInfo
- Publication number
- CN108366370B CN108366370B CN201810105180.8A CN201810105180A CN108366370B CN 108366370 B CN108366370 B CN 108366370B CN 201810105180 A CN201810105180 A CN 201810105180A CN 108366370 B CN108366370 B CN 108366370B
- Authority
- CN
- China
- Prior art keywords
- channel
- information
- communication
- party
- parties
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 44
- 230000006854 communication Effects 0.000 claims abstract description 47
- 238000004891 communication Methods 0.000 claims abstract description 47
- 230000005540 biological transmission Effects 0.000 claims abstract description 35
- 238000012937 correction Methods 0.000 claims abstract description 21
- 230000008569 process Effects 0.000 claims abstract description 14
- 230000004044 response Effects 0.000 claims description 14
- 238000007781 pre-processing Methods 0.000 claims description 8
- 238000005259 measurement Methods 0.000 claims description 6
- 238000012545 processing Methods 0.000 claims description 5
- 238000013139 quantization Methods 0.000 claims description 4
- 230000008859 change Effects 0.000 claims description 2
- 238000000605 extraction Methods 0.000 claims description 2
- 238000000513 principal component analysis Methods 0.000 claims description 2
- 230000003321 amplification Effects 0.000 abstract description 5
- 238000003199 nucleic acid amplification method Methods 0.000 abstract description 5
- 239000000284 extract Substances 0.000 abstract description 3
- 230000006872 improvement Effects 0.000 description 9
- 238000010586 diagram Methods 0.000 description 5
- 238000005516 engineering process Methods 0.000 description 3
- 241000169170 Boreogadus saida Species 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000011160 research Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0875—Generation of secret information including derivation or calculation of cryptographic keys or passwords based on channel impulse response [CIR]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
技术领域technical field
本发明涉及信息安全传送技术领域,特别是涉及一种基于无线信道特征量化私有不对称密钥的信息传输方法。The invention relates to the technical field of information security transmission, in particular to an information transmission method for quantizing a private asymmetric key based on wireless channel characteristics.
背景技术Background technique
基于无线信道特征物理层安全技术主要是基于测量无线信道的特征将其量化成通信双方对称的密钥,再使用其密钥加密上层传输的信息。然而,在实际的通信系统中,由于通信双方的通信链路可能存在着些许的差别,获得的无线信道特征不尽相同。因此,为了能够获得对称的密钥,在以往的基于无线信道特征物理层安全技术中需要引入信息调和过程,通过通信双方交互信息调和信息,从而获得通信双方一致的密钥。然而,引入信息调和将不可避免的泄漏通信双方秘密的无线信道特征信息。为了能够解决信息调和带来的双方秘密的无线信道特征信息的泄漏,通信双方还需要进一步通过隐私放大过程来保护最终获得密钥的安全性和随机性。因此,这些过程将增加最终获得密钥的复杂度。此外,在现有的基于无线信道特征的密钥生成技术体制中,信道纠错编码大多被用于考虑在信息调和的过程中使用,用于生成对称的密钥。在现有的研究中,并没有将将信道纠错编码和基于无线信道特征密钥生成的安全信息传输结合在一起考虑。The physical layer security technology based on wireless channel characteristics is mainly based on measuring the characteristics of the wireless channel to quantify it into a symmetric key for both communication parties, and then use the key to encrypt the information transmitted by the upper layer. However, in an actual communication system, because there may be some differences in the communication links between the two communicating parties, the obtained wireless channel characteristics are not the same. Therefore, in order to obtain a symmetric key, an information reconciliation process needs to be introduced in the previous physical layer security technology based on wireless channel characteristics, and a key that is consistent between the two parties can be obtained by exchanging information and reconciling information between the two communicating parties. However, the introduction of information reconciliation will inevitably leak the secret wireless channel characteristic information of both communicating parties. In order to solve the leakage of the secret wireless channel characteristic information caused by information reconciliation, the communication parties need to further protect the security and randomness of the finally obtained key through the privacy amplification process. Therefore, these procedures will increase the complexity of finally obtaining the key. In addition, in the existing key generation technology system based on wireless channel characteristics, channel error correction coding is mostly used in the process of information reconciliation to generate symmetric keys. In the existing research, the combination of channel error correction coding and secure information transmission based on wireless channel characteristic key generation is not considered together.
发明内容SUMMARY OF THE INVENTION
为了解决上述存在的问题,本发明提供一种基于无线信道特征量化私有不对称密钥的信息传输方法,通过本发明方法,可以基于通信双方测量得到的无线信道特征,将需要的信息通过安全的方式传递给对方,从而避免在以往通过无线信道特征直接生成密钥方法中的信息调和和隐私放大过程,具有更好的实用性,为达此目的,本发明提供一种基于无线信道特征量化私有不对称密钥的信息传输方法,包括了以下步骤:In order to solve the above existing problems, the present invention provides an information transmission method based on wireless channel characteristics to quantify private asymmetric keys. Through the method of the present invention, the required information can be transmitted through a secure In order to avoid the process of information reconciliation and privacy amplification in the previous method of directly generating keys through wireless channel characteristics, it has better practicability. To achieve this purpose, the present invention provides a quantitative private key based on wireless channel characteristics. The information transmission method of an asymmetric key includes the following steps:
步骤A,通信双方A和B通过各自发射的导频序列,测量通信双方各自到对方信道的信道特征,通信双方将各自测量得到的无线信道特征量化成一种私有密钥,所述私有密钥是通信双方不对称的密钥;In step A, the communication parties A and B measure the channel characteristics of the communication parties to each other's channel through the pilot sequences transmitted respectively, and the communication parties quantify the wireless channel characteristics measured by each into a private key, and the private key is The asymmetric key of the communication parties;
步骤B,通信的A方将需要传输的信息通过预处理后进行信道纠错编码,生成信道纠错编码后的比特序列;In step B, party A of the communication performs channel error correction coding on the information to be transmitted after preprocessing, and generates a bit sequence after channel error correction coding;
步骤C,通信的A方将步骤B中生成的信道纠错编码后的比特序列和步骤A中得到的私有密钥进行编码操作,生成加密后的数据流;In step C, party A in the communication encodes the channel error correction coded bit sequence generated in step B and the private key obtained in step A to generate an encrypted data stream;
步骤D,通信的A方将加密后的数据流通过公开信道发送给B;Step D, the communication party A sends the encrypted data stream to B through the open channel;
步骤E,通信的B方使用在步骤A获得的私有密钥对从A接收到的数据流进行解码操作;Step E, communicating party B uses the private key obtained in step A to decode the data stream received from A;
步骤F,通信的B方使用信道编码解码算法对步骤E进行解码操作后的数据流进行信道纠错编码解码;In step F, party B in the communication uses a channel coding and decoding algorithm to perform channel error correction coding and decoding on the data stream after the decoding operation in step E;
步骤G,通信的B方将信道解码后的比特序列进行和步骤B预处理过程相逆的处理后得到A传输给B的信息。In step G, party B in the communication processes the channel-decoded bit sequence inversely to the preprocessing process in step B to obtain the information transmitted by A to B.
本发明的进一步改进,步骤A中的导频序列应是多载波传输系统中的频域子载波导频序列,或者是单载波传输系统中的时域符号序列,步骤A中的信道特征应是测量得到的信道频域幅度响应特征,或者是测量得到的信道时域冲击响应特征,步骤A中的量化过程为,当信道特征为信道频域幅度响应特征时,应将信道的频域幅度响应特征在不同子载波的幅度值量化为与幅度对应的比特序列;当信道特征为信道时域冲击响应特征时,应将信道的时域冲击响应在不同时间点的冲击响应幅度值量化为与幅度对应的比特序列。As a further improvement of the present invention, the pilot sequence in step A should be the frequency domain subcarrier pilot sequence in the multi-carrier transmission system, or the time domain symbol sequence in the single carrier transmission system, and the channel characteristics in step A should be The measured frequency-domain amplitude response characteristics of the channel, or the measured channel time-domain impulse response characteristics, the quantization process in step A is, when the channel characteristics are channel frequency-domain amplitude response characteristics, the frequency-domain amplitude response of the channel should be The amplitude values of the features at different subcarriers are quantized into bit sequences corresponding to the amplitudes; when the channel feature is the channel time-domain impulse response feature, the impulse response amplitude values of the time-domain impulse response of the channel at different time points should be quantized as the corresponding amplitude the corresponding bit sequence.
本发明的进一步改进,步骤A中的私有密钥,应由通信的A和B方将相应的信道测量的结果,通过预处理后量化成比特序列。As a further improvement of the present invention, the private key in step A should be quantized into a bit sequence after the corresponding channel measurement results are preprocessed by communicating parties A and B.
本发明的进一步改进,步骤A预处理过程包括了将信道测量的结果进行变换域处理或主成份分析处理,提取出A和B方一致性较高的比特序列并将测量的信道特征量化成的比特序列通过一定的方式进行抽取或排列组合变化。As a further improvement of the present invention, the preprocessing process of step A includes performing transform domain processing or principal component analysis processing on the channel measurement results, extracting bit sequences with high consistency between A and B, and quantizing the measured channel features into The bit sequence is extracted or permuted and combined in a certain way.
本发明的进一步改进,步骤B中的预处理包括了通信A方使用通信双方已经共有的信息和传输的帧序号对需要传输的信息进行加密处理。As a further improvement of the present invention, the preprocessing in step B includes that the communication party A encrypts the information to be transmitted using the information shared by both communication parties and the transmitted frame sequence number.
本发明的进一步改进,步骤B中的信道编码,包括了卷积码,Turbo码,RS码,LDPC码,Polar码,并将原传输信息转化为比原传输信息更长的码序列,用于纠正传输过程中比特错误的编码方法。In a further improvement of the present invention, the channel coding in step B includes convolutional codes, Turbo codes, RS codes, LDPC codes, and Polar codes, and converts the original transmission information into a longer code sequence than the original transmission information for use in An encoding method that corrects bit errors during transmission.
本发明的进一步改进,步骤C中的编码操作,包括了将步骤B中通信A方生成的信道纠错编码后的比特序列和步骤A中通信A方得到的私有密钥进行逐个比特的异或操作。As a further improvement of the present invention, the encoding operation in step C includes bit-by-bit XOR of the channel error correction coded bit sequence generated by communication party A in step B and the private key obtained by communication party A in step A operate.
本发明的进一步改进,步骤E中的解码操作,包括了将步骤D中由通信A方传输来的比特序列和步骤A中通信B方得到的私有密钥进行逐个比特的异或操作。In a further improvement of the present invention, the decoding operation in step E includes performing a bit-by-bit exclusive OR operation on the bit sequence transmitted by communication party A in step D and the private key obtained by communication party B in step A.
本发明的进一步改进,步骤F中的信道纠错编码解码,包括了通信B方使用纠错码将步骤E解码后的比特进行纠正,获得正确的信道编码前的比特序列。In a further improvement of the present invention, the channel error correction coding and decoding in step F includes that communication party B uses an error correction code to correct the bits decoded in step E to obtain a correct bit sequence before channel coding.
本发明的进一步改进,步骤G中的逆操作,包括了通信B方使用通信双方已经共有的信息和传输的帧序号对在步骤F中获得的信道解码的比特序列进行解密处理。A further improvement of the present invention, the inverse operation in step G, includes that communication party B uses the information shared by both communication parties and the transmitted frame sequence number to decrypt the channel-decoded bit sequence obtained in step F.
本发明提供一种基于无线信道特征量化私有不对称密钥的信息传输方法,针对通信双方测量获得的信道特征,本发明不同于以往的密钥生成方法,设计了一种信息传输方法。由于信息调和过程有可能泄露双方秘密的共享信道信息,加入隐私放大过程后将增加系统整体的复杂度。本发明方法将测量得到的信道特征量化成私有密钥,直接和经过信道编码的需要传输的信息进行异或操作后传输给对方。对方通过将测量得到的信道特征量化成的私有密钥进行异或操作后对传输的信息进行信道纠错编码解码,最终获得传输的信息。通过该方法可以不借助于信息调和过程实现通信双方通过无线信道特征获得安全的信息传输。The present invention provides an information transmission method for quantifying private asymmetric keys based on wireless channel characteristics. The present invention is different from the previous key generation method and designs an information transmission method for the channel characteristics measured and obtained by both communication parties. Since the information reconciliation process may reveal the secret shared channel information of both parties, adding the privacy amplification process will increase the overall complexity of the system. The method of the invention quantizes the measured channel characteristics into a private key, and directly performs an XOR operation with the information to be transmitted after channel coding, and then transmits it to the other party. The other party performs channel error correction coding and decoding on the transmitted information by performing an XOR operation on the private key quantified by the measured channel characteristics, and finally obtains the transmitted information. Through this method, it is possible to achieve secure information transmission between the communication parties through wireless channel characteristics without resorting to the information reconciliation process.
附图说明Description of drawings
图1为本发明系统流程图;Fig. 1 is a flow chart of the system of the present invention;
图2为本发明基于无线信道得到的频域子载波幅度信道特征图;Fig. 2 is the frequency-domain sub-carrier amplitude channel characteristic diagram obtained based on the wireless channel in the present invention;
图3为本发明基于无线信道特征得到的信道量化结果图;Fig. 3 is the channel quantization result diagram that the present invention obtains based on wireless channel characteristic;
图4为本发明基于无线信道量化结果得到的密钥比特图;Fig. 4 is the key bit map that the present invention obtains based on the radio channel quantization result;
图5为本发明系统实施的实例图;Figure 5 is an example diagram of the implementation of the system of the present invention;
图6为本发明使用该发明方法在有窃听者情况下的安全传输性能和窃听结果示意图。FIG. 6 is a schematic diagram of the secure transmission performance and eavesdropping results of the present invention using the inventive method in the case of an eavesdropper.
具体实施方式Detailed ways
下面结合附图与具体实施方式对本发明作进一步详细描述:Below in conjunction with accompanying drawing and specific embodiment the present invention is described in further detail:
本发明提供一种基于无线信道特征量化私有不对称密钥的信息传输方法,通过本发明方法,可以基于通信双方测量得到的无线信道特征,将需要的信息通过安全的方式传递给对方,从而避免在以往通过无线信道特征直接生成密钥方法中的信息调和和隐私放大过程,具有更好的实用性。The present invention provides an information transmission method for quantifying private asymmetric keys based on wireless channel characteristics. Through the method of the present invention, the required information can be transmitted to the other party in a safe manner based on the wireless channel characteristics measured by both communication parties, thereby avoiding It has better practicability in the process of information reconciliation and privacy amplification in the previous method of directly generating keys through wireless channel characteristics.
作为本发明一种实施例,本发明提供具体实施系统流程图如图1所示示意图。As an embodiment of the present invention, the present invention provides a specific implementation system flowchart as shown in FIG. 1 .
首先通信双方Alice和Bob通过各自的信道特征探测导频P,测量信道特征。在本实施例中,考虑Alice和Bob基于无线信道在频域的幅度特征。通过信道探测导频P,Alice获得的从Bob至Alice的信道特征为HBA,Bob获得的从Alice至Bob的信道特征为HAB。其获得的无线信道频域特征如图2所示。从图中可以看出,由于通信双方无线信道的差异以及通信双方各自器件的差异,其获得的无线信道频域特征会有一定的差异。Firstly, Alice and Bob, the communication parties, detect the pilot P through their respective channel characteristics, and measure the channel characteristics. In this embodiment, the amplitude characteristics of Alice and Bob based on the wireless channel in the frequency domain are considered. Through the channel sounding pilot P, the channel characteristic obtained by Alice from Bob to Alice is H BA , and the characteristic of the channel from Alice to Bob obtained by Bob is H AB . The obtained wireless channel frequency domain characteristics are shown in Fig. 2 . It can be seen from the figure that due to the differences in the wireless channels of the two parties in communication and the differences in the devices of the two parties in communication, the frequency domain characteristics of the wireless channel obtained will have certain differences.
Alice和Bob分别将测量得到的信道特征量化成初步获得的私有密钥PA和PB。其中,由于受到实际测量的影响,HBA≈HAB,因此,实际获得的私有密钥PA≈PB。其获得私有密钥的过程如图3和图4所示。在图4中可以看到,Alice和Bob最终获得的私有密钥中的0/1比特序列具有一定的差异。Alice and Bob respectively quantize the measured channel characteristics into initially obtained private keys PA and P B . Wherein, due to the influence of actual measurement, H BA ≈ H AB , therefore, the actually obtained private key P A ≈ P B . The process of obtaining the private key is shown in Figure 3 and Figure 4. As can be seen in Figure 4, the 0/1 bit sequences in the private keys finally obtained by Alice and Bob have certain differences.
因此,在本实施例中,我们允许PA和PB大部分的比特相同,但允许PA和PB有少量的比特不同。此外,Alice和Bob为了能够提高私有密钥的随机性,可以对初步获得私有密钥PA和PB进行抽取操作,即;Therefore, in this embodiment, we allow most of the bits of PA and P B to be the same, but allow PA and P B to have a small number of bits different. In addition, in order to improve the randomness of the private key, Alice and Bob can extract the private key P A and P B initially obtained, namely;
其中D为抽取深度。where D is the extraction depth.
最终,Alice和Bob可以通过多次测量无线信道,获得长度为L的具有高度随机性的私有密钥和 Finally, Alice and Bob can obtain a highly random private key of length L by measuring the wireless channel multiple times and
Alice选择需要发送给Bob的信息M,Alice在信息M后加入传输的帧序号F,组合成信息MF。Alice通过和Bob事先共享的密钥K,将信息MF进行加密,获得信息Alice选择一种信道纠错编码算法,该信道编码算法的码率为c,即信道纠错编码后的信息长度为原传输信息长度的1/c。Alice将信息通过信道编码,获得信道编码后的信息其中,的长度为L。Alice selects the message M that needs to be sent to Bob, and Alice adds the transmitted frame number F after the message M to form the message MF. Alice encrypts the information MF through the key K shared with Bob in advance to obtain the information Alice chooses a channel error correction coding algorithm with a code rate c, that is, the length of the information after channel error correction coding is 1/c of the length of the original transmission information. Alice sends the message Through channel coding, the information after channel coding is obtained in, The length is L.
Alice将和私有密钥进行逐个比特的异或操作,获得将要传输的序列S。Alice will and private key Perform a bit-by-bit XOR operation to obtain the sequence S to be transmitted.
Alice将序列S通过公共的信道传输给Bob。Bob通过其私有的密钥和接收的序列S进行异或操作,解出信息 Alice transmits the sequence S to Bob through a public channel. Bob passes his private key Perform XOR operation with the received sequence S to solve the information
Bob通过信道纠错编码解码算法,对获得的信息进行解码,获得进行纠错后的信息最终,Bob通过和Alice事先共享的密钥K,将信息进行解密,获得信息MF,并最终提取出Alice传递的信息M。Bob uses the channel error correction coding and decoding algorithm to obtain information Decode to obtain error-corrected information In the end, through the key K shared by Bob and Alice in advance, the information Decrypt to obtain the information MF, and finally extract the information M passed by Alice.
上述的本发明方法整体系统实施实例图如图5所示。利用该发明方法进行安全信息传输的传输性能和窃听者通过窃听信道尝试解码传输信息的性能如图6所示。由图中所示,当以256比特为一组进行信息传输,传输环境的信噪比高于15dB时,使用该发明方法进行安全信息传输的分组错误率低于10%,可以实现信息的安全传输。而窃听者窃听后进行信息解码的分组错误率为100%,无法正确解出传输的信息。The overall system implementation example diagram of the above-mentioned method of the present invention is shown in FIG. 5 . The transmission performance of the secure information transmission using the inventive method and the performance of an eavesdropper trying to decode the transmission information by eavesdropping on the channel are shown in FIG. 6 . As shown in the figure, when 256 bits are used as a group for information transmission and the signal-to-noise ratio of the transmission environment is higher than 15dB, the packet error rate of using the inventive method for secure information transmission is lower than 10%, which can realize information security transmission. However, the packet error rate for the eavesdropper to decode the information after eavesdropping is 100%, and the transmitted information cannot be decoded correctly.
以上所述,仅是本发明的较佳实施例而已,并非是对本发明作任何其他形式的限制,而依据本发明的技术实质所作的任何修改或等同变化,仍属于本发明所要求保护的范围。The above is only a preferred embodiment of the present invention, and is not intended to limit the present invention in any other form, and any modification or equivalent change made according to the technical essence of the present invention still belongs to the scope of protection required by the present invention .
Claims (7)
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810105180.8A CN108366370B (en) | 2018-02-02 | 2018-02-02 | A kind of information transferring method quantifying privately owned asymmetric key based on radio channel characteristic |
PCT/CN2018/086477 WO2019148690A1 (en) | 2018-02-02 | 2018-05-11 | Information transmission method based on wireless channel feature quantized asymmetric private keys |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810105180.8A CN108366370B (en) | 2018-02-02 | 2018-02-02 | A kind of information transferring method quantifying privately owned asymmetric key based on radio channel characteristic |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108366370A CN108366370A (en) | 2018-08-03 |
CN108366370B true CN108366370B (en) | 2019-08-02 |
Family
ID=63004238
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810105180.8A Active CN108366370B (en) | 2018-02-02 | 2018-02-02 | A kind of information transferring method quantifying privately owned asymmetric key based on radio channel characteristic |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN108366370B (en) |
WO (1) | WO2019148690A1 (en) |
Families Citing this family (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110071801B (en) * | 2019-04-24 | 2021-09-07 | 东南大学 | A method of generating key part reconciliation combining BBBSS protocol and BCH code |
CN110086616B (en) * | 2019-05-10 | 2021-07-16 | 南京东科优信网络安全技术研究院有限公司 | Forward one-time pad secret communication method based on wireless channel |
CN110336657B (en) * | 2019-07-03 | 2022-02-08 | 上海大学 | Optical OFDM dynamic key generation method based on channel characteristics |
CN111404587B (en) * | 2020-03-12 | 2022-04-01 | 东南大学 | Multi-user MIMO symmetrical channel characteristic obtaining method based on conjugate precoding |
CN112104459B (en) * | 2020-09-10 | 2023-05-12 | 国网江苏省电力有限公司信息通信分公司 | Key generation method based on channel fingerprint and auxiliary data |
CN112533199A (en) * | 2020-11-25 | 2021-03-19 | 南京熊猫电子股份有限公司 | OFDM channel physical key generation method and device based on USRP and computer equipment |
CN112532328B (en) * | 2021-02-07 | 2021-05-14 | 中国人民解放军国防科技大学 | Channel characteristic quantization method and device, electronic equipment and storage medium |
CN112906874B (en) * | 2021-04-06 | 2024-08-23 | 南京大学 | Convolutional neural network feature map data compression method and device |
CN114040392A (en) * | 2021-11-04 | 2022-02-11 | 东南大学 | Uniform quantization method based on median non-uniform normalization and applicable to uncoordinated wireless channel key generation system |
CN116567804A (en) * | 2022-01-27 | 2023-08-08 | 华为技术有限公司 | Distance measuring method, device and readable storage medium in UWB |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104717074A (en) * | 2015-04-02 | 2015-06-17 | 东南大学 | Shared key security communication method for fusing private information |
CN105024824A (en) * | 2014-11-05 | 2015-11-04 | 祝国龙 | Method for generating and verifying credible label based on asymmetrical encryption algorithm and system |
CN106102049A (en) * | 2016-06-06 | 2016-11-09 | 东南大学 | A kind of safe transmission message approach utilizing the characteristic of channel |
CN106211149A (en) * | 2016-07-08 | 2016-12-07 | 东南大学 | Channel reciprocity enhancement method based on principal component analysis |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140153723A1 (en) * | 2012-06-01 | 2014-06-05 | Georgia Tech Research Corporation | System for providing physical layer security |
CN104219252A (en) * | 2014-09-28 | 2014-12-17 | 东南大学 | Coding error correction based secret key forward direction consistency calibration method |
CN106878012B (en) * | 2016-12-07 | 2019-07-16 | 中国电子科技集团公司第三十研究所 | A kind of wireless channel physical layer key agreement and inconsistent bit minimizing technology |
-
2018
- 2018-02-02 CN CN201810105180.8A patent/CN108366370B/en active Active
- 2018-05-11 WO PCT/CN2018/086477 patent/WO2019148690A1/en active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105024824A (en) * | 2014-11-05 | 2015-11-04 | 祝国龙 | Method for generating and verifying credible label based on asymmetrical encryption algorithm and system |
CN104717074A (en) * | 2015-04-02 | 2015-06-17 | 东南大学 | Shared key security communication method for fusing private information |
CN106102049A (en) * | 2016-06-06 | 2016-11-09 | 东南大学 | A kind of safe transmission message approach utilizing the characteristic of channel |
CN106211149A (en) * | 2016-07-08 | 2016-12-07 | 东南大学 | Channel reciprocity enhancement method based on principal component analysis |
Non-Patent Citations (3)
Title |
---|
基于无线信道特征的物理层安全研究;黄夷芯;《中国优秀硕士学位论文全文数据库》;20160504;全文 |
无线信道的密钥生成方法;胡爱群 等;《密码学报》;20140615;全文 |
无线通信物理层安全方法综述;胡爱群 等;《数据采集与处理》;20140515;全文 |
Also Published As
Publication number | Publication date |
---|---|
WO2019148690A1 (en) | 2019-08-08 |
CN108366370A (en) | 2018-08-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108366370B (en) | A kind of information transferring method quantifying privately owned asymmetric key based on radio channel characteristic | |
EP3709563A1 (en) | Secure key agreement with non-trusted devices | |
CN110086616B (en) | Forward one-time pad secret communication method based on wireless channel | |
CN107148015B (en) | Continuous encryption physical layer secure transmission method based on polarization code structure | |
CN108696867B (en) | Lightweight group key distribution method based on wireless channel characteristics | |
CN111970693B (en) | A low-complexity LoRa IoT security encryption method based on physical layer waveform | |
KR20150129328A (en) | Method and apparatus for secure communication | |
CN101697512A (en) | Method and system for anti-interference quantum secure direct communication | |
CN207234973U (en) | Video conferencing system based on quantum cryptography | |
CN110336657B (en) | Optical OFDM dynamic key generation method based on channel characteristics | |
CN105846947A (en) | Physical layer encryption method introducing Latin array | |
CN106027231B (en) | A method of cascade error correction being carried out to error code in the processing after quantum key distribution | |
CN116032454A (en) | Physical layer encryption method and system based on dynamic constellation rotation | |
CN110971399A (en) | Post-processing method and device for optical network physical layer key distribution | |
CN115396102B (en) | Physical layer key generation method based on block and cyclic code | |
Noura et al. | A physical encryption scheme for low-power wireless M2M devices: a dynamic key approach | |
Mihaljević et al. | An approach for stream ciphers design based on joint computing over random and secret data | |
CN104540125B (en) | A kind of safe transmission method using single channel encryption | |
CN107017960A (en) | A kind of AWGN wiretap channel anti-eavesdropping safeguard constructions and its implementation based on polar codes | |
CN104486756A (en) | Encryption and decryption method and system for secret letter short message | |
du Pin Calmon et al. | Lists that are smaller than their parts: A coding approach to tunable secrecy | |
CN113824510A (en) | Quantum secure direct communication method based on intermediate base decoy state | |
Ni et al. | PHY‐Aided Secure Communication via Weighted Fractional Fourier Transform | |
Suresh et al. | Separable reversible data hiding using Rc4 algorithm | |
CN114915417B (en) | A method for securely distributing quantum keys on the edge of the Internet of Things |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |