CN111314325B - Physical layer network coding encryption transceiving system and method based on relay control - Google Patents
Physical layer network coding encryption transceiving system and method based on relay control Download PDFInfo
- Publication number
- CN111314325B CN111314325B CN202010076379.XA CN202010076379A CN111314325B CN 111314325 B CN111314325 B CN 111314325B CN 202010076379 A CN202010076379 A CN 202010076379A CN 111314325 B CN111314325 B CN 111314325B
- Authority
- CN
- China
- Prior art keywords
- source node
- plaintext
- information
- beta
- formula
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B10/00—Transmission systems employing electromagnetic waves other than radio-waves, e.g. infrared, visible or ultraviolet light, or employing corpuscular radiation, e.g. quantum communication
- H04B10/11—Arrangements specific to free-space transmission, i.e. transmission through air or vacuum
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- Electromagnetism (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention relates to a physical layer network coding encryption transceiving system and method based on relay control, wherein a relay node and each source node encrypt a sent plaintext in an aliasing mode, and specifically, the relay node and each source node encrypt any data to be sent: the first sending information, the second sending information, the superposed sending information and the like are all operation results, any first plaintext and any second plaintext which originally participate in the operation cannot be deduced only from the operation results, and in the data transmission process, the information received by a malicious third party is the operation result, namely aliasing information which does not have recovery value, so that each source node completes the secret transmission of the plaintext; compared with the common TWRC scene brought by PNC, the method has the advantages that the throughput can be doubled, any data sent at any moment is realized by simple XOR operation defined by plaintext and key text and carried out in G (2), real-time communication is not influenced, and the transmission efficiency is guaranteed.
Description
Technical Field
The invention relates to the field of laser communication, in particular to a physical layer network coding encryption transceiving system and method based on relay control.
Background
Physical-layer Network Coding (PNC) is a communication means for applying Network Coding to a Physical layer, a relay node performs Network Coding mapping on plaintext from different source nodes and forwards the plaintext to corresponding source nodes, and a source node receiving the plaintext recovers the plaintext of the corresponding source node, so that throughput can be doubled.
In order to avoid cracking, the current adopted method is as follows: in a multi-source node system, selecting an information source node, a legal user node and a cooperative user node, wherein the information source node and the legal user node send information and artificial noise to a relay, and the cooperative user node sends the artificial noise to the relay; the relay amplifies, forwards and broadcasts the mixed signal, meanwhile, the cooperative user node broadcasts artificial noise, the legal user node carries out self-interference elimination on the received signal and completes estimation of sufficient statistics of received symbols to obtain information symbols. But noise is artificially added in the system, and amplification of the noise exists; the method solves the problem that noise needs to be matched among a plurality of nodes back and forth, has large calculation amount, wastes transmission time slots and reduces the system efficiency.
Therefore, how to improve the transmission efficiency while ensuring the confidentiality of plaintext transmission between different source nodes is an urgent technical problem to be solved in the industry.
Disclosure of Invention
The invention aims to solve the technical problem of the prior art and provides a physical layer network coding encryption transceiving system and method based on relay control.
The invention discloses a technical scheme of a physical layer network coding encryption transceiving system based on relay control, which comprises the following steps:
selecting two source nodes from the plurality of source nodes at will, and respectively recording the two source nodes as a first source node and a second source node;
the relay node, the first source node and the second source node all store the same key F;
by means of XOR operationsThe first source node stationFirst plaintext a to be transmitted and the key F generate first transmission information betaA(ii) a By said XOR operationGenerating second sending information beta by using a second plaintext b to be sent by the second source node and the key text FBWherein, in the step (A),
the first source node and the second source node respectively transmit the first transmission information betaAAnd the second transmission information betaBSending the information to the relay node;
the first plaintext a, the second plaintext b, the first transmission information βAAnd the second transmission information betaBBelonging to a Galois field G (2) in which an XOR operation is defined in said Galois field G (2)Comprises the following steps:
the XOR operation satisfies the commutative, associative, and distributive laws in the Galois field G (2), andand
the total data information received by the relay node is betaABThe total data information betaABMapping physical layer network coding (PNC) to obtain a mapping signal betaRWherein, in the step (A),
the relay node maps the mapping signal betaRObtaining the superposition information beta by a first formulacomThe first formula is:
the relay node then couples the superposition information betacomAfter the XOR operation is carried out, the superposed sending information is obtained
The relay node sends the superposition sending informationRespectively sending the data to the first source node and the second source node;
the first source node and the second source node use the respective key text F to send information to the superposition through a second formulaRespectively obtaining the superposition information beta after processingcomThe second formula is:
the first source node uses the first plaintext a to superimpose the information beta by a third formulacomProcessing the first plaintext b to obtain a second plaintext b, and using the second plaintext b by the second source node to obtain the superposition information beta through a fourth formulacomAnd obtaining the first plaintext a after processing, wherein a third formula is as follows:the fourth formula is:
the physical layer network coding encryption transceiving system based on relay control has the following beneficial effects:
the relay node and each source node encrypt the transmitted plaintext in an aliasing form, and specifically, the relay node and each source node encrypt any data to be transmitted: first transmission information betaASecond transmission information betaBThe superposition sending information and the like are all operation results, any first plaintext a and any second plaintext b which originally participate in the operation cannot be deduced only from the operation results, and in the data transmission process, the information received by a malicious third party is the operation result, namely aliasing information which has no recovery value, so that each source node completes the secret transmission of the plaintext; compared with the common Two-Way Relay Channel (TWRC) scene brought by PNC, the throughput of the PNC can be doubled, any data sent at any time is realized by simple XOR operation which is defined by plaintext and key and carried out in G (2), the calculation amount is small, the real-time communication is not influenced, and the transmission efficiency is ensured. And because no other factors are involved except for increasing codes and no limitation is given to other parts involved in communication, the physical layer network coding encryption transceiving system based on relay control can be matched with any other communication technology in theory to realize a more complex communication system.
The invention discloses a technical scheme of a physical layer network coding encryption transceiving system based on relay control, which comprises the following steps:
s1, randomly selecting two of the source nodes, and respectively recording the two as a first source node and a second source node; respectively storing the same key text F in a relay node, the first source node and the second source node;
s2, generating a first sending message β from the first plaintext a to be sent by the first source node and the key F by exclusive-or operationA,
By said XOR operationGenerating second transmission information beta from a second plaintext b to be transmitted by the second source node and the key FB,
And respectively transmitting the first transmission information beta through the first source node and the second source nodeAAnd the second transmission information betaBSending the information to the relay node;
the first plaintext a, the second plaintext b, the first transmission information, and the second transmission information belong to a galois field G (2), and an exclusive or operation is defined in the galois field G (2) as:
the XOR operation satisfies the commutative, associative, and distributive laws in the Galois field G (2), andand
s3, the total data information received by the relay node is betaABAnd converting the total data information betaABMapping physical layer network coding (PNC) to obtain a mapping signal betaRWherein, in the step (A),
the relay node maps the mapping signal betaRObtaining the superposition information beta by a first formulacomThe first formula is:
the relay node then couples the superposition information betacomAfter the XOR operation is carried out, the superposed sending information is obtained
The relay node sends the superposition sending informationRespectively sending the data to the first source node and the second source node;
s4, the first source node and the second source node send information to the superposition by a second formula using the respective key texts FRespectively obtaining the superposition information beta after processingcomThe second formula is:
s5, the first source node uses the first plaintext a to overlap the information beta through a third formulacomProcessing the first plaintext b to obtain a second plaintext b, and using the second plaintext b by the second source node to obtain the superposition information beta through a fourth formulacomAnd obtaining the first plaintext a after processing, wherein a third formula is as follows:the fourth formula is:
the physical layer network coding encryption transceiving method based on relay control has the following beneficial effects:
the relay node and each source node encrypt the transmitted plaintext in an aliasing form, and specifically, the relay node and each source node encrypt any data to be transmitted: first transmission information betaASecond sending informationβBThe superposition sending information and the like are all operation results, any first plaintext a and any second plaintext b which originally participate in the operation cannot be deduced only from the operation results, and in the data transmission process, the information received by a malicious third party is the operation result, namely aliasing information which has no recovery value, so that each source node completes the secret transmission of the plaintext; compared with the common TWRC scene brought by PNC, the method has the advantages that the throughput can be doubled, any data sent at any moment is realized by simple XOR operation defined by plaintext and key text and carried out in G (2), the calculation amount is small, real-time communication is not influenced, and the transmission efficiency is guaranteed. And because no other factors are involved except for adding codes and no limitation is made to other parts involved in communication, the relay control-based physical layer network coding encryption transceiving system can be matched with any other communication technology in theory.
Drawings
Fig. 1 is a schematic diagram of an operating principle of a relay control-based physical layer network coding encryption transceiving system according to an embodiment of the present invention;
fig. 2 is a schematic flowchart of a physical layer network coding encryption transceiving method based on relay control according to an embodiment of the present invention.
Detailed Description
In the physical layer network coding encryption transceiving system based on relay control according to the embodiment of the present invention, as shown in fig. 1, two source nodes are arbitrarily selected from a plurality of source nodes and are respectively marked as a first source node and a second source node; the number of the source nodes may be 2, 4, 6, etc., the number of the relay nodes may be 1, 2, 3, etc., and the relay nodes, the first source node, and the second source node all store the same key F;
an information sequence formed by splicing the first sequence C and the second sequence D in sequence is defined as CD, so that qm, pn and qn in the application can be more conveniently understood;
the key F comprises an operation instruction and key content, when the operation instruction is a common instruction, a sequence of the common instruction is marked as q, a sequence of the key content is marked as m, the key F is generated to be qm according to q and m, and qm represents an information sequence formed by splicing the q and the m in sequence;
generating first sending information beta by using an XOR operation between a first plaintext a to be sent by the first source node and the key FA,Namely, the encryption of the first plaintext a is completed;
generating second sending information beta by using the second plaintext b to be sent by the second source node and the key F through the XOR operationB,Namely, the encryption of the second plaintext b is completed;
the first source node and the source node respectively transmit the first transmission information betaAAnd the second transmission information betaBSending the information to the relay node;
the first plaintext a, the second plaintext b, the first transmission information βAAnd the second transmission information betaABelongs to a Galois field G (2), where the Galois field G (2) defines the XOR operation as:
the XOR operation satisfies the commutative, associative, and distributive laws in the Galois field G (2), andand
the total data information received by the relay node is betaABThe total data information betaABMapping physical layer network coding (PNC) to obtain a mapping signal betaRWherein, in the step (A),and converting the total data information betaABMapping physical layer network coding (PNC) to obtain a mapping signal betaRCan be expressed as:
the relay node maps the mapping signal betaRObtaining the superposition information beta by a first formulacomThe first formula is:namely, it isThat is, the relay node is receiving the mapping signal βRWhile directly obtaining the superposed information betacom;
Then the relay node performs the superposition information beta againcomAfter the XOR operation is carried out, the superposed sending information is obtainedAnd will superimpose the transmitted informationSending β to the first source node and the second source node, i.e. relay nodes, respectivelycomEncrypting to send information as superposition
The first source node and the second source node use the respective key text F to send information to the superposition through a second formulaRespectively obtaining the superposition information beta after processingcom: second maleThe formula is as follows:namely, it isThat is, the first source node and the second source node respectively transmit information to the superpositionDecrypting to obtain the superposed information betacom;
The first source node uses the first plaintext a to superimpose the information beta by a third formulacomAnd obtaining the second plaintext b after processing, wherein a third formula is as follows:
the second source node uses the second plaintext b to add the information beta by a fourth formulacomAnd obtaining the first plaintext a after processing, wherein a fourth formula is as follows:
in short, the first source node obtains the second plaintext b through a third formula using the first plaintext a, and the second source node obtains the first plaintext a through a fourth formula using the second plaintext b, that is, the plaintext exchange between the first source node and the second source node is completed, and the communication between the first source node and the second source node is realized;
in another embodiment, after the first source node obtains the second plaintext b, the first plaintext a is deleted; when the second source node obtains the first plaintext a and deletes the second plaintext b, it can be understood that the second plaintext b is obtained at the first source node, and then the first plaintext a is deleted, although the first plaintext a still remains in the first source node for a period of time, the data amount of the first plaintext a is small, and the storage resource is not occupied basically, and this is also true for the second plaintext b still remains in the second source node for a period of time, which is not described herein again. And it is understood that: the plaintext represents the truly useful information that is sent out by the source node.
When the operation instruction is a change instruction, recording the sequence of the change instruction as p, and recording the sequence of the new key content as n;
the relay node will change signal betachaRespectively to the first source node and the second source node, wherein,
the first source node and the second source node utilize an old key text qm and a change signal beta, respectivelychaObtaining an intermediate quantity beta by a fifth formulamidThe fifth formula is
From said intermediate quantity betamidHas obtained the sequence p of the change instruction and applies the intermediate quantity betamidThe second half part n and q of the middle p are spliced into qn in sequence, and then the new first transmission information beta is respectively transmittedA*And new second transmission information betaB*And sending the information to the relay node, wherein,andpn represents an information sequence formed by splicing p and n in series.
At this point, the old key content m is immediately removed from use and deleted. And when the first source node and the second source node send the plaintext again, encrypting the plaintext by utilizing the qn key.
Wherein, the length of the sequence p of the change instruction is the same as the length of the sequence q of the normal instruction, and the length of the sequence m of the key content is the same as the length of the sequence n of the new key content, so as to ensure the information sequence alignment of pn and qm and avoid errors.
The lengths of the first plaintext and the second plaintext are respectively integral multiples of the length of the key text F, so that the first plaintext and the second plaintext can be completely covered by the key text.
Wherein a plurality of the superimposition information βcomIs an integral multiple of the length of pn, qm and/or qn, further ensuring the information sequence alignment of pn, qm and/or qn and avoiding errors.
The relay node updates the change instruction randomly or at a preset frequency, wherein the preset frequency can be 1 update time in 1 minute, 1 update time in 5 minutes and the like, and the confidentiality of plaintext transmission between different source nodes is further ensured.
The mapping rules for PNC are shown in table 1 below: if any other communication related technologies such as modulation, channel coding, etc. are added to the present application, there always exists a mapping scheme corresponding to the technology that can be implementedTo (3) is performed.
Table 1:
βA | βB | βAB | βR |
0 | 0 | 0 | 0 |
1 | 0 | 1 | 1 |
0 | 1 | 1 | 1 |
1 | 1 | 2 | 0 |
the application discloses a physical layer network coding encryption transceiving system based on relay control, wherein a relay node and each source node encrypt a sent plaintext in an aliasing mode, the relay node and each source node encrypt the sent plaintext in the aliasing mode, and specifically, the relay node and each source node encrypt any data to be sent: first transmission information betaASecond transmission information betaBThe superposition sending information and the like are all operation results, any first plaintext a and any second plaintext b which originally participate in the operation cannot be deduced only from the operation results, and in the data transmission process, the information received by a malicious third party is the operation result, namely aliasing information which has no recovery value, so that each source node completes the secret transmission of the plaintext; compared with the common TWRC scene brought by PNC, the method has the advantages that the throughput can be doubled, any data sent at any moment is realized by simple XOR operation defined by plaintext and key text and carried out in G (2), the calculation amount is small, real-time communication is not influenced, and the transmission efficiency is guaranteed. And because no other factors are involved except for adding codes and no limitation is made to other parts involved in communication, the relay control-based physical layer network coding encryption transceiving system can be theoretically connected with any other partCommunication technologies cooperate to implement more complex communication systems.
As shown in fig. 2, a physical layer network coding encryption transceiving method based on relay control according to an embodiment of the present invention includes the following steps:
s1, randomly selecting two of the source nodes, and respectively recording the two as a first source node and a second source node; respectively storing the same key text F in a relay node, the first source node and the second source node;
s2, generating a first sending message β from the first plaintext a to be sent by the first source node and the key F by exclusive-or operationA,
Generating second sending information beta by using the second plaintext b to be sent by the second source node and the key F through the XOR operationB,
And respectively transmitting the first transmission information beta through the first source node and the second source nodeAAnd the second transmission information betaBSending the information to the relay node;
the first plaintext a, the second plaintext b, the first transmission information, and the second transmission information belong to a galois field G (2), and an exclusive or operation is defined in the galois field G (2) as:
the XOR operation satisfies the commutative, associative, and distributive laws in the Galois field G (2), andand
s3, the total data information received by the relay node is betaABAnd converting the total data information betaABMapping physical layer network coding (PNC) to obtain a mapping signal betaRWherein, in the step (A),
the relay node maps the mapping signal betaRObtaining the superposition information beta by a first formulacomThe first formula is:
the relay node then couples the superposition information betacomAfter the XOR operation is carried out, the superposed sending information is obtained
The relay node sends the superposition sending informationRespectively sending the data to the first source node and the second source node;
s4, the first source node and the second source node send information to the superposition by a second formula using the respective key texts FRespectively obtaining the superposition information beta after processingcomThe second formula is:
s5, the first source node uses the first plaintext a to overlap the information beta through a third formulacomThe second plaintext b is obtained after the processing, and the second sourceThe node uses the second plaintext b to add the information beta through a fourth formulacomProcessing to obtain the first plaintext a; the third formula is:the fourth formula is:
the application discloses a physical layer network coding encryption transceiving method based on relay control, wherein a relay node and each source node encrypt a sent plaintext in an aliasing mode, the relay node and each source node encrypt the sent plaintext in the aliasing mode, and specifically, the relay node and each source node encrypt any data to be sent: first transmission information betaASecond transmission information betaBThe superposition sending information and the like are all operation results, any first plaintext a and any second plaintext b which originally participate in the operation cannot be deduced only from the operation results, and in the data transmission process, the information received by a malicious third party is the operation result, namely aliasing information which has no recovery value, so that each source node completes the secret transmission of the plaintext; compared with the common TWRC scene brought by PNC, the method has the advantages that the throughput can be doubled, any data sent at any moment is realized by simple XOR operation defined by plaintext and key text and carried out in G (2), the calculation amount is small, real-time communication is not influenced, and the transmission efficiency is guaranteed. And because no other factors are involved except for adding codes and no limitation is made to other parts involved in communication, the relay control-based physical layer network coding encryption transceiving system can be matched with any other communication technology in theory.
Preferably, in the above technical solution, the method further comprises: defining an information sequence formed by splicing the first sequence C and the second sequence D in sequence from front to back as a CD;
the key F comprises an operation instruction and key content, when the operation instruction is a common instruction, a sequence of the common instruction is marked as q, a sequence of the key content is marked as m, the key F is generated to be qm according to q and m, and qm represents an information sequence formed by splicing q and m in sequence.
Preferably, in the above technical solution, the method further comprises: when the operation instruction is a change instruction, recording the sequence of the change instruction as p, and recording the sequence of the new key content as n;
the relay node will change signal betachaRespectively to the first source node and the second source node, wherein,
the first source node and the second source node utilize an old key text qm and a change signal beta, respectivelychaObtaining an intermediate quantity beta by a fifth formulamidThe fifth formula is:
from said intermediate quantity betamidHas obtained the sequence p of the change instruction and applies the intermediate quantity betamidThe second half part n and q of the middle p are spliced into qn in sequence, and then the new first transmission information beta is respectively transmittedA*And new second transmission information betaB*Sending the information to the relay node;
wherein the content of the first and second substances,andpn represents an information sequence formed by splicing p and n in series.
Preferably, in the above technical solution, the method further comprises: the length of the sequence p of the change instruction is the same as the length of the sequence q of the ordinary instruction; the length of the sequence m of key content is the same as the length of the sequence n of new key content.
Preferably, in the above technical solution, the method further comprises: the lengths of the first plaintext and the second plaintext are respectively integral multiples of the length of the key text F.
Preferably, in the above technical solution, the method further comprises: further comprising: a plurality of the superimposed information betacomIs an integer multiple of the length of pn, qm and/or qn.
Preferably, in the above technical solution, the method further comprises: the first source node obtains the second plaintext b and deletes the first plaintext a; and deleting the second plaintext b after the second source node obtains the first plaintext a.
Preferably, in the above technical solution, the method further comprises: and the relay node updates the change instruction randomly or at a preset frequency.
For the above steps of the relay control-based physical layer network coding encryption transceiving method according to the present invention, reference may be made to the above embodiments of a relay control-based physical layer network coding encryption transceiving system, which are not described herein again.
In the present invention, the terms "first", "second" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include at least one such feature. In the description of the present invention, "a plurality" means at least two, e.g., two, three, etc., unless specifically limited otherwise.
In the description herein, references to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, the schematic representations of the terms used above are not necessarily intended to refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples. Furthermore, various embodiments or examples and features of different embodiments or examples described in this specification can be combined and combined by one skilled in the art without contradiction.
Although embodiments of the present invention have been shown and described above, it is understood that the above embodiments are exemplary and should not be construed as limiting the present invention, and that variations, modifications, substitutions and alterations can be made to the above embodiments by those of ordinary skill in the art within the scope of the present invention.
Claims (9)
1. A physical layer network coding encryption transceiving system based on relay control is characterized in that two of a plurality of source nodes are selected randomly and are respectively marked as a first source node and a second source node;
the relay node, the first source node and the second source node all store the same key F;
generating first sending information beta by using an XOR operation between a first plaintext a to be sent by the first source node and the key FA(ii) a Generating second sending information beta by using the second plaintext b to be sent by the second source node and the key F through the XOR operationBWherein, in the step (A),
the first source node and the second source node respectively transmit the first transmission information betaAAnd the second transmission information betaBSending the information to the relay node;
the first plaintext a, the second plaintext b, the first transmission information βAAnd the second transmission information betaBBelongs to a galois field G (2) where the galois field G (2) defines the xor operation as:
the XOR operation satisfies the commutative, associative, and distributive laws in the Galois field G (2), andand
the total data information received by the relay node is betaABThe total data information betaABMapping physical layer network coding (PNC) to obtain a mapping signal betaRWherein, in the step (A),
the relay node maps the mapping signal betaRObtaining the superposition information beta by a first formulacomThe first formula is:
the relay node then couples the superposition information betacomAfter the XOR operation is carried out, the superposed sending information is obtained
The relay node sends the superposition sending informationRespectively sending the data to the first source node and the second source node;
the first source node and the second source node use the respective key text F to send information to the superposition through a second formulaRespectively obtaining the superposition information beta after processingcomThe second formula is:
the first source node uses the first plaintext a to superimpose the information beta by a third formulacomProcessing the first plaintext b to obtain a second plaintext b, and using the second plaintext b by the second source node to obtain the superposition information beta through a fourth formulacomAnd obtaining the first plaintext a after processing, wherein the third formula is as follows:the fourth formula is:
2. the relay control-based physical layer network coding encryption transceiving system according to claim 1, further comprising: the key F comprises an operation instruction and key content, when the operation instruction is a common instruction, a sequence of the common instruction is marked as q, a sequence of the key content is marked as m, the key F is generated to be qm according to q and m, and qm represents an information sequence formed by splicing q and m in sequence.
3. The system according to claim 2, wherein when the operation command is a change command, the sequence of the change command is denoted by p, and the sequence of the new key content is denoted by n;
the relay node will change signal betachaRespectively to the first source node and the second source node, wherein,
the first source node and the second source node utilize an old key text qm and a change signal beta, respectivelychaObtaining an intermediate quantity beta by a fifth formulamidThe fifth formula is:
from said intermediate quantity betamidHas obtained the sequence p of the change instruction and applies the intermediate quantity betamidThe second half part n and q of the middle p are spliced into qn in sequence, and then the new first sending information is respectively sentAnd new second transmission informationSending the information to the relay node;
4. The relay control-based physical layer network coding encryption transceiving system according to claim 3, further comprising:
the length of the sequence p of the change instruction is the same as the length of the sequence q of the ordinary instruction;
the length of the sequence m of key content is the same as the length of the sequence n of new key content.
5. The system according to claim 4, wherein the lengths of the first plaintext and the second plaintext are respectively integer multiples of the length of the key frame F.
6. The relay control-based physical layer network coding encryption transceiving system according to claim 5, further comprising: a plurality of the superimposed information betacomIs an integer multiple of the length of pn, qm and/or qn.
7. The relay control-based physical layer network coding encryption transceiving system according to any one of claims 3 to 6, further comprising: the first source node obtains the second plaintext b and deletes the first plaintext a; and deleting the second plaintext b after the second source node obtains the first plaintext a.
8. The relay control-based physical layer network coding encryption transceiving system according to claim 7, further comprising: and the relay node updates the change instruction randomly or at a preset frequency.
9. A physical layer network coding encryption transceiving method based on relay control is characterized by comprising the following steps:
s1, randomly selecting two of the source nodes, and respectively recording the two as a first source node and a second source node; respectively storing the same key text F in a relay node, the first source node and the second source node;
s2, generating a first sending message β from the first plaintext a to be sent by the first source node and the key F by exclusive-or operationA,
Generating second sending information beta by using the second plaintext b to be sent by the second source node and the key F through the XOR operationB,
And respectively transmitting the first transmission information beta through the first source node and the second source nodeAAnd the second transmission information betaBSending the information to the relay node;
the first plaintext a, the second plaintext b, the first transmission information, and the second transmission information belong to a galois field G (2), and an exclusive or operation is defined in the galois field G (2) as:
the XOR operation satisfies the commutative, associative, and distributive laws in the Galois field G (2), andand
s3, the total data information received by the relay node is betaABAnd converting the total data information betaABMapping physical layer network coding (PNC) to obtain a mapping signal betaRWherein, in the step (A),
the relay node maps the mapping signal betaRObtaining the superposition information beta by a first formulacom:
the relay node then couples the superposition information betacomAfter the XOR operation is carried out, a superposed sending message is obtainedInformation processing device
The relay node sends the superposition sending informationRespectively sending the data to the first source node and the second source node;
s4, the first source node and the second source node send information to the superposition by a second formula using the respective key texts FRespectively obtaining the superposition information beta after processingcomThe second formula is:
s5, the first source node uses the first plaintext a to overlap the information beta through a third formulacomProcessing the first plaintext b to obtain a second plaintext b, and using the second plaintext b by the second source node to obtain the superposition information beta through a fourth formulacomThe first plaintext a is obtained after the processing, and the third formula is as follows:the fourth formula is:
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010076379.XA CN111314325B (en) | 2020-01-23 | 2020-01-23 | Physical layer network coding encryption transceiving system and method based on relay control |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010076379.XA CN111314325B (en) | 2020-01-23 | 2020-01-23 | Physical layer network coding encryption transceiving system and method based on relay control |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111314325A CN111314325A (en) | 2020-06-19 |
CN111314325B true CN111314325B (en) | 2022-02-01 |
Family
ID=71159812
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010076379.XA Active CN111314325B (en) | 2020-01-23 | 2020-01-23 | Physical layer network coding encryption transceiving system and method based on relay control |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111314325B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111770118B (en) * | 2020-09-01 | 2020-11-24 | 华芯生物科技(武汉)有限公司 | Data transmission method of detection equipment |
CN116346224B (en) * | 2023-03-09 | 2023-11-17 | 中国科学院空间应用工程与技术中心 | RGB-LED-based two-way visible light communication method and system |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2011035797A1 (en) * | 2009-09-24 | 2011-03-31 | Universität Duisburg-Essen | Method, relay station and system for transmitting signals between a first signal source and a second signal source |
CN102332963A (en) * | 2011-11-01 | 2012-01-25 | 北京邮电大学 | Symbol-based physical-layer network coding method for two-way relay communication system |
CN102983945A (en) * | 2012-12-06 | 2013-03-20 | 哈尔滨工业大学 | Wireless communication method for realizing physical layer network coding in multi-user channel |
CN105634671A (en) * | 2015-12-23 | 2016-06-01 | 中国人民解放军军械工程学院 | Communication method based on fountain codes and physical layer network coding |
CN105680986A (en) * | 2015-12-23 | 2016-06-15 | 中国人民解放军军械工程学院 | Communication method based on LDLC (Low Density Lattice Code) and physical layer network coding |
-
2020
- 2020-01-23 CN CN202010076379.XA patent/CN111314325B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2011035797A1 (en) * | 2009-09-24 | 2011-03-31 | Universität Duisburg-Essen | Method, relay station and system for transmitting signals between a first signal source and a second signal source |
CN102332963A (en) * | 2011-11-01 | 2012-01-25 | 北京邮电大学 | Symbol-based physical-layer network coding method for two-way relay communication system |
CN102983945A (en) * | 2012-12-06 | 2013-03-20 | 哈尔滨工业大学 | Wireless communication method for realizing physical layer network coding in multi-user channel |
CN105634671A (en) * | 2015-12-23 | 2016-06-01 | 中国人民解放军军械工程学院 | Communication method based on fountain codes and physical layer network coding |
CN105680986A (en) * | 2015-12-23 | 2016-06-15 | 中国人民解放军军械工程学院 | Communication method based on LDLC (Low Density Lattice Code) and physical layer network coding |
Non-Patent Citations (1)
Title |
---|
《无线双向中继传输及物理层安全研究》;魏浩;《中国优秀博硕士学位论文全文数据库(硕士)信息科技辑》;20130715;全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN111314325A (en) | 2020-06-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109995510B (en) | Quantum key relay service method | |
Chen et al. | Controlled bidirectional remote preparation of three-qubit state | |
Bitar et al. | Staircase codes for secret sharing with optimal communication and read overheads | |
CN111404672B (en) | Quantum key distribution method and device | |
CN111314325B (en) | Physical layer network coding encryption transceiving system and method based on relay control | |
US20050031119A1 (en) | Method and communications device for secure group communication | |
CN101321053A (en) | Group cipher key generating method, system and apparatus | |
CN101170404B (en) | Method for secret key configuration based on specified group | |
CN101110670A (en) | Key management method based on wireless Mesh netword | |
Fung et al. | Quantum key distribution with delayed privacy amplification and its application to the security proof of a two-way deterministic protocol | |
Sun et al. | Towards collusion-attack-resilient group key management using one-way function tree | |
Zhang et al. | Multihop teleportation via the composite of asymmetric W state and Bell state | |
CN103888249A (en) | Agent re-encryption method used for group traffic | |
JP5234307B2 (en) | Encryption key update method, encryption key update apparatus, and encryption key update program | |
CN102088352A (en) | Data encryption transmission method and system for message-oriented middleware | |
Horng | Cryptanalysis of a key management scheme for secure multicast communications | |
Pour et al. | A hierarchical group key management scheme for secure multicast increasing efficiency of key distribution in leave operation | |
CN104468496A (en) | Method, information service system and program for information encryption/decryption | |
CN116032647A (en) | Method, device and storage medium for realizing high-frequency privacy query on blockchain | |
CN101677271A (en) | Method, device and system for multicast key management | |
JP4654371B2 (en) | Communication method and communication system using decentralized key management system | |
Zhang et al. | Lattice-based dual receiver encryption and more | |
Huang et al. | Efficient and secure multicast in wirelessman: A cross-layer design | |
DE102016218758B4 (en) | DEVICE AND METHOD FOR THE CONTINUOUS AND CROSS-MEDIA TRANSFER OF COMMUNICATION PROTOCOLS WITHOUT PROTOCOL IMPLEMENTATION | |
Du et al. | Towards solving multicast key management problem |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |