CN111917527A - Industrial internet covert communication system based on 5G NR carrier aggregation and communication method thereof - Google Patents

Industrial internet covert communication system based on 5G NR carrier aggregation and communication method thereof Download PDF

Info

Publication number
CN111917527A
CN111917527A CN202010484625.5A CN202010484625A CN111917527A CN 111917527 A CN111917527 A CN 111917527A CN 202010484625 A CN202010484625 A CN 202010484625A CN 111917527 A CN111917527 A CN 111917527A
Authority
CN
China
Prior art keywords
data
carrier
industrial
carrier aggregation
confidential
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010484625.5A
Other languages
Chinese (zh)
Other versions
CN111917527B (en
Inventor
王茗倩
王云良
顾卫杰
邵春旺
任佳红
施天意
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Changzhou Vocational Institute of Mechatronic Technology
Original Assignee
Changzhou Vocational Institute of Mechatronic Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Changzhou Vocational Institute of Mechatronic Technology filed Critical Changzhou Vocational Institute of Mechatronic Technology
Priority to CN202010484625.5A priority Critical patent/CN111917527B/en
Publication of CN111917527A publication Critical patent/CN111917527A/en
Application granted granted Critical
Publication of CN111917527B publication Critical patent/CN111917527B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L5/00Arrangements affording multiple use of the transmission path
    • H04L5/0001Arrangements for dividing the transmission path
    • H04L5/0003Two-dimensional division
    • H04L5/0005Time-frequency
    • H04L5/0007Time-frequency the frequencies being orthogonal, e.g. OFDM(A), DMT
    • H04L5/001Time-frequency the frequencies being orthogonal, e.g. OFDM(A), DMT the frequencies being arranged in component carriers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L27/00Modulated-carrier systems
    • H04L27/0014Carrier regulation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/08Protocols for interworking; Protocol conversion

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses an industrial internet covert communication system based on 5G NR carrier aggregation and a communication method thereof. The invention relates to the technical field of network information security, and the system comprises: the system comprises an industrial field data acquisition device, a hidden communication sending terminal, a 5G network, a hidden communication receiving terminal and an industrial internet platform; the industrial field data acquisition unit acquires industrial data, the confidential data is filtered through the filter, the non-confidential data is obtained through filtering of the filter, edge processing is carried out on the non-confidential data, and the non-confidential data is sent to the 5G interface module; the encoder encodes the confidential data and the non-confidential data to obtain the steganographic data, and the steganographic data is transmitted to a steganographic communication receiving end through a 5G network; the demodulator demodulates the steganographic data to obtain secret-related data, and transmits the secret-related data to the cloud platform. The invention can obviously improve the anti-detection performance and the safety of the industrial internet covert communication system.

Description

Industrial internet covert communication system based on 5G NR carrier aggregation and communication method thereof
Technical Field
The invention relates to the technical field of network information security, in particular to an industrial internet covert communication system based on 5G NR carrier aggregation and a communication method thereof.
Background
The industrial internet is a ubiquitous network which connects people, data and machines, realizes acquisition, transmission and application of industrial data, realizes optimization of a production process and a management decision, and improves the efficiency of manufacturing resource allocation and management service. In the applications of product traceability, industrial equipment predictive maintenance and the like, most of the applications relate to important confidential industrial data such as core parameters, equipment running states and the like of the whole production process of the product. The data may be intercepted and stolen by competitors in the transmission process from the gateway of the industrial production site to the public/private cloud platform through an open wireless network such as Wifi, 4G/5G and the like, so that information leakage is caused. However, once leaked, industrial data, which is an important business secret for manufacturing enterprises, will cause the enterprises to suffer significant economic losses, affect the core competitiveness of the market, and even threaten survival and development.
Therefore, aiming at the security threat faced by industrial data, a covert communication technical means can be adopted to ensure the secure transmission of the industrial data. The network steganography is a type of covert communication technology which takes legal network data flow as a carrier for information hiding and adopts various ways to embed secret information into the legal network data flow. Traditional network steganography based on TCP/IP protocol can be mainly divided into two categories, namely storage type and time type. Storage steganography mainly utilizes redundancy of network protocols to embed secret information into a protocol header field or a data payload part. The method is simple and easy to implement, but the original default value or rule of the field is easy to change to cause abnormity, and most of the existing algorithms are disclosed, so that the detection of a steganalysis method is difficult to resist, and the concealment is lacked. Temporal steganography modulates secret information into the temporal attributes of a network data stream. The concealment of the method is improved compared with the storage method, but the method is easily interfered by network noises such as jitter, time delay, packet loss and the like, and the reliability of covert communication is difficult to ensure. Meanwhile, the introduction of synchronization mechanisms such as error correction coding and the like tends to increase the system overhead and complexity. Therefore, how to design a scientific and effective industrial internet covert communication system and a steganography method to ensure that confidential industrial data can be safely and reliably transmitted in an open wireless link becomes an important problem to be solved.
In recent years, a 5G wireless communication network based on a new generation nr (new radio) standard has the advantages of high data rate, low cost, low power consumption, ultra-low time delay, availability and the like, is gradually becoming a main transmission means of field data cloud in an industrial internet platform, and will be more comprehensively and widely applied in the future. Therefore, the 5G network becomes an emerging potential good carrier for covert communication of the industrial Internet.
Disclosure of Invention
The invention provides an industrial internet covert communication system based on 5G NR carrier aggregation and a communication method thereof for realizing industrial data encryption transmission, and the invention provides the following technical scheme:
an industrial internet covert communication system based on 5G NR carrier aggregation, the system comprising: the system comprises an industrial field data acquisition device, a hidden communication sending terminal, a 5G network, a hidden communication receiving terminal and an industrial internet platform;
the hidden communication sending end comprises a filter, a 5G interface module, an encoder and a carrier modulator; industrial data are transmitted to a filter by a data signal of the field data collector, non-confidential data are transmitted to a 5G interface module by the filter, the confidential data are transmitted to an encoder by the filter, a data signal output end of the 5G interface module is connected with the encoder, and NR carrier wave combined data are transmitted to a carrier wave modulator by the encoder;
the carrier modulator transmits the hidden write data stream to a hidden communication receiving end through a 5G network, the hidden communication receiving end comprises a demodulator, a decoder and a cloud platform, the demodulator receives the hidden write data stream, the demodulator transmits the NR subcarrier to the decoder, the decoder transmits the confidential industrial data to the cloud platform, and the industrial internet platform directly accesses the cloud platform.
Preferably, the covert communication sending end is located at an industrial internet platform gateway and performs edge processing and protocol interface conversion on data collected at an industrial site.
An industrial internet covert communication method based on 5G NR carrier aggregation comprises the following steps:
step 1, an industrial field data collector collects industrial data, and confidential data is filtered through a filter, wherein the confidential data comprises product core parameters and equipment state information;
step 2: filtering by a filter to obtain non-confidential data, performing edge processing on the non-confidential data, and sending the non-confidential data to a 5G interface module;
and step 3: the encoder encodes the confidential data and the non-confidential data, transmits the encoded data to different combinations of NR carrier aggregation of the carrier modulator to obtain the steganographic data, and transmits the steganographic data to the covert communication receiving end through a 5G network;
and 4, step 4: the demodulator demodulates the steganographic data to obtain the frequency band of each NR subcarrier, the decoder decodes the frequency band of each NR subcarrier to obtain secret-related data, and the secret-related data are transmitted to the cloud platform.
Preferably, the encoding of the confidential data and the non-confidential data by the encoder in the step 3 specifically includes:
step 3.1: dividing industrial secret-related data S into a plurality of data blocks S according to 4-bit sizeiS is represented by the formulai
Figure BDA0002518672940000021
Wherein n is the number of blocks, sijFor binary data taking the value 0 or 1, siContains 4-bit binary numbers;
step 3.2: dividing two different carrier frequency bands A and B into 8 sub-carrier frequency bands respectively, determining each sub-carrier bandwidth, and expressing each sub-carrier bandwidth by the following formula:
Figure BDA0002518672940000022
wherein, Δ fiDenotes the ith subcarrier CiBandwidth of fiIs the boundary frequency of each subcarrier;
step 3.3: will siModulation to different combinations of NR carrier aggregation
Figure BDA0002518672940000023
Obtaining an encoding function, which is expressed by the following formula:
Figure BDA0002518672940000031
wherein f isenFor the coding function, [ s ]i]dBlocking s for secret-related dataiDecimal form of (d); according to different scenarios of NR carrier aggregation, the following four cases can be specifically classified:
step 3.4: according to
Figure BDA0002518672940000032
Transmitting the data to different combinations of a carrier modulator for NR carrier aggregation through a 5G network to obtain steganographic data;
step 3.5: and (5) repeating the step 3.3 to the step 3.4 until all the industrial secret-related data are transmitted in blocks.
Preferably, according to different scenarios of NR carrier aggregation, the following four cases are specifically classified:
case 1: when [ s ]i]dWhen 0, the combination of the corresponding NR carrier aggregation is case0Selecting a single carrier C1
Case 2: when [ s ]i]dWhen 1, the combination of the corresponding NR carrier aggregation is case1The application scene of aggregation in the frequency band and continuous distribution of each subcarrier on the frequency domain is met, and the subcarrier C is selected1And C2
Case 3: when 2 is less than or equal to si]dWhen the sum is less than or equal to 7, the combination corresponding to NR carrier aggregation is case2~case7The application scenes of aggregation in the frequency band and discontinuous distribution of each subcarrier on the frequency domain are met, and the subcarriers C are respectively selected1And C2~C7
Case 4: when the ratio of s is less than or equal to 8i]dWhen the sum is less than or equal to 15, the combination corresponding to NR carrier aggregation is case8~case15That is, the subcarrier C is selected respectively according to the application scenario of aggregation between frequency bands and discontinuous distribution of each subcarrier on the frequency domain1And C8~C15
Preferably, the demodulation of the steganographic data by the demodulator in the step 4 specifically includes:
step 4.1: capturing covert communication data stream of a 5G physical layer through a covert communication receiving terminal;
step 4.2: identifying each NR carrier frequency in the steganographic data stream with a demodulator;
step 4.3: determining the sub-carrier frequency band C according to the NR carrier frequencymAnd obtaining a carrier combination, the band C being represented by the following formulamThe carrier combination of (2):
Figure BDA0002518672940000033
step 4.4: using a decoding function fdeRecovering secret-related data blocks
Figure BDA0002518672940000034
And converts it into binary data
Figure BDA0002518672940000035
The decoding process is represented by:
Figure BDA0002518672940000036
step 4.5: and (4) repeating the step 4.3 to the step 4.4 until all the industrial secret-related data are decoded.
The invention has the following beneficial effects:
the invention takes the 5G network as a carrier of industrial internet covert communication, and has the advantages of high data rate, low cost, low power consumption, ultra-low time delay, availability and the like. On the premise of ensuring that industrial field data is normally transmitted to the cloud, the invention modulates the confidential data in the data into the combination of the subcarriers according to the normal mode of NR carrier aggregation, does not directly modify the network protocol or the time attribute thereof, and can effectively resist the detection of various steganalysis methods. Therefore, the invention can obviously improve the anti-detection performance and the safety of the industrial Internet covert communication system.
Drawings
FIG. 1 is an industrial Internet covert communication system model based on a 5G network;
fig. 2 is a diagram of NR subcarrier division;
FIG. 3 is a diagram of a mapping relationship between industrial classified data blocks and NR subcarrier combinations;
FIG. 4 is an encoding flow diagram;
fig. 5 is a decoding flow chart.
Detailed Description
The present invention will be described in detail with reference to specific examples.
The first embodiment is as follows:
the invention designs a steganography method and a steganography system based on 5G carrier aggregation by taking a 5G network as a covert communication carrier in an industrial internet. When the carrier modulation link of the physical layer is implemented on industrial data, the secret-related data in the industrial data is modulated to different combinations of NR carrier aggregation, so that the transmission cloud of the industrial data is not influenced, and the normal mode of NR carrier aggregation is completely met. Because the invention does not directly modify the network protocol or the time attribute thereof, but utilizes the carrier modulation of the physical layer to implement steganography, the detection of the existing various steganography analysis methods can be effectively resisted. Therefore, the invention can provide an industrial internet covert communication technical means with strong concealment so as to ensure the safe transmission of industrial confidential data in an open wireless link.
The invention takes a 5G network as a carrier of industrial internet covert communication and designs a steganography method by utilizing a carrier aggregation function defined by NR standard. In the NR standard, it is specified that a plurality of carriers can be aggregated together to serve one terminal at the same time, which enables the terminal to obtain a larger service bandwidth and transmission rate. The industrial internet covert communication system model related by the invention is shown in figure 1, wherein a covert communication sending end is positioned at an industrial internet platform gateway and implements normal edge processing and protocol interface conversion on data acquired in an industrial field, and a covert communication receiving end is positioned at a private/public cloud platform, and both parties utilize the system to realize the safe transmission of industrial confidential data. The following describes the specific process of covert communication with reference to the accompanying drawings:
(1) a covert communication sending end filters confidential data including product core parameters, equipment key state information and the like from all data collected on an industrial field;
(2) the interface module is used for carrying out edge processing on general industrial data which are not involved in secret, and sending the industrial data into an industrial control network protocol (such as industrial Ethernet, field bus and the like) to be converted into a 5G protocol;
(3) when the data which is not confidential enters a carrier modulation link section of a physical layer after being processed by each layer of a 5G protocol stack, the confidential industrial data is modulated into different combinations of NR carrier aggregation by using an encoder;
(4) the covert communication sending end transmits the data flow containing the secret and covert after the carrier modulation to the covert communication receiving end through a 5G network channel;
(5) the covert communication receiving end demodulates the covert data stream and identifies the frequency band of each NR subcarrier;
(6) and the covert communication receiving end analyzes and obtains the confidential industrial data by using a decoder.
As shown in fig. 1, the present invention provides an industrial internet covert communication system based on 5G NR carrier aggregation, said system comprising: the system comprises an industrial field data acquisition device, a hidden communication sending terminal, a 5G network, a hidden communication receiving terminal and an industrial internet platform;
the hidden communication sending end comprises a filter, a 5G interface module, an encoder and a carrier modulator; industrial data are transmitted to a filter by a data signal of the field data collector, non-confidential data are transmitted to a 5G interface module by the filter, the confidential data are transmitted to an encoder by the filter, a data signal output end of the 5G interface module is connected with the encoder, and NR carrier wave combined data are transmitted to a carrier wave modulator by the encoder;
the carrier modulator transmits the hidden write data stream to a hidden communication receiving end through a 5G network, the hidden communication receiving end comprises a demodulator, a decoder and a cloud platform, the demodulator receives the hidden write data stream, the demodulator transmits the NR subcarrier to the decoder, the decoder transmits the confidential industrial data to the cloud platform, and the industrial internet platform directly accesses the cloud platform.
The covert communication sending end is positioned at an industrial Internet platform gateway and is used for carrying out edge processing and protocol interface conversion on data collected in an industrial place.
Referring to fig. 2 to 5, the industrial internet covert communication method based on 5G NR carrier aggregation of the present invention includes the following steps:
step 1, an industrial field data collector collects industrial data, and confidential data is filtered through a filter, wherein the confidential data comprises product core parameters and equipment state information;
step 2: filtering by a filter to obtain non-confidential data, performing edge processing on the non-confidential data, and sending the non-confidential data to a 5G interface module; according to the specifications in the 5G-NR standard, a single terminal can support aggregation of up to 16 different bandwidth carriers, and carrier aggregation does not need to be contiguous in the frequency domain or restricted to be within the same frequency band. Thus, as shown in FIG. 2, the present invention combines two different carrier bands A (frequency range f)1~f9) B (frequency range f)10~f18) Are divided into 8 sub-carrier frequency bands respectively.
And step 3: the encoder encodes the confidential data and the non-confidential data, transmits the encoded data to different combinations of NR carrier aggregation of the carrier modulator to obtain the steganographic data, and transmits the steganographic data to the covert communication receiving end through a 5G network;
the encoding of the confidential data and the non-confidential data by the encoder in the step 3 specifically comprises the following steps:
step 3.1: dividing industrial secret-related data S into a plurality of data blocks S according to 4-bit sizeiAnd is denoted as S ═ S i1,2, ·, n }, s is represented by the following formulai
Figure BDA0002518672940000051
Wherein n is the number of blocks, sijFor binary data taking the value 0 or 1, siContains 4-bit binary numbers;
step 3.2: dividing two different carrier frequency bands A and B into 8 sub-carrier frequency bands respectively, determining each sub-carrier bandwidth, and expressing each sub-carrier bandwidth by the following formula:
Figure BDA0002518672940000052
wherein, Δ fiDenotes the ith subcarrier CiBandwidth of fiIs the boundary frequency of each subcarrier;
step 3.3: will siModulation to different combinations of NR carrier aggregation
Figure BDA0002518672940000053
Obtaining an encoding function, which is expressed by the following formula:
Figure BDA0002518672940000061
wherein f isenFor the coding function, [ s ]i]dBlocking s for secret-related dataiDecimal form of (d); according to different scenarios of NR carrier aggregation, the following four cases can be specifically classified:
step 3.4: according to case[si]dTransmitted to a carrier modulator through a 5G networkObtaining steganographic data in different combinations of NR carrier aggregation;
step 3.5: and (5) repeating the step 3.3 to the step 3.4 until all the industrial secret-related data are transmitted in blocks.
According to different scenarios of NR carrier aggregation, the following four cases are specifically classified:
case 1: when [ s ]i]dWhen 0, the combination of the corresponding NR carrier aggregation is case0Selecting a single carrier C1
Case 2: when [ s ]i]dWhen 1, the combination of the corresponding NR carrier aggregation is case1The application scene of aggregation in the frequency band and continuous distribution of each subcarrier on the frequency domain is met, and the subcarrier C is selected1And C2
Case 3: when 2 is less than or equal to si]dWhen the sum is less than or equal to 7, the combination corresponding to NR carrier aggregation is case2~case7The application scenes of aggregation in the frequency band and discontinuous distribution of each subcarrier on the frequency domain are met, and the subcarriers C are respectively selected1And C2~C7
Case 4: when the ratio of s is less than or equal to 8i]dWhen the sum is less than or equal to 15, the combination corresponding to NR carrier aggregation is case8~case15That is, the subcarrier C is selected respectively according to the application scenario of aggregation between frequency bands and discontinuous distribution of each subcarrier on the frequency domain1And C8~C15
And 4, step 4: the demodulator demodulates the steganographic data to obtain the frequency band of each NR subcarrier, the decoder decodes the frequency band of each NR subcarrier to obtain secret-related data, and the secret-related data are transmitted to the cloud platform.
The demodulation of the steganographic data by the demodulator in the step 4 specifically comprises the following steps:
step 4.1: capturing covert communication data stream of a 5G physical layer through a covert communication receiving terminal;
step 4.2: identifying each NR carrier frequency in the steganographic data stream with a demodulator;
step 4.3: determining the sub-carrier frequency band C according to the NR carrier frequencymAnd obtaining a carrier groupAnd, the band C is represented by the following formulamThe carrier combination of (2):
Figure BDA0002518672940000062
step 4.4: using a decoding function fdeRecovering secret-related data blocks
Figure BDA0002518672940000063
And converts it into binary data
Figure BDA0002518672940000064
The decoding process is represented by:
Figure BDA0002518672940000065
step 4.5: repeating the step 4.3 to the step 4.4 until all the industrial confidential data are obtained
Figure BDA0002518672940000066
And finishing decoding.
The above description is only a preferred embodiment of the industrial internet covert communication system based on 5G NR carrier aggregation and the communication method thereof, and the protection scope of the industrial internet covert communication system based on 5G NR carrier aggregation and the communication method thereof is not limited to the above embodiments, and all technical solutions belonging to the idea belong to the protection scope of the present invention. It should be noted that modifications and variations which do not depart from the gist of the invention will be those skilled in the art to which the invention pertains and which are intended to be within the scope of the invention.

Claims (6)

1. An industrial internet covert communication system based on 5G NR carrier aggregation is characterized in that: the system comprises: the system comprises an industrial field data acquisition device, a hidden communication sending terminal, a 5G network, a hidden communication receiving terminal and an industrial internet platform;
the hidden communication sending end comprises a filter, a 5G interface module, an encoder and a carrier modulator; industrial data are transmitted to a filter by a data signal of the field data collector, non-confidential data are transmitted to a 5G interface module by the filter, the confidential data are transmitted to an encoder by the filter, a data signal output end of the 5G interface module is connected with the encoder, and NR carrier wave combined data are transmitted to a carrier wave modulator by the encoder;
the carrier modulator transmits the hidden write data stream to a hidden communication receiving end through a 5G network, the hidden communication receiving end comprises a demodulator, a decoder and a cloud platform, the demodulator receives the hidden write data stream, the demodulator transmits the NR subcarrier to the decoder, the decoder transmits the confidential industrial data to the cloud platform, and the industrial internet platform directly accesses the cloud platform.
2. The industrial internet covert communication system based on 5G NR carrier aggregation according to claim 1, wherein: the covert communication sending end is positioned at an industrial Internet platform gateway and is used for carrying out edge processing and protocol interface conversion on data collected in an industrial place.
3. An industrial internet covert communication method based on 5G NR carrier aggregation, the method being based on the industrial internet covert communication system based on 5G NR carrier aggregation as claimed in claim 1, characterized in that: the method comprises the following steps:
step 1, an industrial field data collector collects industrial data, and confidential data is filtered through a filter, wherein the confidential data comprises product core parameters and equipment state information;
step 2: filtering by a filter to obtain non-confidential data, performing edge processing on the non-confidential data, and sending the non-confidential data to a 5G interface module;
and step 3: the encoder encodes the confidential data and the non-confidential data, transmits the encoded data to different combinations of NR carrier aggregation of the carrier modulator to obtain the steganographic data, and transmits the steganographic data to the covert communication receiving end through a 5G network;
and 4, step 4: the demodulator demodulates the steganographic data to obtain the frequency band of each NR subcarrier, the decoder decodes the frequency band of each NR subcarrier to obtain secret-related data, and the secret-related data are transmitted to the cloud platform.
4. The industrial internet covert communication method based on 5G NR carrier aggregation according to claim 3, wherein: the encoding of the confidential data and the non-confidential data by the encoder in the step 3 specifically comprises the following steps:
step 3.1: dividing industrial secret-related data S into a plurality of data blocks S according to 4-bit sizeiS is represented by the formulai
Figure FDA0002518672930000011
Wherein n is the number of blocks, sijFor binary data taking the value 0 or 1, siContains 4-bit binary numbers;
step 3.2: dividing two different carrier frequency bands A and B into 8 sub-carrier frequency bands respectively, determining each sub-carrier bandwidth, and expressing each sub-carrier bandwidth by the following formula:
Figure FDA0002518672930000021
wherein, Δ fiDenotes the ith subcarrier CiBandwidth of fiIs the boundary frequency of each subcarrier;
step 3.3: will siModulation to different combinations of NR carrier aggregation
Figure FDA0002518672930000022
Obtaining an encoding function, which is expressed by the following formula:
Figure FDA0002518672930000023
wherein f isenFor the coding function, [ s ]i]dBlocking s for secret-related dataiDecimal form of (d); according to different scenarios of NR carrier aggregation, the following four cases are specifically classified:
step 3.4: according to
Figure FDA0002518672930000024
Transmitting the data to different combinations of a carrier modulator for NR carrier aggregation through a 5G network to obtain steganographic data;
step 3.5: and (5) repeating the step 3.3 to the step 3.4 until all the industrial secret-related data are transmitted in blocks.
5. The industrial internet covert communication method based on 5GNR carrier aggregation as claimed in claim 4, wherein: according to different scenarios of NR carrier aggregation, the following four cases are specifically classified:
case 1: when [ s ]i]dWhen 0, the combination of the corresponding NR carrier aggregation is case0Selecting a single carrier C1
Case 2: when [ s ]i]dWhen 1, the combination of the corresponding NR carrier aggregation is case1The application scene of aggregation in the frequency band and continuous distribution of each subcarrier on the frequency domain is met, and the subcarrier C is selected1And C2
Case 3: when 2 is less than or equal to si]dWhen the sum is less than or equal to 7, the combination corresponding to NR carrier aggregation is case2~case7The application scenes of aggregation in the frequency band and discontinuous distribution of each subcarrier on the frequency domain are met, and the subcarriers C are respectively selected1And C2~C7
Case 4: when the ratio of s is less than or equal to 8i]dWhen the sum is less than or equal to 15, the combination corresponding to NR carrier aggregation is case8~case15That is, the subcarrier C is selected respectively according to the application scenario of aggregation between frequency bands and discontinuous distribution of each subcarrier on the frequency domain1And C8~C15
6. The industrial internet covert communication method based on 5GNR carrier aggregation as claimed in claim 3, wherein: the demodulation of the steganographic data by the demodulator in the step 4 specifically comprises the following steps:
step 4.1: capturing covert communication data stream of a 5G physical layer through a covert communication receiving terminal;
step 4.2: identifying each NR carrier frequency in the steganographic data stream with a demodulator;
step 4.3: determining the sub-carrier frequency band C according to the NR carrier frequencymAnd obtaining a carrier combination, the band C being represented by the following formulamThe carrier combination of (2):
Figure FDA0002518672930000025
step 4.4: using a decoding function fdeRecovering secret-related data blocks
Figure FDA0002518672930000026
And converts it into binary data
Figure FDA0002518672930000027
The decoding process is represented by:
Figure FDA0002518672930000031
step 4.5: and (4) repeating the step 4.3 to the step 4.4 until all the industrial secret-related data are decoded.
CN202010484625.5A 2020-06-01 2020-06-01 Industrial internet covert communication system based on 5G NR carrier aggregation and communication method thereof Active CN111917527B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010484625.5A CN111917527B (en) 2020-06-01 2020-06-01 Industrial internet covert communication system based on 5G NR carrier aggregation and communication method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010484625.5A CN111917527B (en) 2020-06-01 2020-06-01 Industrial internet covert communication system based on 5G NR carrier aggregation and communication method thereof

Publications (2)

Publication Number Publication Date
CN111917527A true CN111917527A (en) 2020-11-10
CN111917527B CN111917527B (en) 2022-06-10

Family

ID=73237659

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010484625.5A Active CN111917527B (en) 2020-06-01 2020-06-01 Industrial internet covert communication system based on 5G NR carrier aggregation and communication method thereof

Country Status (1)

Country Link
CN (1) CN111917527B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114374589A (en) * 2022-01-11 2022-04-19 深圳凡维泰科技服务有限公司 PSS cross-correlation algorithm of 5G-NR system based on FPGA
CN115242414A (en) * 2021-04-15 2022-10-25 华晨宝马汽车有限公司 Steganography method, system, medium, and program based on industrial real-time data
CN117354788A (en) * 2023-10-09 2024-01-05 中国电子科技集团公司第十五研究所 Hidden communication equipment based on disguised peripheral equipment

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106878346A (en) * 2017-04-26 2017-06-20 常州机电职业技术学院 Network concealed communication method and system based on BitTorrent agreements
WO2017161616A1 (en) * 2016-03-24 2017-09-28 深圳大学 Physical layer steganography method and system
CN107276987A (en) * 2017-05-17 2017-10-20 厦门奥普拓自控科技有限公司 A kind of the special line physical isolation industrial data means of communication and system
CN107770199A (en) * 2017-12-08 2018-03-06 东北大学 It is a kind of towards industry internet with the industry control agreement honey jar of self-learning function and application

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017161616A1 (en) * 2016-03-24 2017-09-28 深圳大学 Physical layer steganography method and system
CN106878346A (en) * 2017-04-26 2017-06-20 常州机电职业技术学院 Network concealed communication method and system based on BitTorrent agreements
CN107276987A (en) * 2017-05-17 2017-10-20 厦门奥普拓自控科技有限公司 A kind of the special line physical isolation industrial data means of communication and system
CN107770199A (en) * 2017-12-08 2018-03-06 东北大学 It is a kind of towards industry internet with the industry control agreement honey jar of self-learning function and application

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115242414A (en) * 2021-04-15 2022-10-25 华晨宝马汽车有限公司 Steganography method, system, medium, and program based on industrial real-time data
CN114374589A (en) * 2022-01-11 2022-04-19 深圳凡维泰科技服务有限公司 PSS cross-correlation algorithm of 5G-NR system based on FPGA
CN117354788A (en) * 2023-10-09 2024-01-05 中国电子科技集团公司第十五研究所 Hidden communication equipment based on disguised peripheral equipment
CN117354788B (en) * 2023-10-09 2024-03-19 中国电子科技集团公司第十五研究所 Hidden communication equipment based on disguised peripheral equipment

Also Published As

Publication number Publication date
CN111917527B (en) 2022-06-10

Similar Documents

Publication Publication Date Title
CN111917527B (en) Industrial internet covert communication system based on 5G NR carrier aggregation and communication method thereof
US20120307831A1 (en) SYSTEMS AND METHODS FOR PROVIDING A MoCA IMPROVED PERFORMANCE FOR SHORT BURST PACKETS
CN111245539A (en) NOMA-based efficient resource allocation method for mobile edge computing network
CN110572441B (en) Ultra-large-scale DPI data processing system and method based on edge calculation
CN107528687A (en) Dynamic key based on physical layer channel cross correlation quantifies machinery of consultation
CN109040115A (en) A kind of concealed communication method under block chain network environment
US7068649B2 (en) Extended bandwidth homePNA system compatible with homePNA 2.0
CN103023630B (en) Method for hiding information of speech stream on basis of speech coding by pulse code modulation
CN111343632B (en) Industrial Internet covert communication method and system
CN110167193A (en) WiFi matches network method and WiFi equipment automatically
CN107171775B (en) Hybrid duplex transmission method for improving physical layer security in cognitive relay network
CN115802348B (en) Low-power consumption NB-IoT terminal and secure communication mechanism
CN113795023B (en) Bluetooth data transmission encryption method based on chaotic sequence and packet encryption
CN102946393B (en) A kind of safety communicating method applied to wireless multimedia sensor network
Ye et al. Multimedia transmission over cognitive radio channels under sensing uncertainty
WO2015000115A1 (en) Signal modulation and demodulation methods, modulation and demodulation apparatuses, and signal transmission system
CN110677839B (en) NOMA-based 5G mobile communication resource allocation method
CN102215173A (en) Ethernet service transmitting and receiving method and device capable of dynamically configuring bandwidth
CN111628842A (en) Encoding method, decoding method, covert communication method and system
CN115102664B (en) Network pipeline printing method and system for tracing and information transmission
CN117857226B (en) Safety communication method and system based on industrial Internet multilateral platform
CN113596026B (en) Physical layer secure transmission method based on multiple channels
CN116132152B (en) Time hidden channel technology based on block chain public chain
KR102184181B1 (en) security information sending method for 1-bit ADC wiretap channel
CN111586679B (en) Safety guarantee method based on limited feedback non-orthogonal multiple access network

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant