CN111711518A - Method for simultaneously distributing key of multi-user physical layer and broadcasting communication - Google Patents

Method for simultaneously distributing key of multi-user physical layer and broadcasting communication Download PDF

Info

Publication number
CN111711518A
CN111711518A CN202010758177.3A CN202010758177A CN111711518A CN 111711518 A CN111711518 A CN 111711518A CN 202010758177 A CN202010758177 A CN 202010758177A CN 111711518 A CN111711518 A CN 111711518A
Authority
CN
China
Prior art keywords
bob
key
alice
symbol
snr
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010758177.3A
Other languages
Chinese (zh)
Other versions
CN111711518B (en
Inventor
唐杰
许爱东
蒋屹新
文红
姬学斌
张宇南
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
University of Electronic Science and Technology of China
Research Institute of Southern Power Grid Co Ltd
Original Assignee
University of Electronic Science and Technology of China
Research Institute of Southern Power Grid Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by University of Electronic Science and Technology of China, Research Institute of Southern Power Grid Co Ltd filed Critical University of Electronic Science and Technology of China
Publication of CN111711518A publication Critical patent/CN111711518A/en
Application granted granted Critical
Publication of CN111711518B publication Critical patent/CN111711518B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B7/00Radio transmission systems, i.e. using radiation field
    • H04B7/02Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
    • H04B7/04Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
    • H04B7/0413MIMO systems
    • H04B7/0456Selection of precoding matrices or codebooks, e.g. using matrices antenna weighting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B7/00Radio transmission systems, i.e. using radiation field
    • H04B7/02Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
    • H04B7/04Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
    • H04B7/08Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the receiving station
    • H04B7/0837Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the receiving station using pre-detection combining
    • H04B7/0842Weighted combining
    • H04B7/0848Joint weighting
    • H04B7/0857Joint weighting using maximum ratio combining techniques, e.g. signal-to- interference ratio [SIR], received signal strenght indication [RSS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/085Secret sharing or secret splitting, e.g. threshold schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Radio Transmission System (AREA)

Abstract

The invention discloses a method for simultaneously distributing keys of a multi-user physical layer and carrying out broadcast communication, which comprises the following steps: alice randomly generates different key bits corresponding to N Bobs, and respectively maps the different key bits into key symbols, wherein each key symbol corresponds to a vector for activating different receiving antennas of each Bob; alice selects precoding of the key symbols of each Bob corresponding to the activation vectors, and broadcasts communication data symbols to N Bobs by using a precoding matrix; each Bob independently measures the average signal reception intensity or SNR estimation antenna vector of each antenna of the Bob, and obtains a key symbol and a key bit of the Bob through inverse mapping; each Bob independently demodulates the data symbols of the broadcast communication at its active antenna through the observed antenna vector. The invention embeds the key generation process into the broadcast communication process through the multi-user random zero forcing technology, realizes the simultaneous distribution of the keys of the multi-user physical layer in the broadcast communication process, ensures that the key sharing does not cause the interruption and the time delay of the multi-user network communication, and has good technical, performance and cost advantages.

Description

Method for simultaneously distributing key of multi-user physical layer and broadcasting communication
Technical Field
The invention relates to the field of encrypted information, in particular to a method for simultaneously distributing keys of a multi-user physical layer and carrying out broadcast communication.
Background
With the rapid development of the 5G Internet of things and the edge computing network, a large number of novel services and applications are continuously emerging. Various confidential and sensitive data and the like in a wireless network are increased in a massive manner, the problem of information security is more and more prominent, and the security is gradually becoming a precondition for various different service applications. In a conventional wireless communication network, cryptography-based encryption technology is generally used at the network layer and the upper layer to secure system communication. Performing various cryptographic authentications requires establishing a secure shared key between the communicating parties. In a large number of novel application scenarios of the 5G network, such as a large-scale IoT network and an edge computing network, a large number of resource-limited sensing nodes are accessed, so that the complexity of key distribution and management based on cryptography is extremely high and even difficult to implement. The key generation and distribution technology based on the physical channel has the basic principle that the keys among legal users are generated and distributed by utilizing the randomness and the reciprocity of fading channels, and under the environment with rich multipath scattering, if an attacker is more than 1-2 physical signal wavelengths away from the legal users, the key information of the legal users cannot be presumed.
Currently, there are some preliminary research results on physical layer key generation, but current physical layer key technology mainly implements how to generate a shared key between a pair or a group of users. However, in practical applications, it is most often the case that one central node (e.g., a base station, an edge computing central node, etc.) needs to distribute different keys to a plurality of different users or nodes to establish secure communication between each user and the central node. If the existing method is used to distribute keys to each user one by one, there is a high requirement on the speed of generating a single key, because there are a large number of nodes accessing and leaving the network in the dynamic network, so that the central node needs to update and distribute keys frequently. The key distribution rate of the current method is highly dependent on how fast the channel changes. Experiments verify that a typical physical layer key distribution system with 3 transmit-receive antennas reaches below 10 in indoor channels-2Key error rates of the order of magnitude it takes 10 seconds or more to establish a 128 bit length AES symmetric encryption key. In the current method, a normal communication process and key distribution cannot be performed simultaneously, so that in an environment where different keys need to be shared by multiple users, communication interruption or delay increase is inevitably caused.
Disclosure of Invention
The present invention is directed to solve the above problems, and an object of the present invention is to provide a method for performing key distribution of a multi-user physical layer simultaneously with broadcast communication.
A method of multi-user physical layer key distribution concurrent with broadcast communication, comprising:
each Bob determines to Alice the number of receive antennas it uses and the number of transmit symbol streams it needs.
Random generation of secret message b of binary system by Alicek=(bk1,bk2,...,bkN) The key bits distributed to each Bob are separately paired, where each b shareki,i=1,2,...,N MS=log2M contains bits MSThe constellation signal order of the modulation scheme used by each Bob.
Alice will bkEvery M inSMapping bits to a key symbol stream K ═ K (K)1,K2,..,KN) ∈ K, and according to the value of K, selecting different columns in E as selection references for sending precoding of different Bobs.
Each Bob sends a pilot frequency sequence to Alice in turn, and the Alice estimates an uplink equivalent channel HBAAnd transposes to obtain the downlink channel
Figure BDA0002612271130000021
Wherein HAB=[HAB,1;HAB,2]Corresponding to the channel from Alice to each Bob.
Alice selects its W (K) for each Bobi) Corresponding to the number of non-zero columns W (E) in E (: K + 1).
Alice sends m different symbol streams s by W (e)1,s2,....smThen each Bob receives the m-frame symbol stream y separately1,y2,....ymEach Bob receives a signal N at a timeBDimension vector
Figure BDA0002612271130000022
Each Bob receives the signal y according to itself1,y2,....ymThe key symbol k coming out of the current one is observed.
Each Bob independently demodulates m frames S according to the antenna corresponding to the coordinates of N nonzero elements in e observed in S7 by each Bob1,s2,....smCommunication data symbol
Figure BDA0002612271130000023
Completing the communication, wherein:
Figure BDA0002612271130000024
the above communication and key distribution process is repeated until each Bob has obtained a key of L bits length
Figure BDA0002612271130000025
And B, respectively confirming the key consistency of Bob and Alice, and if the key of Bob is consistent with the key shared by Alice, finishing the key sharing.
Further, the parameters of the key symbol stream satisfy the following relationship: bob selects the required number of receiving antennas NBThe number N of communication data modulation symbol streams transmitted simultaneously with Alice, wherein N is more than or equal to 1 and less than or equal to NB-1 such that:
Figure BDA0002612271130000026
then
K={0,1,2…,Nk-1}。
Further, Alice obtains the candidate precoding space W according to the following processing:
Figure BDA0002612271130000027
Figure BDA0002612271130000031
and according to the number of the receiving antennas of each Bob, the Alice divides the column corresponding to the W into corresponding spaces.
Further, said W (K)i) The number of columns in (E) (K +1) corresponding to non-zero is W (E):
W(ei)=W(Ki)E(:,K+1)
alice sends each W (e)i) Combined into W (e) ═ W (e)1),....,W(eN)]。
Further, observing the key symbol k includes two methods: SPN-based observation methods and SNR-based observation methods; the observation method based on the SPN comprises the following steps: each Bob directly measures the m-frame symbol-averaged signal-plus-noise strength SPN for each antenna as follows:
Figure BDA0002612271130000032
if the modulation is real signal modulation, such as BPSK, the real part of the received signal can be directly selected for measurement, and Bob selects the largest N αiThe subscript is the position corresponding to the nonzero element in the e; after Bob observes e, the observed key symbol K and the observed key bit are obtained according to e
Figure BDA0002612271130000033
The SNR-based method is as follows: bob directly measures the average SNR of the M-frame symbols of each antenna, specifically, different SNR estimation methods can be adopted, N SNR antennas with the largest SNR are selected in the M2M4SNR estimation method bit sequence, and the subscript is the position corresponding to the nonzero element in e. Bob thus gets the observed e, and then gets the observed key symbol K and key bits from e
Figure BDA0002612271130000034
The invention has the following advantages: the key generation process is embedded into the broadcast communication process through a multi-user random zero forcing technology, so that the key distribution of a multi-user physical layer is realized simultaneously in the broadcast communication process, the key sharing cannot cause the interruption and the time delay of multi-user network communication, and the data transmission of multiple users cannot be interrupted all the time in the key generation process; low overhead: both sides of the key distribution of the invention only need to send the unidirectional pilot frequency, do not need to send the pilot frequency each other; the method has low complexity and high safety, and the key distribution process of the invention does not need both parties to carry out key quantization, negotiation and privacy amplification, so that both parties do not need to carry out multiple interactive negotiations related to the process on a public channel, and the hidden danger of information leakage is avoided.
Drawings
Figure 1 is a flow chart of a method for simultaneous distribution of keys to a multi-user physical layer and broadcast communication.
Fig. 2 is a diagram of a model of a method for simultaneous distribution of keys of a multi-user physical layer and broadcast communication.
Detailed Description
In order to more clearly understand the technical features, objects, and effects of the present invention, embodiments of the present invention will now be described with reference to the accompanying drawings.
In this embodiment, a method for performing multi-user physical layer key distribution and broadcast communication simultaneously includes:
each Bob determines to Alice the number of receive antennas it uses and the number of transmit symbol streams it needs.
Random generation of secret message b of binary system by Alicek=(bk1,bk2,...,bkN) The key bits distributed to each Bob are separately paired, where each b shareki,i=1,2,...,N MS=log2M contains bits MSThe constellation signal order of the modulation scheme used by each Bob.
Alice will bkEvery M inSMapping bits to a key symbol stream K ═ K (K)1,K2,..,KN) ∈ K, and according to the value of K, selecting different columns in E as selection references for sending precoding of different Bobs.
Each Bob sends a pilot frequency sequence to Alice in turn, and the Alice estimates an uplink equivalent channel HBAAnd transposes to obtain the downlink channel
Figure BDA0002612271130000041
Wherein HAB=[HAB,1;HAB,2]Corresponding to the channel from Alice to each Bob.
Alice selects its W (K) for each Bobi) Corresponding to the number of non-zero columns W (E) in E (: K + 1).
In which the number of antennas N of BobBFor example, if the key symbol is mapped to the antenna vector under 2 condition, if N isB2, N is 1, then K is 2, and all possible antenna combinations E are represented as:
Figure BDA0002612271130000042
where the first column vector E of E1A 1 in Bob indicates the first antenna to activate Bob, a 0 indicates the second antenna to deactivate Bob, and so on.
Alice transmits a symbol stream s ═(s) with w (e) precoding1,..,sN)。
Alice sends m different symbol streams s by W (e)1,s2,....smThen each Bob receives the m-frame symbol stream y separately1,y2,....ymEach Bob receives a signal N at a timeBDimension vector
Figure BDA0002612271130000043
Each Bob receives the signal y according to itself1,y2,....ymThe key symbol k coming out of the current one is observed.
Each Bob independently demodulates m frames S according to the antenna corresponding to the coordinates of N nonzero elements in e observed in S7 by each Bob1,s2,....smCommunication data symbol
Figure BDA0002612271130000044
Completing the communication, wherein:
Figure BDA0002612271130000045
repeating the communication and key distribution process according to the formula until each Bob obtains a key with L bit length according to the maximum likelihood decoding algorithm
Figure BDA0002612271130000051
And B, respectively confirming the key consistency of Bob and Alice, and if the key of Bob is consistent with the key shared by Alice, finishing the key sharing.
Further, the parameters of the key symbol stream satisfy the following relationship: bob selects the required number of receiving antennas NBThe number N of communication data modulation symbol streams transmitted simultaneously with Alice, wherein N is more than or equal to 1 and less than or equal to NB-1 such that:
Figure BDA0002612271130000052
then
K={0,1,2…,Nk-1}。
Further, Alice obtains the candidate precoding space W according to the following processing:
Figure BDA0002612271130000053
Figure BDA0002612271130000054
and according to the number of the receiving antennas of each Bob, the Alice divides the column corresponding to the W into corresponding spaces. The specific process comprises the following steps: and Alice calculates a right pseudo-inverse matrix according to the channel, and then normalizes each column vector of the right pseudo-inverse matrix to obtain an alternative pre-coding spatial matrix.
Further, said W (K)i) The number of columns in (E) (K +1) corresponding to non-zero is W (E):
W(ei)=W(Ki)E(:,K+1)
alice sends each W (e)i) Combined into W (e) ═ W (e)1),....,W(eN)]。
Further, observing the key symbol k includes two methods: SPN-based observation methods and SNR-based observation methods; the observation method based on the SPN comprises the following steps: each Bob directly measures the m-frame symbol-averaged signal-plus-noise strength SPN for each antenna as follows:
Figure BDA0002612271130000055
if the modulation is real signal modulation, such as BPSK, the real part of the received signal can be directly selected for measurement, and Bob selects the largest N αiThe subscript is the position corresponding to the nonzero element in the e; after Bob observes e, the observed key symbol K and the observed key bit are obtained according to e
Figure BDA0002612271130000061
The SNR-based method is as follows: bob directly measures the average SNR of the M-frame symbols of each antenna, specifically, different SNR estimation methods can be adopted, N SNR antennas with the largest SNR are selected in the M2M4SNR estimation method bit sequence, and the subscript is the position corresponding to the nonzero element in e. For example, when N ═ 1
Figure BDA0002612271130000062
Figure BDA0002612271130000063
Bob thus gets the observed e, and then gets the observed key symbol K and key bits from e
Figure BDA0002612271130000064
The invention embeds the key generation process into the broadcast communication process through the multi-user random zero forcing technology, realizes the simultaneous distribution of the keys of the multi-user physical layer in the broadcast communication process, ensures that the key sharing does not cause the interruption and the time delay of the multi-user network communication, and always ensures that the data transmission of the multi-user is not interrupted in the key generation process. Both sides of the key distribution only need to carry out one-way pilot frequency transmission without carrying out pilot frequency mutual transmission; in the key distribution process, the two parties do not need to carry out key quantization, negotiation and privacy amplification, so that the two parties do not need to carry out multiple interactive negotiations related to the process on a public channel; the hidden danger of information leakage is avoided. Therefore, the invention has good technical, performance and cost advantages.
The foregoing shows and describes the general principles and features of the present invention, together with the advantages thereof. It will be understood by those skilled in the art that the present invention is not limited to the embodiments described above, which are described in the specification and illustrated only to illustrate the principle of the present invention, but that various changes and modifications may be made therein without departing from the spirit and scope of the present invention, which should fall within the scope of the claimed invention. The scope of the invention is defined by the appended claims and equivalents thereof.

Claims (6)

1. A method for simultaneous distribution of keys to a multi-user physical layer and broadcast communication, comprising the steps of:
s1: random generation of secret message b of binary system by Alicek=(bk1,bk2,...,bkN) The key bits distributed to each Bob are separately paired, where each b shareki,i=1,2,...,N MS=log2M contains bits MSThe constellation signal order of the modulation scheme used by each Bob;
s2: alice will bkEvery M inSMapping bits to a key symbol stream K ═ K (K)1,K2,..,KN) ∈ K, selecting different columns in E as selection reference for sending precoding of different Bobs according to the value of K;
s3: each Bob sends a pilot frequency sequence to Alice in turn, and the Alice estimates an uplink equivalent channel HBAAnd transposes to obtain the downlink channel
Figure FDA0002612271120000011
Wherein HAB=[HAB,1;HAB,2]Corresponding to the channels from Alice to each Bob;
s4: alice selects its W (K) for each Bobi) The number of columns W (E) in (1) corresponding to non-zero columns in E (: K);
s5: alice sends m different symbol streams s by W (e)1,s2,....smThen each Bob receives the m-frame symbol stream y separately1,y2,....ymEach Bob receives a signal N at a timeBDimension vector
Figure FDA0002612271120000012
Each Bob receives the signal y according to itself1,y2,....ymObserving the self-current key symbol k;
s6: each Bob is according toIndependently demodulating m frames S under the antenna corresponding to the N nonzero element coordinates observed in S71,s2,....smCommunication data symbol
Figure FDA0002612271120000013
Completing the communication, wherein:
Figure FDA0002612271120000014
s7: the above communication and key distribution process is repeated until each Bob has obtained a key of L bits length
Figure FDA0002612271120000015
And B, respectively confirming the key consistency of Bob and Alice, and if the key of Bob is consistent with the key shared by Alice, finishing the key sharing.
2. The method of claim 1, wherein the parameters of the key symbol stream in step S2 satisfy the following relationship: bob selects the required number of receiving antennas NBThe number N of communication data modulation symbol streams transmitted simultaneously with Alice, wherein N is more than or equal to 1 and less than or equal to NB-1 such that:
Figure FDA0002612271120000016
MS=log2(NK),
then
K={0,1,2…,Nk-1}。
3. The method according to claim 1, wherein in step S3, Alice obtains the candidate precoding space W according to the following process:
Figure FDA0002612271120000021
Figure FDA0002612271120000022
and according to the number of the receiving antennas of each Bob, the Alice divides the column corresponding to the W into corresponding spaces. Taking the number of Bob as 2 as an example, W is divided into two spaces corresponding to Bob1 and Bob2
Figure FDA0002612271120000023
4. The method of claim 1, wherein the step S4 is executed in a manner that the key distribution of the physical layer of multiple users is executed simultaneously with the broadcast communication
The W (K)i) The number of columns in (E) (K +1) corresponding to non-zero is W (E):
W(ei)=W(Ki)E(:,K+1),
alice sends each W (e)i) Combined into W (e) ═ W (e)1),....,W(eN)]。
5. The method of claim 1, wherein observing the key symbol k in step S5 comprises two methods: SPN-based observation methods and SNR-based observation methods; the observation method based on the SPN comprises the following steps: each Bob directly measures the m-frame symbol-averaged signal-plus-noise strength SPN for each antenna as follows:
Figure FDA0002612271120000024
if the modulation is real signal modulation, such as BPSK, the real part of the received signal can be directly selected for measurement, and Bob selects the largest N αiThe subscript is the position corresponding to the nonzero element in the e; after Bob observes e, the observed key symbol K and the observed key bit are obtained according to e
Figure FDA0002612271120000025
The SNR-based method is as follows: bob directly measures the average SNR of the M-frame symbols of each antenna, and specifically, different SNR estimation methods can be adopted, N SNR antennas with the largest SNR are selected in the M2M4SNR estimation method bit sequence, and the subscript of the N SNR antennas is the position corresponding to the nonzero element in e. Bob thus gets the observed e, and then gets the observed key symbol K and key bits from e
Figure FDA0002612271120000026
6. The method of claim 1, further comprising step S0, wherein each Bob determines to Alice the number of receive antennas it uses and the number of transmit symbol streams it needs.
CN202010758177.3A 2019-12-27 2020-07-31 Method for simultaneously distributing key of multi-user physical layer and broadcasting communication Active CN111711518B (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN2019113882722 2019-12-27
CN201911388272 2019-12-27

Publications (2)

Publication Number Publication Date
CN111711518A true CN111711518A (en) 2020-09-25
CN111711518B CN111711518B (en) 2021-12-10

Family

ID=72548173

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010758177.3A Active CN111711518B (en) 2019-12-27 2020-07-31 Method for simultaneously distributing key of multi-user physical layer and broadcasting communication

Country Status (1)

Country Link
CN (1) CN111711518B (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU3275197A (en) * 1996-06-28 1998-01-21 Hitachi Limited Key distribution method and key distribution system in broadcast cipher communication
US20140129835A1 (en) * 2012-11-05 2014-05-08 Qualcomm Incorporated Optimizing offline message (network history) delivery for users accessing an application from a single device
CN105515625A (en) * 2015-12-06 2016-04-20 西安电子科技大学 Multi-user downlink transmission method based on spatial modulation of receiving end
CN105897323A (en) * 2016-04-06 2016-08-24 电子科技大学 Spatial modulation and upper-layer key stream-based MIMO cross-layer secure communication system and method
CN109588059A (en) * 2016-05-13 2019-04-05 瑞典爱立信有限公司 The network architecture, method and apparatus for cordless communication network
CN109588064A (en) * 2016-05-13 2019-04-05 瑞典爱立信有限公司 The network architecture, method and apparatus for cordless communication network
CN109861783A (en) * 2019-03-26 2019-06-07 哈尔滨工业大学 A kind of safety of physical layer method based on artifact power's distribution
CN110572872A (en) * 2019-09-05 2019-12-13 华北电力大学(保定) Secret capacity calculation method and optimization method of double-medium untrusted relay system
CN111082933A (en) * 2019-12-27 2020-04-28 电子科技大学 Multi-user physical layer safety communication method capable of resisting any plurality of cooperation eavesdroppers

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU3275197A (en) * 1996-06-28 1998-01-21 Hitachi Limited Key distribution method and key distribution system in broadcast cipher communication
US20140129835A1 (en) * 2012-11-05 2014-05-08 Qualcomm Incorporated Optimizing offline message (network history) delivery for users accessing an application from a single device
CN105515625A (en) * 2015-12-06 2016-04-20 西安电子科技大学 Multi-user downlink transmission method based on spatial modulation of receiving end
CN105897323A (en) * 2016-04-06 2016-08-24 电子科技大学 Spatial modulation and upper-layer key stream-based MIMO cross-layer secure communication system and method
CN109588059A (en) * 2016-05-13 2019-04-05 瑞典爱立信有限公司 The network architecture, method and apparatus for cordless communication network
CN109588064A (en) * 2016-05-13 2019-04-05 瑞典爱立信有限公司 The network architecture, method and apparatus for cordless communication network
CN109861783A (en) * 2019-03-26 2019-06-07 哈尔滨工业大学 A kind of safety of physical layer method based on artifact power's distribution
CN110572872A (en) * 2019-09-05 2019-12-13 华北电力大学(保定) Secret capacity calculation method and optimization method of double-medium untrusted relay system
CN111082933A (en) * 2019-12-27 2020-04-28 电子科技大学 Multi-user physical layer safety communication method capable of resisting any plurality of cooperation eavesdroppers

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
唐杰: "未来无线通信中基于物理信道的安全技术研究", 《中国博士学位论文全文数据库 信息科技辑》 *
潘绯: "基于物理特征的认证及恶意节点检测研究", 《中国博士学位论文全文数据库 信息科技辑》 *
程伟等: "基于USRP与OFDM信道响应的密钥提取实现", 《通信技术》 *

Also Published As

Publication number Publication date
CN111711518B (en) 2021-12-10

Similar Documents

Publication Publication Date Title
Xiong et al. Secure transmission against pilot spoofing attack: A two-way training-based scheme
US9876655B2 (en) Precoding-codebook-based secure uplink in LTE
Trappe The challenges facing physical layer security
Jiang et al. Secrecy-enhancing scheme for spatial modulation
Melki et al. An efficient OFDM-based encryption scheme using a dynamic key approach
CN111082933B (en) Multi-user physical layer safety communication method capable of resisting any plurality of cooperation eavesdroppers
Qin et al. Exploiting multi-antenna non-reciprocal channels for shared secret key generation
CN106685639B (en) Sequence cipher encryption safe transmission method based on artificial noise addition in 5G communication system
Osorio et al. Safeguarding MTC at the physical layer: Potentials and challenges
US11483704B2 (en) Physical layer secure communication against an eavesdropper with arbitrary number of eavesdropping antennas
Zhang et al. Design of an efficient OFDMA-based multi-user key generation protocol
Li et al. Asymmetric physical layer encryption for wireless communications
Tang et al. Sharing secrets via wireless broadcasting: A new efficient physical layer group secret key generation for multiple IoT devices
CN110176952B (en) Antenna selection method in secure spatial modulation network
Xie et al. Privacy-preserving physical-layer authentication for non-orthogonal multiple access systems
Liang et al. Physical layer security in broadcast networks
Basciftci et al. Physical layer security in massive MIMO
CN111711518B (en) Method for simultaneously distributing key of multi-user physical layer and broadcasting communication
CN111934863B (en) Key sharing method based on artificial noise and security coding in edge calculation
CN111726221B (en) Physical layer safety transmission method capable of resisting arbitrary eavesdropping antenna number
CN111786789B (en) Physical layer key distribution method based on random wave beam and edge calculation
CN113132086B (en) Method for simultaneously realizing physical layer key distribution in communication process
Din et al. Multiple antenna physical layer security against passive eavesdroppers: A tutorial
Efstathiou et al. Enhancement of transmission security for OFDM based systems
Wang et al. An artificial noise assisted secrecy-enhancing scheme for space–time shift keying systems

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant