CN111934863B - Key sharing method based on artificial noise and security coding in edge calculation - Google Patents

Key sharing method based on artificial noise and security coding in edge calculation Download PDF

Info

Publication number
CN111934863B
CN111934863B CN202010801225.2A CN202010801225A CN111934863B CN 111934863 B CN111934863 B CN 111934863B CN 202010801225 A CN202010801225 A CN 202010801225A CN 111934863 B CN111934863 B CN 111934863B
Authority
CN
China
Prior art keywords
bob
key
alice
signal
eve
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010801225.2A
Other languages
Chinese (zh)
Other versions
CN111934863A (en
Inventor
许爱东
唐杰
张宇南
蒋屹新
文红
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
University of Electronic Science and Technology of China
CSG Electric Power Research Institute
Original Assignee
University of Electronic Science and Technology of China
CSG Electric Power Research Institute
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by University of Electronic Science and Technology of China, CSG Electric Power Research Institute filed Critical University of Electronic Science and Technology of China
Priority to CN202010801225.2A priority Critical patent/CN111934863B/en
Publication of CN111934863A publication Critical patent/CN111934863A/en
Application granted granted Critical
Publication of CN111934863B publication Critical patent/CN111934863B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B7/00Radio transmission systems, i.e. using radiation field
    • H04B7/02Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
    • H04B7/04Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
    • H04B7/0413MIMO systems
    • H04B7/0426Power distribution
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B7/00Radio transmission systems, i.e. using radiation field
    • H04B7/02Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
    • H04B7/04Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
    • H04B7/06Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station
    • H04B7/0613Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station using simultaneous transmission
    • H04B7/0615Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station using simultaneous transmission of weighted versions of same signal
    • H04B7/0617Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station using simultaneous transmission of weighted versions of same signal for beam forming
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L25/00Baseband systems
    • H04L25/38Synchronous or start-stop systems, e.g. for Baudot code
    • H04L25/40Transmitting circuits; Receiving circuits
    • H04L25/49Transmitting circuits; Receiving circuits using code conversion at the transmitter; using predistortion; using insertion of idle bits for obtaining a desired frequency spectrum; using three or more amplitude levels ; Baseband coding techniques specific to data transmission systems
    • H04L25/4906Transmitting circuits; Receiving circuits using code conversion at the transmitter; using predistortion; using insertion of idle bits for obtaining a desired frequency spectrum; using three or more amplitude levels ; Baseband coding techniques specific to data transmission systems using binary codes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Abstract

The invention discloses a key sharing method based on artificial noise and security coding in edge calculation, which comprises the following steps of S1, setting a protection area: s2, channel estimation: bob sends a channel estimation sequence to Alice, and Alice estimates to obtain a channel matrix H A The method comprises the steps of carrying out a first treatment on the surface of the S3, safety coding: edge side device Alice encodes key message b= (b) by security coding 1 ,b 2 ,...b m ) Encoding into binary bits s=(s) 1 ,s 2 ,...s n ) The method comprises the steps of carrying out a first treatment on the surface of the S4, combining artificial noise to form a transmitting signal: alice forms the transmit signal x by MIMO beamforming in combination with artificial noise: x=fs+gz; s5, signal receiving and decoding: legal terminal Bob receives and demodulates the signal and decodes m-bit key bits from the received signalS6, repeatedly executing the steps S3 to S5 until Bob obtains the keys with L symbol lengths.

Description

Key sharing method based on artificial noise and security coding in edge calculation
Technical Field
The present invention relates to key sharing in edge computing, and more particularly, to a key sharing method based on artificial noise and security coding in edge computing.
Background
The edge computing is used for migrating part or all of computing tasks of the original cloud computing model to network edge equipment, so that the computing load of a cloud computing center is reduced, and network congestion is relieved. The edge calculation has rich application scenes such as cloud computing task migration, video monitoring, intelligent transportation, intelligent power grid and the like. With the rapid development of the 5G internet of things and the edge computing network, a great deal of novel services and applications are continuously emerging. Various secret and sensitive data in a wireless network are grown in mass, the information security problem is increasingly outstanding, and the security is becoming a precondition for various different business applications. In conventional wireless communication networks, cryptography-based encryption techniques are typically used at the network layer and upper layers to secure system communications. While performing various encryption authentications requires establishing a secure shared key between the two parties. In a large number of novel application scenes of edge computing, for example, a large number of resource-limited sensing node terminals are accessed in a large-scale internet of things (IoT) network and a smart grid network, so that the complexity of key distribution and management based on cryptography is extremely high and even difficult to realize. The key generation and distribution technology based on physical channel has the basic principle of utilizing the randomness and reciprocity of fading channel to generate and distribute the key between legal users.
Currently, there are some preliminary researches on physical layer key generation, but the current physical layer key generation rate is slow, and the rate and the channel variation speed are highly correlated. Experiments verify that a typical physical layer key distribution system of 3 transmit and receive antennas requires 10 seconds or more to achieve an AES symmetric encryption key with a 128 bit length in an indoor channel with a key error rate of orders of magnitude lower. Because the two parties need to perform more than 3 interactions (including the processes of sending pilot frequency, key negotiation, privacy amplification, final consistency confirmation and the like by the two parties) on the public channel in the process of establishing the key, the complexity of the communication protocol is higher, and the hidden danger of information leakage is improved.
Disclosure of Invention
The invention aims to overcome the defects of the prior art, and provides a key sharing method based on artificial noise and security codes in edge computing, wherein the artificial noise and security codes are utilized to realize physical layer key distribution in an edge computing environment, and only two interactions are needed to realize physical layer key distribution, so that time delay and complexity caused by key sharing are reduced.
The aim of the invention is realized by the following technical scheme: a key sharing method based on artificial noise and security coding in edge calculation comprises the following steps of
S1, setting a protection area:
setting edge side equipment Alice and legal terminal Bob to share a secret key, wherein Eve is an eavesdropper;
the edge equipment Alice and the legal terminal Bob respectively use a protection area with the radius of R to surround the edge equipment Alice and the legal terminal Bob, so that an eavesdropper Eve cannot enter the protection area to eavesdrop, namely the distance between Eve and Alice is ensured to be larger than R, and the distance between Eve and Bob is ensured to be larger than R;
N A and N B Respectively represent the antenna numbers of Alice and Bob, N A >N B ≥1;
S2, channel estimation: bob sends a channel estimation sequence to Alice, and Alice estimates to obtain a channel matrix H A
S3, safety coding: edge side device Alice encodes key message b= (b) by security coding 1 ,b 2 ,...b m ) Encoding into binary bits s=(s) 1 ,s 2 ,...s n );
Assuming binary security coding is used, the code rate is described as R S For code rate R =m/n S (n, m)A security code, where m is the legal user information bit packet length and n is the code length, and by adjusting the transmission SNR signal-to-noise ratio, the decoding BER ρ of Bob is made c The following conditions are satisfied
S4, combining artificial noise to form a transmitting signal:
alice forms the transmit signal x by MIMO beamforming in combination with artificial noise:
x=fs+Gz;
where s is the modulated unit scalar transmit key symbol and z is N T -1 x 1-dimensional randomly generated complex gaussian artificial noise AN vector; the transmit beamformer is denoted as:
f=V(:,1);
wherein H is A =UΣV H A first column vector representing singular value decomposition, f=v (: 1) being V;
meanwhile, the interference signal needs to be in the null space of Bob so as not to generate interference to the legitimate user, and the interference signal is denoted by g=v (: 2:n T -1), therefore there are:
H A G·z⊥H A f
in terms of power allocation, the transmit signal covariance matrix E { xx } H }=Q x ,T r (Q x )≤P max Wherein T is r (. Cndot.) represents a trace operator; the power allocated to the legitimate signal is P S Transmitting interference signal with residual power, P AN =P max -P S And E is% ZZ H )=[P AN /(N T -1)I];
S5, signal receiving and decoding: legal terminal Bob receives and demodulates the signal and decodes m-bit key bits from the received signal
In the step S5, N is set A >N B Not less than 1 and N is required to be ensured A -1>N E The method comprises the steps of carrying out a first treatment on the surface of the Wherein N is E The number of antennas for an eavesdropper; at the receiving end, w A And w E Respectively represent N R ×1,N E The x 1-dimensional received combined vector, after being received and combined, is represented by the signals received by Bob and Eve as follows:
wherein n is A And n E The power covariance of the white noise vectors corresponding to the Bob and Eve received signals is matrix:
H A and H E Independent of each other, is a channel matrix of the main channel and the eavesdropping channel, and Alice and Bob are unknown H E The method comprises the steps of carrying out a first treatment on the surface of the Wherein Alice feeds back w A =H A f. For Bob, then there are:
due to H A G·z⊥H A f, there are:
that is, bob is not disturbed by artificial noise, and the received signal-to-interference-and-noise ratio is expressed as:
eve receives artificial noise H E G·z interference, whose reception quality decreases with increasing noise power, and whose reception signal-to-interference-and-noise ratio is expressed as:
legal receiver Bob gets the sequenceIs a noisy version of sequence s; at the same time, the eavesdropper Eve can also observe noisy symbol sequences +.>Selecting a transmit power P S And noise power P AN So that the received signal-to-noise ratio of Bob is better than that of Eve, thereby realizing the interference effect on Eve when Bob normally receives signals and leading to
It is difficult for an eavesdropper to obtain the and key message b= (b) by demodulating and securely decoding the received signal 1 ,b 2 ,...b m ) A consistent key bit; and the legal terminal Bob can obtain the and key message b= (b) through demodulating and safely decoding the received signal 1 ,b 2 ,...b m ) Consistent m-bit key bits
S6, repeatedly executing the steps S3 to S5 until Bob obtains the keys with L symbol lengths.
In the step S6, bob, after having obtained the L symbol-length keys, further includes a consistency confirmation step:
and (3) confirming the consistency of the key between Bob and Alice, if the key obtained by Bob is consistent with the Alice sharing key, completing the key sharing, and if the key obtained by Bob is consistent with the Alice sharing key, returning to the step S2, and re-executing the key sharing process according to the steps S2-S6.
Preferably, when Bob and Alice perform the key consistency confirmation, the adopted consistency confirmation method comprises the following steps:
alice generates a signature by using the shared secret key through a hash function, encrypts the digital signature by using the shared secret key to obtain a ciphertext signature to be transmitted, and transmits the ciphertext signature to Bob;
and (3) the Bob decrypts the ciphertext digital signature by using the obtained key, generates the digital signature by using the hash function through the obtained key, compares the solved digital signature with the digital signature, and if the solved digital signature is consistent with the digital signature, the consistency of the key is passed.
The beneficial effects of the invention are as follows: (1) According to the invention, only 2 times of interaction are needed to realize physical layer key distribution, so that the low error rate of the terminal is realized, and the time delay and complexity caused by key sharing are reduced; meanwhile, only one channel estimation is needed in the process of key sharing, so that the cost is saved. (2) The key distribution process does not need to carry out key quantization, negotiation and privacy amplification by both sides, so that the multiple interactive negotiations related to the process are not needed by both sides on a public channel, and the complexity is reduced. (3) The current technology needs to perform at least 3 interactions (including the processes of mutual pilot frequency transmission, key negotiation, privacy amplification, final consistency confirmation and the like of the receiving and transmitting sides) on a public channel in the process of establishing the key, so that the complexity of a communication protocol is higher, and the hidden danger of information leakage is improved. The technology does not need the process of key quantization, negotiation and privacy amplification in the common channel negotiation, avoids hidden danger of information leakage, and improves the safety.
Drawings
FIG. 1 is a flow chart of the method of the present invention;
FIG. 2 is a schematic diagram of a physical layer key distribution architecture under an edge computing network;
FIG. 3 is a schematic diagram of the key bit error probabilities for Bob and Eve;
fig. 4 is a schematic diagram of key bit error probabilities of Bob and Eve at different transmission signal-to-noise ratios.
Detailed Description
The technical solution of the present invention will be described in further detail with reference to the accompanying drawings, but the scope of the present invention is not limited to the following description.
As shown in FIG. 1, a key sharing method based on artificial noise and security coding in edge calculation comprises the following steps of
S1, setting a protection area:
setting edge side equipment Alice and legal terminal Bob to share a secret key, wherein Eve is an eavesdropper;
the edge equipment Alice and the legal terminal Bob respectively use a protection area with the radius R to surround the edge equipment Alice and the legal terminal Bob, wherein the protection area is an area which can not be accessed by an eavesdropper Eve, so that the eavesdropper Eve can not access the protection area to eavesdrop, and the eavesdropping can be realized through a fence or an enclosing wall on a physical level or can be a forbidden area on an artificial duty; namely, ensuring that the distance between Eve and Alice is larger than R, and ensuring that the distance between Eve and Bob is larger than R; the radius length of the guard area is typically greater than the uncorrelated distance of the channel, and in the embodiments of the present application, the length is determined by the channel propagation environment and carrier frequency, and the scattering is typically 10cm-100cm in a sufficient environment.
N A And N B Respectively represent the antenna numbers of Alice and Bob, N A >N B ≥1;
S2, channel estimation: bob sends a channel estimation sequence to Alice, and Alice estimates to obtain a channel matrix H A
S3, safety coding: edge side device Alice encodes key message b= (b) by security coding 1 ,b 2 ,...b m ) Encoding into binary bits s=(s) 1 ,s 2 ,...s n );
Assuming binary security coding is used, the code rate is described as R S For code rate R =m/n S Where m is the legal user information bit packet length and n is the code length, by adjusting the transmit SNR signal-to-noise ratio such that Bob's interpretationCode BER ρ c The following conditions are satisfied
S4, combining artificial noise to form a transmitting signal:
alice forms the transmit signal x by MIMO beamforming in combination with artificial noise:
x=fs+Gz;
where s is the modulated unit scalar transmit key symbol and z is N T -1 x 1-dimensional randomly generated complex gaussian artificial noise AN vector; the transmit beamformer is denoted as:
f=V(:,1);
wherein H is A =UΣV H A first column vector representing singular value decomposition, f=v (: 1) being V;
meanwhile, the interference signal needs to be in the null space of Bob so as not to generate interference to the legitimate user, and the interference signal is denoted by g=v (: 2:n T -1), therefore there are:
H A G·z⊥H A f
in terms of power allocation, the transmit signal covariance matrix E { xx } H }=Q x ,T r (Q x )≤P max Wherein T is r (. Cndot.) represents a trace operator; the power allocated to the legitimate signal is P S Transmitting interference signal with residual power, P AN =P max -P S And E is% ZZ H )=[P AN /(N T -1)I];
S5, signal receiving and decoding: legal terminal Bob receives and demodulates the signal and decodes m-bit key bits from the received signal
In the step S5, N is set A >N B Not less than 1 and N is required to be ensured A -1>N E The method comprises the steps of carrying out a first treatment on the surface of the Wherein N is E The number of antennas for an eavesdropper; at the receiving end, w A And w E Respectively represent N R ×1,N E The x 1-dimensional received combined vector, after being received and combined, is represented by the signals received by Bob and Eve as follows:
wherein n is A And n E The power covariance of the white noise vectors corresponding to the Bob and Eve received signals is matrix:
H A and H E Independent of each other, is a channel matrix of the main channel and the eavesdropping channel, and Alice and Bob are unknown H E The method comprises the steps of carrying out a first treatment on the surface of the Wherein Alice feeds back w A =H A f. For Bob, then there are:
due to H A G·z⊥H A f, there are:
that is, bob is not disturbed by artificial noise, and the received signal-to-interference-and-noise ratio is expressed as:
eve receives artificial noise H E G·z interference, whose reception quality decreases with increasing noise power, and whose reception signal-to-interference-and-noise ratio is expressed as:
legal receiver Bob gets the sequenceIs a noisy version of sequence s; at the same time, the eavesdropper Eve can also observe noisy symbol sequences +.>Selecting a transmit power P S And noise power P AN So that the received signal-to-noise ratio of Bob is better than that of Eve, thereby realizing the interference effect on Eve when Bob normally receives signals and leading to
It is difficult for an eavesdropper to obtain the and key message b= (b) by demodulating and securely decoding the received signal 1 ,b 2 ,...b m ) A consistent key bit; and the legal terminal Bob can obtain the and key message b= (b) through demodulating and safely decoding the received signal 1 ,b 2 ,...b m ) Consistent m-bit key bits
S6, repeatedly executing the steps S3 to S5 until Bob obtains keys with L symbol lengths, wherein L is larger than m, L is generally an integer multiple of m, and generally, for the keys to be shared, L is a determined known value, and codes m with different lengths can be selected according to actual conditions and L obtaining requirements.
In the step S6, bob, after having obtained the L symbol-length keys, further includes a consistency confirmation step:
and (3) confirming the consistency of the key between Bob and Alice, if the key obtained by Bob is consistent with the Alice sharing key, completing the key sharing, and if the key obtained by Bob is consistent with the Alice sharing key, returning to the step S2, and re-executing the key sharing process according to the steps S2-S6.
In the embodiment of the application, when Bob and Alice perform the key consistency confirmation, the adopted consistency confirmation method includes:
alice generates a signature by using the shared secret key through a hash function, encrypts the digital signature by using the shared secret key to obtain a ciphertext signature to be transmitted, and transmits the ciphertext signature to Bob;
and (3) the Bob decrypts the ciphertext digital signature by using the obtained key, generates the digital signature by using the hash function through the obtained key, compares the solved digital signature with the digital signature, and if the solved digital signature is consistent with the digital signature, the consistency of the key is passed.
In the embodiment of the present application, as shown in fig. 2, the physical layer key distribution architecture under the edge computing network is shown in fig. 3 of the key bit error probabilities (the error probabilities under pan=10 dB, 20dB and with or without security coding) of Bob and Eve, the key bit error probabilities of Bob and Eve under different transmission signal-to-noise ratios are shown in fig. 4, it can be seen that, as the signal-to-noise ratio and the artificial interference power of the transmission signal increase, the error rate of the Eve decoding key bit remains 0.5, ensuring the security thereof, while the error probability of Bob key bit decoding decreases exponentially and tends to 0, ensuring the high consistency thereof.
The foregoing is a preferred embodiment of the invention, and it is to be understood that the invention is not limited to the form disclosed herein, but is not to be construed as limited to other embodiments, but is capable of other combinations, modifications and environments and is capable of changes or modifications within the scope of the inventive concept, either as a result of the foregoing teachings or as a result of the knowledge or knowledge of the relevant art. And that modifications and variations which do not depart from the spirit and scope of the invention are intended to be within the scope of the appended claims.

Claims (2)

1. A key sharing method based on artificial noise and security coding in edge calculation is characterized in that: comprises the following steps
S1, setting a protection area:
setting edge side equipment Alice and legal terminal Bob to share a secret key, wherein Eve is an eavesdropper;
the edge equipment Alice and the legal terminal Bob respectively use a protection area with the radius of R to surround the edge equipment Alice and the legal terminal Bob, so that an eavesdropper Eve cannot enter the protection area to eavesdrop, namely the distance between Eve and Alice is ensured to be larger than R, and the distance between Eve and Bob is ensured to be larger than R;
N A and N B Respectively represent the antenna numbers of Alice and Bob, N A >N B ≥1;
S2, channel estimation: bob sends a channel estimation sequence to Alice, and Alice estimates to obtain a channel matrix H A
S3, safety coding: edge side device Alice encodes key message b= (b) by security coding 1 ,b 2 ,...b m ) Encoding into binary bits s=(s) 1 ,s 2 ,...s n );
Assuming binary security coding is used, the code rate is described as R S For code rate R =m/n S Where m is the legal user information bit packet length and n is the code length, by adjusting the transmit SNR signal-to-noise ratio such that Bob's decoding BER ρ c The following conditions are satisfied
S4, combining artificial noise to form a transmitting signal:
alice forms the transmit signal x by MIMO beamforming in combination with artificial noise:
x=fs+Gz;
where s is the modulated unit scalar transmit key symbol and z is N T -1 x 1-dimensional randomly generated complex gaussian artificial noise AN vector; the transmit beamformer is denoted as:
f=V(:,1);
wherein H is A =UΣV H Representing singular value decomposition, f=v (: 1) is the first column vector of V;
meanwhile, the interference signal needs to be in the null space of Bob so as not to generate interference to the legitimate user, and the interference signal is denoted by g=v (: 2:n T -1), therefore there are:
H A G·z⊥H A f
in terms of power allocation, the transmit signal covariance matrix E { xx } H }=Q x ,T r (Q x )≤P max Wherein T is r (. Cndot.) represents a trace operator; the power allocated to the legitimate signal is P S Transmitting interference signal with residual power, P AN =P max -P S And E is% ZZ H )=[P AN /(N T -1)]I;
S5, signal receiving and decoding: legal terminal Bob receives and demodulates the signal and decodes m-bit key bits from the received signal
In the step S5, N is set A >N B Not less than 1 and N is required to be ensured A -1>N E The method comprises the steps of carrying out a first treatment on the surface of the Wherein N is E The number of antennas for an eavesdropper;
at the receiving end, w A And w E Respectively represent N R ×1,N E The x 1-dimensional received combined vector, after being received and combined, is represented by the signals received by Bob and Eve as follows:
wherein n is A And n E White noise vectors corresponding to Bob and Eve received signals respectively, and the power covariance of the white noise vectors is matrixThe method meets the following conditions:
H A and H E Independent of each other, is a channel matrix of the main channel and the eavesdropping channel, and Alice and Bob are unknown H E The method comprises the steps of carrying out a first treatment on the surface of the Wherein Alice feeds back w A =H A f. For Bob, then there are:
due to H A G·z⊥H A f, there are:
that is, bob is not disturbed by artificial noise, and the received signal-to-interference-and-noise ratio is expressed as:
eve receives artificial noise H E G·z interference, whose reception quality decreases with increasing noise power, and whose reception signal-to-interference-and-noise ratio is expressed as:
legal receiver Bob gets the sequenceIs a noisy version of sequence s; at the same time, the eavesdropper Eve can also observe noisy symbol sequences +.>Selecting a transmit power P S And noise power P AN So that the received signal-to-noise ratio of Bob is better than that of Eve, thereby realizing the interference effect on Eve when Bob normally receives signals and leading to
It is difficult for an eavesdropper to obtain the and key message b= (b) by demodulating and securely decoding the received signal 1 ,b 2 ,...b m ) A consistent key bit; and the legal terminal Bob can obtain the and key message b= (b) through demodulating and safely decoding the received signal 1 ,b 2 ,...b m ) Consistent m-bit key bits
S6, repeatedly executing the steps S3 to S5 until Bob obtains the keys with L symbol lengths.
2. The method for sharing keys based on artificial noise and security coding in edge computing according to claim 1, wherein: in the step S6, bob, after having obtained the L symbol-length keys, further includes a consistency confirmation step:
and (3) confirming the consistency of the key between Bob and Alice, if the key obtained by Bob is consistent with the Alice sharing key, completing the key sharing, and if the key obtained by Bob is consistent with the Alice sharing key, returning to the step S2, and re-executing the key sharing process according to the steps S2-S6.
CN202010801225.2A 2020-08-11 2020-08-11 Key sharing method based on artificial noise and security coding in edge calculation Active CN111934863B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010801225.2A CN111934863B (en) 2020-08-11 2020-08-11 Key sharing method based on artificial noise and security coding in edge calculation

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010801225.2A CN111934863B (en) 2020-08-11 2020-08-11 Key sharing method based on artificial noise and security coding in edge calculation

Publications (2)

Publication Number Publication Date
CN111934863A CN111934863A (en) 2020-11-13
CN111934863B true CN111934863B (en) 2024-01-09

Family

ID=73310256

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010801225.2A Active CN111934863B (en) 2020-08-11 2020-08-11 Key sharing method based on artificial noise and security coding in edge calculation

Country Status (1)

Country Link
CN (1) CN111934863B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114745235B (en) * 2022-04-07 2024-04-19 展讯通信(上海)有限公司 Data preprocessing method and device for transform domain channel estimation and communication equipment

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106357373A (en) * 2016-08-30 2017-01-25 湖南国天电子科技有限公司 Security transmission method, based on man made noise, of spatially modulated physical layer
CN106374980A (en) * 2016-07-27 2017-02-01 西安交通大学 Safe transmission method in MIMO Y eavesdropping network based on real interference alignment
CN106685639A (en) * 2016-12-15 2017-05-17 西安交通大学 Encrypted safe transmission method for sequential cipher based on artificial added noise in 5G communication system
CN106789027A (en) * 2017-01-03 2017-05-31 电子科技大学 It is a kind of that uniformity confirmation method and system are carried out to key using unconditional security transmission
US10069592B1 (en) * 2015-10-27 2018-09-04 Arizona Board Of Regents On Behalf Of The University Of Arizona Systems and methods for securing wireless communications
CN111082933A (en) * 2019-12-27 2020-04-28 电子科技大学 Multi-user physical layer safety communication method capable of resisting any plurality of cooperation eavesdroppers

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10999000B2 (en) * 2018-01-24 2021-05-04 Korea Advanced Institute Of Science And Technology Apparatus and method for secure communication using artificial noise scheme

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10069592B1 (en) * 2015-10-27 2018-09-04 Arizona Board Of Regents On Behalf Of The University Of Arizona Systems and methods for securing wireless communications
CN106374980A (en) * 2016-07-27 2017-02-01 西安交通大学 Safe transmission method in MIMO Y eavesdropping network based on real interference alignment
CN106357373A (en) * 2016-08-30 2017-01-25 湖南国天电子科技有限公司 Security transmission method, based on man made noise, of spatially modulated physical layer
CN106685639A (en) * 2016-12-15 2017-05-17 西安交通大学 Encrypted safe transmission method for sequential cipher based on artificial added noise in 5G communication system
CN106789027A (en) * 2017-01-03 2017-05-31 电子科技大学 It is a kind of that uniformity confirmation method and system are carried out to key using unconditional security transmission
CN111082933A (en) * 2019-12-27 2020-04-28 电子科技大学 Multi-user physical layer safety communication method capable of resisting any plurality of cooperation eavesdroppers

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
Secret Key Attaches in MIMO IoT Communications by Using Self-injection Artificial Noise;Jie Tang et.al.;2020 IEEE International Conference on Artificial Intelligence and Information Systems (ICAIIS);225-229 *
未来无线通信中基于物理信道的安全技术研究;唐杰;万方学位论文集;56-83 *
结合无条件安全传输的密钥一致性确认方法;程伟等;通信技术;第50卷(第6期);1281-1283 *

Also Published As

Publication number Publication date
CN111934863A (en) 2020-11-13

Similar Documents

Publication Publication Date Title
Yan et al. Low probability of detection communication: Opportunities and challenges
Aldaghri et al. Physical layer secret key generation in static environments
Xiong et al. Secure transmission against pilot spoofing attack: A two-way training-based scheme
Badawy et al. Unleashing the secure potential of the wireless physical layer: Secret key generation methods
Chen et al. Fast power allocation for secure communication with full-duplex radio
CN111082933B (en) Multi-user physical layer safety communication method capable of resisting any plurality of cooperation eavesdroppers
Vázquez-Castro et al. Physical layer security for RF satellite channels in the finite-length regime
Alves et al. Enhanced physical layer security through transmit antenna selection
US11516655B2 (en) Physical layer key generation
US11483704B2 (en) Physical layer secure communication against an eavesdropper with arbitrary number of eavesdropping antennas
Osorio et al. Safeguarding MTC at the physical layer: Potentials and challenges
US20120140922A1 (en) Method for Generating Private Keys in Wireless Networks
CN111065096A (en) Physical layer encryption transmission system for wireless communication and method thereof
Tang et al. Sharing secrets via wireless broadcasting: A new efficient physical layer group secret key generation for multiple IoT devices
Hyadi et al. Secure broadcasting with imperfect channel state information at the transmitter
Ismayil Siyad et al. Chaotic deep neural network based physical layer key generation for massive MIMO
CN111934863B (en) Key sharing method based on artificial noise and security coding in edge calculation
Zhang et al. Impact of imperfect angle estimation on spatial and directional modulation
CN111786789B (en) Physical layer key distribution method based on random wave beam and edge calculation
Tang et al. Secure MIMO-SVD communications against eavesdroppers with any number of antennas
CN111726221B (en) Physical layer safety transmission method capable of resisting arbitrary eavesdropping antenna number
Taha et al. Secret key establishment technique using channel state information driven phase randomisation in multiple‐input multiple‐output orthogonal frequency division multiplexing
Hentila et al. Secure key generation for distributed inference in IoT invited presentation
Cepheli et al. An encryption aware physical layer security system
Zhang et al. Wireless Communication Physical Layer Sensing Antenna Array Construction and Information Security Analysis

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant