CN111711518A - Method for simultaneously distributing key of multi-user physical layer and broadcasting communication - Google Patents
Method for simultaneously distributing key of multi-user physical layer and broadcasting communication Download PDFInfo
- Publication number
- CN111711518A CN111711518A CN202010758177.3A CN202010758177A CN111711518A CN 111711518 A CN111711518 A CN 111711518A CN 202010758177 A CN202010758177 A CN 202010758177A CN 111711518 A CN111711518 A CN 111711518A
- Authority
- CN
- China
- Prior art keywords
- bob
- key
- alice
- symbol
- snr
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/02—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
- H04B7/04—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
- H04B7/0413—MIMO systems
- H04B7/0456—Selection of precoding matrices or codebooks, e.g. using matrices antenna weighting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/02—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
- H04B7/04—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
- H04B7/08—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the receiving station
- H04B7/0837—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the receiving station using pre-detection combining
- H04B7/0842—Weighted combining
- H04B7/0848—Joint weighting
- H04B7/0857—Joint weighting using maximum ratio combining techniques, e.g. signal-to- interference ratio [SIR], received signal strenght indication [RSS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/085—Secret sharing or secret splitting, e.g. threshold schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Mobile Radio Communication Systems (AREA)
- Radio Transmission System (AREA)
Abstract
The invention discloses a method for simultaneously distributing keys of a multi-user physical layer and carrying out broadcast communication, which comprises the following steps: alice randomly generates different key bits corresponding to N Bobs, and respectively maps the different key bits into key symbols, wherein each key symbol corresponds to a vector for activating different receiving antennas of each Bob; alice selects precoding of the key symbols of each Bob corresponding to the activation vectors, and broadcasts communication data symbols to N Bobs by using a precoding matrix; each Bob independently measures the average signal reception intensity or SNR estimation antenna vector of each antenna of the Bob, and obtains a key symbol and a key bit of the Bob through inverse mapping; each Bob independently demodulates the data symbols of the broadcast communication at its active antenna through the observed antenna vector. The invention embeds the key generation process into the broadcast communication process through the multi-user random zero forcing technology, realizes the simultaneous distribution of the keys of the multi-user physical layer in the broadcast communication process, ensures that the key sharing does not cause the interruption and the time delay of the multi-user network communication, and has good technical, performance and cost advantages.
Description
Technical Field
The invention relates to the field of encrypted information, in particular to a method for simultaneously distributing keys of a multi-user physical layer and carrying out broadcast communication.
Background
With the rapid development of the 5G Internet of things and the edge computing network, a large number of novel services and applications are continuously emerging. Various confidential and sensitive data and the like in a wireless network are increased in a massive manner, the problem of information security is more and more prominent, and the security is gradually becoming a precondition for various different service applications. In a conventional wireless communication network, cryptography-based encryption technology is generally used at the network layer and the upper layer to secure system communication. Performing various cryptographic authentications requires establishing a secure shared key between the communicating parties. In a large number of novel application scenarios of the 5G network, such as a large-scale IoT network and an edge computing network, a large number of resource-limited sensing nodes are accessed, so that the complexity of key distribution and management based on cryptography is extremely high and even difficult to implement. The key generation and distribution technology based on the physical channel has the basic principle that the keys among legal users are generated and distributed by utilizing the randomness and the reciprocity of fading channels, and under the environment with rich multipath scattering, if an attacker is more than 1-2 physical signal wavelengths away from the legal users, the key information of the legal users cannot be presumed.
Currently, there are some preliminary research results on physical layer key generation, but current physical layer key technology mainly implements how to generate a shared key between a pair or a group of users. However, in practical applications, it is most often the case that one central node (e.g., a base station, an edge computing central node, etc.) needs to distribute different keys to a plurality of different users or nodes to establish secure communication between each user and the central node. If the existing method is used to distribute keys to each user one by one, there is a high requirement on the speed of generating a single key, because there are a large number of nodes accessing and leaving the network in the dynamic network, so that the central node needs to update and distribute keys frequently. The key distribution rate of the current method is highly dependent on how fast the channel changes. Experiments verify that a typical physical layer key distribution system with 3 transmit-receive antennas reaches below 10 in indoor channels-2Key error rates of the order of magnitude it takes 10 seconds or more to establish a 128 bit length AES symmetric encryption key. In the current method, a normal communication process and key distribution cannot be performed simultaneously, so that in an environment where different keys need to be shared by multiple users, communication interruption or delay increase is inevitably caused.
Disclosure of Invention
The present invention is directed to solve the above problems, and an object of the present invention is to provide a method for performing key distribution of a multi-user physical layer simultaneously with broadcast communication.
A method of multi-user physical layer key distribution concurrent with broadcast communication, comprising:
each Bob determines to Alice the number of receive antennas it uses and the number of transmit symbol streams it needs.
Random generation of secret message b of binary system by Alicek=(bk1,bk2,...,bkN) The key bits distributed to each Bob are separately paired, where each b shareki,i=1,2,...,N MS=log2M contains bits MSThe constellation signal order of the modulation scheme used by each Bob.
Alice will bkEvery M inSMapping bits to a key symbol stream K ═ K (K)1,K2,..,KN) ∈ K, and according to the value of K, selecting different columns in E as selection references for sending precoding of different Bobs.
Each Bob sends a pilot frequency sequence to Alice in turn, and the Alice estimates an uplink equivalent channel HBAAnd transposes to obtain the downlink channelWherein HAB=[HAB,1;HAB,2]Corresponding to the channel from Alice to each Bob.
Alice selects its W (K) for each Bobi) Corresponding to the number of non-zero columns W (E) in E (: K + 1).
Alice sends m different symbol streams s by W (e)1,s2,....smThen each Bob receives the m-frame symbol stream y separately1,y2,....ymEach Bob receives a signal N at a timeBDimension vectorEach Bob receives the signal y according to itself1,y2,....ymThe key symbol k coming out of the current one is observed.
Each Bob independently demodulates m frames S according to the antenna corresponding to the coordinates of N nonzero elements in e observed in S7 by each Bob1,s2,....smCommunication data symbolCompleting the communication, wherein:
the above communication and key distribution process is repeated until each Bob has obtained a key of L bits lengthAnd B, respectively confirming the key consistency of Bob and Alice, and if the key of Bob is consistent with the key shared by Alice, finishing the key sharing.
Further, the parameters of the key symbol stream satisfy the following relationship: bob selects the required number of receiving antennas NBThe number N of communication data modulation symbol streams transmitted simultaneously with Alice, wherein N is more than or equal to 1 and less than or equal to NB-1 such that:
then
K={0,1,2…,Nk-1}。
Further, Alice obtains the candidate precoding space W according to the following processing:
and according to the number of the receiving antennas of each Bob, the Alice divides the column corresponding to the W into corresponding spaces.
Further, said W (K)i) The number of columns in (E) (K +1) corresponding to non-zero is W (E):
W(ei)=W(Ki)E(:,K+1)
alice sends each W (e)i) Combined into W (e) ═ W (e)1),....,W(eN)]。
Further, observing the key symbol k includes two methods: SPN-based observation methods and SNR-based observation methods; the observation method based on the SPN comprises the following steps: each Bob directly measures the m-frame symbol-averaged signal-plus-noise strength SPN for each antenna as follows:
if the modulation is real signal modulation, such as BPSK, the real part of the received signal can be directly selected for measurement, and Bob selects the largest N αiThe subscript is the position corresponding to the nonzero element in the e; after Bob observes e, the observed key symbol K and the observed key bit are obtained according to eThe SNR-based method is as follows: bob directly measures the average SNR of the M-frame symbols of each antenna, specifically, different SNR estimation methods can be adopted, N SNR antennas with the largest SNR are selected in the M2M4SNR estimation method bit sequence, and the subscript is the position corresponding to the nonzero element in e. Bob thus gets the observed e, and then gets the observed key symbol K and key bits from e
The invention has the following advantages: the key generation process is embedded into the broadcast communication process through a multi-user random zero forcing technology, so that the key distribution of a multi-user physical layer is realized simultaneously in the broadcast communication process, the key sharing cannot cause the interruption and the time delay of multi-user network communication, and the data transmission of multiple users cannot be interrupted all the time in the key generation process; low overhead: both sides of the key distribution of the invention only need to send the unidirectional pilot frequency, do not need to send the pilot frequency each other; the method has low complexity and high safety, and the key distribution process of the invention does not need both parties to carry out key quantization, negotiation and privacy amplification, so that both parties do not need to carry out multiple interactive negotiations related to the process on a public channel, and the hidden danger of information leakage is avoided.
Drawings
Figure 1 is a flow chart of a method for simultaneous distribution of keys to a multi-user physical layer and broadcast communication.
Fig. 2 is a diagram of a model of a method for simultaneous distribution of keys of a multi-user physical layer and broadcast communication.
Detailed Description
In order to more clearly understand the technical features, objects, and effects of the present invention, embodiments of the present invention will now be described with reference to the accompanying drawings.
In this embodiment, a method for performing multi-user physical layer key distribution and broadcast communication simultaneously includes:
each Bob determines to Alice the number of receive antennas it uses and the number of transmit symbol streams it needs.
Random generation of secret message b of binary system by Alicek=(bk1,bk2,...,bkN) The key bits distributed to each Bob are separately paired, where each b shareki,i=1,2,...,N MS=log2M contains bits MSThe constellation signal order of the modulation scheme used by each Bob.
Alice will bkEvery M inSMapping bits to a key symbol stream K ═ K (K)1,K2,..,KN) ∈ K, and according to the value of K, selecting different columns in E as selection references for sending precoding of different Bobs.
Each Bob sends a pilot frequency sequence to Alice in turn, and the Alice estimates an uplink equivalent channel HBAAnd transposes to obtain the downlink channelWherein HAB=[HAB,1;HAB,2]Corresponding to the channel from Alice to each Bob.
Alice selects its W (K) for each Bobi) Corresponding to the number of non-zero columns W (E) in E (: K + 1).
In which the number of antennas N of BobBFor example, if the key symbol is mapped to the antenna vector under 2 condition, if N isB2, N is 1, then K is 2, and all possible antenna combinations E are represented as:
where the first column vector E of E1A 1 in Bob indicates the first antenna to activate Bob, a 0 indicates the second antenna to deactivate Bob, and so on.
Alice transmits a symbol stream s ═(s) with w (e) precoding1,..,sN)。
Alice sends m different symbol streams s by W (e)1,s2,....smThen each Bob receives the m-frame symbol stream y separately1,y2,....ymEach Bob receives a signal N at a timeBDimension vectorEach Bob receives the signal y according to itself1,y2,....ymThe key symbol k coming out of the current one is observed.
Each Bob independently demodulates m frames S according to the antenna corresponding to the coordinates of N nonzero elements in e observed in S7 by each Bob1,s2,....smCommunication data symbolCompleting the communication, wherein:
repeating the communication and key distribution process according to the formula until each Bob obtains a key with L bit length according to the maximum likelihood decoding algorithmAnd B, respectively confirming the key consistency of Bob and Alice, and if the key of Bob is consistent with the key shared by Alice, finishing the key sharing.
Further, the parameters of the key symbol stream satisfy the following relationship: bob selects the required number of receiving antennas NBThe number N of communication data modulation symbol streams transmitted simultaneously with Alice, wherein N is more than or equal to 1 and less than or equal to NB-1 such that:
then
K={0,1,2…,Nk-1}。
Further, Alice obtains the candidate precoding space W according to the following processing:
and according to the number of the receiving antennas of each Bob, the Alice divides the column corresponding to the W into corresponding spaces. The specific process comprises the following steps: and Alice calculates a right pseudo-inverse matrix according to the channel, and then normalizes each column vector of the right pseudo-inverse matrix to obtain an alternative pre-coding spatial matrix.
Further, said W (K)i) The number of columns in (E) (K +1) corresponding to non-zero is W (E):
W(ei)=W(Ki)E(:,K+1)
alice sends each W (e)i) Combined into W (e) ═ W (e)1),....,W(eN)]。
Further, observing the key symbol k includes two methods: SPN-based observation methods and SNR-based observation methods; the observation method based on the SPN comprises the following steps: each Bob directly measures the m-frame symbol-averaged signal-plus-noise strength SPN for each antenna as follows:
if the modulation is real signal modulation, such as BPSK, the real part of the received signal can be directly selected for measurement, and Bob selects the largest N αiThe subscript is the position corresponding to the nonzero element in the e; after Bob observes e, the observed key symbol K and the observed key bit are obtained according to eThe SNR-based method is as follows: bob directly measures the average SNR of the M-frame symbols of each antenna, specifically, different SNR estimation methods can be adopted, N SNR antennas with the largest SNR are selected in the M2M4SNR estimation method bit sequence, and the subscript is the position corresponding to the nonzero element in e. For example, when N ═ 1
The invention embeds the key generation process into the broadcast communication process through the multi-user random zero forcing technology, realizes the simultaneous distribution of the keys of the multi-user physical layer in the broadcast communication process, ensures that the key sharing does not cause the interruption and the time delay of the multi-user network communication, and always ensures that the data transmission of the multi-user is not interrupted in the key generation process. Both sides of the key distribution only need to carry out one-way pilot frequency transmission without carrying out pilot frequency mutual transmission; in the key distribution process, the two parties do not need to carry out key quantization, negotiation and privacy amplification, so that the two parties do not need to carry out multiple interactive negotiations related to the process on a public channel; the hidden danger of information leakage is avoided. Therefore, the invention has good technical, performance and cost advantages.
The foregoing shows and describes the general principles and features of the present invention, together with the advantages thereof. It will be understood by those skilled in the art that the present invention is not limited to the embodiments described above, which are described in the specification and illustrated only to illustrate the principle of the present invention, but that various changes and modifications may be made therein without departing from the spirit and scope of the present invention, which should fall within the scope of the claimed invention. The scope of the invention is defined by the appended claims and equivalents thereof.
Claims (6)
1. A method for simultaneous distribution of keys to a multi-user physical layer and broadcast communication, comprising the steps of:
s1: random generation of secret message b of binary system by Alicek=(bk1,bk2,...,bkN) The key bits distributed to each Bob are separately paired, where each b shareki,i=1,2,...,N MS=log2M contains bits MSThe constellation signal order of the modulation scheme used by each Bob;
s2: alice will bkEvery M inSMapping bits to a key symbol stream K ═ K (K)1,K2,..,KN) ∈ K, selecting different columns in E as selection reference for sending precoding of different Bobs according to the value of K;
s3: each Bob sends a pilot frequency sequence to Alice in turn, and the Alice estimates an uplink equivalent channel HBAAnd transposes to obtain the downlink channelWherein HAB=[HAB,1;HAB,2]Corresponding to the channels from Alice to each Bob;
s4: alice selects its W (K) for each Bobi) The number of columns W (E) in (1) corresponding to non-zero columns in E (: K);
s5: alice sends m different symbol streams s by W (e)1,s2,....smThen each Bob receives the m-frame symbol stream y separately1,y2,....ymEach Bob receives a signal N at a timeBDimension vectorEach Bob receives the signal y according to itself1,y2,....ymObserving the self-current key symbol k;
s6: each Bob is according toIndependently demodulating m frames S under the antenna corresponding to the N nonzero element coordinates observed in S71,s2,....smCommunication data symbolCompleting the communication, wherein:
2. The method of claim 1, wherein the parameters of the key symbol stream in step S2 satisfy the following relationship: bob selects the required number of receiving antennas NBThe number N of communication data modulation symbol streams transmitted simultaneously with Alice, wherein N is more than or equal to 1 and less than or equal to NB-1 such that:
then
K={0,1,2…,Nk-1}。
3. The method according to claim 1, wherein in step S3, Alice obtains the candidate precoding space W according to the following process:
and according to the number of the receiving antennas of each Bob, the Alice divides the column corresponding to the W into corresponding spaces. Taking the number of Bob as 2 as an example, W is divided into two spaces corresponding to Bob1 and Bob2
4. The method of claim 1, wherein the step S4 is executed in a manner that the key distribution of the physical layer of multiple users is executed simultaneously with the broadcast communication
The W (K)i) The number of columns in (E) (K +1) corresponding to non-zero is W (E):
W(ei)=W(Ki)E(:,K+1),
alice sends each W (e)i) Combined into W (e) ═ W (e)1),....,W(eN)]。
5. The method of claim 1, wherein observing the key symbol k in step S5 comprises two methods: SPN-based observation methods and SNR-based observation methods; the observation method based on the SPN comprises the following steps: each Bob directly measures the m-frame symbol-averaged signal-plus-noise strength SPN for each antenna as follows:
if the modulation is real signal modulation, such as BPSK, the real part of the received signal can be directly selected for measurement, and Bob selects the largest N αiThe subscript is the position corresponding to the nonzero element in the e; after Bob observes e, the observed key symbol K and the observed key bit are obtained according to eThe SNR-based method is as follows: bob directly measures the average SNR of the M-frame symbols of each antenna, and specifically, different SNR estimation methods can be adopted, N SNR antennas with the largest SNR are selected in the M2M4SNR estimation method bit sequence, and the subscript of the N SNR antennas is the position corresponding to the nonzero element in e. Bob thus gets the observed e, and then gets the observed key symbol K and key bits from e
6. The method of claim 1, further comprising step S0, wherein each Bob determines to Alice the number of receive antennas it uses and the number of transmit symbol streams it needs.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2019113882722 | 2019-12-27 | ||
CN201911388272 | 2019-12-27 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111711518A true CN111711518A (en) | 2020-09-25 |
CN111711518B CN111711518B (en) | 2021-12-10 |
Family
ID=72548173
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010758177.3A Active CN111711518B (en) | 2019-12-27 | 2020-07-31 | Method for simultaneously distributing key of multi-user physical layer and broadcasting communication |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111711518B (en) |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
AU3275197A (en) * | 1996-06-28 | 1998-01-21 | Hitachi Limited | Key distribution method and key distribution system in broadcast cipher communication |
US20140129835A1 (en) * | 2012-11-05 | 2014-05-08 | Qualcomm Incorporated | Optimizing offline message (network history) delivery for users accessing an application from a single device |
CN105515625A (en) * | 2015-12-06 | 2016-04-20 | 西安电子科技大学 | Multi-user downlink transmission method based on spatial modulation of receiving end |
CN105897323A (en) * | 2016-04-06 | 2016-08-24 | 电子科技大学 | Spatial modulation and upper-layer key stream-based MIMO cross-layer secure communication system and method |
CN109588059A (en) * | 2016-05-13 | 2019-04-05 | 瑞典爱立信有限公司 | The network architecture, method and apparatus for cordless communication network |
CN109588064A (en) * | 2016-05-13 | 2019-04-05 | 瑞典爱立信有限公司 | The network architecture, method and apparatus for cordless communication network |
CN109861783A (en) * | 2019-03-26 | 2019-06-07 | 哈尔滨工业大学 | A kind of safety of physical layer method based on artifact power's distribution |
CN110572872A (en) * | 2019-09-05 | 2019-12-13 | 华北电力大学(保定) | Secret capacity calculation method and optimization method of double-medium untrusted relay system |
CN111082933A (en) * | 2019-12-27 | 2020-04-28 | 电子科技大学 | Multi-user physical layer safety communication method capable of resisting any plurality of cooperation eavesdroppers |
-
2020
- 2020-07-31 CN CN202010758177.3A patent/CN111711518B/en active Active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
AU3275197A (en) * | 1996-06-28 | 1998-01-21 | Hitachi Limited | Key distribution method and key distribution system in broadcast cipher communication |
US20140129835A1 (en) * | 2012-11-05 | 2014-05-08 | Qualcomm Incorporated | Optimizing offline message (network history) delivery for users accessing an application from a single device |
CN105515625A (en) * | 2015-12-06 | 2016-04-20 | 西安电子科技大学 | Multi-user downlink transmission method based on spatial modulation of receiving end |
CN105897323A (en) * | 2016-04-06 | 2016-08-24 | 电子科技大学 | Spatial modulation and upper-layer key stream-based MIMO cross-layer secure communication system and method |
CN109588059A (en) * | 2016-05-13 | 2019-04-05 | 瑞典爱立信有限公司 | The network architecture, method and apparatus for cordless communication network |
CN109588064A (en) * | 2016-05-13 | 2019-04-05 | 瑞典爱立信有限公司 | The network architecture, method and apparatus for cordless communication network |
CN109861783A (en) * | 2019-03-26 | 2019-06-07 | 哈尔滨工业大学 | A kind of safety of physical layer method based on artifact power's distribution |
CN110572872A (en) * | 2019-09-05 | 2019-12-13 | 华北电力大学(保定) | Secret capacity calculation method and optimization method of double-medium untrusted relay system |
CN111082933A (en) * | 2019-12-27 | 2020-04-28 | 电子科技大学 | Multi-user physical layer safety communication method capable of resisting any plurality of cooperation eavesdroppers |
Non-Patent Citations (3)
Title |
---|
唐杰: "未来无线通信中基于物理信道的安全技术研究", 《中国博士学位论文全文数据库 信息科技辑》 * |
潘绯: "基于物理特征的认证及恶意节点检测研究", 《中国博士学位论文全文数据库 信息科技辑》 * |
程伟等: "基于USRP与OFDM信道响应的密钥提取实现", 《通信技术》 * |
Also Published As
Publication number | Publication date |
---|---|
CN111711518B (en) | 2021-12-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Xiong et al. | Secure transmission against pilot spoofing attack: A two-way training-based scheme | |
US9876655B2 (en) | Precoding-codebook-based secure uplink in LTE | |
Trappe | The challenges facing physical layer security | |
Jiang et al. | Secrecy-enhancing scheme for spatial modulation | |
Melki et al. | An efficient OFDM-based encryption scheme using a dynamic key approach | |
CN111082933B (en) | Multi-user physical layer safety communication method capable of resisting any plurality of cooperation eavesdroppers | |
Qin et al. | Exploiting multi-antenna non-reciprocal channels for shared secret key generation | |
CN106685639B (en) | Sequence cipher encryption safe transmission method based on artificial noise addition in 5G communication system | |
Osorio et al. | Safeguarding MTC at the physical layer: Potentials and challenges | |
US11483704B2 (en) | Physical layer secure communication against an eavesdropper with arbitrary number of eavesdropping antennas | |
Zhang et al. | Design of an efficient OFDMA-based multi-user key generation protocol | |
Li et al. | Asymmetric physical layer encryption for wireless communications | |
Tang et al. | Sharing secrets via wireless broadcasting: A new efficient physical layer group secret key generation for multiple IoT devices | |
CN110176952B (en) | Antenna selection method in secure spatial modulation network | |
Xie et al. | Privacy-preserving physical-layer authentication for non-orthogonal multiple access systems | |
Liang et al. | Physical layer security in broadcast networks | |
Basciftci et al. | Physical layer security in massive MIMO | |
CN111711518B (en) | Method for simultaneously distributing key of multi-user physical layer and broadcasting communication | |
CN111934863B (en) | Key sharing method based on artificial noise and security coding in edge calculation | |
CN111726221B (en) | Physical layer safety transmission method capable of resisting arbitrary eavesdropping antenna number | |
CN111786789B (en) | Physical layer key distribution method based on random wave beam and edge calculation | |
CN113132086B (en) | Method for simultaneously realizing physical layer key distribution in communication process | |
Din et al. | Multiple antenna physical layer security against passive eavesdroppers: A tutorial | |
Efstathiou et al. | Enhancement of transmission security for OFDM based systems | |
Wang et al. | An artificial noise assisted secrecy-enhancing scheme for space–time shift keying systems |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |