CN111934863A - Secret key sharing method based on artificial noise and safety coding in edge calculation - Google Patents
Secret key sharing method based on artificial noise and safety coding in edge calculation Download PDFInfo
- Publication number
- CN111934863A CN111934863A CN202010801225.2A CN202010801225A CN111934863A CN 111934863 A CN111934863 A CN 111934863A CN 202010801225 A CN202010801225 A CN 202010801225A CN 111934863 A CN111934863 A CN 111934863A
- Authority
- CN
- China
- Prior art keywords
- bob
- key
- alice
- signal
- eve
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 29
- 238000004364 calculation method Methods 0.000 title claims abstract description 8
- 239000011159 matrix material Substances 0.000 claims abstract description 10
- 230000005540 biological transmission Effects 0.000 claims abstract description 9
- 239000013598 vector Substances 0.000 claims description 15
- 230000008569 process Effects 0.000 claims description 11
- 238000012790 confirmation Methods 0.000 claims description 8
- 239000003795 chemical substances by application Substances 0.000 claims description 6
- 230000007423 decrease Effects 0.000 claims description 4
- 238000000354 decomposition reaction Methods 0.000 claims description 3
- 230000003321 amplification Effects 0.000 description 4
- 238000004891 communication Methods 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 4
- 230000003993 interaction Effects 0.000 description 4
- 238000003199 nucleic acid amplification method Methods 0.000 description 4
- 238000010586 diagram Methods 0.000 description 3
- 230000001681 protective effect Effects 0.000 description 3
- 230000009286 beneficial effect Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000013139 quantization Methods 0.000 description 2
- 230000008859 change Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000002474 experimental method Methods 0.000 description 1
- 238000005562 fading Methods 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 238000013508 migration Methods 0.000 description 1
- 230000005012 migration Effects 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 238000011160 research Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/02—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
- H04B7/04—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
- H04B7/0413—MIMO systems
- H04B7/0426—Power distribution
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/02—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
- H04B7/04—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
- H04B7/06—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station
- H04B7/0613—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station using simultaneous transmission
- H04B7/0615—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station using simultaneous transmission of weighted versions of same signal
- H04B7/0617—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station using simultaneous transmission of weighted versions of same signal for beam forming
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L25/00—Baseband systems
- H04L25/38—Synchronous or start-stop systems, e.g. for Baudot code
- H04L25/40—Transmitting circuits; Receiving circuits
- H04L25/49—Transmitting circuits; Receiving circuits using code conversion at the transmitter; using predistortion; using insertion of idle bits for obtaining a desired frequency spectrum; using three or more amplitude levels ; Baseband coding techniques specific to data transmission systems
- H04L25/4906—Transmitting circuits; Receiving circuits using code conversion at the transmitter; using predistortion; using insertion of idle bits for obtaining a desired frequency spectrum; using three or more amplitude levels ; Baseband coding techniques specific to data transmission systems using binary codes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Power Engineering (AREA)
- Physics & Mathematics (AREA)
- Spectroscopy & Molecular Physics (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a secret key sharing method based on artificial noise and safety coding in edge calculation, which comprises the following steps of S1: s2, channel estimation: bob sends a channel estimation sequence to Alice, and the Alice estimates to obtain a channel matrix HA(ii) a S3, safety coding: the edge side device Alice sets the key message b as (b) through security coding1,b2,...bm) Coded as binary bits s ═(s)1,s2,...sn) (ii) a S4, forming a transmitting signal by combining artificial noise: alice combines artificial noise through MIMO beamformingForming a transmission signal x: x is fs + Gz; s5, signal receiving and decoding: legal terminal Bob receives and demodulates the signal and decodes m key bits from the received signalS6, repeatedly executing the step S3 to the step S5 until Bob obtains the keys with the length of L symbols.
Description
Technical Field
The invention relates to key sharing in edge calculation, in particular to a key sharing method based on artificial noise and safety coding in edge calculation.
Background
The edge computing moves part or all of the computing tasks of the original cloud computing model to the network edge equipment, so that the computing load of a cloud computing center is reduced, and network congestion is relieved. The edge computing has rich application scenes, such as cloud computing task migration, video monitoring, intelligent transportation, an intelligent power grid and the like. With the rapid development of the 5G Internet of things and the edge computing network, a large number of novel services and applications are continuously emerging. Various confidential and sensitive data and the like in a wireless network are increased in a massive manner, the problem of information security is more and more prominent, and the security is gradually becoming a precondition for various different service applications. In a conventional wireless communication network, cryptography-based encryption technology is generally used at the network layer and the upper layer to secure system communication. Performing various cryptographic authentications requires establishing a secure shared key between the communicating parties. In a large number of novel application scenarios of edge computing, such as a large-scale IoT network and a smart grid network, a large number of resource-limited sensing node terminals are accessed, so that the complexity of key distribution and management based on cryptography is extremely high and even difficult to implement. The key generation and distribution technology based on physical channel uses the randomness and reciprocity of fading channel to generate and distribute the key between legal users.
At present, there are some preliminary research results on physical layer key generation, but the current physical layer key generation rate is slow, and the rate is highly related to the channel change speed. Experiments have verified that a typical physical layer key distribution system with 3 transmit and receive antennas takes 10 seconds or more to build a 128 bit length AES symmetric encryption key in an indoor channel with a key error rate of less than an order of magnitude. Because the two parties need to perform interaction at least for more than 3 times on the public channel in the process of establishing the key (including the processes of pilot frequency transmission, key agreement, privacy amplification, final consistency confirmation and the like of the two parties of the transceiver), the complexity of the communication protocol is higher, and the hidden danger of information leakage is promoted.
Disclosure of Invention
The invention aims to overcome the defects of the prior art and provide a key sharing method based on artificial noise and security coding in edge computing, which realizes the key distribution of a physical layer under an edge computing environment by using the artificial noise and the security coding, only needs two times of interaction to realize the key distribution of the physical layer and reduces the time delay and the complexity caused by key sharing.
The purpose of the invention is realized by the following technical scheme: a secret key sharing method based on artificial noise and safety coding in edge calculation comprises the following steps
S1, setting a protection area:
setting that an edge side device Alice and a legal terminal Bob need to share a secret key, wherein Eve is an eavesdropper;
the edge device Alice and the legal terminal Bob respectively surround the edge device Alice and the legal terminal Bob by using a protection area with the radius of R, so that an eavesdropper Eve cannot enter the protection area for eavesdropping, namely, the distance between Eve and Alice is ensured to be larger than R, and the distance between Eve and Bob is ensured to be larger than R;
NAand NBRespectively representing the number of antennas, N, of Alice and BobA>NB≥1;
S2, channel estimation: bob sends a channel estimation sequence to Alice, and the Alice estimates to obtain a channel matrix HA;
S3, safety coding: the edge side device Alice sets the key message b as (b) through security coding1,b2,...bm) Coded as binary bits s ═(s)1,s2,...sn);
Assuming binary security coding is used, the code rate is described as RSFor code rate R ═ m/nSWhere m is the packet length of the legitimate user information bits and n is the code length, by adjusting the transmit SNR signal-to-noise ratio such that Bob's decoded BER ρcSatisfies the following conditions
S4, forming a transmitting signal by combining artificial noise:
forming a transmitting signal x by combining MIMO beam forming and artificial noise by Alice:
x=fs+Gz;
where s is the modulated unit scalar transmit key symbol and z is NT-a 1 x 1-dimensional randomly generated complex gaussian artificial noise AN vector; the transmit beamformer is represented as:
f=V(:,1);
wherein HA=UΣVHRepresenting singular value decomposition, f ═ V (: 1) is the first column vector of V;
meanwhile, the interference signal needs to be in the null space of Bob to avoid interference to legal users, and G is equal to V (: 2: N)T-1), thus:
HAG·z⊥HAf
in terms of power allocation, the transmit signal covariance matrix E { xxH}=Qx,Tr(Qx)≤PmaxWherein T isr(-) represents the trace-finding operator; the power allocated to the legitimate signal is PSTransmitting the interference signal with the residual power, then PAN=Pmax-PSAnd E: (a)ZZ H)=[PAN/(NT-1)I];
S5, signal receiving and decoding: legal terminal Bob receivesDemodulating the signal and decoding the m key bits from the received signal
In the step S5, N is setA>NBNot less than 1 and N is guaranteedA-1>NE(ii) a Wherein N isENumber of antennas for eavesdroppers; at the receiving end, wAAnd wERespectively represent NR×1,NEAnd receiving the combining vector in the dimension of x 1, wherein after receiving and combining, the signals received by Bob and Eve are represented as follows:
wherein n isAAnd nEWhite noise vectors corresponding to Bob and Eve receiving signals respectively, and the power covariance of the white noise vectors is satisfied by a matrix:
HAand HEIndependent of each other, channel matrices for the main channel and the eavesdropping channel, Alice and Bob unknown HE(ii) a Wherein Alice feeds back wA=HAf. To Bob, there are:
due to HAG·z⊥HAf, then there are:
that is, Bob is not interfered by artificial noise, and the received signal-to-interference-and-noise ratio is expressed as:
eve received artifact HEThe reception quality of the interference of G · z decreases with increasing noise power, and the received signal-to-interference-and-noise ratio is expressed as:
the legitimate receiver Bob gets the sequenceIs a noisy version of the sequence s; meanwhile, an eavesdropper Eve can observe a noisy symbol sequenceSelecting a transmission power PSSum noise power PANThe receiving signal-to-noise ratio of Bob is better than that of Eve, so that when Bob normally receives signals, Eve is interfered, and Eve is interfered
It is difficult for an eavesdropper to obtain the key message b (b) by demodulating and securely decoding the received signal1,b2,...bm) A consistent key bit; and the legal terminal Bob can obtain the message b (b) of the key by demodulating and safely decoding the received signal1,b2,...bm) Consistent m-bit key bits
S6, repeatedly executing the step S3 to the step S5 until Bob obtains the keys with the length of L symbols.
In step S6, after Bob has obtained L symbol-length keys, the method further includes a consistency confirmation step:
and B, confirming the consistency of the key between Bob and Alice, finishing the key sharing if the key obtained by Bob is consistent with the key shared by Alice, returning to the step S2 if the key obtained by Bob is consistent with the key shared by Alice, and re-executing the key sharing process according to the steps S2-S6.
Preferably, when Bob and Alice confirm the key consistency, the consistency confirmation method adopted includes:
alice uses the shared secret key to generate a signature through a hash function, encrypts the digital signature by using the shared secret key to obtain a ciphertext signature to be sent, and sends the ciphertext signature to Bob;
bob decrypts the ciphertext digital signature by using the key obtained by the Bob, generates the digital signature by using the key obtained by the Bob through a Hash function, compares the decoded digital signature with the digital signature of the Bob, and if the digital signature is consistent with the digital signature of the Bob, the key consistency is passed.
The invention has the beneficial effects that: (1) the invention only needs 2 times of interaction to realize the key distribution of the physical layer, realizes the low error rate of the terminal, and reduces the time delay and the complexity caused by key sharing; meanwhile, only one channel estimation is needed when the secret key is shared, which is beneficial to saving the expenditure. (2) According to the key distribution process, the key quantization, negotiation and privacy amplification do not need to be carried out by two parties, so that the two parties do not need to carry out multiple interactive negotiations related to the process on a public channel, and the complexity is reduced. (3) In the current technology, at least more than 3 times of interaction (including the processes of pilot frequency transmission, key agreement, privacy amplification, final consistency confirmation and the like of a transmitting party and a receiving party) needs to be performed on a public channel in the process of establishing a key, so that the complexity of a communication protocol is higher, and the hidden danger of information leakage is promoted. The technology does not need the processes of key quantization, negotiation and privacy amplification in public channel negotiation, avoids the hidden danger of information leakage, and improves the safety.
Drawings
FIG. 1 is a flow chart of a method of the present invention;
FIG. 2 is a schematic diagram of a key distribution architecture of a physical layer under an edge computing network;
FIG. 3 is a schematic diagram of the key bit error probability of Bob and Eve;
FIG. 4 is a diagram illustrating the probability of key bit errors of Bob and Eve under different transmission signal-to-noise ratios.
Detailed Description
The technical solutions of the present invention are further described in detail below with reference to the accompanying drawings, but the scope of the present invention is not limited to the following.
As shown in FIG. 1, a key sharing method based on artificial noise and security coding in edge calculation comprises the following steps
S1, setting a protection area:
setting that an edge side device Alice and a legal terminal Bob need to share a secret key, wherein Eve is an eavesdropper;
the edge device Alice and the legal terminal Bob respectively surround the edge device Alice and the legal terminal Bob by a protective area with the radius of R, and the protective area is an area where an eavesdropper Eve is forbidden to enter, so that the eavesdropper Eve cannot enter the protective area for eavesdropping, and the eavesdropper can be realized by a fence and a fence on a physical layer, and can also be a forbidden area for manual duty; namely, ensuring that the distance between Eve and Alice is greater than R and the distance between Eve and Bob is greater than R; the radius length of the protection region is generally required to be greater than the uncorrelated distance of the channel, and in the embodiment of the present application, the length is determined by the propagation environment of the channel and the frequency of the carrier frequency, and is generally 10cm to 100cm in the environment of sufficient scattering.
NAAnd NBRespectively representing the number of antennas, N, of Alice and BobA>NB≥1;
S2, channel estimation: bob sends a channel estimation sequence to Alice, and the Alice estimates to obtain a channel matrix HA;
S3, safety coding: the edge side device Alice sets the key message b as (b) through security coding1,b2,...bm) Coded as binary bits s ═(s)1,s2,...sn);
Assuming binary security coding is used, the code rate is described as RSFor code rate R ═ m/nSWhere m is the packet length of the legitimate user information bits and n is the code length, by adjusting the transmit SNR signal-to-noise ratio such that Bob's decoded BER ρcSatisfies the following conditions
S4, forming a transmitting signal by combining artificial noise:
forming a transmitting signal x by combining MIMO beam forming and artificial noise by Alice:
x=fs+Gz;
where s is the modulated unit scalar transmit key symbol and z is NT-a 1 x 1-dimensional randomly generated complex gaussian artificial noise AN vector; the transmit beamformer is represented as:
f=V(:,1);
wherein HA=UΣVHRepresenting singular value decomposition, f ═ V (: 1) is the first column vector of V;
meanwhile, the interference signal needs to be in the null space of Bob to avoid interference to legal users, and G is equal to V (: 2: N)T-1), thus:
HAG·z⊥HAf
in terms of power allocation, the transmit signal covariance matrix E { xxH}=Qx,Tr(Qx)≤PmaxWherein T isr(-) represents the trace-finding operator; the power allocated to the legitimate signal is PSTransmitting the interference signal with the residual power, then PAN=Pmax-PSAnd E: (a)ZZ H)=[PAN/(NT-1)I];
S5, signal receiving and decoding: legal terminal Bob receives and demodulates the signal and decodes m key bits from the received signal
In the step S5, N is setA>NBNot less than 1 and N is guaranteedA-1>NE(ii) a Wherein N isENumber of antennas for eavesdroppers; at the receiving end, wAAnd wERespectively represent NR×1,NEAnd receiving the combining vector in the dimension of x 1, wherein after receiving and combining, the signals received by Bob and Eve are represented as follows:
wherein n isAAnd nEWhite noise vectors corresponding to Bob and Eve receiving signals respectively, and the power covariance of the white noise vectors is satisfied by a matrix:
HAand HEIndependent of each other, channel matrices for the main channel and the eavesdropping channel, Alice and Bob unknown HE(ii) a Wherein Alice feeds back wA=HAf. To Bob, there are:
due to HAG·z⊥HAf, then there are:
that is, Bob is not interfered by artificial noise, and the received signal-to-interference-and-noise ratio is expressed as:
eve received artifact HEThe reception quality of the interference of G · z decreases with increasing noise power, and the received signal-to-interference-and-noise ratio is expressed as:
the legitimate receiver Bob gets the sequenceIs a noisy version of the sequence s; meanwhile, an eavesdropper Eve can observe a noisy symbol sequenceSelecting a transmission power PSSum noise power PANThe receiving signal-to-noise ratio of Bob is better than that of Eve, so that when Bob normally receives signals, Eve is interfered, and Eve is interfered
It is difficult for an eavesdropper to obtain the key message b (b) by demodulating and securely decoding the received signal1,b2,...bm) A consistent key bit; and the legal terminal Bob can obtain the message b (b) of the key by demodulating and safely decoding the received signal1,b2,...bm) Consistent m-bit key bits
S6, repeatedly executing the steps S3 to S5 until Bob obtains L keys with symbol lengths, wherein L is greater than m, and L is generally an integral multiple of m, generally, for the key to be shared, L is a determined known value, and codes m with different lengths can be selected according to actual conditions and L requirements.
In step S6, after Bob has obtained L symbol-length keys, the method further includes a consistency confirmation step:
and B, confirming the consistency of the key between Bob and Alice, finishing the key sharing if the key obtained by Bob is consistent with the key shared by Alice, returning to the step S2 if the key obtained by Bob is consistent with the key shared by Alice, and re-executing the key sharing process according to the steps S2-S6.
In the embodiment of the present application, when Bob and Alice perform key consistency confirmation, the adopted consistency confirmation method includes:
alice uses the shared secret key to generate a signature through a hash function, encrypts the digital signature by using the shared secret key to obtain a ciphertext signature to be sent, and sends the ciphertext signature to Bob;
bob decrypts the ciphertext digital signature by using the key obtained by the Bob, generates the digital signature by using the key obtained by the Bob through a Hash function, compares the decoded digital signature with the digital signature of the Bob, and if the digital signature is consistent with the digital signature of the Bob, the key consistency is passed.
In the embodiment of the present application, an edge computing network lower physical layer key distribution architecture is as shown in fig. 2, and fig. 3 shows key bit error probabilities of Bob and Eve (error probabilities when PAN is 10dB, 20dB, and with or without security coding), and fig. 4 shows key bit error probabilities of Bob and Eve under different transmission signal-to-noise ratios, it can be seen that, as the signal-to-noise ratio of the transmission signal and the artificial interference power increase, the Eve decoding key bit error rate remains 0.5, which ensures the security thereof, while the Bob key bit decoding error probability decreases exponentially and tends to 0, which ensures the high consistency thereof.
The foregoing is a preferred embodiment of the present invention, it is to be understood that the invention is not limited to the form disclosed herein, but is not to be construed as excluding other embodiments, and is capable of other combinations, modifications, and environments and is capable of changes within the scope of the inventive concept as expressed herein, commensurate with the above teachings, or the skill or knowledge of the relevant art. And that modifications and variations may be effected by those skilled in the art without departing from the spirit and scope of the invention as defined by the appended claims.
Claims (3)
1. A secret key sharing method based on artificial noise and safety coding in edge calculation is characterized in that: comprises the following steps
S1, setting a protection area:
setting that an edge side device Alice and a legal terminal Bob need to share a secret key, wherein Eve is an eavesdropper;
the edge device Alice and the legal terminal Bob respectively surround the edge device Alice and the legal terminal Bob by using a protection area with the radius of R, so that an eavesdropper Eve cannot enter the protection area for eavesdropping, namely, the distance between Eve and Alice is ensured to be larger than R, and the distance between Eve and Bob is ensured to be larger than R;
NAand NBRespectively representing the number of antennas, N, of Alice and BobA>NB≥1;
S2, channel estimation: bob sends a channel estimation sequence to Alice, and the Alice estimates to obtain a channel matrix HA;
S3, safety coding: the edge side device Alice sets the key message b as (b) through security coding1,b2,...bm) Coded as binary bits s ═(s)1,s2,...sn);
Assuming binary security coding is used, the code rate is described as RSFor code rate R ═ m/nSWhere m is the packet length of the legitimate user information bits and n is the code length, by adjusting the transmit SNR signal-to-noise ratio such that Bob's decoded BER ρcSatisfies the following conditions
S4, forming a transmitting signal by combining artificial noise:
forming a transmitting signal x by combining MIMO beam forming and artificial noise by Alice:
x=fs+Gz;
where s is the modulated unit scalar transmit key symbol and z is NT-a 1 x 1-dimensional randomly generated complex gaussian artificial noise AN vector; the transmit beamformer is represented as:
f=V(:,1);
wherein HA=UΣVHRepresenting singular value decomposition, f ═ V (: 1) is the first column vector of V;
meanwhile, the interference signal needs to be in the null space of Bob to avoid interference to legal users, and G is equal to V (: 2: N)T-1), thus:
HAG·z⊥HAf
in terms of power allocation, the transmit signal covariance matrix E { xxH}=Qx,Tr(Qx)≤PmaxWherein T isr(-) represents the trace-finding operator; the power allocated to the legitimate signal is PSTransmitting the interference signal with the residual power, then PAN=Pmax-PSAnd E: (a)ZZ H)=[PAN/(NT-1)]I;
S5, signal receiving and decoding: legal terminal Bob receives and demodulates the signal and decodes m key bits from the received signal
S6, repeatedly executing the step S3 to the step S5 until Bob obtains the keys with the length of L symbols.
2. The method of claim 1, wherein the method comprises: in the step S5, N is setA>NBNot less than 1 and N is guaranteedA-1>NE(ii) a Wherein N isENumber of antennas for eavesdroppers;
at the receiving end, wAAnd wERespectively represent NR×1,NEThe x 1-dimensional received combined vector,after the reception and combination process, the signals received by Bob and Eve are represented as follows:
wherein n isAAnd nEWhite noise vectors corresponding to Bob and Eve receiving signals respectively, and the power covariance of the white noise vectors is satisfied by a matrix:
HAand HEIndependent of each other, channel matrices for the main channel and the eavesdropping channel, Alice and Bob unknown HE(ii) a Wherein Alice feeds back wA=HAf. To Bob, there are:
due to HAG·z⊥HAf, then there are:
that is, Bob is not interfered by artificial noise, and the received signal-to-interference-and-noise ratio is expressed as:
eve received artifact HEThe reception quality of the interference of G · z decreases with increasing noise power, and the received signal-to-interference-and-noise ratio is expressed as:
the legitimate receiver Bob gets the sequenceIs a noisy version of the sequence s; meanwhile, an eavesdropper Eve can observe a noisy symbol sequenceSelecting a transmission power PSSum noise power PANThe receiving signal-to-noise ratio of Bob is better than that of Eve, so that when Bob normally receives signals, Eve is interfered, and Eve is interfered
It is difficult for an eavesdropper to obtain the key message b (b) by demodulating and securely decoding the received signal1,b2,...bm) A consistent key bit; and the legal terminal Bob can obtain the message b (b) of the key by demodulating and safely decoding the received signal1,b2,...bm) Consistent m-bit key bits
3. The method of claim 1, wherein the method comprises: in step S6, after Bob has obtained L symbol-length keys, the method further includes a consistency confirmation step:
and B, confirming the consistency of the key between Bob and Alice, finishing the key sharing if the key obtained by Bob is consistent with the key shared by Alice, returning to the step S2 if the key obtained by Bob is consistent with the key shared by Alice, and re-executing the key sharing process according to the steps S2-S6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010801225.2A CN111934863B (en) | 2020-08-11 | 2020-08-11 | Key sharing method based on artificial noise and security coding in edge calculation |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010801225.2A CN111934863B (en) | 2020-08-11 | 2020-08-11 | Key sharing method based on artificial noise and security coding in edge calculation |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111934863A true CN111934863A (en) | 2020-11-13 |
CN111934863B CN111934863B (en) | 2024-01-09 |
Family
ID=73310256
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010801225.2A Active CN111934863B (en) | 2020-08-11 | 2020-08-11 | Key sharing method based on artificial noise and security coding in edge calculation |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111934863B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114745235A (en) * | 2022-04-07 | 2022-07-12 | 展讯通信(上海)有限公司 | Data preprocessing method and device for transform domain channel estimation and communication equipment |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106357373A (en) * | 2016-08-30 | 2017-01-25 | 湖南国天电子科技有限公司 | Security transmission method, based on man made noise, of spatially modulated physical layer |
CN106374980A (en) * | 2016-07-27 | 2017-02-01 | 西安交通大学 | Safe transmission method in MIMO Y eavesdropping network based on real interference alignment |
CN106685639A (en) * | 2016-12-15 | 2017-05-17 | 西安交通大学 | Encrypted safe transmission method for sequential cipher based on artificial added noise in 5G communication system |
CN106789027A (en) * | 2017-01-03 | 2017-05-31 | 电子科技大学 | It is a kind of that uniformity confirmation method and system are carried out to key using unconditional security transmission |
US10069592B1 (en) * | 2015-10-27 | 2018-09-04 | Arizona Board Of Regents On Behalf Of The University Of Arizona | Systems and methods for securing wireless communications |
US20190229833A1 (en) * | 2018-01-24 | 2019-07-25 | Korea Advanced Institute Of Science And Technology | Apparatus and method for secure communication using artificial noise scheme |
CN111082933A (en) * | 2019-12-27 | 2020-04-28 | 电子科技大学 | Multi-user physical layer safety communication method capable of resisting any plurality of cooperation eavesdroppers |
-
2020
- 2020-08-11 CN CN202010801225.2A patent/CN111934863B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10069592B1 (en) * | 2015-10-27 | 2018-09-04 | Arizona Board Of Regents On Behalf Of The University Of Arizona | Systems and methods for securing wireless communications |
CN106374980A (en) * | 2016-07-27 | 2017-02-01 | 西安交通大学 | Safe transmission method in MIMO Y eavesdropping network based on real interference alignment |
CN106357373A (en) * | 2016-08-30 | 2017-01-25 | 湖南国天电子科技有限公司 | Security transmission method, based on man made noise, of spatially modulated physical layer |
CN106685639A (en) * | 2016-12-15 | 2017-05-17 | 西安交通大学 | Encrypted safe transmission method for sequential cipher based on artificial added noise in 5G communication system |
CN106789027A (en) * | 2017-01-03 | 2017-05-31 | 电子科技大学 | It is a kind of that uniformity confirmation method and system are carried out to key using unconditional security transmission |
US20190229833A1 (en) * | 2018-01-24 | 2019-07-25 | Korea Advanced Institute Of Science And Technology | Apparatus and method for secure communication using artificial noise scheme |
CN111082933A (en) * | 2019-12-27 | 2020-04-28 | 电子科技大学 | Multi-user physical layer safety communication method capable of resisting any plurality of cooperation eavesdroppers |
Non-Patent Citations (3)
Title |
---|
JIE TANG ET.AL.: "Secret Key Attaches in MIMO IoT Communications by Using Self-injection Artificial Noise", 2020 IEEE INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND INFORMATION SYSTEMS (ICAIIS), pages 225 - 229 * |
唐杰: "未来无线通信中基于物理信道的安全技术研究", 万方学位论文集, pages 56 - 83 * |
程伟等: "结合无条件安全传输的密钥一致性确认方法", 通信技术, vol. 50, no. 6, pages 1281 - 1283 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114745235A (en) * | 2022-04-07 | 2022-07-12 | 展讯通信(上海)有限公司 | Data preprocessing method and device for transform domain channel estimation and communication equipment |
CN114745235B (en) * | 2022-04-07 | 2024-04-19 | 展讯通信(上海)有限公司 | Data preprocessing method and device for transform domain channel estimation and communication equipment |
Also Published As
Publication number | Publication date |
---|---|
CN111934863B (en) | 2024-01-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Koorapaty et al. | Secure information transmission for mobile radio | |
Xiong et al. | Secure transmission against pilot spoofing attack: A two-way training-based scheme | |
Yang et al. | Physical layer security with threshold-based multiuser scheduling in multi-antenna wireless networks | |
Badawy et al. | Unleashing the secure potential of the wireless physical layer: Secret key generation methods | |
Chen et al. | Fast power allocation for secure communication with full-duplex radio | |
Vázquez-Castro et al. | Physical layer security for RF satellite channels in the finite-length regime | |
CN111082933B (en) | Multi-user physical layer safety communication method capable of resisting any plurality of cooperation eavesdroppers | |
Osorio et al. | Safeguarding MTC at the physical layer: Potentials and challenges | |
Cohen et al. | Wiretap channel with causal state information and secure rate-limited feedback | |
Tang et al. | Sharing secrets via wireless broadcasting: A new efficient physical layer group secret key generation for multiple IoT devices | |
Hyadi et al. | Secure broadcasting with imperfect channel state information at the transmitter | |
Bang et al. | Secure modulation based on constellation mapping obfuscation in OFDM based TDD systems | |
Ismayil Siyad et al. | Chaotic deep neural network based physical layer key generation for massive MIMO | |
CN111934863B (en) | Key sharing method based on artificial noise and security coding in edge calculation | |
CN111786789B (en) | Physical layer key distribution method based on random wave beam and edge calculation | |
Han et al. | A novel physical layer key generation method based on wgan-gp adversarial autoencoder | |
CN111726221B (en) | Physical layer safety transmission method capable of resisting arbitrary eavesdropping antenna number | |
Park et al. | Fronthaul quantization as artificial noise for enhanced secret communication in C-RAN | |
Hu et al. | Modulated symbol-based one-time pad secure transmission scheme using physical layer keys | |
CN110365374B (en) | Safe and accurate wireless transmission method based on multi-phased array direction modulation | |
Vazquez-Castro et al. | One-way and two-way physical layer security protocols for the Gaussian satellite channel | |
CN111711518B (en) | Method for simultaneously distributing key of multi-user physical layer and broadcasting communication | |
CN113595675B (en) | Interference management method and system for maximizing safe data transmission rate | |
Zou et al. | Layered secure broadcasting over MIMO channels and application in secret sharing | |
CN111586679B (en) | Safety guarantee method based on limited feedback non-orthogonal multiple access network |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |