CN109889337A - A kind of joint intertexture encryption method based on physical layer key - Google Patents
A kind of joint intertexture encryption method based on physical layer key Download PDFInfo
- Publication number
- CN109889337A CN109889337A CN201910249804.8A CN201910249804A CN109889337A CN 109889337 A CN109889337 A CN 109889337A CN 201910249804 A CN201910249804 A CN 201910249804A CN 109889337 A CN109889337 A CN 109889337A
- Authority
- CN
- China
- Prior art keywords
- node
- key
- vector
- physical layer
- intertexture
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Mobile Radio Communication Systems (AREA)
Abstract
The joint intertexture encryption method based on physical layer key that the invention discloses a kind of, the implementation steps of this method include: that node A and node B just utilizes channel characteristics to generate key, make both sides' key agreement by key agreement, after being grouped and system is converted, extract 0, 1, 2, the position of 3 vector after the conversion forms position vector, for generating interleaver matrix, node A is multiplied to encrypt with interleaver matrix with OFDM symbol, interleaver matrix is just used for the design of balanced device by node B, because time-division system wireless channel has reciprocity, node A is no longer needed for key with node B and exchanges, the present invention is compared with the generation scheme for needing first to carry out key exchange before intertexture, it no longer needs communicating pair to carry out key and exchanges this process, with better security performance, interweave while realizing encryption, also it provides and divides Diversity gain, system have better errored bit.
Description
Technical field
The present invention relates to wireless communication technology fields, and in particular to a kind of joint intertexture encryption side based on physical layer key
Method.
Background technique:
With the continuous development of wireless network, wireless communication plays increasingly important role in life.However by
In the broadcast and opening of wireless medium, the information of propagation is easy to be ravesdropping, the privacy and safety problem of wireless communication
Have become the focus of extensive concern.The technology of traditional guarantee communication security mainly based on network layer is by cryptography,
Its safety depends on computing capability, and with the arrival in quantum information epoch, many traditional encryption methods are easy to be cracked,
And safety of physical layer technology then can achieve the safety in information theory meaning, the basic principle of information theory safety is to need to add
Close scheme guarantees that third party can not eavesdrop on wireless medium with the channel coding technology for exploring channel randomness.
Many advantages, such as orthogonal frequency division multiplexing (OFDM) technology is because of its spectral efficient and anti-multipath jamming, is wirelessly communicating
It is widely used in system.Interleaving mode is broadly divided into frequency-domain-interleaving (i.e. before IFFT module logarithm in OFDM at present
According to being interleaved) and time domain interweave (data are interleaved after IFFT module), such as Reliability and
Latency Trade-off i Time Domian Interleaving for OFDM Communication System this
What piece article was proposed is exactly to be interleaved in time domain to OFDM symbol, to realize cipher round results.But the deficiency of its presence pair
Exactly for generating the key of interleaver matrix, it is still desirable to be swapped between communicating pair, this adds increased information leakages
A possibility that, so that the unavailable guarantee of the safety of communication system.
Summary of the invention
Present invention aims at solving above-mentioned the deficiencies in the prior art, a kind of joint based on physical layer key is provided
Encryption method, this method is the reciprocity using time-division system wireless channel, to the channel magnitude and phase between two nodes
It measures, to extract key bit, then generates interleaver matrix with generated physical layer key, and needed before intertexture
The generation scheme for first carrying out key exchange is compared, and the present invention no longer needs communicating pair progress key to exchange this process, is avoided
The leakage of information caused by because communicating pair carries out key exchange to each other due to.
A kind of joint intertexture encryption method based on physical layer key, this method comprises the following steps:
Two or more nodes send detectable signal each other;
Node measures amplitude vector and phase vectors after receiving detectable signal;
Each node generates consistent key according to respective amplitude vector and phase vectors;
Interleaver matrix is obtained according to key;
Data are encrypted and decrypted by interleaver matrix.
Preferably, the measurement method of the amplitude vector and phase vectors are as follows:
Node A sends detectable signal s to node Ba(t), node B sends detectable signal s to node Ab(t);
Node-B receiver is to signal are as follows: yB(t)=sa(t)*hAB+nB, node A receives signal are as follows: yA(t)=sb(t)*hBA
+nA;
Respective channel phase vector is measured respectively by repeatedly sending and receiving node A and node B, is indicated are as follows:
θa=[θa(1)T,...,θa(N)T]
θb=[θb(1)T,...,θb(N)T]
Wherein, N is vector length, each element θ in vectora(1),θb(1),...,θa(N),θbIt (N), is every measurement
The sampling value set of one secondary channel multiple repairing weld, hBAIt indicates when node B sends detectable signal from node B to the channel of node A institute
Corresponding channel gain, hABIt indicates when node A sends detectable signal from node A to channel gain corresponding to the channel of node B,
nA、nBThe respectively additive white Gaussian noise at the end node A and the end node B;
The channel magnitude vector of node A and node B uses r respectivelyaAnd rbIt indicates.
Preferably, the generation method of the key includes the following steps:
By to ra, rbAnd θa, θbQuantization generate initial physical layer key KEYaAnd KEYb;
Again by radio physical layer key negotiation technique to KEYaAnd KEYbIt holds consultation, so that node A and node B both sides
The key of generation reaches unanimously, i.e. KEYaEqual to KEYb。
Preferably, the preparation method of the interleaver matrix includes the following steps:
Node A is KEYaS is grouped for one group by 2 bita, converted by system saIt is converted into only comprising decimal number
0,1,2,3 vector Sa;
0,1,2,3 are found out in vector SaIn position, generate 0,1,2,3 position vector Position0_a,
Position1_a,Position2_a,Position3_a;
Again 0,1,2,3 position vector according to Position0_a, Position1_a, Position2_a,
It puts in order as Position3_a and is combined into a new vector as the position vector of the data after final interweave and is
Interleaver matrix;
The interleaver matrix of other nodes is generated by same way.
Preferably, the method for the data encryption includes the following steps:
In transmitting terminal, data are interleaved after IFFT module multiplied by interleaver matrix, pass through day after adding cyclic prefix
Line is sent.
Preferably, the method for the data deciphering includes the following steps:
In receiving end, received data are first removed cyclic prefix, then by FFT module, then pass through frequency domain equalization, are realized
The data sent are decrypted to data deinterlacing.
The present invention has the advantages that this method takes full advantage of the characteristic of channel, and need first to carry out key friendship before intertexture
The generation scheme changed is compared, and the present invention no longer needs communicating pair progress key to exchange this process, is avoided because of communicating pair
To each other carry out key exchange and caused by information leakage;The present invention generates intertexture square using the randomness of physical layer key
Battle array, therefore interleaver matrix also has a possibility that randomness, the key of attenuating is cracked, and keeps the encryption performance of system more preferable.
Detailed description of the invention
The schematic diagram that the encryption interleaver matrix that Fig. 1 is interior joint A of the present invention generates.
Fig. 2 is the schematic diagram that physical layer wirelessly eavesdrops system in the present invention.
Fig. 3 is system construction drawing of the invention.
When Fig. 4 is mobile with the speed of 1m/s for user in the present invention compared with the bit error rate of no intertexture.
When Fig. 5 is the speed movement of user of the invention with 20m/s compared with the bit error rate of no intertexture.
Specific embodiment
To be easy to understand the technical means, the creative features, the aims and the efficiencies achieved by the present invention, below with reference to
Specific embodiment, the present invention is further explained.
As shown in Figures 1 to 5, a kind of joint intertexture encryption method based on physical layer key, this method for becoming letter slowly
Road and Quick-Change channel are applicable in, and the physical layer key of generation is carried out key agreement, so that communicating pair is for producing intertexture square
The key agreement of battle array, then decimal number is converted to after the every dibit of key is divided into one group, position vector is finally obtained, is used for
Interleaver matrix is generated, different interleaver matrixs is generated according to different position vector, the influence to the performance of communication system is not yet
Together.
Method flow:
Node A of the invention sends detectable signal to node B, after Node-B receiver to signal, and channel spy is measured with it
Sign, then sends data packet to node A, and node A is received and measured.It is multiple back and forth after, obtain channel magnitude and phase vectors, lead to
It crosses particular quantization method and generates physical layer key, negotiate the same key of posterior nodal point A and node B.The present invention is double by legitimate correspondence
The physical layer key of Fang Shengcheng is used to generate interleaver matrix, and different according to position vector generate different interleaving matrixes, node A and
Data are encrypted and decrypted in the interleaver matrix that node B is generated according to oneself respectively.Specifically comprise the following steps:
Step 1: node A sends detectable signal s to node Ba(t), the signal y of Node-B receiverB(t)=sa(t)*hAB+nB,
Channel magnitude r and θ are measured, same node B then sends detectable signal to node A, and node A is received and measured, finally, multiple
After back and forth, channel phase vector representation is as follows, it may be assumed that
θa=[θa(1)T,...,θa(N)T]
θb=[θb(1)T,...,θb(N)T]
Wherein, N is vector length, each element θ in vectora(1),θb(1),...,θa(N),θbIt (N), is every measurement
One secondary channel, the sampling value set of multiple repairing weld, the vector r of channel magnitudeaAnd rbIt indicates;By to ra, rbAnd θa, θbAmount
Metaplasia is at initial physical layer key KEYaAnd KEYb, then by radio physical layer key negotiation technique to KEYaAnd KEYbIt is assisted
Quotient, so that node A reaches consistent with the key that node B both sides generate, i.e. KEYaEqual to KEYb, radio physical layer Negotiation Technology is
It is reconciled using information, consistency authenticates, the technologies such as enhancing that maintain secrecy improve the consistency that communicating pair generates key;
Step 2: node A is KEYaS is grouped for one group by 2 bita, converted by system saIt is converted into only comprising ten
The vector S of system number 0,1,2,3a, 0,1,2,3 are found out in vector SaIn position generate 0,1,2,3 position vector
Position0_a, Position1_a, Position2_a, Position3_a, then the position vector of 0 obtained, 1,2,3 by
According to put in order as Position0_a, Position1_a, Position2_a, Position3_a be combined into one it is new
Position vector of the vector as the data after final interweave, node B produce interleaver matrix using mode identical with node A;
In step 3:OFDM system, in transmitting terminal, data are after IFFT module multiplied by the interleaver matrix generated in step 2
It is interleaved, is sent after adding cyclic prefix by antenna, in receiving end, received data are first removed cyclic prefix, then
By FFT module, then pass through frequency domain equalization, realizes and data deinterlacing is decrypted to obtain transmission data.Intertexture of the present invention
Matrix is generated according to position vector, and position vector determines the interleaver matrix ultimately produced, as long as the mode of position vector arrangement
Difference, final is also different to interleaver matrix.
The present invention is that physical layer key is generated using the reciprocity of time-division system wireless channel, is interweaved for generating encryption
Matrix.
The characteristic of channel of the invention is very sensitive to the distance between receiving end and transmitting terminal, when listener-in's node E with it is legal
The distance between user node A and node B of communication are greater than λ/2 or more distance, the measurement h of node EAEAnd hBEWith node A and section
The measurement of point B is almost without correlation.
Based on above-mentioned, joint intertexture encryption method of this kind based on physical layer key, the generation of radio physical layer key is base
In the reciprocity property of common radio channel.Tapping channel system model is as illustrated in fig. 2, it is assumed that legal there are two wireless communication systems
Node A and node B and passive attack person's node E.The reciprocity property of legitimate node A and node B measurement physical channel, is used respectively
hABAnd hBAIt indicates.When listener-in's node E and the distance between legitimate correspondence user node A and node B are greater than λ/2 or more distance.
The measurement h of node EAEAnd hBEMeasurement with node A and node B is almost without correlation.For narrowband flat fading channel, close
Method communicating pair node A and node B mutually send out training sequence in a manner of TDD, and the detection time interval of both sides is less than channel
Correlation time.Node A of the invention sends detectable signal to node B, after Node-B receiver to signal, and measures channel with it
Feature, then sends data packet to node A, and node A is received and measured.It is multiple back and forth after, obtain channel magnitude and phase vectors,
Physical layer key is generated by particular quantization method, negotiates the same key of posterior nodal point A and node B.The present invention is by legitimate correspondence
The physical layer key that both sides generate is used to generate interleaver matrix, and different according to location matrix generate different interleaving matrix, node A
Data are encrypted and decrypted with the node B interleaver matrix generated respectively according to oneself.
As shown in Fig. 2, node A is by physical layer key KEYaIt is grouped to obtain vector s by one group of 2 bita, then sa
In each element be converted into decimal number 0,1,2,3 and obtain vector Sa, then 0,1,2,3 are found out in vector SaLocation index obtain
To position vector Position0_a, Position1_a, Position2_a, Position3_a, according to Position0_a,
The arrangement mode of Position1_a, Position2_a, Position3_a are different, available different location vector, generate and hand over
It is also different to knit matrix.
For the production principle of simple specific description interleaver matrix, not anti-order
KEYa=[0 011101000100001110110001001101
1]
It is obtained after grouping:
sa=[00 11 10 10 00 10 00 01 11 01 10 00 10 01 10 11]
It is then converted into the decimal system:
Sa=[0 32201013120212 3]
Extract position vector: Position0_a=[1 57 12]
Position1_a=[6 8 10 14]
Position2_a=[3 4 11 13 15]
Position3_a=[2 9 16]
It, can according to the different arrangement modes of Position0_a, Position1_a, Position2_a, Position3_a
To generate different interleaver matrixs.The present invention proposes a kind of tactic arrangement scheme, enables original position vector first
Position=[1 23456789 10 11 12 13 14 15 16], Position0_a, Position1_a,
Final position vector after Position2_a, Position3_a arrangement is Position', interleaver matrix φ, the tool of scheme
Hold in vivo as follows:
By sequentially being combined as Position0_a, Position1_a, Position2_a, Position3_a, then
Position is expressed as follows:
Position'=[Position0_a Position1_a Position2_a Position3_a]
=[1 57 12 68 10 14 34 11 13 15 29 16]
According to interleaving formula: the available interleaver matrix φ of Position'=Position φ.This just utilizes 0,1,2,3
The randomness of position make the generation of interleaver matrix that also there is randomness so that listener-in is difficult to crack, while basis
The difference of the sequence of Position0_a, Position1_a, Position2_a, Position3_a difference arrangement, obtains difference
Interleaver matrix.
The block diagram as shown in figure 3, system of the invention works sends data after serioparallel exchange, by IFFT in transmitting terminal
Module encrypts OFDM symbol multiplied by interleaver matrix, then parallel-serial conversion, then adds cyclic prefix, is sent by antenna
It goes out.In receiving end, cyclic prefix first is gone to reception data, FFT module is sent to after serioparallel exchange, is carried out using balanced device
Frequency domain equalization restores original data after signal detection.This programme surveys design balanced device according to MMSE standard, can be to received number
The factually existing effect for deinterleaving decryption.
Fig. 4 and Fig. 5 is respectively this programme and the bit error rate under no interleaving conditions in the case of moving slowly at and fast moving
Comparison, it can be seen that with the increase of signal-to-noise ratio, either move slowly at situation and still fast move situation, the mistake ratio of curve
Special rate is all to reduce, and this programme can obtain snr gain compared with no intertexture, so that the error bit ability of system has
Very big promotion.
As known by the technical knowledge, the present invention can pass through the embodiment party of other essence without departing from its spirit or essential feature
Case is realized.Therefore, embodiment disclosed above, in all respects are merely illustrative, not the only.Institute
Have within the scope of the present invention or is included in the invention in the change being equal in the scope of the present invention.
Claims (6)
1. a kind of joint intertexture encryption method based on physical layer key, which is characterized in that this method comprises the following steps:
Two or more nodes send detectable signal each other;
Node measures amplitude vector and phase vectors after receiving detectable signal;
Each node generates consistent key according to respective amplitude vector and phase vectors;
Interleaver matrix is obtained according to key;
Data are encrypted and decrypted by interleaver matrix.
2. a kind of joint intertexture encryption method based on physical layer key according to claim 1, it is characterised in that: described
The measurement method of amplitude vector and phase vectors are as follows:
Node A sends detectable signal s to node Ba(t), node B sends detectable signal s to node Ab(t);
Node-B receiver is to signal are as follows: yB(t)=sa(t)*hAB+nB, node A receives signal are as follows: yA(t)=sb(t)*hBA+nA;
Respective channel phase vector is measured respectively by repeatedly sending and receiving node A and node B, is indicated are as follows:
θa=[θa(1)T,...,θa(N)T]
θb=[θb(1)T,...,θb(N)T]
Wherein, N is vector length, each element θ in vectora(1),θb(1),...,θa(N),θbIt (N), is the primary letter of every measurement
The sampling value set of road multiple repairing weld, hBAIt indicates when node B sends detectable signal from node B to corresponding to the channel of node A
Channel gain, hABIt indicates when node A sends detectable signal from node A to channel gain corresponding to the channel of node B, nA、nB
The respectively additive white Gaussian noise at the end node A and the end node B;
The channel magnitude vector of node A and node B uses r respectivelyaAnd rbIt indicates.
3. a kind of joint intertexture encryption method based on physical layer key according to claim 2, it is characterised in that: described
The generation method of key includes the following steps:
By to ra, rbAnd θa, θbQuantization generate initial physical layer key KEYaAnd KEYb;
Again by radio physical layer key negotiation technique to KEYaAnd KEYbIt holds consultation, so that node A and node B both sides generate
Key reach unanimously, i.e. KEYaEqual to KEYb。
4. a kind of joint intertexture encryption method based on physical layer key according to claim 3, it is characterised in that: described
The preparation method of interleaver matrix includes the following steps:
Node A is KEYaS is grouped for one group by 2 bita, converted by system saBe converted into only comprising decimal number 0,1,
2,3 vector Sa;
0,1,2,3 are found out in vector SaIn position, generate 0,1,2,3 position vector Position0_a, Position1_a,
Position2_a,Position3_a;
Again 0,1,2,3 position vector according to Position0_a, Position1_a, Position2_a, Position3_a
It is such to put in order that be combined into a new vector as the position vector of the data after final interweave be interleaver matrix;
The interleaver matrix of other nodes is generated by same way.
5. a kind of joint intertexture encryption method based on physical layer key according to claim 1, it is characterised in that: described
The method of data encryption includes the following steps:
In transmitting terminal, data are interleaved after IFFT module multiplied by interleaver matrix, add cyclic prefix after by antenna into
Row is sent.
6. a kind of joint intertexture encryption method based on physical layer key according to claim 5, it is characterised in that: described
The method of data deciphering includes the following steps:
In receiving end, received data are first removed cyclic prefix, then by FFT module, then pass through frequency domain equalization, realize logarithm
The data sent according to decryption is deinterleaved.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910249804.8A CN109889337A (en) | 2019-03-29 | 2019-03-29 | A kind of joint intertexture encryption method based on physical layer key |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910249804.8A CN109889337A (en) | 2019-03-29 | 2019-03-29 | A kind of joint intertexture encryption method based on physical layer key |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109889337A true CN109889337A (en) | 2019-06-14 |
Family
ID=66935214
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910249804.8A Pending CN109889337A (en) | 2019-03-29 | 2019-03-29 | A kind of joint intertexture encryption method based on physical layer key |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109889337A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110417817A (en) * | 2019-08-30 | 2019-11-05 | 哈尔滨工业大学 | A kind of encryption in physical layer based on interleaved multi-user, decryption method and system |
WO2021255507A1 (en) * | 2020-06-18 | 2021-12-23 | DESC (Dubai Electronic Security Center) | Secured and robust wireless communication system for low latency applications |
CN114040392A (en) * | 2021-11-04 | 2022-02-11 | 东南大学 | Uniform quantization method based on median non-uniform normalization and applicable to uncoordinated wireless channel key generation system |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1585321A (en) * | 2004-06-07 | 2005-02-23 | 北京交通大学 | Digital information anti-interference soft encrypted method and system based on Turbo code-encode |
CN101710852A (en) * | 2009-11-06 | 2010-05-19 | 北京交通大学 | LDPC code encoding/decoding method and encoder/decoder with encryption function |
CN103427980A (en) * | 2013-07-30 | 2013-12-04 | 西北大学 | Physical layer security algorithm of OFDM (orthogonal frequency division multiplexing) system based on double matrix transformation |
CN104811211A (en) * | 2015-05-13 | 2015-07-29 | 广东省电信规划设计院有限公司 | Construction method and device of Turbo code interleaver |
CN106102052A (en) * | 2016-03-01 | 2016-11-09 | 南京邮电大学 | A kind of two dimensional wireless physical layer key generation method of combined channel amplitude and phase place |
CN107026808A (en) * | 2017-03-23 | 2017-08-08 | 西安电子科技大学 | The multi-system Continuous Phase Modulation frequency-domain equilibrium method interweaved based on chaos |
-
2019
- 2019-03-29 CN CN201910249804.8A patent/CN109889337A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1585321A (en) * | 2004-06-07 | 2005-02-23 | 北京交通大学 | Digital information anti-interference soft encrypted method and system based on Turbo code-encode |
CN101710852A (en) * | 2009-11-06 | 2010-05-19 | 北京交通大学 | LDPC code encoding/decoding method and encoder/decoder with encryption function |
CN103427980A (en) * | 2013-07-30 | 2013-12-04 | 西北大学 | Physical layer security algorithm of OFDM (orthogonal frequency division multiplexing) system based on double matrix transformation |
CN104811211A (en) * | 2015-05-13 | 2015-07-29 | 广东省电信规划设计院有限公司 | Construction method and device of Turbo code interleaver |
CN106102052A (en) * | 2016-03-01 | 2016-11-09 | 南京邮电大学 | A kind of two dimensional wireless physical layer key generation method of combined channel amplitude and phase place |
CN107026808A (en) * | 2017-03-23 | 2017-08-08 | 西安电子科技大学 | The multi-system Continuous Phase Modulation frequency-domain equilibrium method interweaved based on chaos |
Non-Patent Citations (2)
Title |
---|
AMAL SAAD ET AL: ""Comparative Simulation for Physical Layer Key Generation Methods"", 《2015 INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC)》 * |
H.MUKHTAR ET AL: ""Reliability and Latency Trade-off in Time Domain Interleaving for OFDM Communication Systems"", 《2018 7TH MEDITERRANEAN CONFERENCE ON EMBEDDED COMPUTING (MECO)》 * |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110417817A (en) * | 2019-08-30 | 2019-11-05 | 哈尔滨工业大学 | A kind of encryption in physical layer based on interleaved multi-user, decryption method and system |
WO2021255507A1 (en) * | 2020-06-18 | 2021-12-23 | DESC (Dubai Electronic Security Center) | Secured and robust wireless communication system for low latency applications |
CN114040392A (en) * | 2021-11-04 | 2022-02-11 | 东南大学 | Uniform quantization method based on median non-uniform normalization and applicable to uncoordinated wireless channel key generation system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Melki et al. | An efficient OFDM-based encryption scheme using a dynamic key approach | |
Melki et al. | A survey on OFDM physical layer security | |
US20070036353A1 (en) | Authentication and encryption methods using shared secret randomness in a joint channel | |
CN106789049B (en) | A kind of three-dimensional constellation rotation encryption method based on radio channel characteristic | |
CN103402200A (en) | Secret key generation method based on wireless channel characteristics in frequency division duplex system | |
Kang et al. | A survey of security mechanisms with direct sequence spread spectrum signals | |
CN109889337A (en) | A kind of joint intertexture encryption method based on physical layer key | |
Sahin et al. | Secure and robust symmetric key generation using physical layer techniques under various wireless environments | |
Lu et al. | FREE: A fast and robust key extraction mechanism via inaudible acoustic signal | |
Li et al. | Asymmetric physical layer encryption for wireless communications | |
Noura et al. | A physical encryption scheme for low-power wireless M2M devices: a dynamic key approach | |
CN111082933A (en) | Multi-user physical layer safety communication method capable of resisting any plurality of cooperation eavesdroppers | |
Noura et al. | Efficient and secure physical encryption scheme for low-power wireless M2M devices | |
Ji et al. | Wireless secret key generation for distributed antenna systems: A joint space-time-frequency perspective | |
Noura et al. | Efficient data confidentiality scheme for 5g wireless NOMA communications | |
Jacovic et al. | Physical layer encryption for wireless OFDM communication systems | |
Kitaura et al. | A scheme of private key agreement based on the channel characteristics in OFDM land mobile radio | |
Yu et al. | Quantum-resistance authentication and data transmission scheme for NB-IoT in 3GPP 5G networks | |
Bang et al. | Secure modulation based on constellation mapping obfuscation in OFDM based TDD systems | |
CN109195163A (en) | A kind of high speed key generation method towards wireless communication | |
Zhao et al. | Efficient and secure key extraction using CSI without chasing down errors | |
JP2018137702A (en) | Radio transmission method | |
Hua et al. | A novel physical layer encryption algorithm based on statistical characteristics of time-selective channels | |
Tahir et al. | Wireless physical layer security using channel state information | |
CN102223628A (en) | Frequency domain encryption method and device for random subcarrier weight |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190614 |