CN109889337A - A kind of joint intertexture encryption method based on physical layer key - Google Patents

A kind of joint intertexture encryption method based on physical layer key Download PDF

Info

Publication number
CN109889337A
CN109889337A CN201910249804.8A CN201910249804A CN109889337A CN 109889337 A CN109889337 A CN 109889337A CN 201910249804 A CN201910249804 A CN 201910249804A CN 109889337 A CN109889337 A CN 109889337A
Authority
CN
China
Prior art keywords
node
key
vector
physical layer
intertexture
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910249804.8A
Other languages
Chinese (zh)
Inventor
侯晓赟
张永伟
凌捷
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Post and Telecommunication University
Nanjing University of Posts and Telecommunications
Original Assignee
Nanjing Post and Telecommunication University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Post and Telecommunication University filed Critical Nanjing Post and Telecommunication University
Priority to CN201910249804.8A priority Critical patent/CN109889337A/en
Publication of CN109889337A publication Critical patent/CN109889337A/en
Pending legal-status Critical Current

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The joint intertexture encryption method based on physical layer key that the invention discloses a kind of, the implementation steps of this method include: that node A and node B just utilizes channel characteristics to generate key, make both sides' key agreement by key agreement, after being grouped and system is converted, extract 0, 1, 2, the position of 3 vector after the conversion forms position vector, for generating interleaver matrix, node A is multiplied to encrypt with interleaver matrix with OFDM symbol, interleaver matrix is just used for the design of balanced device by node B, because time-division system wireless channel has reciprocity, node A is no longer needed for key with node B and exchanges, the present invention is compared with the generation scheme for needing first to carry out key exchange before intertexture, it no longer needs communicating pair to carry out key and exchanges this process, with better security performance, interweave while realizing encryption, also it provides and divides Diversity gain, system have better errored bit.

Description

A kind of joint intertexture encryption method based on physical layer key
Technical field
The present invention relates to wireless communication technology fields, and in particular to a kind of joint intertexture encryption side based on physical layer key Method.
Background technique:
With the continuous development of wireless network, wireless communication plays increasingly important role in life.However by In the broadcast and opening of wireless medium, the information of propagation is easy to be ravesdropping, the privacy and safety problem of wireless communication Have become the focus of extensive concern.The technology of traditional guarantee communication security mainly based on network layer is by cryptography, Its safety depends on computing capability, and with the arrival in quantum information epoch, many traditional encryption methods are easy to be cracked, And safety of physical layer technology then can achieve the safety in information theory meaning, the basic principle of information theory safety is to need to add Close scheme guarantees that third party can not eavesdrop on wireless medium with the channel coding technology for exploring channel randomness.
Many advantages, such as orthogonal frequency division multiplexing (OFDM) technology is because of its spectral efficient and anti-multipath jamming, is wirelessly communicating It is widely used in system.Interleaving mode is broadly divided into frequency-domain-interleaving (i.e. before IFFT module logarithm in OFDM at present According to being interleaved) and time domain interweave (data are interleaved after IFFT module), such as Reliability and Latency Trade-off i Time Domian Interleaving for OFDM Communication System this What piece article was proposed is exactly to be interleaved in time domain to OFDM symbol, to realize cipher round results.But the deficiency of its presence pair Exactly for generating the key of interleaver matrix, it is still desirable to be swapped between communicating pair, this adds increased information leakages A possibility that, so that the unavailable guarantee of the safety of communication system.
Summary of the invention
Present invention aims at solving above-mentioned the deficiencies in the prior art, a kind of joint based on physical layer key is provided Encryption method, this method is the reciprocity using time-division system wireless channel, to the channel magnitude and phase between two nodes It measures, to extract key bit, then generates interleaver matrix with generated physical layer key, and needed before intertexture The generation scheme for first carrying out key exchange is compared, and the present invention no longer needs communicating pair progress key to exchange this process, is avoided The leakage of information caused by because communicating pair carries out key exchange to each other due to.
A kind of joint intertexture encryption method based on physical layer key, this method comprises the following steps:
Two or more nodes send detectable signal each other;
Node measures amplitude vector and phase vectors after receiving detectable signal;
Each node generates consistent key according to respective amplitude vector and phase vectors;
Interleaver matrix is obtained according to key;
Data are encrypted and decrypted by interleaver matrix.
Preferably, the measurement method of the amplitude vector and phase vectors are as follows:
Node A sends detectable signal s to node Ba(t), node B sends detectable signal s to node Ab(t);
Node-B receiver is to signal are as follows: yB(t)=sa(t)*hAB+nB, node A receives signal are as follows: yA(t)=sb(t)*hBA +nA
Respective channel phase vector is measured respectively by repeatedly sending and receiving node A and node B, is indicated are as follows:
θa=[θa(1)T,...,θa(N)T]
θb=[θb(1)T,...,θb(N)T]
Wherein, N is vector length, each element θ in vectora(1),θb(1),...,θa(N),θbIt (N), is every measurement The sampling value set of one secondary channel multiple repairing weld, hBAIt indicates when node B sends detectable signal from node B to the channel of node A institute Corresponding channel gain, hABIt indicates when node A sends detectable signal from node A to channel gain corresponding to the channel of node B, nA、nBThe respectively additive white Gaussian noise at the end node A and the end node B;
The channel magnitude vector of node A and node B uses r respectivelyaAnd rbIt indicates.
Preferably, the generation method of the key includes the following steps:
By to ra, rbAnd θa, θbQuantization generate initial physical layer key KEYaAnd KEYb
Again by radio physical layer key negotiation technique to KEYaAnd KEYbIt holds consultation, so that node A and node B both sides The key of generation reaches unanimously, i.e. KEYaEqual to KEYb
Preferably, the preparation method of the interleaver matrix includes the following steps:
Node A is KEYaS is grouped for one group by 2 bita, converted by system saIt is converted into only comprising decimal number 0,1,2,3 vector Sa
0,1,2,3 are found out in vector SaIn position, generate 0,1,2,3 position vector Position0_a, Position1_a,Position2_a,Position3_a;
Again 0,1,2,3 position vector according to Position0_a, Position1_a, Position2_a, It puts in order as Position3_a and is combined into a new vector as the position vector of the data after final interweave and is Interleaver matrix;
The interleaver matrix of other nodes is generated by same way.
Preferably, the method for the data encryption includes the following steps:
In transmitting terminal, data are interleaved after IFFT module multiplied by interleaver matrix, pass through day after adding cyclic prefix Line is sent.
Preferably, the method for the data deciphering includes the following steps:
In receiving end, received data are first removed cyclic prefix, then by FFT module, then pass through frequency domain equalization, are realized The data sent are decrypted to data deinterlacing.
The present invention has the advantages that this method takes full advantage of the characteristic of channel, and need first to carry out key friendship before intertexture The generation scheme changed is compared, and the present invention no longer needs communicating pair progress key to exchange this process, is avoided because of communicating pair To each other carry out key exchange and caused by information leakage;The present invention generates intertexture square using the randomness of physical layer key Battle array, therefore interleaver matrix also has a possibility that randomness, the key of attenuating is cracked, and keeps the encryption performance of system more preferable.
Detailed description of the invention
The schematic diagram that the encryption interleaver matrix that Fig. 1 is interior joint A of the present invention generates.
Fig. 2 is the schematic diagram that physical layer wirelessly eavesdrops system in the present invention.
Fig. 3 is system construction drawing of the invention.
When Fig. 4 is mobile with the speed of 1m/s for user in the present invention compared with the bit error rate of no intertexture.
When Fig. 5 is the speed movement of user of the invention with 20m/s compared with the bit error rate of no intertexture.
Specific embodiment
To be easy to understand the technical means, the creative features, the aims and the efficiencies achieved by the present invention, below with reference to Specific embodiment, the present invention is further explained.
As shown in Figures 1 to 5, a kind of joint intertexture encryption method based on physical layer key, this method for becoming letter slowly Road and Quick-Change channel are applicable in, and the physical layer key of generation is carried out key agreement, so that communicating pair is for producing intertexture square The key agreement of battle array, then decimal number is converted to after the every dibit of key is divided into one group, position vector is finally obtained, is used for Interleaver matrix is generated, different interleaver matrixs is generated according to different position vector, the influence to the performance of communication system is not yet Together.
Method flow:
Node A of the invention sends detectable signal to node B, after Node-B receiver to signal, and channel spy is measured with it Sign, then sends data packet to node A, and node A is received and measured.It is multiple back and forth after, obtain channel magnitude and phase vectors, lead to It crosses particular quantization method and generates physical layer key, negotiate the same key of posterior nodal point A and node B.The present invention is double by legitimate correspondence The physical layer key of Fang Shengcheng is used to generate interleaver matrix, and different according to position vector generate different interleaving matrixes, node A and Data are encrypted and decrypted in the interleaver matrix that node B is generated according to oneself respectively.Specifically comprise the following steps:
Step 1: node A sends detectable signal s to node Ba(t), the signal y of Node-B receiverB(t)=sa(t)*hAB+nB, Channel magnitude r and θ are measured, same node B then sends detectable signal to node A, and node A is received and measured, finally, multiple After back and forth, channel phase vector representation is as follows, it may be assumed that
θa=[θa(1)T,...,θa(N)T]
θb=[θb(1)T,...,θb(N)T]
Wherein, N is vector length, each element θ in vectora(1),θb(1),...,θa(N),θbIt (N), is every measurement One secondary channel, the sampling value set of multiple repairing weld, the vector r of channel magnitudeaAnd rbIt indicates;By to ra, rbAnd θa, θbAmount Metaplasia is at initial physical layer key KEYaAnd KEYb, then by radio physical layer key negotiation technique to KEYaAnd KEYbIt is assisted Quotient, so that node A reaches consistent with the key that node B both sides generate, i.e. KEYaEqual to KEYb, radio physical layer Negotiation Technology is It is reconciled using information, consistency authenticates, the technologies such as enhancing that maintain secrecy improve the consistency that communicating pair generates key;
Step 2: node A is KEYaS is grouped for one group by 2 bita, converted by system saIt is converted into only comprising ten The vector S of system number 0,1,2,3a, 0,1,2,3 are found out in vector SaIn position generate 0,1,2,3 position vector Position0_a, Position1_a, Position2_a, Position3_a, then the position vector of 0 obtained, 1,2,3 by According to put in order as Position0_a, Position1_a, Position2_a, Position3_a be combined into one it is new Position vector of the vector as the data after final interweave, node B produce interleaver matrix using mode identical with node A;
In step 3:OFDM system, in transmitting terminal, data are after IFFT module multiplied by the interleaver matrix generated in step 2 It is interleaved, is sent after adding cyclic prefix by antenna, in receiving end, received data are first removed cyclic prefix, then By FFT module, then pass through frequency domain equalization, realizes and data deinterlacing is decrypted to obtain transmission data.Intertexture of the present invention Matrix is generated according to position vector, and position vector determines the interleaver matrix ultimately produced, as long as the mode of position vector arrangement Difference, final is also different to interleaver matrix.
The present invention is that physical layer key is generated using the reciprocity of time-division system wireless channel, is interweaved for generating encryption Matrix.
The characteristic of channel of the invention is very sensitive to the distance between receiving end and transmitting terminal, when listener-in's node E with it is legal The distance between user node A and node B of communication are greater than λ/2 or more distance, the measurement h of node EAEAnd hBEWith node A and section The measurement of point B is almost without correlation.
Based on above-mentioned, joint intertexture encryption method of this kind based on physical layer key, the generation of radio physical layer key is base In the reciprocity property of common radio channel.Tapping channel system model is as illustrated in fig. 2, it is assumed that legal there are two wireless communication systems Node A and node B and passive attack person's node E.The reciprocity property of legitimate node A and node B measurement physical channel, is used respectively hABAnd hBAIt indicates.When listener-in's node E and the distance between legitimate correspondence user node A and node B are greater than λ/2 or more distance. The measurement h of node EAEAnd hBEMeasurement with node A and node B is almost without correlation.For narrowband flat fading channel, close Method communicating pair node A and node B mutually send out training sequence in a manner of TDD, and the detection time interval of both sides is less than channel Correlation time.Node A of the invention sends detectable signal to node B, after Node-B receiver to signal, and measures channel with it Feature, then sends data packet to node A, and node A is received and measured.It is multiple back and forth after, obtain channel magnitude and phase vectors, Physical layer key is generated by particular quantization method, negotiates the same key of posterior nodal point A and node B.The present invention is by legitimate correspondence The physical layer key that both sides generate is used to generate interleaver matrix, and different according to location matrix generate different interleaving matrix, node A Data are encrypted and decrypted with the node B interleaver matrix generated respectively according to oneself.
As shown in Fig. 2, node A is by physical layer key KEYaIt is grouped to obtain vector s by one group of 2 bita, then sa In each element be converted into decimal number 0,1,2,3 and obtain vector Sa, then 0,1,2,3 are found out in vector SaLocation index obtain To position vector Position0_a, Position1_a, Position2_a, Position3_a, according to Position0_a, The arrangement mode of Position1_a, Position2_a, Position3_a are different, available different location vector, generate and hand over It is also different to knit matrix.
For the production principle of simple specific description interleaver matrix, not anti-order
KEYa=[0 011101000100001110110001001101 1]
It is obtained after grouping:
sa=[00 11 10 10 00 10 00 01 11 01 10 00 10 01 10 11]
It is then converted into the decimal system:
Sa=[0 32201013120212 3]
Extract position vector: Position0_a=[1 57 12]
Position1_a=[6 8 10 14]
Position2_a=[3 4 11 13 15]
Position3_a=[2 9 16]
It, can according to the different arrangement modes of Position0_a, Position1_a, Position2_a, Position3_a To generate different interleaver matrixs.The present invention proposes a kind of tactic arrangement scheme, enables original position vector first Position=[1 23456789 10 11 12 13 14 15 16], Position0_a, Position1_a, Final position vector after Position2_a, Position3_a arrangement is Position', interleaver matrix φ, the tool of scheme Hold in vivo as follows:
By sequentially being combined as Position0_a, Position1_a, Position2_a, Position3_a, then Position is expressed as follows:
Position'=[Position0_a Position1_a Position2_a Position3_a]
=[1 57 12 68 10 14 34 11 13 15 29 16]
According to interleaving formula: the available interleaver matrix φ of Position'=Position φ.This just utilizes 0,1,2,3 The randomness of position make the generation of interleaver matrix that also there is randomness so that listener-in is difficult to crack, while basis The difference of the sequence of Position0_a, Position1_a, Position2_a, Position3_a difference arrangement, obtains difference Interleaver matrix.
The block diagram as shown in figure 3, system of the invention works sends data after serioparallel exchange, by IFFT in transmitting terminal Module encrypts OFDM symbol multiplied by interleaver matrix, then parallel-serial conversion, then adds cyclic prefix, is sent by antenna It goes out.In receiving end, cyclic prefix first is gone to reception data, FFT module is sent to after serioparallel exchange, is carried out using balanced device Frequency domain equalization restores original data after signal detection.This programme surveys design balanced device according to MMSE standard, can be to received number The factually existing effect for deinterleaving decryption.
Fig. 4 and Fig. 5 is respectively this programme and the bit error rate under no interleaving conditions in the case of moving slowly at and fast moving Comparison, it can be seen that with the increase of signal-to-noise ratio, either move slowly at situation and still fast move situation, the mistake ratio of curve Special rate is all to reduce, and this programme can obtain snr gain compared with no intertexture, so that the error bit ability of system has Very big promotion.
As known by the technical knowledge, the present invention can pass through the embodiment party of other essence without departing from its spirit or essential feature Case is realized.Therefore, embodiment disclosed above, in all respects are merely illustrative, not the only.Institute Have within the scope of the present invention or is included in the invention in the change being equal in the scope of the present invention.

Claims (6)

1. a kind of joint intertexture encryption method based on physical layer key, which is characterized in that this method comprises the following steps:
Two or more nodes send detectable signal each other;
Node measures amplitude vector and phase vectors after receiving detectable signal;
Each node generates consistent key according to respective amplitude vector and phase vectors;
Interleaver matrix is obtained according to key;
Data are encrypted and decrypted by interleaver matrix.
2. a kind of joint intertexture encryption method based on physical layer key according to claim 1, it is characterised in that: described The measurement method of amplitude vector and phase vectors are as follows:
Node A sends detectable signal s to node Ba(t), node B sends detectable signal s to node Ab(t);
Node-B receiver is to signal are as follows: yB(t)=sa(t)*hAB+nB, node A receives signal are as follows: yA(t)=sb(t)*hBA+nA
Respective channel phase vector is measured respectively by repeatedly sending and receiving node A and node B, is indicated are as follows:
θa=[θa(1)T,...,θa(N)T]
θb=[θb(1)T,...,θb(N)T]
Wherein, N is vector length, each element θ in vectora(1),θb(1),...,θa(N),θbIt (N), is the primary letter of every measurement The sampling value set of road multiple repairing weld, hBAIt indicates when node B sends detectable signal from node B to corresponding to the channel of node A Channel gain, hABIt indicates when node A sends detectable signal from node A to channel gain corresponding to the channel of node B, nA、nB The respectively additive white Gaussian noise at the end node A and the end node B;
The channel magnitude vector of node A and node B uses r respectivelyaAnd rbIt indicates.
3. a kind of joint intertexture encryption method based on physical layer key according to claim 2, it is characterised in that: described The generation method of key includes the following steps:
By to ra, rbAnd θa, θbQuantization generate initial physical layer key KEYaAnd KEYb
Again by radio physical layer key negotiation technique to KEYaAnd KEYbIt holds consultation, so that node A and node B both sides generate Key reach unanimously, i.e. KEYaEqual to KEYb
4. a kind of joint intertexture encryption method based on physical layer key according to claim 3, it is characterised in that: described The preparation method of interleaver matrix includes the following steps:
Node A is KEYaS is grouped for one group by 2 bita, converted by system saBe converted into only comprising decimal number 0,1, 2,3 vector Sa
0,1,2,3 are found out in vector SaIn position, generate 0,1,2,3 position vector Position0_a, Position1_a, Position2_a,Position3_a;
Again 0,1,2,3 position vector according to Position0_a, Position1_a, Position2_a, Position3_a It is such to put in order that be combined into a new vector as the position vector of the data after final interweave be interleaver matrix;
The interleaver matrix of other nodes is generated by same way.
5. a kind of joint intertexture encryption method based on physical layer key according to claim 1, it is characterised in that: described The method of data encryption includes the following steps:
In transmitting terminal, data are interleaved after IFFT module multiplied by interleaver matrix, add cyclic prefix after by antenna into Row is sent.
6. a kind of joint intertexture encryption method based on physical layer key according to claim 5, it is characterised in that: described The method of data deciphering includes the following steps:
In receiving end, received data are first removed cyclic prefix, then by FFT module, then pass through frequency domain equalization, realize logarithm The data sent according to decryption is deinterleaved.
CN201910249804.8A 2019-03-29 2019-03-29 A kind of joint intertexture encryption method based on physical layer key Pending CN109889337A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910249804.8A CN109889337A (en) 2019-03-29 2019-03-29 A kind of joint intertexture encryption method based on physical layer key

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910249804.8A CN109889337A (en) 2019-03-29 2019-03-29 A kind of joint intertexture encryption method based on physical layer key

Publications (1)

Publication Number Publication Date
CN109889337A true CN109889337A (en) 2019-06-14

Family

ID=66935214

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910249804.8A Pending CN109889337A (en) 2019-03-29 2019-03-29 A kind of joint intertexture encryption method based on physical layer key

Country Status (1)

Country Link
CN (1) CN109889337A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110417817A (en) * 2019-08-30 2019-11-05 哈尔滨工业大学 A kind of encryption in physical layer based on interleaved multi-user, decryption method and system
WO2021255507A1 (en) * 2020-06-18 2021-12-23 DESC (Dubai Electronic Security Center) Secured and robust wireless communication system for low latency applications
CN114040392A (en) * 2021-11-04 2022-02-11 东南大学 Uniform quantization method based on median non-uniform normalization and applicable to uncoordinated wireless channel key generation system

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1585321A (en) * 2004-06-07 2005-02-23 北京交通大学 Digital information anti-interference soft encrypted method and system based on Turbo code-encode
CN101710852A (en) * 2009-11-06 2010-05-19 北京交通大学 LDPC code encoding/decoding method and encoder/decoder with encryption function
CN103427980A (en) * 2013-07-30 2013-12-04 西北大学 Physical layer security algorithm of OFDM (orthogonal frequency division multiplexing) system based on double matrix transformation
CN104811211A (en) * 2015-05-13 2015-07-29 广东省电信规划设计院有限公司 Construction method and device of Turbo code interleaver
CN106102052A (en) * 2016-03-01 2016-11-09 南京邮电大学 A kind of two dimensional wireless physical layer key generation method of combined channel amplitude and phase place
CN107026808A (en) * 2017-03-23 2017-08-08 西安电子科技大学 The multi-system Continuous Phase Modulation frequency-domain equilibrium method interweaved based on chaos

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1585321A (en) * 2004-06-07 2005-02-23 北京交通大学 Digital information anti-interference soft encrypted method and system based on Turbo code-encode
CN101710852A (en) * 2009-11-06 2010-05-19 北京交通大学 LDPC code encoding/decoding method and encoder/decoder with encryption function
CN103427980A (en) * 2013-07-30 2013-12-04 西北大学 Physical layer security algorithm of OFDM (orthogonal frequency division multiplexing) system based on double matrix transformation
CN104811211A (en) * 2015-05-13 2015-07-29 广东省电信规划设计院有限公司 Construction method and device of Turbo code interleaver
CN106102052A (en) * 2016-03-01 2016-11-09 南京邮电大学 A kind of two dimensional wireless physical layer key generation method of combined channel amplitude and phase place
CN107026808A (en) * 2017-03-23 2017-08-08 西安电子科技大学 The multi-system Continuous Phase Modulation frequency-domain equilibrium method interweaved based on chaos

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
AMAL SAAD ET AL: ""Comparative Simulation for Physical Layer Key Generation Methods"", 《2015 INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC)》 *
H.MUKHTAR ET AL: ""Reliability and Latency Trade-off in Time Domain Interleaving for OFDM Communication Systems"", 《2018 7TH MEDITERRANEAN CONFERENCE ON EMBEDDED COMPUTING (MECO)》 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110417817A (en) * 2019-08-30 2019-11-05 哈尔滨工业大学 A kind of encryption in physical layer based on interleaved multi-user, decryption method and system
WO2021255507A1 (en) * 2020-06-18 2021-12-23 DESC (Dubai Electronic Security Center) Secured and robust wireless communication system for low latency applications
CN114040392A (en) * 2021-11-04 2022-02-11 东南大学 Uniform quantization method based on median non-uniform normalization and applicable to uncoordinated wireless channel key generation system

Similar Documents

Publication Publication Date Title
Melki et al. An efficient OFDM-based encryption scheme using a dynamic key approach
Melki et al. A survey on OFDM physical layer security
US20070036353A1 (en) Authentication and encryption methods using shared secret randomness in a joint channel
CN106789049B (en) A kind of three-dimensional constellation rotation encryption method based on radio channel characteristic
CN103402200A (en) Secret key generation method based on wireless channel characteristics in frequency division duplex system
Kang et al. A survey of security mechanisms with direct sequence spread spectrum signals
CN109889337A (en) A kind of joint intertexture encryption method based on physical layer key
Sahin et al. Secure and robust symmetric key generation using physical layer techniques under various wireless environments
Lu et al. FREE: A fast and robust key extraction mechanism via inaudible acoustic signal
Li et al. Asymmetric physical layer encryption for wireless communications
Noura et al. A physical encryption scheme for low-power wireless M2M devices: a dynamic key approach
CN111082933A (en) Multi-user physical layer safety communication method capable of resisting any plurality of cooperation eavesdroppers
Noura et al. Efficient and secure physical encryption scheme for low-power wireless M2M devices
Ji et al. Wireless secret key generation for distributed antenna systems: A joint space-time-frequency perspective
Noura et al. Efficient data confidentiality scheme for 5g wireless NOMA communications
Jacovic et al. Physical layer encryption for wireless OFDM communication systems
Kitaura et al. A scheme of private key agreement based on the channel characteristics in OFDM land mobile radio
Yu et al. Quantum-resistance authentication and data transmission scheme for NB-IoT in 3GPP 5G networks
Bang et al. Secure modulation based on constellation mapping obfuscation in OFDM based TDD systems
CN109195163A (en) A kind of high speed key generation method towards wireless communication
Zhao et al. Efficient and secure key extraction using CSI without chasing down errors
JP2018137702A (en) Radio transmission method
Hua et al. A novel physical layer encryption algorithm based on statistical characteristics of time-selective channels
Tahir et al. Wireless physical layer security using channel state information
CN102223628A (en) Frequency domain encryption method and device for random subcarrier weight

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190614