CN111934863A - Secret key sharing method based on artificial noise and safety coding in edge calculation - Google Patents

Secret key sharing method based on artificial noise and safety coding in edge calculation Download PDF

Info

Publication number
CN111934863A
CN111934863A CN202010801225.2A CN202010801225A CN111934863A CN 111934863 A CN111934863 A CN 111934863A CN 202010801225 A CN202010801225 A CN 202010801225A CN 111934863 A CN111934863 A CN 111934863A
Authority
CN
China
Prior art keywords
bob
key
alice
signal
eve
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010801225.2A
Other languages
Chinese (zh)
Other versions
CN111934863B (en
Inventor
许爱东
唐杰
张宇南
蒋屹新
文红
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
University of Electronic Science and Technology of China
Research Institute of Southern Power Grid Co Ltd
Original Assignee
University of Electronic Science and Technology of China
Research Institute of Southern Power Grid Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by University of Electronic Science and Technology of China, Research Institute of Southern Power Grid Co Ltd filed Critical University of Electronic Science and Technology of China
Priority to CN202010801225.2A priority Critical patent/CN111934863B/en
Publication of CN111934863A publication Critical patent/CN111934863A/en
Application granted granted Critical
Publication of CN111934863B publication Critical patent/CN111934863B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B7/00Radio transmission systems, i.e. using radiation field
    • H04B7/02Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
    • H04B7/04Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
    • H04B7/0413MIMO systems
    • H04B7/0426Power distribution
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B7/00Radio transmission systems, i.e. using radiation field
    • H04B7/02Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
    • H04B7/04Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
    • H04B7/06Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station
    • H04B7/0613Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station using simultaneous transmission
    • H04B7/0615Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station using simultaneous transmission of weighted versions of same signal
    • H04B7/0617Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station using simultaneous transmission of weighted versions of same signal for beam forming
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L25/00Baseband systems
    • H04L25/38Synchronous or start-stop systems, e.g. for Baudot code
    • H04L25/40Transmitting circuits; Receiving circuits
    • H04L25/49Transmitting circuits; Receiving circuits using code conversion at the transmitter; using predistortion; using insertion of idle bits for obtaining a desired frequency spectrum; using three or more amplitude levels ; Baseband coding techniques specific to data transmission systems
    • H04L25/4906Transmitting circuits; Receiving circuits using code conversion at the transmitter; using predistortion; using insertion of idle bits for obtaining a desired frequency spectrum; using three or more amplitude levels ; Baseband coding techniques specific to data transmission systems using binary codes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Power Engineering (AREA)
  • Physics & Mathematics (AREA)
  • Spectroscopy & Molecular Physics (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a secret key sharing method based on artificial noise and safety coding in edge calculation, which comprises the following steps of S1: s2, channel estimation: bob sends a channel estimation sequence to Alice, and the Alice estimates to obtain a channel matrix HA(ii) a S3, safety coding: the edge side device Alice sets the key message b as (b) through security coding1,b2,...bm) Coded as binary bits s ═(s)1,s2,...sn) (ii) a S4, forming a transmitting signal by combining artificial noise: alice combines artificial noise through MIMO beamformingForming a transmission signal x: x is fs + Gz; s5, signal receiving and decoding: legal terminal Bob receives and demodulates the signal and decodes m key bits from the received signal
Figure DDA0002627469250000011
S6, repeatedly executing the step S3 to the step S5 until Bob obtains the keys with the length of L symbols.

Description

Secret key sharing method based on artificial noise and safety coding in edge calculation
Technical Field
The invention relates to key sharing in edge calculation, in particular to a key sharing method based on artificial noise and safety coding in edge calculation.
Background
The edge computing moves part or all of the computing tasks of the original cloud computing model to the network edge equipment, so that the computing load of a cloud computing center is reduced, and network congestion is relieved. The edge computing has rich application scenes, such as cloud computing task migration, video monitoring, intelligent transportation, an intelligent power grid and the like. With the rapid development of the 5G Internet of things and the edge computing network, a large number of novel services and applications are continuously emerging. Various confidential and sensitive data and the like in a wireless network are increased in a massive manner, the problem of information security is more and more prominent, and the security is gradually becoming a precondition for various different service applications. In a conventional wireless communication network, cryptography-based encryption technology is generally used at the network layer and the upper layer to secure system communication. Performing various cryptographic authentications requires establishing a secure shared key between the communicating parties. In a large number of novel application scenarios of edge computing, such as a large-scale IoT network and a smart grid network, a large number of resource-limited sensing node terminals are accessed, so that the complexity of key distribution and management based on cryptography is extremely high and even difficult to implement. The key generation and distribution technology based on physical channel uses the randomness and reciprocity of fading channel to generate and distribute the key between legal users.
At present, there are some preliminary research results on physical layer key generation, but the current physical layer key generation rate is slow, and the rate is highly related to the channel change speed. Experiments have verified that a typical physical layer key distribution system with 3 transmit and receive antennas takes 10 seconds or more to build a 128 bit length AES symmetric encryption key in an indoor channel with a key error rate of less than an order of magnitude. Because the two parties need to perform interaction at least for more than 3 times on the public channel in the process of establishing the key (including the processes of pilot frequency transmission, key agreement, privacy amplification, final consistency confirmation and the like of the two parties of the transceiver), the complexity of the communication protocol is higher, and the hidden danger of information leakage is promoted.
Disclosure of Invention
The invention aims to overcome the defects of the prior art and provide a key sharing method based on artificial noise and security coding in edge computing, which realizes the key distribution of a physical layer under an edge computing environment by using the artificial noise and the security coding, only needs two times of interaction to realize the key distribution of the physical layer and reduces the time delay and the complexity caused by key sharing.
The purpose of the invention is realized by the following technical scheme: a secret key sharing method based on artificial noise and safety coding in edge calculation comprises the following steps
S1, setting a protection area:
setting that an edge side device Alice and a legal terminal Bob need to share a secret key, wherein Eve is an eavesdropper;
the edge device Alice and the legal terminal Bob respectively surround the edge device Alice and the legal terminal Bob by using a protection area with the radius of R, so that an eavesdropper Eve cannot enter the protection area for eavesdropping, namely, the distance between Eve and Alice is ensured to be larger than R, and the distance between Eve and Bob is ensured to be larger than R;
NAand NBRespectively representing the number of antennas, N, of Alice and BobA>NB≥1;
S2, channel estimation: bob sends a channel estimation sequence to Alice, and the Alice estimates to obtain a channel matrix HA
S3, safety coding: the edge side device Alice sets the key message b as (b) through security coding1,b2,...bm) Coded as binary bits s ═(s)1,s2,...sn);
Assuming binary security coding is used, the code rate is described as RSFor code rate R ═ m/nSWhere m is the packet length of the legitimate user information bits and n is the code length, by adjusting the transmit SNR signal-to-noise ratio such that Bob's decoded BER ρcSatisfies the following conditions
Figure BDA0002627469230000021
S4, forming a transmitting signal by combining artificial noise:
forming a transmitting signal x by combining MIMO beam forming and artificial noise by Alice:
x=fs+Gz;
where s is the modulated unit scalar transmit key symbol and z is NT-a 1 x 1-dimensional randomly generated complex gaussian artificial noise AN vector; the transmit beamformer is represented as:
f=V(:,1);
wherein HA=UΣVHRepresenting singular value decomposition, f ═ V (: 1) is the first column vector of V;
meanwhile, the interference signal needs to be in the null space of Bob to avoid interference to legal users, and G is equal to V (: 2: N)T-1), thus:
HAG·z⊥HAf
in terms of power allocation, the transmit signal covariance matrix E { xxH}=Qx,Tr(Qx)≤PmaxWherein T isr(-) represents the trace-finding operator; the power allocated to the legitimate signal is PSTransmitting the interference signal with the residual power, then PAN=Pmax-PSAnd E: (a)ZZ H)=[PAN/(NT-1)I];
S5, signal receiving and decoding: legal terminal Bob receivesDemodulating the signal and decoding the m key bits from the received signal
Figure BDA0002627469230000022
In the step S5, N is setA>NBNot less than 1 and N is guaranteedA-1>NE(ii) a Wherein N isENumber of antennas for eavesdroppers; at the receiving end, wAAnd wERespectively represent NR×1,NEAnd receiving the combining vector in the dimension of x 1, wherein after receiving and combining, the signals received by Bob and Eve are represented as follows:
Figure BDA0002627469230000031
Figure BDA0002627469230000032
wherein n isAAnd nEWhite noise vectors corresponding to Bob and Eve receiving signals respectively, and the power covariance of the white noise vectors is satisfied by a matrix:
Figure BDA0002627469230000033
HAand HEIndependent of each other, channel matrices for the main channel and the eavesdropping channel, Alice and Bob unknown HE(ii) a Wherein Alice feeds back wA=HAf. To Bob, there are:
Figure BDA0002627469230000034
Figure BDA0002627469230000035
due to HAG·z⊥HAf, then there are:
Figure BDA0002627469230000036
Figure BDA0002627469230000037
that is, Bob is not interfered by artificial noise, and the received signal-to-interference-and-noise ratio is expressed as:
Figure BDA0002627469230000038
eve received artifact HEThe reception quality of the interference of G · z decreases with increasing noise power, and the received signal-to-interference-and-noise ratio is expressed as:
Figure BDA0002627469230000039
the legitimate receiver Bob gets the sequence
Figure BDA00026274692300000310
Is a noisy version of the sequence s; meanwhile, an eavesdropper Eve can observe a noisy symbol sequence
Figure BDA00026274692300000311
Selecting a transmission power PSSum noise power PANThe receiving signal-to-noise ratio of Bob is better than that of Eve, so that when Bob normally receives signals, Eve is interfered, and Eve is interfered
It is difficult for an eavesdropper to obtain the key message b (b) by demodulating and securely decoding the received signal1,b2,...bm) A consistent key bit; and the legal terminal Bob can obtain the message b (b) of the key by demodulating and safely decoding the received signal1,b2,...bm) Consistent m-bit key bits
Figure BDA00026274692300000312
S6, repeatedly executing the step S3 to the step S5 until Bob obtains the keys with the length of L symbols.
In step S6, after Bob has obtained L symbol-length keys, the method further includes a consistency confirmation step:
and B, confirming the consistency of the key between Bob and Alice, finishing the key sharing if the key obtained by Bob is consistent with the key shared by Alice, returning to the step S2 if the key obtained by Bob is consistent with the key shared by Alice, and re-executing the key sharing process according to the steps S2-S6.
Preferably, when Bob and Alice confirm the key consistency, the consistency confirmation method adopted includes:
alice uses the shared secret key to generate a signature through a hash function, encrypts the digital signature by using the shared secret key to obtain a ciphertext signature to be sent, and sends the ciphertext signature to Bob;
bob decrypts the ciphertext digital signature by using the key obtained by the Bob, generates the digital signature by using the key obtained by the Bob through a Hash function, compares the decoded digital signature with the digital signature of the Bob, and if the digital signature is consistent with the digital signature of the Bob, the key consistency is passed.
The invention has the beneficial effects that: (1) the invention only needs 2 times of interaction to realize the key distribution of the physical layer, realizes the low error rate of the terminal, and reduces the time delay and the complexity caused by key sharing; meanwhile, only one channel estimation is needed when the secret key is shared, which is beneficial to saving the expenditure. (2) According to the key distribution process, the key quantization, negotiation and privacy amplification do not need to be carried out by two parties, so that the two parties do not need to carry out multiple interactive negotiations related to the process on a public channel, and the complexity is reduced. (3) In the current technology, at least more than 3 times of interaction (including the processes of pilot frequency transmission, key agreement, privacy amplification, final consistency confirmation and the like of a transmitting party and a receiving party) needs to be performed on a public channel in the process of establishing a key, so that the complexity of a communication protocol is higher, and the hidden danger of information leakage is promoted. The technology does not need the processes of key quantization, negotiation and privacy amplification in public channel negotiation, avoids the hidden danger of information leakage, and improves the safety.
Drawings
FIG. 1 is a flow chart of a method of the present invention;
FIG. 2 is a schematic diagram of a key distribution architecture of a physical layer under an edge computing network;
FIG. 3 is a schematic diagram of the key bit error probability of Bob and Eve;
FIG. 4 is a diagram illustrating the probability of key bit errors of Bob and Eve under different transmission signal-to-noise ratios.
Detailed Description
The technical solutions of the present invention are further described in detail below with reference to the accompanying drawings, but the scope of the present invention is not limited to the following.
As shown in FIG. 1, a key sharing method based on artificial noise and security coding in edge calculation comprises the following steps
S1, setting a protection area:
setting that an edge side device Alice and a legal terminal Bob need to share a secret key, wherein Eve is an eavesdropper;
the edge device Alice and the legal terminal Bob respectively surround the edge device Alice and the legal terminal Bob by a protective area with the radius of R, and the protective area is an area where an eavesdropper Eve is forbidden to enter, so that the eavesdropper Eve cannot enter the protective area for eavesdropping, and the eavesdropper can be realized by a fence and a fence on a physical layer, and can also be a forbidden area for manual duty; namely, ensuring that the distance between Eve and Alice is greater than R and the distance between Eve and Bob is greater than R; the radius length of the protection region is generally required to be greater than the uncorrelated distance of the channel, and in the embodiment of the present application, the length is determined by the propagation environment of the channel and the frequency of the carrier frequency, and is generally 10cm to 100cm in the environment of sufficient scattering.
NAAnd NBRespectively representing the number of antennas, N, of Alice and BobA>NB≥1;
S2, channel estimation: bob sends a channel estimation sequence to Alice, and the Alice estimates to obtain a channel matrix HA
S3, safety coding: the edge side device Alice sets the key message b as (b) through security coding1,b2,...bm) Coded as binary bits s ═(s)1,s2,...sn);
Assuming binary security coding is used, the code rate is described as RSFor code rate R ═ m/nSWhere m is the packet length of the legitimate user information bits and n is the code length, by adjusting the transmit SNR signal-to-noise ratio such that Bob's decoded BER ρcSatisfies the following conditions
Figure BDA0002627469230000051
S4, forming a transmitting signal by combining artificial noise:
forming a transmitting signal x by combining MIMO beam forming and artificial noise by Alice:
x=fs+Gz;
where s is the modulated unit scalar transmit key symbol and z is NT-a 1 x 1-dimensional randomly generated complex gaussian artificial noise AN vector; the transmit beamformer is represented as:
f=V(:,1);
wherein HA=UΣVHRepresenting singular value decomposition, f ═ V (: 1) is the first column vector of V;
meanwhile, the interference signal needs to be in the null space of Bob to avoid interference to legal users, and G is equal to V (: 2: N)T-1), thus:
HAG·z⊥HAf
in terms of power allocation, the transmit signal covariance matrix E { xxH}=Qx,Tr(Qx)≤PmaxWherein T isr(-) represents the trace-finding operator; the power allocated to the legitimate signal is PSTransmitting the interference signal with the residual power, then PAN=Pmax-PSAnd E: (a)ZZ H)=[PAN/(NT-1)I];
S5, signal receiving and decoding: legal terminal Bob receives and demodulates the signal and decodes m key bits from the received signal
Figure BDA0002627469230000061
In the step S5, N is setA>NBNot less than 1 and N is guaranteedA-1>NE(ii) a Wherein N isENumber of antennas for eavesdroppers; at the receiving end, wAAnd wERespectively represent NR×1,NEAnd receiving the combining vector in the dimension of x 1, wherein after receiving and combining, the signals received by Bob and Eve are represented as follows:
Figure BDA0002627469230000062
Figure BDA0002627469230000063
wherein n isAAnd nEWhite noise vectors corresponding to Bob and Eve receiving signals respectively, and the power covariance of the white noise vectors is satisfied by a matrix:
Figure BDA0002627469230000064
HAand HEIndependent of each other, channel matrices for the main channel and the eavesdropping channel, Alice and Bob unknown HE(ii) a Wherein Alice feeds back wA=HAf. To Bob, there are:
Figure BDA0002627469230000065
Figure BDA0002627469230000066
due to HAG·z⊥HAf, then there are:
Figure BDA0002627469230000067
Figure BDA0002627469230000068
that is, Bob is not interfered by artificial noise, and the received signal-to-interference-and-noise ratio is expressed as:
Figure BDA0002627469230000069
eve received artifact HEThe reception quality of the interference of G · z decreases with increasing noise power, and the received signal-to-interference-and-noise ratio is expressed as:
Figure BDA00026274692300000610
the legitimate receiver Bob gets the sequence
Figure BDA00026274692300000611
Is a noisy version of the sequence s; meanwhile, an eavesdropper Eve can observe a noisy symbol sequence
Figure BDA00026274692300000612
Selecting a transmission power PSSum noise power PANThe receiving signal-to-noise ratio of Bob is better than that of Eve, so that when Bob normally receives signals, Eve is interfered, and Eve is interfered
It is difficult for an eavesdropper to obtain the key message b (b) by demodulating and securely decoding the received signal1,b2,...bm) A consistent key bit; and the legal terminal Bob can obtain the message b (b) of the key by demodulating and safely decoding the received signal1,b2,...bm) Consistent m-bit key bits
Figure BDA0002627469230000071
S6, repeatedly executing the steps S3 to S5 until Bob obtains L keys with symbol lengths, wherein L is greater than m, and L is generally an integral multiple of m, generally, for the key to be shared, L is a determined known value, and codes m with different lengths can be selected according to actual conditions and L requirements.
In step S6, after Bob has obtained L symbol-length keys, the method further includes a consistency confirmation step:
and B, confirming the consistency of the key between Bob and Alice, finishing the key sharing if the key obtained by Bob is consistent with the key shared by Alice, returning to the step S2 if the key obtained by Bob is consistent with the key shared by Alice, and re-executing the key sharing process according to the steps S2-S6.
In the embodiment of the present application, when Bob and Alice perform key consistency confirmation, the adopted consistency confirmation method includes:
alice uses the shared secret key to generate a signature through a hash function, encrypts the digital signature by using the shared secret key to obtain a ciphertext signature to be sent, and sends the ciphertext signature to Bob;
bob decrypts the ciphertext digital signature by using the key obtained by the Bob, generates the digital signature by using the key obtained by the Bob through a Hash function, compares the decoded digital signature with the digital signature of the Bob, and if the digital signature is consistent with the digital signature of the Bob, the key consistency is passed.
In the embodiment of the present application, an edge computing network lower physical layer key distribution architecture is as shown in fig. 2, and fig. 3 shows key bit error probabilities of Bob and Eve (error probabilities when PAN is 10dB, 20dB, and with or without security coding), and fig. 4 shows key bit error probabilities of Bob and Eve under different transmission signal-to-noise ratios, it can be seen that, as the signal-to-noise ratio of the transmission signal and the artificial interference power increase, the Eve decoding key bit error rate remains 0.5, which ensures the security thereof, while the Bob key bit decoding error probability decreases exponentially and tends to 0, which ensures the high consistency thereof.
The foregoing is a preferred embodiment of the present invention, it is to be understood that the invention is not limited to the form disclosed herein, but is not to be construed as excluding other embodiments, and is capable of other combinations, modifications, and environments and is capable of changes within the scope of the inventive concept as expressed herein, commensurate with the above teachings, or the skill or knowledge of the relevant art. And that modifications and variations may be effected by those skilled in the art without departing from the spirit and scope of the invention as defined by the appended claims.

Claims (3)

1. A secret key sharing method based on artificial noise and safety coding in edge calculation is characterized in that: comprises the following steps
S1, setting a protection area:
setting that an edge side device Alice and a legal terminal Bob need to share a secret key, wherein Eve is an eavesdropper;
the edge device Alice and the legal terminal Bob respectively surround the edge device Alice and the legal terminal Bob by using a protection area with the radius of R, so that an eavesdropper Eve cannot enter the protection area for eavesdropping, namely, the distance between Eve and Alice is ensured to be larger than R, and the distance between Eve and Bob is ensured to be larger than R;
NAand NBRespectively representing the number of antennas, N, of Alice and BobA>NB≥1;
S2, channel estimation: bob sends a channel estimation sequence to Alice, and the Alice estimates to obtain a channel matrix HA
S3, safety coding: the edge side device Alice sets the key message b as (b) through security coding1,b2,...bm) Coded as binary bits s ═(s)1,s2,...sn);
Assuming binary security coding is used, the code rate is described as RSFor code rate R ═ m/nSWhere m is the packet length of the legitimate user information bits and n is the code length, by adjusting the transmit SNR signal-to-noise ratio such that Bob's decoded BER ρcSatisfies the following conditions
Figure FDA0002627469220000011
S4, forming a transmitting signal by combining artificial noise:
forming a transmitting signal x by combining MIMO beam forming and artificial noise by Alice:
x=fs+Gz;
where s is the modulated unit scalar transmit key symbol and z is NT-a 1 x 1-dimensional randomly generated complex gaussian artificial noise AN vector; the transmit beamformer is represented as:
f=V(:,1);
wherein HA=UΣVHRepresenting singular value decomposition, f ═ V (: 1) is the first column vector of V;
meanwhile, the interference signal needs to be in the null space of Bob to avoid interference to legal users, and G is equal to V (: 2: N)T-1), thus:
HAG·z⊥HAf
in terms of power allocation, the transmit signal covariance matrix E { xxH}=Qx,Tr(Qx)≤PmaxWherein T isr(-) represents the trace-finding operator; the power allocated to the legitimate signal is PSTransmitting the interference signal with the residual power, then PAN=Pmax-PSAnd E: (a)ZZ H)=[PAN/(NT-1)]I;
S5, signal receiving and decoding: legal terminal Bob receives and demodulates the signal and decodes m key bits from the received signal
Figure FDA0002627469220000021
S6, repeatedly executing the step S3 to the step S5 until Bob obtains the keys with the length of L symbols.
2. The method of claim 1, wherein the method comprises: in the step S5, N is setA>NBNot less than 1 and N is guaranteedA-1>NE(ii) a Wherein N isENumber of antennas for eavesdroppers;
at the receiving end, wAAnd wERespectively represent NR×1,NEThe x 1-dimensional received combined vector,after the reception and combination process, the signals received by Bob and Eve are represented as follows:
Figure FDA0002627469220000022
Figure FDA0002627469220000023
wherein n isAAnd nEWhite noise vectors corresponding to Bob and Eve receiving signals respectively, and the power covariance of the white noise vectors is satisfied by a matrix:
Figure FDA0002627469220000024
HAand HEIndependent of each other, channel matrices for the main channel and the eavesdropping channel, Alice and Bob unknown HE(ii) a Wherein Alice feeds back wA=HAf. To Bob, there are:
Figure FDA0002627469220000025
Figure FDA0002627469220000026
due to HAG·z⊥HAf, then there are:
Figure FDA0002627469220000027
Figure FDA0002627469220000028
that is, Bob is not interfered by artificial noise, and the received signal-to-interference-and-noise ratio is expressed as:
Figure FDA0002627469220000029
eve received artifact HEThe reception quality of the interference of G · z decreases with increasing noise power, and the received signal-to-interference-and-noise ratio is expressed as:
Figure FDA00026274692200000210
the legitimate receiver Bob gets the sequence
Figure FDA0002627469220000031
Is a noisy version of the sequence s; meanwhile, an eavesdropper Eve can observe a noisy symbol sequence
Figure FDA0002627469220000032
Selecting a transmission power PSSum noise power PANThe receiving signal-to-noise ratio of Bob is better than that of Eve, so that when Bob normally receives signals, Eve is interfered, and Eve is interfered
It is difficult for an eavesdropper to obtain the key message b (b) by demodulating and securely decoding the received signal1,b2,...bm) A consistent key bit; and the legal terminal Bob can obtain the message b (b) of the key by demodulating and safely decoding the received signal1,b2,...bm) Consistent m-bit key bits
Figure FDA0002627469220000033
3. The method of claim 1, wherein the method comprises: in step S6, after Bob has obtained L symbol-length keys, the method further includes a consistency confirmation step:
and B, confirming the consistency of the key between Bob and Alice, finishing the key sharing if the key obtained by Bob is consistent with the key shared by Alice, returning to the step S2 if the key obtained by Bob is consistent with the key shared by Alice, and re-executing the key sharing process according to the steps S2-S6.
CN202010801225.2A 2020-08-11 2020-08-11 Key sharing method based on artificial noise and security coding in edge calculation Active CN111934863B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010801225.2A CN111934863B (en) 2020-08-11 2020-08-11 Key sharing method based on artificial noise and security coding in edge calculation

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010801225.2A CN111934863B (en) 2020-08-11 2020-08-11 Key sharing method based on artificial noise and security coding in edge calculation

Publications (2)

Publication Number Publication Date
CN111934863A true CN111934863A (en) 2020-11-13
CN111934863B CN111934863B (en) 2024-01-09

Family

ID=73310256

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010801225.2A Active CN111934863B (en) 2020-08-11 2020-08-11 Key sharing method based on artificial noise and security coding in edge calculation

Country Status (1)

Country Link
CN (1) CN111934863B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114745235A (en) * 2022-04-07 2022-07-12 展讯通信(上海)有限公司 Data preprocessing method and device for transform domain channel estimation and communication equipment

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106357373A (en) * 2016-08-30 2017-01-25 湖南国天电子科技有限公司 Security transmission method, based on man made noise, of spatially modulated physical layer
CN106374980A (en) * 2016-07-27 2017-02-01 西安交通大学 Safe transmission method in MIMO Y eavesdropping network based on real interference alignment
CN106685639A (en) * 2016-12-15 2017-05-17 西安交通大学 Encrypted safe transmission method for sequential cipher based on artificial added noise in 5G communication system
CN106789027A (en) * 2017-01-03 2017-05-31 电子科技大学 It is a kind of that uniformity confirmation method and system are carried out to key using unconditional security transmission
US10069592B1 (en) * 2015-10-27 2018-09-04 Arizona Board Of Regents On Behalf Of The University Of Arizona Systems and methods for securing wireless communications
US20190229833A1 (en) * 2018-01-24 2019-07-25 Korea Advanced Institute Of Science And Technology Apparatus and method for secure communication using artificial noise scheme
CN111082933A (en) * 2019-12-27 2020-04-28 电子科技大学 Multi-user physical layer safety communication method capable of resisting any plurality of cooperation eavesdroppers

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10069592B1 (en) * 2015-10-27 2018-09-04 Arizona Board Of Regents On Behalf Of The University Of Arizona Systems and methods for securing wireless communications
CN106374980A (en) * 2016-07-27 2017-02-01 西安交通大学 Safe transmission method in MIMO Y eavesdropping network based on real interference alignment
CN106357373A (en) * 2016-08-30 2017-01-25 湖南国天电子科技有限公司 Security transmission method, based on man made noise, of spatially modulated physical layer
CN106685639A (en) * 2016-12-15 2017-05-17 西安交通大学 Encrypted safe transmission method for sequential cipher based on artificial added noise in 5G communication system
CN106789027A (en) * 2017-01-03 2017-05-31 电子科技大学 It is a kind of that uniformity confirmation method and system are carried out to key using unconditional security transmission
US20190229833A1 (en) * 2018-01-24 2019-07-25 Korea Advanced Institute Of Science And Technology Apparatus and method for secure communication using artificial noise scheme
CN111082933A (en) * 2019-12-27 2020-04-28 电子科技大学 Multi-user physical layer safety communication method capable of resisting any plurality of cooperation eavesdroppers

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
JIE TANG ET.AL.: "Secret Key Attaches in MIMO IoT Communications by Using Self-injection Artificial Noise", 2020 IEEE INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND INFORMATION SYSTEMS (ICAIIS), pages 225 - 229 *
唐杰: "未来无线通信中基于物理信道的安全技术研究", 万方学位论文集, pages 56 - 83 *
程伟等: "结合无条件安全传输的密钥一致性确认方法", 通信技术, vol. 50, no. 6, pages 1281 - 1283 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114745235A (en) * 2022-04-07 2022-07-12 展讯通信(上海)有限公司 Data preprocessing method and device for transform domain channel estimation and communication equipment
CN114745235B (en) * 2022-04-07 2024-04-19 展讯通信(上海)有限公司 Data preprocessing method and device for transform domain channel estimation and communication equipment

Also Published As

Publication number Publication date
CN111934863B (en) 2024-01-09

Similar Documents

Publication Publication Date Title
Koorapaty et al. Secure information transmission for mobile radio
Xiong et al. Secure transmission against pilot spoofing attack: A two-way training-based scheme
Yang et al. Physical layer security with threshold-based multiuser scheduling in multi-antenna wireless networks
Badawy et al. Unleashing the secure potential of the wireless physical layer: Secret key generation methods
Chen et al. Fast power allocation for secure communication with full-duplex radio
Vázquez-Castro et al. Physical layer security for RF satellite channels in the finite-length regime
CN111082933B (en) Multi-user physical layer safety communication method capable of resisting any plurality of cooperation eavesdroppers
Osorio et al. Safeguarding MTC at the physical layer: Potentials and challenges
Cohen et al. Wiretap channel with causal state information and secure rate-limited feedback
Tang et al. Sharing secrets via wireless broadcasting: A new efficient physical layer group secret key generation for multiple IoT devices
Hyadi et al. Secure broadcasting with imperfect channel state information at the transmitter
Bang et al. Secure modulation based on constellation mapping obfuscation in OFDM based TDD systems
Ismayil Siyad et al. Chaotic deep neural network based physical layer key generation for massive MIMO
CN111934863B (en) Key sharing method based on artificial noise and security coding in edge calculation
CN111786789B (en) Physical layer key distribution method based on random wave beam and edge calculation
Han et al. A novel physical layer key generation method based on wgan-gp adversarial autoencoder
CN111726221B (en) Physical layer safety transmission method capable of resisting arbitrary eavesdropping antenna number
Park et al. Fronthaul quantization as artificial noise for enhanced secret communication in C-RAN
Hu et al. Modulated symbol-based one-time pad secure transmission scheme using physical layer keys
CN110365374B (en) Safe and accurate wireless transmission method based on multi-phased array direction modulation
Vazquez-Castro et al. One-way and two-way physical layer security protocols for the Gaussian satellite channel
CN111711518B (en) Method for simultaneously distributing key of multi-user physical layer and broadcasting communication
CN113595675B (en) Interference management method and system for maximizing safe data transmission rate
Zou et al. Layered secure broadcasting over MIMO channels and application in secret sharing
CN111586679B (en) Safety guarantee method based on limited feedback non-orthogonal multiple access network

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant