CN109743155A - Physical layer secure transmission method based on antenna selection differential chaos keying - Google Patents

Physical layer secure transmission method based on antenna selection differential chaos keying Download PDF

Info

Publication number
CN109743155A
CN109743155A CN201910148869.3A CN201910148869A CN109743155A CN 109743155 A CN109743155 A CN 109743155A CN 201910148869 A CN201910148869 A CN 201910148869A CN 109743155 A CN109743155 A CN 109743155A
Authority
CN
China
Prior art keywords
key
antenna
dcsk
day line
antennas
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910148869.3A
Other languages
Chinese (zh)
Other versions
CN109743155B (en
Inventor
雷菁
鲁信金
王思鑫
李为
黄英
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
National University of Defense Technology
Original Assignee
National University of Defense Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by National University of Defense Technology filed Critical National University of Defense Technology
Priority to CN201910148869.3A priority Critical patent/CN109743155B/en
Publication of CN109743155A publication Critical patent/CN109743155A/en
Application granted granted Critical
Publication of CN109743155B publication Critical patent/CN109743155B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention belongs to the field of wireless network communication, and particularly relates to a differential chaotic keying physical layer secure transmission method based on antenna selection. The method is applied to a large-scale MIMO system and comprises the following steps: (S1) generating a Key K1And K2(ii) a (S2) establishing the corresponding relation between the memory address in the antenna index Book and the antenna selection and grouping mode, and using the key K2Scrambling the corresponding relation between the memory address in the antenna index Book and the ASGM, and using the secret key K1Selecting a secret key K from an antenna index Book1Antenna selection and grouping modes corresponding to the equal memory addresses; (S3) the sending end encrypts, determines two reference antennas, equally divides the rest antennas into two groups, and respectively combines the information to be transmitted on the two groups of antennas with r1And r2DCSK modulation is carried out, and finally the antenna is transmitted out by a large-scale MIMO system transmitting end; (S4) the reception side decrypts. The invention has higher security of the key and reduces the complexity of key generation and the mutual communicationThe dependency of the track.

Description

A kind of safe transmission method of physical layer of the differential Chaos Shift Keying based on day line options
Technical field
The invention belongs to wireless communication fields, and in particular to a kind of object of the differential Chaos Shift Keying based on day line options Manage layer safe transmission method.
Background technique
With the development of modern communication technology, people increasingly pay close attention to the safety and confidentiality of information transmission.Chaos sequence Column have many advantages, such as aperiodicity, unpredictability, the characteristic similar with noise, to initial value extreme sensitivity so that chaos letter Number there is natural concealment, low intercepting and capturing property and good anti-interference, thus chaotic communication system is in military communication, low intercepting and capturing There is a unique advantage in the fields probability communication (Low Probability of Intercept, LPI) etc., and wherein difference chaotic Offset keying (Differential Chaos Shift Keying, DCSK) modulation scheme (is detailed in bibliography: Kolumb á n G,Vizvari B,Schwarz W,et al.Differential chaos shift keying:a robust coding for chaotic communication[C]//1996Proceedings of the International Workshop on Nonlinear Dynamics of Electronics System(NDES).Seville,Spain:IEEE Press, 1996:87-92.), using transmission-reference (Transmitted-Reference, T-R) mode, by reference to signal and information The identical or phase antirepresentation binary data bits of signal, receiving end use correlation demodulation, estimate without spread and disposal plus and channel Meter.DCSK not only inherits the good characteristic of chaotic signal, also has the characteristics that structure is simple, anti-multipath jamming.However it is lacked Point is also more prominent, i.e., 1/2 transmission time, frequency band benefit are transmitted in identical frequency band channel and respectively accounted for reference signal and information signal It is low with rate and power efficiency, and the error performance under fading channel is undesirable.
To reinforce performance of the DCSK system under wireless fading channel, it has been proposed that by DCSK and MIMO technique (MIMO) it combines.The wireless communication technique that more antennas are used in transmitting terminal and receiving end, using its diversity gain, not The transmission rate and transmission quality for improving system in the case where increasing extra bandwidth, improve the capacity of communication system, greatly improve The performance of system.Space Time Coding in conjunction with DCSK system, is proposed MIMO-DCSK communication system, S L Wang by H F Ma etc. Deng being analyzed performance of the DCSK system under MIMO technology, and MIMO-DCSK system is given in white Gaussian noise (AWGN) error-rate expression under channel.
However research discovery is carried out to existing MIMO-DCSK scheme and carries out Chaotic Synchronous, institute due to not needing in receiving end To still remain the not strong disadvantage of confidentiality.Also, existing MIMO-DCSK is that directly DCSK modulation system is used in MIMO Every transmitting antenna on, so spectrum efficiency is not still high.
It is traditional complicated using calculating by public key or private key system in network layer with the development of Computing ability The encryption method of degree enhancing communications security will face the challenge.Therefore ensure that the safety of information transmission becomes current in physical layer Research hotspot.Safety of physical layer be protected using the non-reproductions such as channel diversity, reciprocity from physical layer send content, The information such as modulation system combine the safety that can greatly enhance communication with existing password technology.Current radio physical layer Mainly there are two directions for the development of safe practice: first is that key is generated, managed and distributed using the physical characteristic of wireless channel And the physical layer certification based on wireless channel;Second is that the secrecy capacity that Wyner is proposed based on Shannon information theory is general It reads, i.e., the safety of physical layer transmission technology based on tapping channel model.Can specifically the following aspects be divided into first is that base All kinds of tapping channel models are analyzed in information theory, the system secrecy theoretically studied under different radio channel model holds Measure performance.With corresponding safe coding strategy;Second is that beam forming, man made noise and the safe plan of co-interfere Aided Physical layer Slightly, beam forming is received based on MIMO transmitting, signal " alignment " as much as possible will be emitted using multiple antennas and minor channel information and closed The signal strength that method user, as much as possible reduction listener-in can listen to, can also use man made noise and association on this basis Weaken the received signal to noise ratio of listener-in, further with interference to effectively improve security of system energy;Third is that being based on collaboration diversity The safety of physical layer technique study of technology, can make full use of multi-antenna diversity, multi-user diversity and collaboration diversity etc. to mention High security of system energy;Fourth is that the key generation techniques based on physical layer radio channel characteristic, legitimate correspondence both sides are to main channel The channel characteristics parameter such as channel strength carry out corresponding quantification treatment and verification operation, generate bit stream encryption consistent with each other Key is simultaneously encrypted raw information.
For spectrum efficiency in MIMO-DCSK is low and the not strong problem of safety, herein in conjunction with existing extensive MIMO Technology proposes the DCSK encryption in physical layer transmission plan (MIMO-AS- based on day line options (antenna-selection) DCSK).Firstly, establishing extensive MIMO-DCSK Transmission system model;Key is generated from channel subsequently, based on chaology Collection, for picking out two conduct reference antennas from transmitting antenna and remaining antenna being divided into two groups;Finally allow this two groups of days Line carries out DCSK modulation with a wherein reference antenna respectively.Theory analysis and simulation result show and existing MIMO-DCSK phase Than the confidentiality of system not only can be improved in mentioned method, and has a clear superiority in terms of spectrum efficiency, but slightly sacrificial Domestic animal error performance.
Summary of the invention
In order to solve the above technical problems, the present invention combines existing extensive MIMO technology, propose based on day line options (Antenna-Selection) DCSK encryption in physical layer transmission plan (MIMO-AS-DCSK).Firstly, establishing extensive MIMO-AS-DCSK Transmission system model;Key set is generated from channel subsequently, based on chaology, for from transmitting antenna Two are picked out as reference antenna and remaining antenna is divided into two groups;This two groups of antennas are finally allowed to refer to respectively with wherein one Antenna carries out DCSK modulation.Theory analysis and simulation result show to compare with existing MIMO-DCSK, are guaranteeing that errored bit is forthright While energy, the confidentiality of system is not only can be improved in mentioned method, and has a clear superiority in terms of spectrum efficiency.Not Come in 5G communication and military security communication have wide application prospect.Specific technical solution of the present invention is as follows:
A kind of differential Chaos Shift Keying encryption in physical layer method based on day line options is applied in extensive mimo system, The following steps are included:
(S1) key K is generated1And K2, the key extraction method based on radio channel characteristic generates initial value, by initial value generation Enter Lorenz chaotic mapping system and generate a certain number of chaos sequences, and select suitable quantization method, further by chaos Sequence is quantified as bit sequence, and the bit sequence for intercepting certain length respectively forms key K1With key K2
(S2) memory address and day line options and group mode (abbreviation: ASGM) are established in antenna index Book between the two Corresponding relationship, determine day line options and group mode corresponding to different memory address.With key K2By antenna index Memory address and ASGM corresponding relationship scramble in Book, to protect known to the not stolen hearer of sample pool of legal person.Utilize key K1It is picked out from antenna index Book and key K1Corresponding day line options and group mode in equal memory address (ASGM)。
(S3) transmitting terminal encrypts: according to the day line options and group mode (ASGM) selected in the step (S2), determining Two reference antennas, are respectively used to transmission of reference signals r1And r2, and remaining antenna is equally divided into two groups, it will be on two groups of antennas Information to be transmitted respectively with r1And r2DCSK modulation is carried out, is finally launched by extensive mimo system transmitting terminal antenna;
(S4) receiving end is decrypted: legitimate receipt end correctly obtains key K according to radio channel characteristic1And K2, receiving end into Then row signal detection carries out the inverse process of transmitting terminal, demodulates transmission information.
Technical solution for a better understanding of the invention further generates MIMO-AS-DCSK system model and chaotic key The related contents such as algorithm, receiving end decoding algorithm are illustrated.
It is as shown in Figure 1 proposed extensive MIMO-AS-DCSK system model.System model includes sending Person Alice, legal recipient Bob and listener-in Eve.Assuming that extensive MIMO transmitting terminal antenna quantity is NA, receiving end Antenna amount is NR, listener-in's antenna amount be Ne, meet relationship between them are as follows: Ne> > NR=NA> 0, and Ne→ ∞, NR And NAIt is limited big.Although the latter matches it can thus be appreciated that legal recipient and listener-in are provided with extensive mimo antenna array It sets and is far more than powerhouse.dnThe data transmitted required for indicating, subscript n i.e. corresponding n-th is root transmitting terminal antenna.Indicate warp It crosses decision device and demodulates the data come later.
In this system model, different day line options and group mode (Antenna are stored in antenna index Book Selection and Grouping Model, ASGM), ASGM has determined the selection mode of two reference antennas and remaining (NA- 2) antenna is divided equally into the group modes of two groups.Existing MIMO-DCSK system is individually to carry out on each antenna DCSK modulation, i.e., reference signal and information signal respectively account for 1/2 transmission time, and spectrum efficiency is lower.With existing MIMO-DCSK System is different, and this system utilizes the two reference antennas difference transmission of reference signals r selected1And r2, then it is left two groups of antennas On information to be transmitted respectively with r1And r2DCSK modulation is carried out, spectrum efficiency is greatly improved.
This algorithm devises two layers of encryption mechanism, respectively corresponds key K1And K2.First layer encryption mechanism is with key K1From A kind of day line options and group mode ASGM are selected in antenna index Book;Second layer encryption principle is with key K2Scramble Book The corresponding relationship of middle memory address and ASGM, to protect the local sample pool of legal person.Existing MIMO-DCSK system is compared, The encryption mechanism greatly enhances the safety of system.
Chaotic key is generated by chaos system, it is contemplated that the safety of system, this section select Lorenz chaos system as Key generation system, as shown in formula (1):
Wherein, alpha, gamma, β are system parameter,For the chaos coordinate points of generation.Herein be arranged α=15, β= 7/3, γ=26, solution is the chaotic region comprising multicycle window at this time, and system solution jumps between two singular points, chaos system phase Space diagram is as shown in Figure 2.
Equivalent channel phase extraction method based on radio channel characteristic can be 201710180906.X with application reference number Patent application document.X, y are generated using the equivalent phase extracted in radio channel characteristic herein, z initial value substitutes into above-mentioned Lorenz chaos system generates a certain number of chaos sequences, and selects suitable quantization method, and chaos sequence is quantified as comparing Special sequence intercepts the bit sequence of certain length, to form key set K needed for this paper respectively1And K2
Receiving end need to first use Inverse Channel Detection device (Inverse Channel Detector, ICD) to restore every transmitting Signal on antenna.Then the inverse operation of transmitting terminal is carried out again, i.e., corresponding reference antenna is determined according to the ASGM used at this time And antenna packet mode, then DCSK demodulation is carried out, finally obtain raw information.
Inverse Channel Detection device (ICD) is described below.If the signal that transmitting terminal is sent is denoted as s, the signal that receiving end obtains is remembered It is the additive Gaussian noise of channel for s ', ξ.Assuming that receiving end known channel state information, and it is unknown to start.Actually in frequency In non-selective mimo channel, signal model can be indicated are as follows:
S '=Hs+ ξ (2)
In formula,H indicates NR×NTLetter Road gain matrix, upper right mark T indicate vector transposition symbol.Inverse Channel Detection device (ICD) is to eliminate interchannel using weighting matrix W Interference.Weighting matrix W is the pseudoinverse of channel matrix, i.e.,
WE=(HEH)-1HE (3)
Upper right mark E indicates Hermitian transformation, and -1 indicates inversion operation;
Therefore it can further obtain
ValuationEach element quantization to immediate transmission signal.Then the inverse operation of transmitting terminal, i.e. basis are carried out again The ASGM used at this time determines corresponding reference antenna and antenna packet mode, then carries out DCSK demodulation, finally obtains original Information.
Using the present invention obtain the utility model has the advantages that 1. the present invention is based on radio channel characteristic extract equivalent channel phase information As the initial value of chaos system, a large amount of chaos sequence is then generated, using this chaos sequence as key, is handed over without key It changes and transmission process, so that the safety of key is higher, and a large amount of chaos can be obtained by a phase information extraction Sequence reduces the complexity of key generation and the dependency degree to channel.2. the present invention protects a day line selection with chaotic key It selects and combination, allows listener-in not know how to carry out DCSK demodulation, promote safety of physical layer performance, reach secure communication The purpose .3. present invention due to only carrying out reference signal transmission with two antennas, remaining antenna all carry out information signal transmission, Therefore spectrum efficiency is obviously improved compared to tradition MIMO-DCSK system.
Detailed description of the invention
Fig. 1 is extensive MIMO-AS-DCSK system model proposed by the present invention;
Fig. 2 is Lorenz chaos system phase space plot;
Fig. 3 is the method for the present invention flow diagram;
Fig. 4 is key K1With day line options in antenna index Book and group mode ASGM corresponding relationship;
Fig. 5 is traditional DCSK system principle diagram;
Fig. 6 is spectrum efficiency ratio and transmitting antenna number NARelational graph;
Fig. 7 is MIMO-DCSK and MIMO-AS-DCSK bit error rate comparison diagram (NA=NR=16);
Fig. 8 is MIMO-DCSK and MIMO-AS-DCSK bit error rate comparison diagram (NA=NR=32).
Specific embodiment
Present invention will be further explained below with reference to the attached drawings and examples.
As shown in figure 3, the present invention provides a kind of differential Chaos Shift Keying encryption in physical layer method based on day line options, is answered For in extensive mimo system, comprising the following steps:
(S1) key set K is generated1And K2.X initial value, generation are generated using the cipher key-extraction technology based on radio channel characteristic Enter Lorenz chaotic mapping system, generate a certain number of chaos sequences, and select suitable quantization method, by chaos sequence amount Bit sequence is turned to, the bit sequence of certain length is intercepted respectively, to form key set K needed for this paper1And K2;Existing skill Common quantization method has threshold value quantizing and T transformation, detailed visible bibliography ([1] ZHOU Hong, LING Xie- in art ting.Generating chaotic secure sequences with desired statistical properties And high secuirty [J] .Bifurcation and Chaos, 1997,7 (1): 205-213, [2] LI Pei, MIN Le-quan,ZANG Hong-yan,et al.A generalized chaos synchronization-based pseudo- random generator number and performanceanalysis[C]//Proc of Intemational Conference on S.L.]:IEEE Pres,2010:781-785)
(S2) between the two corresponding of memory address and day line options and group mode ASGM in antenna index Book is established Relationship determines day line options and group mode ASGM corresponding to different memory address.With key K2By antenna index Book Middle memory address and ASGM corresponding relationship scramble, to protect known to the not stolen hearer of sample pool of legal person.Utilize key K1From It is picked out in antenna index Book and key K1Corresponding day line options and group mode ASGM in equal memory address.If Antenna number is NA(NAFor even number), A is arrangement oeprator, and C is combinatorial operation symbol, then picks out two in antenna index Book The mode of root reference antenna isKind,Remaining NA- 2 antennas are bisected into the packet mode of two groups HaveKind, so can have in antenna index BookKind different day line options and group mode (ASGM), it is deposited into respectivelyIn a memory address.It is by lengthInstitute Have binary sequence (To be rounded downwards) composition key K1, then picked out from antenna index Book and key K1It is equal Memory address in corresponding day line options and group mode ASGM.With key K2By memory address in antenna index Book with ASGM corresponding relationship scramble in embodiment, can choose XOR operation and carry out scramble, to protect the sample pool of legal person not to be stolen Known to hearer.By key K2Shuffle operation, if want obtain ASGM information, need to be traversed for all possibility of ASGM in Book Property, i.e., key space reaches hereinFurther improve safety.And then establish as shown in Figure 4 one One corresponding relationship, wherein
(S3) transmitting terminal encrypts: according to the day line options and group mode ASGM selected in the step (S2), determining two Root reference antenna, difference transmission of reference signals r1And r2, then the information to be transmitted on remaining two groups of antenna respectively with r1And r2Into Row DCSK modulation.Finally launched by extensive mimo system transmitting terminal antenna.
Shown in fig. 5 is traditional DCSK system principle diagram.DCSK is that a kind of receiving end is not necessarily to carry out the mixed of Chaotic Synchronous Ignorant digital communication system, has good robustness and noiseproof feature, easy to accomplish, and decision threshold is unrelated with signal-to-noise ratio.Its Basic thought is that reference signal is added in chaotic signal, if sending bit is " 1 ", sends the chaos piece as two Section sends two opposite chaos segments, previous segment is known as reference signal, the latter segment if sending bit is " 0 " Referred to as information signal.If previous segment be chaos signal generator generate chaos sequence c=c (1), c (2) ..., c (N) }, N indicates that the length of the previous segment of this chaos sequence is N number of bit, i.e. c (1), c (2) ..., c (N).
Then first of transmission signal of transmitting terminal can be denoted as:
D (l) indicates the information bit of transmission, and value is 1 or 0.
When transmission channel is additive white Gaussian noise channel, the signal that receiving end receives are as follows:
ξ (k) indicates additive white Gaussian noise, will receive the reference signal delay NT of the previous segment of signalcAfterwards, with The information signal of the latter segment is multiplied, and carries out non-coherent demodulation, and the output result after integral is
When noise is bigger, latter three are approximately 0.First item is according to the bit symbol of transmission, when d (l) is " 1 ", First item is positive, if d (l) is " 0 ", first item is negative, therefore judging process may be expressed as:
Existing MIMO-DCSK system is the progress DCSK modulation directly on every antenna of transmitting terminal, wherein with reference to letter Number and information signal respectively account for 1/2 transmission time, spectrum efficiency is lower.And MIMO-AS-DCSK system proposed by the present invention utilizes The two reference antennas difference transmission of reference signals r selected1And r2, then the information to be transmitted on remaining two groups of antennas is distinguished With r1And r2DCSK modulation is carried out, spectrum efficiency is greatly improved.
(S4) receiving end is decrypted: legitimate receipt end correctly obtains key K according to radio channel characteristic1And K2, chosen from Book ASGM used by selecting at this time.Then receiving end is gone back with Inverse Channel Detection device (Inverse Channel Detector, ICD) Original goes out the signal on every transmitting antenna.Then the inverse operation of transmitting terminal is carried out again, i.e., phase is determined according to the ASGM used at this time The reference antenna and antenna packet mode answered, then DCSK demodulation is carried out, finally obtain the raw information of transmission.
MATLAB emulation and mathematical analysis are carried out to the method for the present invention, by simulation flowchart, imitated in safety, frequency spectrum Three aspects of rate and reliability all achieve good effect.Simulation parameter setting refers to 802.16d standard, design parameter setting As shown in table 1, channel is rayleigh fading channel, and Inverse Channel Detection device ICD is taken in receiving end.
The system emulation parameter of 1 MIMO-AS-DCSK encipherment scheme of table
The safety of this algorithm uses key K from two layers of encryption: 1.1ASGM is picked out, DCSK modulation is then carried out, is protected Raw information is protected.2. using key K2By memory address in antenna index Book and ASGM corresponding relationship scramble, local is protected Sample pool;
If listener-in does not have key K1With key K2Information when, each bit of Brute Force requires Ergodic Matrices All possibilities, i.e. complexity areAnd legal receiving terminal is knowing key K1With key K2The case where Under, it can directly find and currently receive ASGM used in bit, therefore listener-in's complexity is legal personTimes.Assuming that 5 bit informations are a circulation group, and table 2 lists different transmitting days on transmission antenna The complexity of legitimate receiver and listener-in compare when line number N.The time required to unit is an addressing operation.
The legal person of table 2 and the comparison of listener-in's complexity
N 16 32 64 128
Legal person 5 5 5 5
Listener-in 3.8×1029 8.7×1055 2.3×10106 9.1×10204
As can be seen from Table 2, after receiving end receives a symbol, legal person need to only find corresponding address, and at this time 5 A bit information is a circulation group, therefore only needs five addressing operations altogether.And listener-in is not due to knowing key K1With key K2 Information, all possible ASGM is needed to be traversed for, so that with transmitting terminal antenna amount NA, the calculation amount of listener-in increased dramatically, The difficulty that cracks of listener-in increases with it.
Spectrum efficiency (ηSE) it is the important indicator value for measuring communications system transmission efficiency, unit is bits/s/Hz, is calculated public Formula are as follows:
Wherein RbFor information rate, W is bandwidth.The transmitting day of setting this paper mentioned algorithm and tradition MIMO-DCSK system Line number NA(NA> 2, and be even number), the symbol transmission rate R on bandwidth W and every antennaBIt is identical.To compare two ways Spectrum efficiency, define rSEFor the ratio between the spectrum efficiency of mentioned algorithm and tradition MIMO-DCSK system herein.
Under traditional MIMO-DCSK system model, every antenna sends symbol and carries information, but reference signal and letter Information signal respectively accounts for 1/2 transmission time, so NAThe maximum effective information bit number that root antenna can transmit are as follows:And MIMO-AS-DCSK system proposed in this paper is transmitted respectively using two reference antennas selected with reference to letter Number r1And r2, then be left two groups of antennas on information to be transmitted respectively with r1And r2DCSK modulation is carried out, so NARoot antenna institute The maximum effective information bit number that can be transmitted is R2=RB·(NA-2)。
Assuming that is, receiving end can correctly receive all transmission bit sequences with error free, then frequency spectrum under error-free channel Efficiency ratio rSEAre as follows:
It will be appreciated from fig. 6 that working as transmitting antenna number NAWhen=4, the spectrum efficiency of two methods is identical, works as NAWhen > 4, this paper institute The spectrum efficiency of the MIMO-AS-DCSK system mentioned is higher than traditional MIMO-DCSK system, and with NAIncrease, frequency spectrum effect Rate ratio gradually levels off to twice.It is significantly mentioned it can be seen that spectrum efficiency of the invention has compared to tradition MIMO-DCSK system It rises.
As shown in Figure 7 and Figure 8, Reliablility simulation is carried out to the present invention under the simulation parameter setting of table 1, wherein existing MIMO-DCSK system is on the every transmitting antenna that directly DCSK modulation system is used in MIMO, and proposed in this paper MIMO-AS-DCSK system is that other antennas and the reference antenna selected carry out DCSK modulation.In addition to this, other parameters are set It sets completely the same.
It can see by Fig. 7 and Fig. 8, the bit error rate of Eve is always near 0.5, from the symbol received completely not It can restore original bit.And Bob can correctly restore original bit, with the raising of signal-to-noise ratio, user performance is become better and better, and NA=NRThe performance of=32 mimo system is better than NA=NR=16 mimo system.Also, MIMO-AS-DCSK system of the invention The performance of BER of system is slightly better than traditional MIMO-DCSK system, and can be seen that mentioning with signal-to-noise ratio from curvilinear trend Height, performance of BER advantage are more obvious.It can be said that MIMO-AS-DCSK system of the invention is while ensure that reliability Greatly improve system spectral efficiency and Information Security.
Above embodiments are only used for helping to understand method of the invention, it is noted that for the ordinary skill of technical field For personnel, without departing from the principle of the present invention, several modifications and improvement can also be carried out to the present invention, these modifications It is also fallen within the protection scope of the claims of the present invention with improvement.

Claims (2)

1. a kind of differential Chaos Shift Keying encryption in physical layer method based on day line options is applied in extensive mimo system, It is characterized in that: the following steps are included:
(S1) key set K is generated1And K2, key extraction method based on radio channel characteristic generates initial value, initial value substituted into Lorenz chaotic mapping system generates a certain number of chaos sequences, and chaos sequence is quantified as bit sequence, intercepts one respectively The bit sequence of measured length forms key K1With key K2
(S2) memory address and the corresponding relationship of day line options and group mode between the two in antenna index Book are established, is determined Day line options and group mode corresponding to different memory address, with key K2By memory address in antenna index Book with ASGM corresponding relationship scramble is picked out and key K from antenna index Book1Corresponding day line selection in equal memory address It selects and group mode;ASGM indicates day line options and group mode;
(S3) transmitting terminal encrypts: according to the day line options and group mode ASGM selected in the step (S2), from transmitting antenna It is middle to select two antennas as reference antenna, difference transmission of reference signals r1And r2, then remaining transmitting antenna is equally divided into Two groups of antennas, by the information to be transmitted on two groups of antennas respectively with r1And r2Launch after carrying out DCSK modulation;
(S4) receiving end is decrypted: legitimate receipt end correctly obtains key K according to radio channel characteristic1And K2, letter is carried out in receiving end Number detection, then carry out transmitting terminal inverse process demodulate transmitting terminal transmission information.
2. a kind of differential Chaos Shift Keying encryption in physical layer method based on day line options as described in claim 1, feature exist In the key K2Length beBinary sequence,To be rounded symbol, N downwardsATransmitting Hold antenna number, and NAFor even number.
CN201910148869.3A 2019-02-28 2019-02-28 Physical layer secure transmission method based on antenna selection differential chaos keying Active CN109743155B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910148869.3A CN109743155B (en) 2019-02-28 2019-02-28 Physical layer secure transmission method based on antenna selection differential chaos keying

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910148869.3A CN109743155B (en) 2019-02-28 2019-02-28 Physical layer secure transmission method based on antenna selection differential chaos keying

Publications (2)

Publication Number Publication Date
CN109743155A true CN109743155A (en) 2019-05-10
CN109743155B CN109743155B (en) 2021-09-24

Family

ID=66368800

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910148869.3A Active CN109743155B (en) 2019-02-28 2019-02-28 Physical layer secure transmission method based on antenna selection differential chaos keying

Country Status (1)

Country Link
CN (1) CN109743155B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110418341A (en) * 2019-07-30 2019-11-05 东南大学 A kind of adaptive symmetrical radio channel characteristic acquisition methods for mimo system
CN112437432A (en) * 2019-08-09 2021-03-02 中国移动通信有限公司研究院 Physical layer key distribution method and communication equipment
CN113055347A (en) * 2019-12-27 2021-06-29 电子科技大学 Communication method for realizing physical layer key distribution based on random self-interference

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014038014A1 (en) * 2012-09-05 2014-03-13 株式会社日立製作所 Interaction data generation device and method for generating interaction data
CN105939171A (en) * 2016-06-02 2016-09-14 广东工业大学 Extensible method of spatial shift keying modulation mode

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014038014A1 (en) * 2012-09-05 2014-03-13 株式会社日立製作所 Interaction data generation device and method for generating interaction data
CN105939171A (en) * 2016-06-02 2016-09-14 广东工业大学 Extensible method of spatial shift keying modulation mode

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
岳敖: "基于信道符号加密的物理层安全传输技术研究", 《CNKI中国硕士学位论文全文数据库信息科技辑》 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110418341A (en) * 2019-07-30 2019-11-05 东南大学 A kind of adaptive symmetrical radio channel characteristic acquisition methods for mimo system
CN110418341B (en) * 2019-07-30 2022-02-11 东南大学 Self-adaptive symmetric wireless channel characteristic acquisition method for MIMO system
CN112437432A (en) * 2019-08-09 2021-03-02 中国移动通信有限公司研究院 Physical layer key distribution method and communication equipment
CN113055347A (en) * 2019-12-27 2021-06-29 电子科技大学 Communication method for realizing physical layer key distribution based on random self-interference
CN113055347B (en) * 2019-12-27 2022-05-20 电子科技大学 Communication method for realizing physical layer key distribution based on random self-interference

Also Published As

Publication number Publication date
CN109743155B (en) 2021-09-24

Similar Documents

Publication Publication Date Title
Ma et al. Secure communication in TDS-OFDM system using constellation rotation and noise insertion
Luo et al. RSS-based secret key generation in underwater acoustic networks: advantages, challenges, and performance improvements
CN109743155A (en) Physical layer secure transmission method based on antenna selection differential chaos keying
Cheng et al. Efficient physical-layer secret key generation and authentication schemes based on wireless channel-phase
Wang et al. Cooperative key agreement for wireless networking: Key rates and practical protocol design
Wang et al. Physical-layer encryption in massive MIMO systems with spatial modulation
Kang et al. A survey of security mechanisms with direct sequence spread spectrum signals
CN111082933B (en) Multi-user physical layer safety communication method capable of resisting any plurality of cooperation eavesdroppers
CN108770069A (en) Power distribution method for the communication of satellite communication network safety of physical layer
CN107017960B (en) A kind of AWGN-wiretap channel anti-eavesdropping safeguard construction and its implementation based on polar code
CN109600222B (en) Key generation method based on channel characteristics
CN110677236A (en) OFDM encryption method based on composite chaotic system and XOR operation
CN111901794B (en) Physical layer secure transmission method based on noise distribution
CN109951240A (en) The physical layer secret communication transmission method of wiretap channel based on polar code
CN110176952B (en) Antenna selection method in secure spatial modulation network
CN108574574A (en) Physical layer encryption method based on multi-dimensional constellation rotation
CN111404587B (en) Multi-user MIMO symmetrical channel characteristic obtaining method based on conjugate precoding
Cheng et al. MIMO-OFDM PHY integrated (MOPI) scheme for confidential wireless transmission
CN110278560A (en) A kind of convert communication system based on IEEE 802.11a
CN111726221B (en) Physical layer safety transmission method capable of resisting arbitrary eavesdropping antenna number
CN115037445A (en) Key generation method and device
Fang et al. Towards phy-aided authentication via weighted fractional fourier transform
Choi et al. Secret key transmission based on channel reciprocity for secure IoT
CN106452719A (en) Safety communication method based on combination of artificial Rayleigh fading and adaptive modulation
Xu et al. Achieving secure communication through random phase rotation technique

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant