CN111614648B - Industrial Internet of things active eavesdropping resistant physical layer secure transmission method - Google Patents
Industrial Internet of things active eavesdropping resistant physical layer secure transmission method Download PDFInfo
- Publication number
- CN111614648B CN111614648B CN202010406181.3A CN202010406181A CN111614648B CN 111614648 B CN111614648 B CN 111614648B CN 202010406181 A CN202010406181 A CN 202010406181A CN 111614648 B CN111614648 B CN 111614648B
- Authority
- CN
- China
- Prior art keywords
- physical layer
- orthogonal
- node
- secure transmission
- eavesdropping
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The application belongs to the technical field of wireless communication, and particularly relates to an active eavesdropping resistant physical layer secure transmission method for an industrial Internet of things. The traditional physical layer secure transmission scheme only aims at a passive eavesdropping mode, and once an eavesdropper acquires a key, the eavesdropper can eavesdrop without being discovered by a legal user; but also has poor effect in dealing with active eavesdropping attack. The application provides an active eavesdropping resistant physical layer secure transmission method for an industrial Internet of things, which comprises the following steps: the method comprises the steps that a legal receiving node initiates orthogonal encryption distribution of security parameters; authenticating the orthogonal characteristic parameters to enable the information source node to recover the security parameters; the information source node transmits encrypted data of security parameters; and the recovery of the data is completed by the legal receiving node. And the condition that an eavesdropper cannot acquire data information in a passive eavesdropping and active deception mode is ensured.
Description
Technical Field
The application belongs to the technical field of wireless communication, and particularly relates to an active eavesdropping resistant physical layer secure transmission method for an industrial Internet of things.
Background
The wireless communication system has the characteristics of space openness, topological structure time-varying property, broadcast property and the like, so that the communication content is easy to eavesdrop. The traditional cryptography encryption mode depending on the computational complexity faces elimination due to continuous improvement of computer computing power, the physical layer secure communication technology does not depend on the computational complexity, and meanwhile, the method has the advantages of small computational overhead, short time delay and greater advantage in practical application.
An OFDM pilot signal physical layer authentication system based on independent check coding is proposed, and spoofing attack is resisted through an interaction protocol and pilot signal design. But the scheme depends on a large-scale antenna to a certain extent, and is difficult to apply to an industrial Internet of things system with low cost and large quantity. The Physical Layer (Physical Layer) is the lowest Layer in the OSI model of computer networks. The physical layer provides for the creation, maintenance, and removal of physical links required for the transmission of data, while providing mechanical, electrical, functional, and regulatory features. In brief, the physical layer ensures that the original data can be transmitted over a variety of physical media. Both local area networks and wide area networks belong to layer 1 and layer 2.
The traditional physical layer secure transmission scheme only aims at a passive eavesdropping mode, and once an eavesdropper acquires a key, the eavesdropper can eavesdrop without being discovered by a legal user; but also has poor effect in dealing with active eavesdropping attack.
Disclosure of Invention
1. Technical problem to be solved
Based on a traditional physical layer secure transmission scheme, only aiming at a passive eavesdropping mode, once an eavesdropper acquires a key, the eavesdropper can eavesdrop without being discovered by a legal user; and the problem that the effect is not good when active eavesdropping attack is responded, and the application provides an active eavesdropping resistant physical layer secure transmission method for the industrial Internet of things.
2. Technical scheme
In order to achieve the above object, the present application provides a secure transmission method of an active eavesdropping resistant physical layer of an industrial internet of things, including the following steps:
step 1): the method comprises the steps that a legal receiving node initiates orthogonal encryption distribution of security parameters;
step 2): authenticating the orthogonal characteristic parameters to enable the information source node to recover the security parameters;
step 3): the information source node initiates and encrypts data transmission by using security parameters;
step 4): and the recovery of the data is completed by the legal receiving node.
Another embodiment provided by the present application is: the orthogonal encryption matrix R generated by the legal receiving node B based on a small amount of common information seeds in the step 1)BThe locally generated U random security parameters thetaB=[θ1,θ2,...,θU]TAnd mapping the K subcarriers to carry out encrypted transmission.
Another embodiment provided by the present application is: the orthogonal encryption matrix RBIs a K × U order matrix of the form
Wherein r isB,u,u=1,2,...U is U (K/U) multiplied by 1 vectors, and is selected by A and B through a small amount of common information seed and a safety protocol; rBθBIs a K multiplied by 1 vector, the K element of which is the signal of the K subcarrier to be modulated by Bob; each 0 in the formula is an all zero vector of (K/U). times.1.
Another embodiment provided by the present application is: the random security parameter θB=[θB,1,θB,2,...,θB,U]T,Is a random complex number with U independent amplitudes of 1, each time generated by B, and with uniformly distributed phases between (0, 2 pi), K being required to be divisible by U.
Another embodiment provided by the present application is: the orthogonal encryption matrix R generated by the information source node A based on the same common information seed as the legal receiving node B in the step 2)BPerforming maximum likelihood estimation on the received signal to obtain estimates of U security parameters
Another embodiment provided by the present application is: the information source node in the step 3) utilizes the U safety parameters recovered in the step 2)And carrying out packet encryption transmission on the sending information.
Another embodiment provided by the present application is: the U safety parameters in the step 3)And carrying out packet encryption transmission on the sending information.
Another embodiment provided by the present application is: the encrypted transmission form is
Wherein the content of the first and second substances,is paired by the source node A in said step 2)Maximum likelihood estimation of (2); symbolIs a K × 1 complex baseband data symbol.
Another embodiment provided by the present application is: and the legal receiving node decrypts and recovers the data in the step 3) by using the security parameter theta generated in the step 1).
3. Advantageous effects
Compared with the prior art, the active eavesdropping resistant physical layer secure transmission method for the industrial Internet of things has the beneficial effects that:
the application provides a physical layer security transmission method for resisting active eavesdropping, which is a physical layer security transmission method for resisting active eavesdropping based on orthogonal characteristic parameter authentication.
According to the active eavesdropping resistant physical layer safety transmission method, a small amount of common information between a legal receiving node and an information source node is utilized, the legal receiving node encrypts a group of random parameters to be sent to the information source node by utilizing orthogonal characteristic parameters, and the information source node conducts constellation diagram rotation encryption on information to be sent by utilizing the random parameters sent by the legal receiving node. Through the orthogonal characteristic parameter encryption, the data information can be ensured to be correctly recovered by a legal receiving node, and meanwhile, an eavesdropper can not acquire the data information in a passive eavesdropping and active cheating mode.
According to the active eavesdropping resistant physical layer secure transmission method, the mode that the orthogonal encryption matrix is used for encrypting the secure parameters in the stages of the step 1) and the step 2) can effectively resist active cheating attacks.
According to the active eavesdropping resistant physical layer security transmission method, the eavesdropping node can send signals in the same form for decoy, and when the eavesdropping node cannot acquire the seed of the common information, the probability that the used orthogonal encryption matrix is the same as the orthogonal encryption matrix adopted by the legal receiving node is extremely low.
According to the active eavesdropping resistant physical layer security transmission method, orthogonal encryption of security parameters can ensure that the information source nodes are slightly influenced by cheating attacks when being recovered.
According to the active eavesdropping resistant physical layer secure transmission method, the constellation diagram is encrypted in a grouping mode by adopting random parameters in the stages of step 3) and step 4), and passive eavesdropping can be effectively resisted. Assuming that the eavesdropping node adopts a one-dimensional search scheme to recover the constellation diagram encrypted by a single security parameter, the probability of recovering the correctness in the QPSK modulation mode isThe same probability as a blind guess; assuming that the eavesdropping node recovers the constellation diagram by adopting an exhaustion method, the retrieval space of the eavesdropping node in single transmission is 4USeed combination, i.e. the probability that all U safety parameters are completely recovered to be correct is
According to the active eavesdropping resistant physical layer security transmission method, the number of security parameters is larger, namely, the number of encrypted packets is larger, the larger the space required to be searched by the eavesdropping node through passive eavesdropping is, and the smaller the correct recovery probability is.
According to the active eavesdropping resistant physical layer security transmission method, the potential of the orthogonal vector base is reduced due to the fact that the number of security parameters is increased, and the probability of successful eavesdropping node tricking attack is increased.
According to the active eavesdropping resistant physical layer safety transmission method, under the condition that the common information seeds are leaked, the eavesdropping node needs to realize active eavesdropping through power suppression and pilot frequency attack, a legal user can detect that the error rate is greatly increased in the process, so that the transmission process is interrupted or the current information seeds are abandoned, and detection and blocking of an eavesdropper are realized.
Drawings
FIG. 1 is a system model schematic of the present application;
FIG. 2 is a schematic diagram of a legal user communication in the secure communication protocol of the present application;
fig. 3 is a simulation experiment result of the relative power of the eavesdropper and the bit error rate of the user in different attack modes in the embodiment of the application.
Detailed Description
Hereinafter, specific embodiments of the present application will be described in detail with reference to the accompanying drawings, and it will be apparent to those skilled in the art from this detailed description that the present application can be practiced. Features from different embodiments may be combined to yield new embodiments, or certain features may be substituted for certain embodiments to yield yet further preferred embodiments, without departing from the principles of the present application.
Referring to fig. 1 to 2, the present application provides an active eavesdropping resistant physical layer security technique based on orthogonal feature parameter authentication, which is suitable for using an OFDM system, where the OFDM system employs K subcarriers. The source node is called Alice, and the shorthand symbol is A; the legal receiving node is called Bob, and the abbreviation symbol is B; the eavesdropping node is called Eve, and the notation is E. Symbol hij,kI, j ∈ a, B, E, K ═ 1, 2. All links are quasi-static fading channels, i.e. hij,kThe time slot is kept unchanged in a time slot with the time length T, and the time slots are independently changed. Assuming that the channel is frequency-selective fading, i.e. all channel fading coefficientsAre different and statistically independent from each other. Assuming that the channels are not reciprocal, i.e. hij,k≠hji,k. Suppose that the receiver of node j obtains the channel coefficient h by channel estimationij,k. The assumption from the source node to the legitimate receiving node is fully open, i.e. the eavesdropping node Eve also knows these protocols and formats. The transmission of Alice to Bob in one time slot is divided into two phases. The first stage has a time length of T1The second stage has a time length of T2Satisfy T ═ T1+T2. Based on a small amount of shared information seed between a receiving node and an information source node, the scheme comprises the following steps:
s1, the orthogonal encryption distribution of the security parameters is initiated by a legal receiving node. Orthogonal encryption matrix R generated by legal receiving node B based on small amount of common information seedBThe locally generated U random security parameters thetaB=[θB,1,θB,2,...,θB,U]TAnd mapping the K subcarriers to carry out encrypted transmission. That is, Bob sends a signal of
Wherein the content of the first and second substances,is a random complex number with U independent amplitudes of 1 generated by B each time and evenly distributed phases between (0, 2 pi), and K is required to be evenly divisible by U; r isB,uU is 1, 2., U, which is U (K/U) × 1 vectors, selected by a and B through seed and security protocols; rBθBIs a K multiplied by 1 vector, the K element of which is the signal of the K subcarrier to be modulated by Bob; each 0 in the formula is an all zero vector of (K/U). times.1.
rB,uFrom a fixed set of perfect orthogonal vectorsSelecting, wherein the set internal vector satisfies:
s2, quadratureAnd (5) authenticating the characteristic parameters, and recovering the security parameters by the information source node. The information source node Alice carries out correlation operation and maximum likelihood estimation on the received signals based on the orthogonal encryption matrix generated by the same common information seed to obtain the estimation of U safety parametersIf no other interference exists, the signal received by Alice in the first stage is:
wherein the content of the first and second substances,for node i, i belongs to { A, B, E }, the complex baseband signal received on the kth subcarrier at the r stage; on the basis of the above-mentioned technical scheme,is a K × 1 received signal vector;i, j belongs to { A, B, E }, and represents a channel fading coefficient from a node i to a node j;is complex base band Gaussian white noise received by a node i receiver on each subcarrier at the r stage and the variance is sigma2。
Alice receives with a maximum likelihood receiver
Wherein the content of the first and second substances,is Alice to θB(ii) an estimate of (d); alice can know R through seed and security protocolB;Is RBThe conjugate transpose of (c).
And S3, encrypting data transmission by the security parameters, and initiating by the source node. The source node uses the U security parameters recovered in S2And carrying out packet encryption transmission on the sending information. The signal transmitted by Alice in the second stage is
Wherein, the symbolComplex baseband data symbols of K × 1; i isK/UIs an identity matrix of order K/U.
And S4, recovering the data, and completing by the legal receiving node. The legitimate receiving node decrypts and restores the data of S3 using the security parameter θ generated in S1. The information received by Bob in the second stage is:
wherein the content of the first and second substances,for node i, i belongs to { A, B, E }, the complex baseband signal received on the kth subcarrier at the r stage; on the basis of the above-mentioned technical scheme,is a K × 1 received signal vector;i, j is belonged to { A, B, E }, and represents the channel fading coefficients from the node i to the node j;Is complex base band Gaussian white noise received by a node i receiver on each subcarrier at the r stage and the variance is sigma2。
Bob employs locally generated ΘBMaximum likelihood reception of received information
Examples
An active eavesdropping resistant physical layer security technology based on orthogonal characteristic parameter authentication is suitable for an OFDM-QPSK system, and the OFDM adopts K subcarriers. The system model is shown in fig. 1 and includes three nodes: the source node Alice, the legal receiving node Bob and the eavesdropping node Eve are respectively abbreviated as A, B, E hereinafter. A bidirectional wireless connection link is arranged between Alice and Bob, and bidirectional wireless connection capability is also arranged between Alice and Eve; and Bob and Eve are far away from each other, have no direct path, and can not listen to the signal that both sides sent each other. The bidirectional transmission between any pair of nodes is in time division duplex mode. The transmission of Alice to Bob in one time slot is divided into two phases. The first stage has a time length of T1The second stage has a time length of T2Satisfy T ═ T1+T2。
Assuming that the prefix length of OFDM is larger than the delay spread of the multipath signal, the baseband equivalent signal received by the receiver has no intersymbol interference (ISI) and intercarrier interference (ICI). Symbol hij,kI, j ∈ a, B, E, K ═ 1, 2. All links are quasi-static fading channels, i.e. hij,kThe time slot is kept unchanged in a time slot with the time length T, and the time slots are independently changed. Assuming that the channel is frequency selectiveFading, i.e. all channel fading coefficientsAre different and statistically independent from each other. Assuming that the channels are not reciprocal, i.e. hij,k≠hji,k. Suppose that the receiver of node j obtains the channel coefficient h by channel estimationij,k. The assumption from the source node to the legitimate receiving node is fully open, i.e. the eavesdropping node Eve also knows these protocols and formats. It is reasonable to assume that there is a small amount of security information seed (a few bits) between Alice and Bob. Based on the above assumptions, the present solution comprises the following steps:
s1, the orthogonal encryption distribution of the security parameters is initiated by a legal receiving node. Orthogonal encryption matrix R generated by legal receiving node B based on small amount of common information seedBThe locally generated U random security parameters thetaB=[θB,1,θB,2,...,θB,U]TAnd mapping the K subcarriers to carry out encrypted transmission. That is, Bob sends a signal of
Wherein the content of the first and second substances,is a random complex number with U independent amplitudes of 1 generated by B each time and evenly distributed phases between (0, 2 pi), and K is required to be evenly divisible by U; r isB,uU is 1, 2., U, which is U (K/U) × 1 vectors, selected by a and B through common information seed and security protocol; rBθBIs a K multiplied by 1 vector, the K element of which is the signal of the K subcarrier to be modulated by Bob; each 0 in the formula is an all zero vector of (K/U). times.1.
rB,uFrom a fixed set of perfect orthogonal vectorsSelecting, wherein the set internal vector satisfies:
and S2, authenticating the orthogonal characteristic parameters, and recovering the security parameters by the information source node. The information source node Alice carries out correlation operation and maximum likelihood estimation on the received signals based on the orthogonal encryption matrix generated by the same common information seed to obtain the estimation of U safety parametersIf no other interference exists, the signal received by Alice in the first stage is:
wherein the content of the first and second substances,for node i, i belongs to { A, B, E }, the complex baseband signal received on the kth subcarrier at the r stage; on the basis of the above-mentioned technical scheme,is a K × 1 received signal vector;i, j belongs to { A, B, E }, and represents a channel fading coefficient from a node i to a node j;is complex base band Gaussian white noise received by a node i receiver on each subcarrier at the r stage and the variance is sigma2。
Alice receives with a maximum likelihood receiver
Wherein the content of the first and second substances,is Alice to θB(ii) an estimate of (d); alice can know R through seed and security protocolB;Is RBThe conjugate transpose of (c).
And S3, encrypting data transmission by the security parameters, and initiating by the source node. The source node uses the U security parameters recovered in S2And carrying out packet encryption transmission on the sending information. The signal transmitted by Alice in the second stage is
Wherein, the symbolComplex baseband data symbols of K × 1; i isK/UIs an identity matrix of order K/U.
And S4, recovering the data, and completing by the legal receiving node. The legitimate receiving node decrypts and restores the data of S3 using the security parameter θ generated in S1. The information received by Bob in the second stage is:
wherein the content of the first and second substances,for node i, i ∈ { A, B, E }, the kth subcarrier is connected in the r stageA received complex baseband signal; on the basis of the above-mentioned technical scheme,is a K × 1 received signal vector;i, j belongs to { A, B, E }, and represents a channel fading coefficient from a node i to a node j;is complex base band Gaussian white noise received by a node i receiver on each subcarrier at the r stage and the variance is sigma2。
Bob employs locally generated ΘBMaximum likelihood reception of received information
I. And considering that the eavesdropping node adopts a decoy attack mode to carry out active eavesdropping. An eavesdropping node may transmit a signal of the same format as a legitimate receiving node by:
wherein the content of the first and second substances,is a random complex number with U independent amplitudes of 1 generated by E each time and evenly distributed phases between (0, 2 pi), and K is required to be evenly divisible by U; r isE,uU is a number of U (K/U) × 1 vectors, customized by EEAnd selecting a safety protocol; rEθEIs a K x 1 vector with the K-th element beingEve is to modulate the signal of the k subcarrier; each 0 in the formula is an all zero vector of (K/U). times.1.
The information received by the first-stage information source node Alice is
When the Alice maximum likelihood receiver in stage S2 is
Seed for A and B and seed for EEDifferent from each other, so RBAnd REIn different, then rB,uAnd rE,uDifferent. ByThe orthogonality of each element in the (A) shows that in the maximum likelihood receiver, Alice's recovered signal is only in accordance with rB,uThe carrier signal on the vector is correlated and the signal on the other vector space can be considered as noise. Therefore, the eavesdropping node cannot influence the estimation of the security parameters of the source node through the tricking attack.
And II, considering that the eavesdropping node carries out active eavesdropping by adopting a pilot frequency attack and decoy attack mode.
The pilot frequency attack means that in the channel estimation stage of Alice, Eve sends the same pilot frequency signal to induce Alice to estimate the channel information in error, so that Alice considers that the channel is HBA+HEA. Stage S2 Alice maximum likelihood receiver as
And III, taking passive wiretapping reception by the wiretapping node into consideration. The signal received by the eavesdropping node in the second stage is as follows:
wherein the content of the first and second substances,for node i, i belongs to { A, B, E }, the complex baseband signal received on the kth subcarrier at the r stage; on the basis of the above-mentioned technical scheme,is a K × 1 received signal vector;i, j belongs to { A, B, E }, and represents a channel fading coefficient from a node i to a node j;is complex base band Gaussian white noise received by a node i receiver on each subcarrier at the r stage and the variance is sigma2。
1) The case that Eve considers the self-spoofing attack to be effective:
at this point, Eve employs a maximum likelihood reception scheme similar to Bob receivers, namely:
2) Case where Eve considers its own attack invalid:
at this time, Eve thinks that he cannot know the encryption parametersTherefore, the received signal pair will be first of allPerforming linear estimation; second, reuse estimationThe data signal detection is completed. One encryption parameter protects a set of data (K/U) so for a parameterWe only need to focus on the signal of the corresponding sub-carrier.
At this point, assume that Eve adopts a one-dimensional search scheme, looking up such thatClosest to QPSK constellationIt is noted that the optimal solution under this problem must be four, i.e. fourAll meet the requirement of "being closest to the QPSK constellation". Therefore, when Eve considers that the own attack is invalid, information stealing is difficult to realize through one-dimensional search.
The simulation result is shown in fig. 3, compared with the error rates of the eavesdropping node in different modes, it can be found that the error rates of Eve are not obviously improved by different attack modes; compared with the bit error rates of the legal receiving node Bob under different attacks, the bit error rate of Bob is improved as the Eve power is improved: only the influence of the decoy attack is minimum, only the influence of the pilot attack is second, and the influence of the two attack modes is maximum when the two attack modes are simultaneously used. According to the simulation experiment, the conclusion can be drawn that the eavesdropping of the information can not be realized through pilot frequency attack and decoy attack, and the active eavesdropping resistance of the application is remarkable.
Although the present application has been described above with reference to specific embodiments, those skilled in the art will recognize that many changes may be made in the configuration and details of the present application within the principles and scope of the present application. The scope of protection of the application is determined by the appended claims, and all changes that come within the meaning and range of equivalency of the technical features are intended to be embraced therein.
Claims (6)
1. An active eavesdropping resistant physical layer secure transmission method for an industrial Internet of things is characterized in that: the method comprises the following steps:
step 1): the method comprises the steps that a legal receiving node initiates orthogonal encryption distribution of security parameters;
orthogonal encryption matrix R generated by legal receiving node B based on a small amount of common information seedsBThe locally generated U random security parameters thetaB=[θ1,θ2,...,θU]TCarrying out orthogonal encryption, and mapping U random security parameters subjected to orthogonal encryption to K subcarriers for transmission;
step 2): authenticating the orthogonal characteristic parameters to enable the information source node to recover the security parameters;
the information source node A generates an orthogonal encryption matrix R based on the same common information seeds of the legal receiving nodes BBPerforming maximum likelihood estimation on the received signal to obtain estimates of U security parameters
Step 3): the information source node initiates and carries out packet encryption transmission on the transmitted information by using the security parameters;
step 4): and the recovery of the data is completed by the legal receiving node.
2. The method for secure transmission of a physical layer resistant to active eavesdropping according to claim 1, wherein: the orthogonal encryption matrix RBIs a K × U order matrix of the form
Wherein r isB,uU is a number of vectors of U (K/U) × 1, and is selected by the source node a and the legitimate receiving node B through a common information seed and a security protocol; rBθBIs a K multiplied by 1 vector, the K element of which is the signal of the K subcarrier to be modulated by Bob; each 0 in the formula is an all-zero vector of (K/U) x 1;
orthogonal vector rB,uFrom a fixed set of perfect orthogonal vectorsSelecting, wherein the set internal vector satisfies:
3. the method for secure transmission of a physical layer resistant to active eavesdropping according to claim 1, wherein: the random security parameter θB=[θB,1,θB,2,...,θB,U]T,Is a random complex number with U independent amplitudes of 1, each time generated by B, and with uniformly distributed phases between (0, 2 pi), K being required to be divisible by U.
5. The method for secure transmission of a physical layer resistant to active eavesdropping according to claim 4, wherein: the encrypted transmission form is
6. The method for secure transmission of a physical layer resistant to active eavesdropping according to claim 1, wherein: and the legal receiving node decrypts and recovers the data in the step 3) by using the security parameter theta generated in the step 1).
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010406181.3A CN111614648B (en) | 2020-05-14 | 2020-05-14 | Industrial Internet of things active eavesdropping resistant physical layer secure transmission method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010406181.3A CN111614648B (en) | 2020-05-14 | 2020-05-14 | Industrial Internet of things active eavesdropping resistant physical layer secure transmission method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111614648A CN111614648A (en) | 2020-09-01 |
CN111614648B true CN111614648B (en) | 2021-10-15 |
Family
ID=72205101
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010406181.3A Active CN111614648B (en) | 2020-05-14 | 2020-05-14 | Industrial Internet of things active eavesdropping resistant physical layer secure transmission method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111614648B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TR202022598A1 (en) * | 2020-12-31 | 2022-07-21 | Istanbul Medipol Ueniversitesi | A METHOD TO PROTECT WIRELESS COMMUNICATIONS AGAINST PEAKING ATTACKS |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108429750A (en) * | 2018-03-13 | 2018-08-21 | 湖南城市学院 | A kind of music control system and control method based on big data |
CN108833390A (en) * | 2018-06-05 | 2018-11-16 | 中国人民解放军国防科技大学 | Matrix transformation-based packet physical layer encryption method |
CN110278537A (en) * | 2019-07-11 | 2019-09-24 | 北京邮电大学 | A kind of incoherent transmission plan of safety for move vehicle system |
CN111065096A (en) * | 2019-12-18 | 2020-04-24 | 中国人民解放军陆军工程大学 | Physical layer encryption transmission system for wireless communication and method thereof |
CN111132153A (en) * | 2019-12-19 | 2020-05-08 | 中山大学 | Endogenous safety communication method based on wireless channel characteristics |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10334435B2 (en) * | 2016-04-27 | 2019-06-25 | Qualcomm Incorporated | Enhanced non-access stratum security |
-
2020
- 2020-05-14 CN CN202010406181.3A patent/CN111614648B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108429750A (en) * | 2018-03-13 | 2018-08-21 | 湖南城市学院 | A kind of music control system and control method based on big data |
CN108833390A (en) * | 2018-06-05 | 2018-11-16 | 中国人民解放军国防科技大学 | Matrix transformation-based packet physical layer encryption method |
CN110278537A (en) * | 2019-07-11 | 2019-09-24 | 北京邮电大学 | A kind of incoherent transmission plan of safety for move vehicle system |
CN111065096A (en) * | 2019-12-18 | 2020-04-24 | 中国人民解放军陆军工程大学 | Physical layer encryption transmission system for wireless communication and method thereof |
CN111132153A (en) * | 2019-12-19 | 2020-05-08 | 中山大学 | Endogenous safety communication method based on wireless channel characteristics |
Also Published As
Publication number | Publication date |
---|---|
CN111614648A (en) | 2020-09-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Melki et al. | A survey on OFDM physical layer security | |
Melki et al. | An efficient OFDM-based encryption scheme using a dynamic key approach | |
Güvenkaya et al. | On physical-layer concepts and metrics in secure signal transmission | |
Wu et al. | Artificial-noise-aided physical layer phase challenge-response authentication for practical OFDM transmission | |
CN111525998B (en) | High-reliability optical transmission method based on mode, time slot and frequency composite vector | |
Huo et al. | A new efficient physical layer OFDM encryption scheme | |
Taha et al. | Secret key exchange and authentication via randomized spatial modulation and phase shifting | |
Melki et al. | Physical layer security schemes for MIMO systems: an overview | |
Yang et al. | Design and analysis of spatial modulation based orthogonal time frequency space system | |
Al-Moliki et al. | Robust lightweight-channel-independent OFDM-based encryption method for VLC-IoT networks | |
Li et al. | A distributed differentially encoded OFDM scheme for asynchronous cooperative systems with low probability of interception | |
CN111614648B (en) | Industrial Internet of things active eavesdropping resistant physical layer secure transmission method | |
US20230082251A1 (en) | Joint random subcarrier selection and channel-based artificial signal design aided pls | |
Tao et al. | Affine frequency division multiplexing with index modulation | |
CN111683033B (en) | Encryption and transmission method based on constellation rotation in TR _ OFDM system | |
CN108684037B (en) | OFDM (orthogonal frequency division multiplexing) safe transmission method combining subcarrier pairing and signal inversion | |
Kaga et al. | Multi-level encrypted transmission scheme using hybrid chaos and linear modulation | |
Huang et al. | Secure and reliable multidimensional orthogonal code aided rf watermark design for nb-iot systems | |
CN113726500B (en) | Five-dimensional hyper-chaotic coupling synchronization system and satellite physical layer encryption transmission method | |
CN111757321B (en) | Active eavesdropping resistant secure transmission method in 5G system | |
Furqan et al. | Secure and reliable IoT communications using nonorthogonal Signals’ superposition with dual-transmission | |
Melki et al. | Efficient & secure physical layer cipher scheme for VLC systems | |
Hasan et al. | Physical-Layer Security Improvement in MIMO OFDM Systems Using Multilevel Chaotic Encryption | |
Kakkar et al. | Secret key generation using OFDM samples | |
Banat et al. | Improved physical-layer security for OFDM using data-based subcarrier scrambling |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20220211 Address after: 719000 room 908, Gaoke building, Kaiyuan Avenue, high tech Industrial Park, Yulin City, Shaanxi Province Patentee after: Shaanxi Ruiyuan Wutong Intelligent Technology Co.,Ltd. Address before: Xi'an Jiaotong University, 28 Xianning West Road, Beilin District, Xi'an City, Shaanxi Province, 710049 Patentee before: XI'AN JIAOTONG University |