CN111542056B - Mobile communication safety intelligent monitoring method, system and device - Google Patents

Mobile communication safety intelligent monitoring method, system and device Download PDF

Info

Publication number
CN111542056B
CN111542056B CN202010444049.1A CN202010444049A CN111542056B CN 111542056 B CN111542056 B CN 111542056B CN 202010444049 A CN202010444049 A CN 202010444049A CN 111542056 B CN111542056 B CN 111542056B
Authority
CN
China
Prior art keywords
signal
channel
monitoring
stolen
encrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010444049.1A
Other languages
Chinese (zh)
Other versions
CN111542056A (en
Inventor
张荣泽
孙绍宁
展昭生
张鹏
袁梦晓
范鹏飞
孙博
张升太
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jinan Sanze Information Security Evaluation Co ltd
Original Assignee
Jinan Sanze Information Security Evaluation Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jinan Sanze Information Security Evaluation Co ltd filed Critical Jinan Sanze Information Security Evaluation Co ltd
Priority to CN202010444049.1A priority Critical patent/CN111542056B/en
Publication of CN111542056A publication Critical patent/CN111542056A/en
Application granted granted Critical
Publication of CN111542056B publication Critical patent/CN111542056B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/121Wireless intrusion detection systems [WIDS]; Wireless intrusion prevention systems [WIPS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/80Arrangements enabling lawful interception [LI]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Technology Law (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention belongs to the field of mobile communication, and particularly relates to a method, a system and a device for intelligently monitoring mobile communication safety. The system comprises: the device comprises a channel monitoring device, a signal analysis device, a signal encryption device and a control device; the channel monitoring device periodically monitors the channel under the time/frequency control of the control device and copies and intercepts signals transmitted by the channel; the signal analysis device is used for carrying out signal analysis on the intercepted signal and judging whether the current channel is maliciously monitored/stolen; and the signal encryption device encrypts the signals transmitted in the channel under the condition that the current channel is analyzed to be maliciously monitored/stolen. The safety monitoring is realized by periodically monitoring the transmission channel of the signal, so that the safety of signal transmission is improved; the method has the advantages of high channel monitoring accuracy and high intelligent degree.

Description

Mobile communication safety intelligent monitoring method, system and device
Technical Field
The invention belongs to the technical field of mobile communication, and particularly relates to a mobile communication safety intelligent monitoring method, system and device.
Background
Mobile communications (mobile communications) communicate the way communications between a mobile user and a fixed-point user or between mobile users.
Both parties of the communication have one or both parties in motion. Including land, sea, and air mobile communications. The frequency bands used are spread over low, medium, high, very high and very high frequencies. The mobile communication system is composed of mobile station, base station and mobile exchange. If communication with a mobile station is desired, the mobile exchange sends a call to the whole network through each base station, the called station sends an answer signal after receiving the answer, the mobile exchange assigns a channel to the mobile station after receiving the answer and transmits a signaling to make it ring from the channel of the speech channel.
The patent numbers are: the patent of CN2015/077975 discloses a channel detection method, a channel detection system, a terminal and a base station. The method for detecting the channel of the LTE system in the working process of the unauthorized frequency band, the system for detecting the channel of the LTE system in the working process of the unauthorized frequency band, a terminal and a base station are provided, wherein the method for detecting the channel of the LTE system in the working process of the unauthorized frequency band comprises the following steps: when a data service arrives, determining a current subframe, and setting channel detection time in the current subframe and/or a backward adjacent subframe to detect a channel state; and when the channel state is an idle state, carrying out data service transmission. By the technical scheme of the invention, on the premise of ensuring that the LTE system works normally in the unauthorized frequency band, the time delay of data service transmission caused by channel detection in a fixed detection period can be effectively reduced, so that the data service transmission efficiency is improved, and the peaceful coexistence of the LTE system and other systems in the unauthorized frequency band is realized.
The channel switching is realized by detecting signals, but the signal safety detection is not realized by monitoring the channel. And the channel monitoring method has lower accuracy.
The patent numbers are: CN2014/096024 discloses a channel detection method and system, a device with a base station function, and a terminal. The utility model provides a channel detection method, a detection system, a device with base station function and a terminal when the LTE system works in the unauthorized frequency band, wherein, the channel detection method when the LTE system suitable for the device with base station function works in the unauthorized frequency band comprises: dividing an unlicensed frequency band into a plurality of frequency bands; setting a judgment threshold value corresponding to each frequency band in the plurality of frequency bands and used for detecting the busy and idle state of a channel in each frequency band; and setting a channel monitoring subframe for detecting the state of a downlink channel and/or the state of an uplink channel in each frequency band in a frame structure of the LTE system, and detecting the busy-idle state of the downlink channel and/or the uplink channel in each frequency band according to a judgment threshold corresponding to each frequency band. The technical scheme of the invention improves the spectrum utilization rate of the unauthorized frequency band, and can avoid the LTE system from generating larger interference to other systems when the LTE system works in the unauthorized frequency band on the premise of ensuring the normal work of the LTE system in the unauthorized frequency band.
Which realizes the interference control of the channel by monitoring the channel. There is no listening for the security of the channel. And the channel listening method thereof also monitors the state of each channel. Security control of the channel cannot be achieved.
In summary, the channel monitoring techniques in the prior art are mainly applied to the improvement of signal transmission of the channel itself. But not for monitoring channel security. And the monitoring process is often only analyzed for the channel and not for the signal transmitted in the channel.
Disclosure of Invention
In view of the above, the main objective of the present invention is to provide a method, a system and a device for intelligently monitoring mobile communication security, which periodically monitor the transmission channel of signals, thereby implementing security monitoring and improving the security of signal transmission; the method has the advantages of high channel monitoring accuracy and high intelligent degree.
In order to achieve the purpose, the technical scheme of the invention is realized as follows:
the intelligent monitoring method for the safety of mobile communication comprises the following steps:
step S1: under the control of set time/frequency, periodically monitoring the channel, and copying and intercepting the signal transmitted by the channel;
step S2: performing signal analysis on the intercepted signal, and judging whether the current channel is maliciously monitored/stolen;
step S3: and under the condition that the current channel is analyzed to be maliciously monitored/stolen, encrypting the signals transmitted in the channel.
Further, the step S1: periodically monitoring the channel under the control of set time/frequency, and duplicating and intercepting the signal transmitted by the channel, comprising:
step S1.1: intercepting signals in a channel;
step S1.2: copying the intercepted signal and sending the copied intercepted signal to a signal analysis device;
step S1.3: the signal is retransmitted.
Further, the step S2: performing signal analysis on the intercepted signal, and judging whether the current channel is maliciously monitored/stolen, including: establishing a state equation of the signal analysis, wherein the state equation is expressed by the following formula:
Figure BDA0002505109170000031
where k is the time, sk∈RnIs a state vector; z is a radical ofkIs an observation vector; f. ofkIs a system function; w is akIs the horizontal component of the signal; h iskIs the vertical component of the signal; h iskIs an observation function; the signal waveform display unit is used for visually displaying the result analyzed by the signal model adaptation unit;
meanwhile, matching the analyzed result with a preset standard model to obtain a matched difference value; if the difference value is within the set threshold value range, judging that the malicious monitoring/stealing is not carried out; if the difference value exceeds a set threshold value, judging that the channel is maliciously monitored/stolen; sending the result to the control device; and after receiving the result, the control device sends a control command to the signal encryption device, and the signal encryption device encrypts the signal transmitted in the channel.
Further, the step S3: under the condition that the current channel is analyzed to be maliciously monitored/stolen, signals transmitted in the channel are encrypted, and the method comprises the following steps:
step S3.1: carrying out binarization on a signal to be encrypted to obtain a binarized signal;
step S3.2: dividing the binary signal into two parts according to a set proportion, namely a first part signal and a second part signal;
step S3.3: encrypting the first part of signals to obtain first encrypted signals, and transmitting the first encrypted signals;
step S3.4: and encrypting the second part of signals to obtain second encrypted signals, and transmitting the second encrypted signals.
Further, the method for signal encryption by the first signal encryption unit comprises the following steps: randomly generating a value alpha as a first key, and performing Fourier transform with an angle of alpha degrees on the first partial signal by using the following formula:
Figure BDA0002505109170000041
wherein: x (t) denotes a first partial signal, Xα(u) denotes the transformed first partial signal, Kα(t, u) is a transformation kernel; said Kα(t, u) is expressed using the following formula:
Figure BDA0002505109170000042
Figure BDA0002505109170000043
wherein t and u are transformation parameters, delta is the Fourier transform of the Dirac function, delta (u-t) represents the Fourier transform of the Dirac function which performs u-t, and delta (u + t) represents the Fourier transform of the Dirac function which performs u + t; fourier-transformed first partial signal Xαu as the first encrypted signal.
Mobile communication safety intelligent monitoring system, the system includes:
the channel monitoring device is configured to periodically monitor the channel under the time/frequency control of the control device and copy and intercept signals transmitted by the channel;
the signal analysis device is configured to perform signal analysis on the intercepted signal and judge whether the current channel is maliciously monitored/stolen;
and the signal encryption device is configured to encrypt the signal transmitted in the channel under the condition that the current channel is analyzed to be maliciously monitored/stolen.
Further, the channel monitoring apparatus includes:
a channel signal intercepting unit configured to intercept a signal in a channel;
a channel signal duplicating unit configured to duplicate the intercepted signal and transmit the duplicated intercepted signal to a signal analyzing apparatus;
and a signal retransmission unit configured to retransmit the signal.
Further, the signal analyzing apparatus includes: the device comprises a signal model adapting unit and a signal waveform display unit; the signal model adapting unit is configured to establish a state equation for signal analysis, and the state equation is expressed by the following formula:
Figure BDA0002505109170000051
where k is the time, sk∈RnIs a state vector; z is a radical ofkIs an observation vector; f. ofkIs a system function; w is akIs the horizontal component of the signal; h iskIs the vertical component of the signal; h iskIs an observation function; the signal waveform display unit is used for visually displaying the result analyzed by the signal model adaptation unit; meanwhile, matching the analyzed result with a preset standard model to obtain a matched difference value; if the difference value is within the set threshold value range, judging that the malicious monitoring/stealing is not carried out; if the difference value exceeds a set threshold value, judging that the channel is maliciously monitored/stolen; sending the result to the control device; and after receiving the result, the control device sends a control command to the signal encryption device, and the signal encryption device encrypts the signal transmitted in the channel.
Further, the signal encryption apparatus includes: the signal binarization unit is configured for binarizing a signal to be encrypted to obtain a binarized signal; a signal dividing unit configured to divide the binarized signal into two parts, namely a first part signal and a second part signal, according to a set ratio; the first signal encryption unit is configured to encrypt the first part of signals to obtain first encrypted signals and transmit the first encrypted signals; and the second signal encryption unit is configured to encrypt the second partial signal to obtain a second encrypted signal and transmit the second encrypted signal.
An intelligent mobile communication security monitoring device, the device being a non-transitory computer-readable storage medium storing computing instructions, comprising: under the control of set time/frequency, periodically monitoring the channel, copying code segment for intercepting the signal transmitted by the channel; performing signal analysis on the intercepted signal, and judging whether the current channel is maliciously monitored/stolen by the code segment; and the code segment is used for encrypting the signal transmitted in the channel under the condition that the current channel is analyzed to be maliciously monitored/stolen.
The intelligent monitoring method, the system and the device for the mobile communication safety have the following beneficial effects: on one hand, the invention judges whether malicious monitoring/stealing occurs or not by monitoring the channel in the mobile communication without interfering the transmitted signal, thereby improving the safety of the mobile communication signal transmission; on the other hand, when the malicious monitoring/stealing is monitored, the signals transmitted in the channel are encrypted, and even if the encrypted signals are monitored/stolen again, the difficulty of cracking the encrypted signals is increased, so that the safety of channel transmission is further improved. The method is mainly realized by the following two processes: 1. implementation of malicious listening/stealing of a channel: the present invention performs signal analysis on the signal of the duplicated channel. Meanwhile, matching the analyzed result with a preset standard model to obtain a matched difference value; if the difference value is within the set threshold value range, judging that the malicious monitoring/stealing is not carried out; if the difference value exceeds a set threshold value, judging that the channel is maliciously monitored/stolen; sending the result to the control device; and after receiving the result, the control device sends a control command to the signal encryption device, and the signal encryption device encrypts the signal transmitted in the channel. 2. And (3) realizing signal encryption: the signal binarization unit is used for binarizing the signal to be encrypted to obtain a binarized signal; a signal dividing unit for dividing the binary signal into two parts according to a set proportion, namely a first part signal and a second part signal; the first signal encryption unit encrypts the first part of signals to obtain first encrypted signals and transmits the first encrypted signals; and the second signal encryption unit encrypts the second part of signals to obtain second encrypted signals and transmits the second encrypted signals. The two processes can improve the safety of channel signal transmission to the maximum extent.
Drawings
Fig. 1 is a schematic flow chart of a method for intelligently monitoring mobile communication security according to an embodiment of the present invention;
fig. 2 is a schematic diagram of a system structure of an intelligent monitoring system for mobile communication security according to an embodiment of the present invention;
fig. 3 is a schematic view of a channel monitoring period of the mobile communication security intelligent monitoring device, system and method according to an embodiment of the present invention;
fig. 4 is a schematic diagram of experimental changes of monitoring accuracy rate along with changes in size of information transmitted by a channel in the mobile communication security intelligent monitoring device, system and method according to an embodiment of the present invention, and a schematic diagram of comparison experimental effects between the experimental changes and the prior art;
fig. 5 is a schematic diagram of experimental changes of signal stealing rates of the mobile communication security intelligent monitoring device, system and method according to the embodiment of the present invention and a schematic diagram of comparative experimental effects of the prior art.
Wherein, 1-prior art experimental curve, 2-inventive experimental curve, 3-theoretical simulation experimental curve, and 4-reference point.
Detailed Description
The method of the present invention will be described in further detail below with reference to the accompanying drawings and embodiments of the invention.
Example 1
As shown in fig. 1, the method for intelligently monitoring the security of mobile communication includes the following steps:
step S1: under the control of set time/frequency, periodically monitoring the channel, and copying and intercepting the signal transmitted by the channel;
step S2: performing signal analysis on the intercepted signal, and judging whether the current channel is maliciously monitored/stolen;
step S3: and under the condition that the current channel is analyzed to be maliciously monitored/stolen, encrypting the signals transmitted in the channel.
By adopting the technical scheme, the invention judges whether malicious monitoring/stealing occurs or not by monitoring the channel in the mobile communication without interfering the transmitted signal, thereby improving the safety of the mobile communication signal transmission; on the other hand, when the malicious monitoring/stealing is monitored, the signals transmitted in the channel are encrypted, and even if the encrypted signals are monitored/stolen again, the difficulty of cracking the encrypted signals is increased, so that the safety of channel transmission is further improved. The method is mainly realized by the following two processes: 1. implementation of malicious listening/stealing of a channel: the present invention performs signal analysis on the signal of the duplicated channel. Meanwhile, matching the analyzed result with a preset standard model to obtain a matched difference value; if the difference value is within the set threshold value range, judging that the malicious monitoring/stealing is not carried out; if the difference value exceeds a set threshold value, judging that the channel is maliciously monitored/stolen; sending the result to the control device; and after receiving the result, the control device sends a control command to the signal encryption device, and the signal encryption device encrypts the signal transmitted in the channel. 2. And (3) realizing signal encryption: the signal binarization unit is used for binarizing the signal to be encrypted to obtain a binarized signal; a signal dividing unit for dividing the binary signal into two parts according to a set proportion, namely a first part signal and a second part signal; the first signal encryption unit encrypts the first part of signals to obtain first encrypted signals and transmits the first encrypted signals; and the second signal encryption unit encrypts the second part of signals to obtain second encrypted signals and transmits the second encrypted signals. The two processes can improve the safety of channel signal transmission to the maximum extent.
Example 2
On the basis of the above embodiment, the step S1: periodically monitoring the channel under the control of set time/frequency, and duplicating and intercepting the signal transmitted by the channel, comprising:
step S1.1: intercepting signals in a channel;
step S1.2: copying the intercepted signal and sending the copied intercepted signal to a signal analysis device;
step S1.3: the signal is retransmitted.
Specifically, information is abstract, but must be conveyed through a tangible medium. For example, two-person conversations, sound waves are transmitted through the air between the two persons, and the air portion between the two persons is the channel. The channel of postal communication refers to the vehicle and the facilities it passes through. The channel of a wireless telephone is the space through which the electric waves propagate, and the channel of a wired telephone is the cable. Each channel has a specific source and sink. In multiplex communications, such as carrier telephony, where one telephone serves as the source of the transmitted information and the other as the sink of the received information, the facility between them is a channel, and the cable for transmission can be shared by a number of channels. In theoretical studies, a channel is often divided into a channel encoder, the channel itself, and a channel decoder. One can modify the encoder and decoder to achieve the best communication, so the encoder and decoder are often parts that are easy to change and design, while the channel is those parts that are relatively fixed. However, this division is more or less arbitrary and can be specified in a specific case. For example, modems and error correction coding and decoding devices are generally considered to belong to channel encoders and decoders, but sometimes the channel containing the modem is referred to as the modulation channel; the channel containing the error correction encoder and decoder is called the code channel.
All channels have an input set A, an output set B and their association, such as conditional probability P (y-x), x ∈ A, y ∈ B. These parameters may be used to define a channel.
The input set is the set of input symbols allowed by the channel. Typically, a random sequence is input, such as X1, X2, …, Xn, …, each X ∈ a (r ═ 1,2, …). The random process can be converted into a random sequence under the condition of time limit or frequency limit. When the input set a is specified, the limits, such as power limits, for each random variable X are also included. The output set is the set of symbols that the channel may output. If the output sequence is Y1, Y2, …, Yn, …, each Y ∈ B. These X and Y may be numbers or symbols or may be a set of numbers or vectors.
The channel types may be divided by the nature of the input and output sets. When both the input and output sets are discrete sets, the channel is referred to as a discrete channel. Telegraph channels and data channels belong to this category. When both the input and output sets are continuous sets, the channel is called a continuous channel. Television and telephone channels belong to this category. When one of the input and output sets is a continuous set and the other is a discrete set, the channel is referred to as a semi-discrete channel or semi-continuous channel. A continuous channel plus a digital modulator or digital demodulator is such a channel.
Example 3
On the basis of the above embodiment, the step S2: performing signal analysis on the intercepted signal, and judging whether the current channel is maliciously monitored/stolen, including: establishing a state equation of the signal analysis, wherein the state equation is expressed by the following formula:
Figure BDA0002505109170000091
where k is the time, sk∈RnIs a state vector; z is a radical ofkIs an observation vector; f. ofkIs a system function; w is akIs the horizontal component of the signal; h iskIs the vertical component of the signal; h iskIs an observation function; the signal waveform display unit is used for visually displaying the result analyzed by the signal model adaptation unit;
meanwhile, matching the analyzed result with a preset standard model to obtain a matched difference value; if the difference value is within the set threshold value range, judging that the malicious monitoring/stealing is not carried out; if the difference value exceeds a set threshold value, judging that the channel is maliciously monitored/stolen; sending the result to the control device; and after receiving the result, the control device sends a control command to the signal encryption device, and the signal encryption device encrypts the signal transmitted in the channel.
Example 4
On the basis of the above embodiment, the step S3: under the condition that the current channel is analyzed to be maliciously monitored/stolen, signals transmitted in the channel are encrypted, and the method comprises the following steps:
step S3.1: carrying out binarization on a signal to be encrypted to obtain a binarized signal;
step S3.2: dividing the binary signal into two parts according to a set proportion, namely a first part signal and a second part signal;
step S3.3: encrypting the first part of signals to obtain first encrypted signals, and transmitting the first encrypted signals;
step S3.4: and encrypting the second part of signals to obtain second encrypted signals, and transmitting the second encrypted signals.
Referring to fig. 4, by adopting the above technical scheme, the signal is cut into two parts, and then different keys are used for encrypting different parts, and the difficulty of cracking is higher. The encryption effect is better. When the signal is intercepted, complete information still can not be obtained by using a single cracking mode or only knowing a part of keys.
Example 5
On the basis of the above embodiment, the method for signal encryption by the first signal encryption unit performs the following steps: randomly generating a value alpha as a first key, and performing Fourier transform with an angle of alpha degrees on the first partial signal by using the following formula:
Figure BDA0002505109170000101
wherein: x (t) denotes a first partial signal, Xα(u) denotes the transformed first partial signal, Kα(t, u) is a transformation kernel; said Kα(t, u) is expressed using the following formula:
Figure BDA0002505109170000102
Figure BDA0002505109170000103
wherein t and u are transformation parameters, delta is the Fourier transform of the Dirac function, delta (u-t) represents the Fourier transform of the Dirac function which performs u-t, and delta (u + t) represents the Fourier transform of the Dirac function which performs u + t; fourier-transformed first partial signal Xα(u) as the first encrypted signal.
Example 6
As shown in fig. 2, the mobile communication security intelligent monitoring system comprises:
the channel monitoring device is configured to periodically monitor the channel under the time/frequency control of the control device and copy and intercept signals transmitted by the channel;
the signal analysis device is configured to perform signal analysis on the intercepted signal and judge whether the current channel is maliciously monitored/stolen;
and the signal encryption device is configured to encrypt the signal transmitted in the channel under the condition that the current channel is analyzed to be maliciously monitored/stolen.
Referring to fig. 3, the channel monitoring apparatus of the present invention periodically monitors the channel under the control of the control apparatus, and duplicates and intercepts signals transmitted by the channel. The monitoring mode can reduce the monitoring cost and does not need to monitor all the time.
Example 7
On the basis of the previous embodiment, the channel monitoring apparatus includes:
a channel signal intercepting unit configured to intercept a signal in a channel;
a channel signal duplicating unit configured to duplicate the intercepted signal and transmit the duplicated intercepted signal to a signal analyzing apparatus;
and a signal retransmission unit configured to retransmit the signal.
Example 8
On the basis of the above embodiment, the signal analyzing deviceThe device comprises: the device comprises a signal model adapting unit and a signal waveform display unit; the signal model adapting unit is configured to establish a state equation for signal analysis, and the state equation is expressed by the following formula:
Figure BDA0002505109170000111
where k is the time, sk∈RnIs a state vector; z is a radical ofkIs an observation vector; f. ofkIs a system function; w is akIs the horizontal component of the signal; h iskIs the vertical component of the signal; h iskIs an observation function; the signal waveform display unit is used for visually displaying the result analyzed by the signal model adaptation unit; meanwhile, matching the analyzed result with a preset standard model to obtain a matched difference value; if the difference value is within the set threshold value range, judging that the malicious monitoring/stealing is not carried out; if the difference value exceeds a set threshold value, judging that the channel is maliciously monitored/stolen; sending the result to the control device; and after receiving the result, the control device sends a control command to the signal encryption device, and the signal encryption device encrypts the signal transmitted in the channel.
Example 9
On the basis of the above embodiment, the signal encryption apparatus includes: the signal binarization unit is configured for binarizing a signal to be encrypted to obtain a binarized signal; a signal dividing unit configured to divide the binarized signal into two parts, namely a first part signal and a second part signal, according to a set ratio; the first signal encryption unit is configured to encrypt the first part of signals to obtain first encrypted signals and transmit the first encrypted signals; and the second signal encryption unit is configured to encrypt the second partial signal to obtain a second encrypted signal and transmit the second encrypted signal.
Referring to fig. 4, matching the analyzed result with a preset standard model, and obtaining a matching difference value; if the difference value is within the set threshold value range, judging that the malicious monitoring/stealing is not carried out; if the difference value exceeds a set threshold value, judging that the channel is maliciously monitored/stolen; sending the result to the control device; and after receiving the result, the control device sends a control command to the signal encryption device, and the signal encryption device encrypts the signal transmitted in the channel. The accuracy of judgment can be obviously improved, and the accuracy of monitoring is improved.
Example 10
On the basis of the above embodiment, the mobile communication security intelligent monitoring device is a non-transitory computer-readable storage medium storing computing instructions, and includes: under the control of set time/frequency, periodically monitoring the channel, copying code segment for intercepting the signal transmitted by the channel; performing signal analysis on the intercepted signal, and judging whether the current channel is maliciously monitored/stolen by the code segment; and the code segment is used for encrypting the signal transmitted in the channel under the condition that the current channel is analyzed to be maliciously monitored/stolen.
It can be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working process and related description of the system described above may refer to the corresponding process in the foregoing method embodiments, and will not be described herein again.
It should be noted that, the system provided in the foregoing embodiment is only illustrated by dividing the functional modules, and in practical applications, the functions may be distributed by different functional modules according to needs, that is, the modules or steps in the embodiment of the present invention are further decomposed or combined, for example, the modules in the foregoing embodiment may be combined into one module, or may be further split into multiple sub-modules, so as to complete all or part of the functions described above. The names of the modules and steps involved in the embodiments of the present invention are only for distinguishing the modules or steps, and are not to be construed as unduly limiting the present invention.
It can be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working processes and related descriptions of the storage device and the processing device described above may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
Those of skill in the art would appreciate that the various illustrative modules, method steps, and modules described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both, and that programs corresponding to the software modules, method steps may be located in Random Access Memory (RAM), memory, Read Only Memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art. To clearly illustrate this interchangeability of electronic hardware and software, various illustrative components and steps have been described above generally in terms of their functionality. Whether such functionality is implemented as electronic hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
The terms "first," "second," and the like are used for distinguishing between similar elements and not necessarily for describing or implying a particular order or sequence.
The terms "comprises," "comprising," or any other similar term are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus.
So far, the technical solutions of the present invention have been described in connection with the preferred embodiments shown in the drawings, but it is easily understood by those skilled in the art that the scope of the present invention is obviously not limited to these specific embodiments. Equivalent changes or substitutions of related technical features can be made by those skilled in the art without departing from the principle of the invention, and the technical scheme after the changes or substitutions can fall into the protection scope of the invention.
The above description is only a preferred embodiment of the present invention, and is not intended to limit the scope of the present invention.

Claims (9)

1. The intelligent monitoring method for the safety of mobile communication is characterized by comprising the following steps:
step S1: under the control of set time/frequency, periodically monitoring the channel, and copying and intercepting the signal transmitted by the channel;
step S2: performing signal analysis on the intercepted signal, and judging whether the current channel is maliciously monitored/stolen;
step S3: encrypting signals transmitted in the channel under the condition that the current channel is analyzed to be maliciously monitored/stolen;
the step S1: periodically monitoring the channel under the control of set time/frequency, and duplicating and intercepting the signal transmitted by the channel, comprising:
step S1.1: intercepting signals in a channel;
step S1.2: copying the intercepted signal and sending the copied intercepted signal to a signal analysis device;
step S1.3: the signal is retransmitted.
2. The method of claim 1, wherein the step S2: performing signal analysis on the intercepted signal, and judging whether the current channel is maliciously monitored/stolen, including: establishing a state equation of the signal analysis, wherein the state equation is expressed by the following formula:
Figure FDA0003045990310000011
where k is the time, sk∈RnIs a state vector; z is a radical ofkIs an observation vector; f. ofkIs a system function; w is akIs the horizontal component of the signal; h iskIs the vertical component of the signal; v. ofkIs an observation function; rnRepresenting an n-dimensional real number set, wherein n is a natural number; carrying out visual display on the analyzed result;
meanwhile, matching the analyzed result with a preset standard model to obtain a matched difference value; if the difference value is within the set threshold value range, judging that the malicious monitoring/stealing is not carried out; if the difference value exceeds a set threshold value, judging that the channel is maliciously monitored/stolen; sending the result to the control device; and after receiving the result, the control device sends a control command to the signal encryption device, and the signal encryption device encrypts the signal transmitted in the channel.
3. The method of claim 2, wherein the step S3: under the condition that the current channel is analyzed to be maliciously monitored/stolen, signals transmitted in the channel are encrypted, and the method comprises the following steps:
step S3.1: carrying out binarization on a signal to be encrypted to obtain a binarized signal;
step S3.2: dividing the binary signal into two parts according to a set proportion, namely a first part signal and a second part signal;
step S3.3: encrypting the first part of signals to obtain first encrypted signals, and transmitting the first encrypted signals;
step S3.4: and encrypting the second part of signals to obtain second encrypted signals, and transmitting the second encrypted signals.
4. A method as claimed in claim 3, wherein the method of encrypting the first portion of the signal performs the steps of: randomly generating a value alpha as a first key, and performing Fourier transform with an angle of alpha degrees on the first partial signal by using the following formula:
Figure FDA0003045990310000021
Figure FDA0003045990310000022
wherein: x (t) denotes a first partial signal, Xα(u) denotes the transformed first partial signal, Kα(t, u) is a transformation kernel; said Kα(t, u) is expressed using the following formula:
Figure FDA0003045990310000023
Figure FDA0003045990310000024
wherein t and u are transformation parameters, delta is the Fourier transform of the Dirac function, delta (u-t) represents the Fourier transform of the Dirac function which performs u-t, and delta (u + t) represents the Fourier transform of the Dirac function which performs u + t; fourier-transformed first partial signal Xα(u) as the first encrypted signal.
5. Intelligent monitoring system for mobile communication security using the method according to one of claims 1 to 4, characterized in that it comprises:
the channel monitoring device is configured to periodically monitor the channel under the time/frequency control of the control device and copy and intercept signals transmitted by the channel;
the signal analysis device is configured to perform signal analysis on the intercepted signal and judge whether the current channel is maliciously monitored/stolen;
and the signal encryption device is configured to encrypt the signal transmitted in the channel under the condition that the current channel is analyzed to be maliciously monitored/stolen.
6. The system of claim 5, wherein the channel listening means comprises:
a channel signal intercepting unit configured to intercept a signal in a channel;
a channel signal duplicating unit configured to duplicate the intercepted signal and transmit the duplicated intercepted signal to a signal analyzing apparatus;
and a signal retransmission unit configured to retransmit the signal.
7. The system of claim 6, wherein the signal analysis means comprises: the device comprises a signal model adapting unit and a signal waveform display unit; the signal model adapting unit is configured to establish a state equation for signal analysis, wherein the state equation uses the following formulaRepresents:
Figure FDA0003045990310000031
where k is the time, sk∈RnIs a state vector; z is a radical ofkIs an observation vector; f. ofkIs a system function; w is akIs the horizontal component of the signal; h iskIs the vertical component of the signal; v. ofkIs an observation function; rnRepresenting an n-dimensional real number set, wherein n is a natural number; the signal waveform display unit is used for visually displaying the result analyzed by the signal model adaptation unit; meanwhile, matching the analyzed result with a preset standard model to obtain a matched difference value; if the difference value is within the set threshold value range, judging that the malicious monitoring/stealing is not carried out; if the difference value exceeds a set threshold value, judging that the channel is maliciously monitored/stolen; sending the result to the control device; and after receiving the result, the control device sends a control command to the signal encryption device, and the signal encryption device encrypts the signal transmitted in the channel.
8. The system of claim 7, wherein said signal encryption means comprises: the signal binarization unit is configured for binarizing a signal to be encrypted to obtain a binarized signal; a signal dividing unit configured to divide the binarized signal into two parts, namely a first part signal and a second part signal, according to a set ratio; the first signal encryption unit is configured to encrypt the first part of signals to obtain first encrypted signals and transmit the first encrypted signals; and the second signal encryption unit is configured to encrypt the second partial signal to obtain a second encrypted signal and transmit the second encrypted signal.
9. A non-transitory computer readable storage medium storing computing instructions which, when executed by a computer, implement the steps of the method of any of claims 1 to 4, comprising: under the control of set time/frequency, periodically monitoring the channel, copying code segment for intercepting the signal transmitted by the channel; performing signal analysis on the intercepted signal, and judging whether the current channel is maliciously monitored/stolen by the code segment; and the code segment is used for encrypting the signal transmitted in the channel under the condition that the current channel is analyzed to be maliciously monitored/stolen.
CN202010444049.1A 2020-05-22 2020-05-22 Mobile communication safety intelligent monitoring method, system and device Active CN111542056B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010444049.1A CN111542056B (en) 2020-05-22 2020-05-22 Mobile communication safety intelligent monitoring method, system and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010444049.1A CN111542056B (en) 2020-05-22 2020-05-22 Mobile communication safety intelligent monitoring method, system and device

Publications (2)

Publication Number Publication Date
CN111542056A CN111542056A (en) 2020-08-14
CN111542056B true CN111542056B (en) 2021-06-15

Family

ID=71978092

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010444049.1A Active CN111542056B (en) 2020-05-22 2020-05-22 Mobile communication safety intelligent monitoring method, system and device

Country Status (1)

Country Link
CN (1) CN111542056B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1549491A (en) * 2003-05-06 2004-11-24 �Ҵ���˾ Encrypting and deencrypting method and apparatus for data flow
CN101106700A (en) * 2007-08-01 2008-01-16 大连海事大学 Intelligent target detail capturing device and method in video monitoring system
CN106604270A (en) * 2016-12-05 2017-04-26 清华大学 Message encryption method by means of wireless physical layer information
CN107645480A (en) * 2016-07-22 2018-01-30 阿里巴巴集团控股有限公司 Data monitoring method and system, device
CN110278022A (en) * 2019-05-23 2019-09-24 军事科学院系统工程研究院网络信息研究所 A kind of simplification method of satellite communication radio channel resource monitoring

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101001242B (en) * 2006-01-10 2011-04-20 中兴通讯股份有限公司 Method of network equipment invaded detection
CN101056302B (en) * 2007-05-31 2010-05-19 上海交通大学 UKF-based channel and carrier frequency deviation estimating method in the OFDM system
CN101635835A (en) * 2008-07-25 2010-01-27 深圳市信义科技有限公司 Intelligent video monitoring method and system thereof
GB201311571D0 (en) * 2013-06-27 2013-08-14 Qinetiq Ltd Signal processing

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1549491A (en) * 2003-05-06 2004-11-24 �Ҵ���˾ Encrypting and deencrypting method and apparatus for data flow
CN101106700A (en) * 2007-08-01 2008-01-16 大连海事大学 Intelligent target detail capturing device and method in video monitoring system
CN107645480A (en) * 2016-07-22 2018-01-30 阿里巴巴集团控股有限公司 Data monitoring method and system, device
CN106604270A (en) * 2016-12-05 2017-04-26 清华大学 Message encryption method by means of wireless physical layer information
CN110278022A (en) * 2019-05-23 2019-09-24 军事科学院系统工程研究院网络信息研究所 A kind of simplification method of satellite communication radio channel resource monitoring

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
Stochastic convergenceanalysisofcubatureKalman filter with intermittentobservations;SHI Jie等;《IEEE》;20180831;全文 *
一种改进的LN94G信道估计算法;孔慧芳等;《计算机测量与控制》;20170831;全文 *

Also Published As

Publication number Publication date
CN111542056A (en) 2020-08-14

Similar Documents

Publication Publication Date Title
Qiu et al. A lattice-partition framework of downlink non-orthogonal multiple access without SIC
JP2761281B2 (en) Encrypted communication method for multi-carrier communication system
CN109565834A (en) Downlink Control Information method of reseptance, device and storage medium
CN117082502B (en) Data acquisition and signal identification method based on data information encryption method
CN105992343B (en) Signal sending method, receiving method and device
CN102624518B (en) Voice encryption and decryption method
Padmapriya et al. Misconstrued voice on SC-FDMA for secured comprehension-a cooperative influence of DWT and ECC
Zheng et al. Physical-layer security of uplink mmWave transmissions in cellular V2X networks
Choi Compressive random access with coded sparse identification vectors for MTC
CN111542056B (en) Mobile communication safety intelligent monitoring method, system and device
Sharma et al. NOMA waveform technique using orthogonal supplementary signal for advanced 5G networks security
US20220322436A1 (en) Spatial reuse for high priority traffic
CN1248528C (en) Modem using encrypted data and unencrypted control codes
CN110278068B (en) LoRa communication encryption system based on chaos sequence
CN107733830B (en) Method, device and system for generating multi-carrier signal
CN110337094B (en) Secure transmission system for D2D content sharing and method thereof
CN116114280A8 (en) Key management method and communication device
US3507980A (en) Communication system
Shishkin Identification of radiotelephony transmissions in VHF band of maritime radio communications
MX2023015445A (en) Channel access method and related apparatus.
Mohammed et al. Adversarial learning for hiding wireless signals
Čubrilović et al. Evaluation of improved classification of speech-like waveforms used for secure voice transmission
CN113115305A (en) Interference management and safe transmission method and system based on immune coding
Islam et al. Secure end-to-end communication over GSM and PSTN networks
CN112367570A (en) Emergency instruction system based on wireless intercom system and method thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant