CN109743155A - Physical layer secure transmission method based on antenna selection differential chaos keying - Google Patents
Physical layer secure transmission method based on antenna selection differential chaos keying Download PDFInfo
- Publication number
- CN109743155A CN109743155A CN201910148869.3A CN201910148869A CN109743155A CN 109743155 A CN109743155 A CN 109743155A CN 201910148869 A CN201910148869 A CN 201910148869A CN 109743155 A CN109743155 A CN 109743155A
- Authority
- CN
- China
- Prior art keywords
- key
- antenna
- dcsk
- day line
- antennas
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Abstract
The invention belongs to the field of wireless network communication, and particularly relates to a differential chaotic keying physical layer secure transmission method based on antenna selection. The method is applied to a large-scale MIMO system and comprises the following steps: (S1) generating a Key K1And K2(ii) a (S2) establishing the corresponding relation between the memory address in the antenna index Book and the antenna selection and grouping mode, and using the key K2Scrambling the corresponding relation between the memory address in the antenna index Book and the ASGM, and using the secret key K1Selecting a secret key K from an antenna index Book1Antenna selection and grouping modes corresponding to the equal memory addresses; (S3) the sending end encrypts, determines two reference antennas, equally divides the rest antennas into two groups, and respectively combines the information to be transmitted on the two groups of antennas with r1And r2DCSK modulation is carried out, and finally the antenna is transmitted out by a large-scale MIMO system transmitting end; (S4) the reception side decrypts. The invention has higher security of the key and reduces the complexity of key generation and the mutual communicationThe dependency of the track.
Description
Technical field
The invention belongs to wireless communication fields, and in particular to a kind of object of the differential Chaos Shift Keying based on day line options
Manage layer safe transmission method.
Background technique
With the development of modern communication technology, people increasingly pay close attention to the safety and confidentiality of information transmission.Chaos sequence
Column have many advantages, such as aperiodicity, unpredictability, the characteristic similar with noise, to initial value extreme sensitivity so that chaos letter
Number there is natural concealment, low intercepting and capturing property and good anti-interference, thus chaotic communication system is in military communication, low intercepting and capturing
There is a unique advantage in the fields probability communication (Low Probability of Intercept, LPI) etc., and wherein difference chaotic
Offset keying (Differential Chaos Shift Keying, DCSK) modulation scheme (is detailed in bibliography: Kolumb á n
G,Vizvari B,Schwarz W,et al.Differential chaos shift keying:a robust coding
for chaotic communication[C]//1996Proceedings of the International Workshop
on Nonlinear Dynamics of Electronics System(NDES).Seville,Spain:IEEE Press,
1996:87-92.), using transmission-reference (Transmitted-Reference, T-R) mode, by reference to signal and information
The identical or phase antirepresentation binary data bits of signal, receiving end use correlation demodulation, estimate without spread and disposal plus and channel
Meter.DCSK not only inherits the good characteristic of chaotic signal, also has the characteristics that structure is simple, anti-multipath jamming.However it is lacked
Point is also more prominent, i.e., 1/2 transmission time, frequency band benefit are transmitted in identical frequency band channel and respectively accounted for reference signal and information signal
It is low with rate and power efficiency, and the error performance under fading channel is undesirable.
To reinforce performance of the DCSK system under wireless fading channel, it has been proposed that by DCSK and MIMO technique
(MIMO) it combines.The wireless communication technique that more antennas are used in transmitting terminal and receiving end, using its diversity gain, not
The transmission rate and transmission quality for improving system in the case where increasing extra bandwidth, improve the capacity of communication system, greatly improve
The performance of system.Space Time Coding in conjunction with DCSK system, is proposed MIMO-DCSK communication system, S L Wang by H F Ma etc.
Deng being analyzed performance of the DCSK system under MIMO technology, and MIMO-DCSK system is given in white Gaussian noise
(AWGN) error-rate expression under channel.
However research discovery is carried out to existing MIMO-DCSK scheme and carries out Chaotic Synchronous, institute due to not needing in receiving end
To still remain the not strong disadvantage of confidentiality.Also, existing MIMO-DCSK is that directly DCSK modulation system is used in MIMO
Every transmitting antenna on, so spectrum efficiency is not still high.
It is traditional complicated using calculating by public key or private key system in network layer with the development of Computing ability
The encryption method of degree enhancing communications security will face the challenge.Therefore ensure that the safety of information transmission becomes current in physical layer
Research hotspot.Safety of physical layer be protected using the non-reproductions such as channel diversity, reciprocity from physical layer send content,
The information such as modulation system combine the safety that can greatly enhance communication with existing password technology.Current radio physical layer
Mainly there are two directions for the development of safe practice: first is that key is generated, managed and distributed using the physical characteristic of wireless channel
And the physical layer certification based on wireless channel;Second is that the secrecy capacity that Wyner is proposed based on Shannon information theory is general
It reads, i.e., the safety of physical layer transmission technology based on tapping channel model.Can specifically the following aspects be divided into first is that base
All kinds of tapping channel models are analyzed in information theory, the system secrecy theoretically studied under different radio channel model holds
Measure performance.With corresponding safe coding strategy;Second is that beam forming, man made noise and the safe plan of co-interfere Aided Physical layer
Slightly, beam forming is received based on MIMO transmitting, signal " alignment " as much as possible will be emitted using multiple antennas and minor channel information and closed
The signal strength that method user, as much as possible reduction listener-in can listen to, can also use man made noise and association on this basis
Weaken the received signal to noise ratio of listener-in, further with interference to effectively improve security of system energy;Third is that being based on collaboration diversity
The safety of physical layer technique study of technology, can make full use of multi-antenna diversity, multi-user diversity and collaboration diversity etc. to mention
High security of system energy;Fourth is that the key generation techniques based on physical layer radio channel characteristic, legitimate correspondence both sides are to main channel
The channel characteristics parameter such as channel strength carry out corresponding quantification treatment and verification operation, generate bit stream encryption consistent with each other
Key is simultaneously encrypted raw information.
For spectrum efficiency in MIMO-DCSK is low and the not strong problem of safety, herein in conjunction with existing extensive MIMO
Technology proposes the DCSK encryption in physical layer transmission plan (MIMO-AS- based on day line options (antenna-selection)
DCSK).Firstly, establishing extensive MIMO-DCSK Transmission system model;Key is generated from channel subsequently, based on chaology
Collection, for picking out two conduct reference antennas from transmitting antenna and remaining antenna being divided into two groups;Finally allow this two groups of days
Line carries out DCSK modulation with a wherein reference antenna respectively.Theory analysis and simulation result show and existing MIMO-DCSK phase
Than the confidentiality of system not only can be improved in mentioned method, and has a clear superiority in terms of spectrum efficiency, but slightly sacrificial
Domestic animal error performance.
Summary of the invention
In order to solve the above technical problems, the present invention combines existing extensive MIMO technology, propose based on day line options
(Antenna-Selection) DCSK encryption in physical layer transmission plan (MIMO-AS-DCSK).Firstly, establishing extensive
MIMO-AS-DCSK Transmission system model;Key set is generated from channel subsequently, based on chaology, for from transmitting antenna
Two are picked out as reference antenna and remaining antenna is divided into two groups;This two groups of antennas are finally allowed to refer to respectively with wherein one
Antenna carries out DCSK modulation.Theory analysis and simulation result show to compare with existing MIMO-DCSK, are guaranteeing that errored bit is forthright
While energy, the confidentiality of system is not only can be improved in mentioned method, and has a clear superiority in terms of spectrum efficiency.Not
Come in 5G communication and military security communication have wide application prospect.Specific technical solution of the present invention is as follows:
A kind of differential Chaos Shift Keying encryption in physical layer method based on day line options is applied in extensive mimo system,
The following steps are included:
(S1) key K is generated1And K2, the key extraction method based on radio channel characteristic generates initial value, by initial value generation
Enter Lorenz chaotic mapping system and generate a certain number of chaos sequences, and select suitable quantization method, further by chaos
Sequence is quantified as bit sequence, and the bit sequence for intercepting certain length respectively forms key K1With key K2;
(S2) memory address and day line options and group mode (abbreviation: ASGM) are established in antenna index Book between the two
Corresponding relationship, determine day line options and group mode corresponding to different memory address.With key K2By antenna index
Memory address and ASGM corresponding relationship scramble in Book, to protect known to the not stolen hearer of sample pool of legal person.Utilize key
K1It is picked out from antenna index Book and key K1Corresponding day line options and group mode in equal memory address
(ASGM)。
(S3) transmitting terminal encrypts: according to the day line options and group mode (ASGM) selected in the step (S2), determining
Two reference antennas, are respectively used to transmission of reference signals r1And r2, and remaining antenna is equally divided into two groups, it will be on two groups of antennas
Information to be transmitted respectively with r1And r2DCSK modulation is carried out, is finally launched by extensive mimo system transmitting terminal antenna;
(S4) receiving end is decrypted: legitimate receipt end correctly obtains key K according to radio channel characteristic1And K2, receiving end into
Then row signal detection carries out the inverse process of transmitting terminal, demodulates transmission information.
Technical solution for a better understanding of the invention further generates MIMO-AS-DCSK system model and chaotic key
The related contents such as algorithm, receiving end decoding algorithm are illustrated.
It is as shown in Figure 1 proposed extensive MIMO-AS-DCSK system model.System model includes sending
Person Alice, legal recipient Bob and listener-in Eve.Assuming that extensive MIMO transmitting terminal antenna quantity is NA, receiving end
Antenna amount is NR, listener-in's antenna amount be Ne, meet relationship between them are as follows: Ne> > NR=NA> 0, and Ne→ ∞, NR
And NAIt is limited big.Although the latter matches it can thus be appreciated that legal recipient and listener-in are provided with extensive mimo antenna array
It sets and is far more than powerhouse.dnThe data transmitted required for indicating, subscript n i.e. corresponding n-th is root transmitting terminal antenna.Indicate warp
It crosses decision device and demodulates the data come later.
In this system model, different day line options and group mode (Antenna are stored in antenna index Book
Selection and Grouping Model, ASGM), ASGM has determined the selection mode of two reference antennas and remaining
(NA- 2) antenna is divided equally into the group modes of two groups.Existing MIMO-DCSK system is individually to carry out on each antenna
DCSK modulation, i.e., reference signal and information signal respectively account for 1/2 transmission time, and spectrum efficiency is lower.With existing MIMO-DCSK
System is different, and this system utilizes the two reference antennas difference transmission of reference signals r selected1And r2, then it is left two groups of antennas
On information to be transmitted respectively with r1And r2DCSK modulation is carried out, spectrum efficiency is greatly improved.
This algorithm devises two layers of encryption mechanism, respectively corresponds key K1And K2.First layer encryption mechanism is with key K1From
A kind of day line options and group mode ASGM are selected in antenna index Book;Second layer encryption principle is with key K2Scramble Book
The corresponding relationship of middle memory address and ASGM, to protect the local sample pool of legal person.Existing MIMO-DCSK system is compared,
The encryption mechanism greatly enhances the safety of system.
Chaotic key is generated by chaos system, it is contemplated that the safety of system, this section select Lorenz chaos system as
Key generation system, as shown in formula (1):
Wherein, alpha, gamma, β are system parameter,For the chaos coordinate points of generation.Herein be arranged α=15, β=
7/3, γ=26, solution is the chaotic region comprising multicycle window at this time, and system solution jumps between two singular points, chaos system phase
Space diagram is as shown in Figure 2.
Equivalent channel phase extraction method based on radio channel characteristic can be 201710180906.X with application reference number
Patent application document.X, y are generated using the equivalent phase extracted in radio channel characteristic herein, z initial value substitutes into above-mentioned
Lorenz chaos system generates a certain number of chaos sequences, and selects suitable quantization method, and chaos sequence is quantified as comparing
Special sequence intercepts the bit sequence of certain length, to form key set K needed for this paper respectively1And K2。
Receiving end need to first use Inverse Channel Detection device (Inverse Channel Detector, ICD) to restore every transmitting
Signal on antenna.Then the inverse operation of transmitting terminal is carried out again, i.e., corresponding reference antenna is determined according to the ASGM used at this time
And antenna packet mode, then DCSK demodulation is carried out, finally obtain raw information.
Inverse Channel Detection device (ICD) is described below.If the signal that transmitting terminal is sent is denoted as s, the signal that receiving end obtains is remembered
It is the additive Gaussian noise of channel for s ', ξ.Assuming that receiving end known channel state information, and it is unknown to start.Actually in frequency
In non-selective mimo channel, signal model can be indicated are as follows:
S '=Hs+ ξ (2)
In formula,H indicates NR×NTLetter
Road gain matrix, upper right mark T indicate vector transposition symbol.Inverse Channel Detection device (ICD) is to eliminate interchannel using weighting matrix W
Interference.Weighting matrix W is the pseudoinverse of channel matrix, i.e.,
WE=(HEH)-1HE (3)
Upper right mark E indicates Hermitian transformation, and -1 indicates inversion operation;
Therefore it can further obtain
ValuationEach element quantization to immediate transmission signal.Then the inverse operation of transmitting terminal, i.e. basis are carried out again
The ASGM used at this time determines corresponding reference antenna and antenna packet mode, then carries out DCSK demodulation, finally obtains original
Information.
Using the present invention obtain the utility model has the advantages that 1. the present invention is based on radio channel characteristic extract equivalent channel phase information
As the initial value of chaos system, a large amount of chaos sequence is then generated, using this chaos sequence as key, is handed over without key
It changes and transmission process, so that the safety of key is higher, and a large amount of chaos can be obtained by a phase information extraction
Sequence reduces the complexity of key generation and the dependency degree to channel.2. the present invention protects a day line selection with chaotic key
It selects and combination, allows listener-in not know how to carry out DCSK demodulation, promote safety of physical layer performance, reach secure communication
The purpose .3. present invention due to only carrying out reference signal transmission with two antennas, remaining antenna all carry out information signal transmission,
Therefore spectrum efficiency is obviously improved compared to tradition MIMO-DCSK system.
Detailed description of the invention
Fig. 1 is extensive MIMO-AS-DCSK system model proposed by the present invention;
Fig. 2 is Lorenz chaos system phase space plot;
Fig. 3 is the method for the present invention flow diagram;
Fig. 4 is key K1With day line options in antenna index Book and group mode ASGM corresponding relationship;
Fig. 5 is traditional DCSK system principle diagram;
Fig. 6 is spectrum efficiency ratio and transmitting antenna number NARelational graph;
Fig. 7 is MIMO-DCSK and MIMO-AS-DCSK bit error rate comparison diagram (NA=NR=16);
Fig. 8 is MIMO-DCSK and MIMO-AS-DCSK bit error rate comparison diagram (NA=NR=32).
Specific embodiment
Present invention will be further explained below with reference to the attached drawings and examples.
As shown in figure 3, the present invention provides a kind of differential Chaos Shift Keying encryption in physical layer method based on day line options, is answered
For in extensive mimo system, comprising the following steps:
(S1) key set K is generated1And K2.X initial value, generation are generated using the cipher key-extraction technology based on radio channel characteristic
Enter Lorenz chaotic mapping system, generate a certain number of chaos sequences, and select suitable quantization method, by chaos sequence amount
Bit sequence is turned to, the bit sequence of certain length is intercepted respectively, to form key set K needed for this paper1And K2;Existing skill
Common quantization method has threshold value quantizing and T transformation, detailed visible bibliography ([1] ZHOU Hong, LING Xie- in art
ting.Generating chaotic secure sequences with desired statistical properties
And high secuirty [J] .Bifurcation and Chaos, 1997,7 (1): 205-213, [2] LI Pei, MIN
Le-quan,ZANG Hong-yan,et al.A generalized chaos synchronization-based pseudo-
random generator number and performanceanalysis[C]//Proc of Intemational
Conference on S.L.]:IEEE Pres,2010:781-785)
(S2) between the two corresponding of memory address and day line options and group mode ASGM in antenna index Book is established
Relationship determines day line options and group mode ASGM corresponding to different memory address.With key K2By antenna index Book
Middle memory address and ASGM corresponding relationship scramble, to protect known to the not stolen hearer of sample pool of legal person.Utilize key K1From
It is picked out in antenna index Book and key K1Corresponding day line options and group mode ASGM in equal memory address.If
Antenna number is NA(NAFor even number), A is arrangement oeprator, and C is combinatorial operation symbol, then picks out two in antenna index Book
The mode of root reference antenna isKind,Remaining NA- 2 antennas are bisected into the packet mode of two groups
HaveKind, so can have in antenna index BookKind different day line options and group mode
(ASGM), it is deposited into respectivelyIn a memory address.It is by lengthInstitute
Have binary sequence (To be rounded downwards) composition key K1, then picked out from antenna index Book and key K1It is equal
Memory address in corresponding day line options and group mode ASGM.With key K2By memory address in antenna index Book with
ASGM corresponding relationship scramble in embodiment, can choose XOR operation and carry out scramble, to protect the sample pool of legal person not to be stolen
Known to hearer.By key K2Shuffle operation, if want obtain ASGM information, need to be traversed for all possibility of ASGM in Book
Property, i.e., key space reaches hereinFurther improve safety.And then establish as shown in Figure 4 one
One corresponding relationship, wherein
(S3) transmitting terminal encrypts: according to the day line options and group mode ASGM selected in the step (S2), determining two
Root reference antenna, difference transmission of reference signals r1And r2, then the information to be transmitted on remaining two groups of antenna respectively with r1And r2Into
Row DCSK modulation.Finally launched by extensive mimo system transmitting terminal antenna.
Shown in fig. 5 is traditional DCSK system principle diagram.DCSK is that a kind of receiving end is not necessarily to carry out the mixed of Chaotic Synchronous
Ignorant digital communication system, has good robustness and noiseproof feature, easy to accomplish, and decision threshold is unrelated with signal-to-noise ratio.Its
Basic thought is that reference signal is added in chaotic signal, if sending bit is " 1 ", sends the chaos piece as two
Section sends two opposite chaos segments, previous segment is known as reference signal, the latter segment if sending bit is " 0 "
Referred to as information signal.If previous segment be chaos signal generator generate chaos sequence c=c (1), c (2) ..., c
(N) }, N indicates that the length of the previous segment of this chaos sequence is N number of bit, i.e. c (1), c (2) ..., c (N).
Then first of transmission signal of transmitting terminal can be denoted as:
D (l) indicates the information bit of transmission, and value is 1 or 0.
When transmission channel is additive white Gaussian noise channel, the signal that receiving end receives are as follows:
ξ (k) indicates additive white Gaussian noise, will receive the reference signal delay NT of the previous segment of signalcAfterwards, with
The information signal of the latter segment is multiplied, and carries out non-coherent demodulation, and the output result after integral is
When noise is bigger, latter three are approximately 0.First item is according to the bit symbol of transmission, when d (l) is " 1 ",
First item is positive, if d (l) is " 0 ", first item is negative, therefore judging process may be expressed as:
Existing MIMO-DCSK system is the progress DCSK modulation directly on every antenna of transmitting terminal, wherein with reference to letter
Number and information signal respectively account for 1/2 transmission time, spectrum efficiency is lower.And MIMO-AS-DCSK system proposed by the present invention utilizes
The two reference antennas difference transmission of reference signals r selected1And r2, then the information to be transmitted on remaining two groups of antennas is distinguished
With r1And r2DCSK modulation is carried out, spectrum efficiency is greatly improved.
(S4) receiving end is decrypted: legitimate receipt end correctly obtains key K according to radio channel characteristic1And K2, chosen from Book
ASGM used by selecting at this time.Then receiving end is gone back with Inverse Channel Detection device (Inverse Channel Detector, ICD)
Original goes out the signal on every transmitting antenna.Then the inverse operation of transmitting terminal is carried out again, i.e., phase is determined according to the ASGM used at this time
The reference antenna and antenna packet mode answered, then DCSK demodulation is carried out, finally obtain the raw information of transmission.
MATLAB emulation and mathematical analysis are carried out to the method for the present invention, by simulation flowchart, imitated in safety, frequency spectrum
Three aspects of rate and reliability all achieve good effect.Simulation parameter setting refers to 802.16d standard, design parameter setting
As shown in table 1, channel is rayleigh fading channel, and Inverse Channel Detection device ICD is taken in receiving end.
The system emulation parameter of 1 MIMO-AS-DCSK encipherment scheme of table
The safety of this algorithm uses key K from two layers of encryption: 1.1ASGM is picked out, DCSK modulation is then carried out, is protected
Raw information is protected.2. using key K2By memory address in antenna index Book and ASGM corresponding relationship scramble, local is protected
Sample pool;
If listener-in does not have key K1With key K2Information when, each bit of Brute Force requires Ergodic Matrices
All possibilities, i.e. complexity areAnd legal receiving terminal is knowing key K1With key K2The case where
Under, it can directly find and currently receive ASGM used in bit, therefore listener-in's complexity is legal personTimes.Assuming that 5 bit informations are a circulation group, and table 2 lists different transmitting days on transmission antenna
The complexity of legitimate receiver and listener-in compare when line number N.The time required to unit is an addressing operation.
The legal person of table 2 and the comparison of listener-in's complexity
N | 16 | 32 | 64 | 128 |
Legal person | 5 | 5 | 5 | 5 |
Listener-in | 3.8×1029 | 8.7×1055 | 2.3×10106 | 9.1×10204 |
As can be seen from Table 2, after receiving end receives a symbol, legal person need to only find corresponding address, and at this time 5
A bit information is a circulation group, therefore only needs five addressing operations altogether.And listener-in is not due to knowing key K1With key K2
Information, all possible ASGM is needed to be traversed for, so that with transmitting terminal antenna amount NA, the calculation amount of listener-in increased dramatically,
The difficulty that cracks of listener-in increases with it.
Spectrum efficiency (ηSE) it is the important indicator value for measuring communications system transmission efficiency, unit is bits/s/Hz, is calculated public
Formula are as follows:
Wherein RbFor information rate, W is bandwidth.The transmitting day of setting this paper mentioned algorithm and tradition MIMO-DCSK system
Line number NA(NA> 2, and be even number), the symbol transmission rate R on bandwidth W and every antennaBIt is identical.To compare two ways
Spectrum efficiency, define rSEFor the ratio between the spectrum efficiency of mentioned algorithm and tradition MIMO-DCSK system herein.
Under traditional MIMO-DCSK system model, every antenna sends symbol and carries information, but reference signal and letter
Information signal respectively accounts for 1/2 transmission time, so NAThe maximum effective information bit number that root antenna can transmit are as follows:And MIMO-AS-DCSK system proposed in this paper is transmitted respectively using two reference antennas selected with reference to letter
Number r1And r2, then be left two groups of antennas on information to be transmitted respectively with r1And r2DCSK modulation is carried out, so NARoot antenna institute
The maximum effective information bit number that can be transmitted is R2=RB·(NA-2)。
Assuming that is, receiving end can correctly receive all transmission bit sequences with error free, then frequency spectrum under error-free channel
Efficiency ratio rSEAre as follows:
It will be appreciated from fig. 6 that working as transmitting antenna number NAWhen=4, the spectrum efficiency of two methods is identical, works as NAWhen > 4, this paper institute
The spectrum efficiency of the MIMO-AS-DCSK system mentioned is higher than traditional MIMO-DCSK system, and with NAIncrease, frequency spectrum effect
Rate ratio gradually levels off to twice.It is significantly mentioned it can be seen that spectrum efficiency of the invention has compared to tradition MIMO-DCSK system
It rises.
As shown in Figure 7 and Figure 8, Reliablility simulation is carried out to the present invention under the simulation parameter setting of table 1, wherein existing
MIMO-DCSK system is on the every transmitting antenna that directly DCSK modulation system is used in MIMO, and proposed in this paper
MIMO-AS-DCSK system is that other antennas and the reference antenna selected carry out DCSK modulation.In addition to this, other parameters are set
It sets completely the same.
It can see by Fig. 7 and Fig. 8, the bit error rate of Eve is always near 0.5, from the symbol received completely not
It can restore original bit.And Bob can correctly restore original bit, with the raising of signal-to-noise ratio, user performance is become better and better, and
NA=NRThe performance of=32 mimo system is better than NA=NR=16 mimo system.Also, MIMO-AS-DCSK system of the invention
The performance of BER of system is slightly better than traditional MIMO-DCSK system, and can be seen that mentioning with signal-to-noise ratio from curvilinear trend
Height, performance of BER advantage are more obvious.It can be said that MIMO-AS-DCSK system of the invention is while ensure that reliability
Greatly improve system spectral efficiency and Information Security.
Above embodiments are only used for helping to understand method of the invention, it is noted that for the ordinary skill of technical field
For personnel, without departing from the principle of the present invention, several modifications and improvement can also be carried out to the present invention, these modifications
It is also fallen within the protection scope of the claims of the present invention with improvement.
Claims (2)
1. a kind of differential Chaos Shift Keying encryption in physical layer method based on day line options is applied in extensive mimo system,
It is characterized in that: the following steps are included:
(S1) key set K is generated1And K2, key extraction method based on radio channel characteristic generates initial value, initial value substituted into
Lorenz chaotic mapping system generates a certain number of chaos sequences, and chaos sequence is quantified as bit sequence, intercepts one respectively
The bit sequence of measured length forms key K1With key K2;
(S2) memory address and the corresponding relationship of day line options and group mode between the two in antenna index Book are established, is determined
Day line options and group mode corresponding to different memory address, with key K2By memory address in antenna index Book with
ASGM corresponding relationship scramble is picked out and key K from antenna index Book1Corresponding day line selection in equal memory address
It selects and group mode;ASGM indicates day line options and group mode;
(S3) transmitting terminal encrypts: according to the day line options and group mode ASGM selected in the step (S2), from transmitting antenna
It is middle to select two antennas as reference antenna, difference transmission of reference signals r1And r2, then remaining transmitting antenna is equally divided into
Two groups of antennas, by the information to be transmitted on two groups of antennas respectively with r1And r2Launch after carrying out DCSK modulation;
(S4) receiving end is decrypted: legitimate receipt end correctly obtains key K according to radio channel characteristic1And K2, letter is carried out in receiving end
Number detection, then carry out transmitting terminal inverse process demodulate transmitting terminal transmission information.
2. a kind of differential Chaos Shift Keying encryption in physical layer method based on day line options as described in claim 1, feature exist
In the key K2Length beBinary sequence,To be rounded symbol, N downwardsATransmitting
Hold antenna number, and NAFor even number.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910148869.3A CN109743155B (en) | 2019-02-28 | 2019-02-28 | Physical layer secure transmission method based on antenna selection differential chaos keying |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910148869.3A CN109743155B (en) | 2019-02-28 | 2019-02-28 | Physical layer secure transmission method based on antenna selection differential chaos keying |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109743155A true CN109743155A (en) | 2019-05-10 |
CN109743155B CN109743155B (en) | 2021-09-24 |
Family
ID=66368800
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910148869.3A Active CN109743155B (en) | 2019-02-28 | 2019-02-28 | Physical layer secure transmission method based on antenna selection differential chaos keying |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109743155B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110418341A (en) * | 2019-07-30 | 2019-11-05 | 东南大学 | A kind of adaptive symmetrical radio channel characteristic acquisition methods for mimo system |
CN112437432A (en) * | 2019-08-09 | 2021-03-02 | 中国移动通信有限公司研究院 | Physical layer key distribution method and communication equipment |
CN113055347A (en) * | 2019-12-27 | 2021-06-29 | 电子科技大学 | Communication method for realizing physical layer key distribution based on random self-interference |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2014038014A1 (en) * | 2012-09-05 | 2014-03-13 | 株式会社日立製作所 | Interaction data generation device and method for generating interaction data |
CN105939171A (en) * | 2016-06-02 | 2016-09-14 | 广东工业大学 | Extensible method of spatial shift keying modulation mode |
-
2019
- 2019-02-28 CN CN201910148869.3A patent/CN109743155B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2014038014A1 (en) * | 2012-09-05 | 2014-03-13 | 株式会社日立製作所 | Interaction data generation device and method for generating interaction data |
CN105939171A (en) * | 2016-06-02 | 2016-09-14 | 广东工业大学 | Extensible method of spatial shift keying modulation mode |
Non-Patent Citations (1)
Title |
---|
岳敖: "基于信道符号加密的物理层安全传输技术研究", 《CNKI中国硕士学位论文全文数据库信息科技辑》 * |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110418341A (en) * | 2019-07-30 | 2019-11-05 | 东南大学 | A kind of adaptive symmetrical radio channel characteristic acquisition methods for mimo system |
CN110418341B (en) * | 2019-07-30 | 2022-02-11 | 东南大学 | Self-adaptive symmetric wireless channel characteristic acquisition method for MIMO system |
CN112437432A (en) * | 2019-08-09 | 2021-03-02 | 中国移动通信有限公司研究院 | Physical layer key distribution method and communication equipment |
CN113055347A (en) * | 2019-12-27 | 2021-06-29 | 电子科技大学 | Communication method for realizing physical layer key distribution based on random self-interference |
CN113055347B (en) * | 2019-12-27 | 2022-05-20 | 电子科技大学 | Communication method for realizing physical layer key distribution based on random self-interference |
Also Published As
Publication number | Publication date |
---|---|
CN109743155B (en) | 2021-09-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Ma et al. | Secure communication in TDS-OFDM system using constellation rotation and noise insertion | |
Luo et al. | RSS-based secret key generation in underwater acoustic networks: advantages, challenges, and performance improvements | |
CN109743155A (en) | Physical layer secure transmission method based on antenna selection differential chaos keying | |
Cheng et al. | Efficient physical-layer secret key generation and authentication schemes based on wireless channel-phase | |
Wang et al. | Cooperative key agreement for wireless networking: Key rates and practical protocol design | |
Wang et al. | Physical-layer encryption in massive MIMO systems with spatial modulation | |
Kang et al. | A survey of security mechanisms with direct sequence spread spectrum signals | |
CN111082933B (en) | Multi-user physical layer safety communication method capable of resisting any plurality of cooperation eavesdroppers | |
CN108770069A (en) | Power distribution method for the communication of satellite communication network safety of physical layer | |
CN107017960B (en) | A kind of AWGN-wiretap channel anti-eavesdropping safeguard construction and its implementation based on polar code | |
CN109600222B (en) | Key generation method based on channel characteristics | |
CN110677236A (en) | OFDM encryption method based on composite chaotic system and XOR operation | |
CN111901794B (en) | Physical layer secure transmission method based on noise distribution | |
CN109951240A (en) | The physical layer secret communication transmission method of wiretap channel based on polar code | |
CN110176952B (en) | Antenna selection method in secure spatial modulation network | |
CN108574574A (en) | Physical layer encryption method based on multi-dimensional constellation rotation | |
CN111404587B (en) | Multi-user MIMO symmetrical channel characteristic obtaining method based on conjugate precoding | |
Cheng et al. | MIMO-OFDM PHY integrated (MOPI) scheme for confidential wireless transmission | |
CN110278560A (en) | A kind of convert communication system based on IEEE 802.11a | |
CN111726221B (en) | Physical layer safety transmission method capable of resisting arbitrary eavesdropping antenna number | |
CN115037445A (en) | Key generation method and device | |
Fang et al. | Towards phy-aided authentication via weighted fractional fourier transform | |
Choi et al. | Secret key transmission based on channel reciprocity for secure IoT | |
CN106452719A (en) | Safety communication method based on combination of artificial Rayleigh fading and adaptive modulation | |
Xu et al. | Achieving secure communication through random phase rotation technique |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |