CN111934863B - Key sharing method based on artificial noise and security coding in edge calculation - Google Patents
Key sharing method based on artificial noise and security coding in edge calculation Download PDFInfo
- Publication number
- CN111934863B CN111934863B CN202010801225.2A CN202010801225A CN111934863B CN 111934863 B CN111934863 B CN 111934863B CN 202010801225 A CN202010801225 A CN 202010801225A CN 111934863 B CN111934863 B CN 111934863B
- Authority
- CN
- China
- Prior art keywords
- bob
- key
- alice
- signal
- eve
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 33
- 238000004364 calculation method Methods 0.000 title claims abstract description 7
- 239000011159 matrix material Substances 0.000 claims abstract description 12
- 239000013598 vector Substances 0.000 claims description 13
- 238000012790 confirmation Methods 0.000 claims description 9
- 230000007423 decrease Effects 0.000 claims description 4
- 238000000354 decomposition reaction Methods 0.000 claims description 3
- 230000000694 effects Effects 0.000 claims description 3
- 230000005540 biological transmission Effects 0.000 description 5
- 230000003321 amplification Effects 0.000 description 4
- 238000004891 communication Methods 0.000 description 4
- 230000003993 interaction Effects 0.000 description 4
- 238000003199 nucleic acid amplification method Methods 0.000 description 4
- 238000010586 diagram Methods 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 230000000875 corresponding effect Effects 0.000 description 2
- 238000013139 quantization Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000002596 correlated effect Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000002474 experimental method Methods 0.000 description 1
- 238000005562 fading Methods 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 238000013508 migration Methods 0.000 description 1
- 230000005012 migration Effects 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 238000011160 research Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/02—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
- H04B7/04—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
- H04B7/0413—MIMO systems
- H04B7/0426—Power distribution
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/02—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
- H04B7/04—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
- H04B7/06—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station
- H04B7/0613—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station using simultaneous transmission
- H04B7/0615—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station using simultaneous transmission of weighted versions of same signal
- H04B7/0617—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station using simultaneous transmission of weighted versions of same signal for beam forming
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L25/00—Baseband systems
- H04L25/38—Synchronous or start-stop systems, e.g. for Baudot code
- H04L25/40—Transmitting circuits; Receiving circuits
- H04L25/49—Transmitting circuits; Receiving circuits using code conversion at the transmitter; using predistortion; using insertion of idle bits for obtaining a desired frequency spectrum; using three or more amplitude levels ; Baseband coding techniques specific to data transmission systems
- H04L25/4906—Transmitting circuits; Receiving circuits using code conversion at the transmitter; using predistortion; using insertion of idle bits for obtaining a desired frequency spectrum; using three or more amplitude levels ; Baseband coding techniques specific to data transmission systems using binary codes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Abstract
The invention discloses a key sharing method based on artificial noise and security coding in edge calculation, which comprises the following steps of S1, setting a protection area: s2, channel estimation: bob sends a channel estimation sequence to Alice, and Alice estimates to obtain a channel matrix H A The method comprises the steps of carrying out a first treatment on the surface of the S3, safety coding: edge side device Alice encodes key message b= (b) by security coding 1 ,b 2 ,...b m ) Encoding into binary bits s=(s) 1 ,s 2 ,...s n ) The method comprises the steps of carrying out a first treatment on the surface of the S4, combining artificial noise to form a transmitting signal: alice forms the transmit signal x by MIMO beamforming in combination with artificial noise: x=fs+gz; s5, signal receiving and decoding: legal terminal Bob receives and demodulates the signal and decodes m-bit key bits from the received signalS6, repeatedly executing the steps S3 to S5 until Bob obtains the keys with L symbol lengths.
Description
Technical Field
The present invention relates to key sharing in edge computing, and more particularly, to a key sharing method based on artificial noise and security coding in edge computing.
Background
The edge computing is used for migrating part or all of computing tasks of the original cloud computing model to network edge equipment, so that the computing load of a cloud computing center is reduced, and network congestion is relieved. The edge calculation has rich application scenes such as cloud computing task migration, video monitoring, intelligent transportation, intelligent power grid and the like. With the rapid development of the 5G internet of things and the edge computing network, a great deal of novel services and applications are continuously emerging. Various secret and sensitive data in a wireless network are grown in mass, the information security problem is increasingly outstanding, and the security is becoming a precondition for various different business applications. In conventional wireless communication networks, cryptography-based encryption techniques are typically used at the network layer and upper layers to secure system communications. While performing various encryption authentications requires establishing a secure shared key between the two parties. In a large number of novel application scenes of edge computing, for example, a large number of resource-limited sensing node terminals are accessed in a large-scale internet of things (IoT) network and a smart grid network, so that the complexity of key distribution and management based on cryptography is extremely high and even difficult to realize. The key generation and distribution technology based on physical channel has the basic principle of utilizing the randomness and reciprocity of fading channel to generate and distribute the key between legal users.
Currently, there are some preliminary researches on physical layer key generation, but the current physical layer key generation rate is slow, and the rate and the channel variation speed are highly correlated. Experiments verify that a typical physical layer key distribution system of 3 transmit and receive antennas requires 10 seconds or more to achieve an AES symmetric encryption key with a 128 bit length in an indoor channel with a key error rate of orders of magnitude lower. Because the two parties need to perform more than 3 interactions (including the processes of sending pilot frequency, key negotiation, privacy amplification, final consistency confirmation and the like by the two parties) on the public channel in the process of establishing the key, the complexity of the communication protocol is higher, and the hidden danger of information leakage is improved.
Disclosure of Invention
The invention aims to overcome the defects of the prior art, and provides a key sharing method based on artificial noise and security codes in edge computing, wherein the artificial noise and security codes are utilized to realize physical layer key distribution in an edge computing environment, and only two interactions are needed to realize physical layer key distribution, so that time delay and complexity caused by key sharing are reduced.
The aim of the invention is realized by the following technical scheme: a key sharing method based on artificial noise and security coding in edge calculation comprises the following steps of
S1, setting a protection area:
setting edge side equipment Alice and legal terminal Bob to share a secret key, wherein Eve is an eavesdropper;
the edge equipment Alice and the legal terminal Bob respectively use a protection area with the radius of R to surround the edge equipment Alice and the legal terminal Bob, so that an eavesdropper Eve cannot enter the protection area to eavesdrop, namely the distance between Eve and Alice is ensured to be larger than R, and the distance between Eve and Bob is ensured to be larger than R;
N A and N B Respectively represent the antenna numbers of Alice and Bob, N A >N B ≥1;
S2, channel estimation: bob sends a channel estimation sequence to Alice, and Alice estimates to obtain a channel matrix H A ;
S3, safety coding: edge side device Alice encodes key message b= (b) by security coding 1 ,b 2 ,...b m ) Encoding into binary bits s=(s) 1 ,s 2 ,...s n );
Assuming binary security coding is used, the code rate is described as R S For code rate R =m/n S (n, m)A security code, where m is the legal user information bit packet length and n is the code length, and by adjusting the transmission SNR signal-to-noise ratio, the decoding BER ρ of Bob is made c The following conditions are satisfied
S4, combining artificial noise to form a transmitting signal:
alice forms the transmit signal x by MIMO beamforming in combination with artificial noise:
x=fs+Gz;
where s is the modulated unit scalar transmit key symbol and z is N T -1 x 1-dimensional randomly generated complex gaussian artificial noise AN vector; the transmit beamformer is denoted as:
f=V(:,1);
wherein H is A =UΣV H A first column vector representing singular value decomposition, f=v (: 1) being V;
meanwhile, the interference signal needs to be in the null space of Bob so as not to generate interference to the legitimate user, and the interference signal is denoted by g=v (: 2:n T -1), therefore there are:
H A G·z⊥H A f
in terms of power allocation, the transmit signal covariance matrix E { xx } H }=Q x ,T r (Q x )≤P max Wherein T is r (. Cndot.) represents a trace operator; the power allocated to the legitimate signal is P S Transmitting interference signal with residual power, P AN =P max -P S And E is% ZZ H )=[P AN /(N T -1)I];
S5, signal receiving and decoding: legal terminal Bob receives and demodulates the signal and decodes m-bit key bits from the received signal
In the step S5, N is set A >N B Not less than 1 and N is required to be ensured A -1>N E The method comprises the steps of carrying out a first treatment on the surface of the Wherein N is E The number of antennas for an eavesdropper; at the receiving end, w A And w E Respectively represent N R ×1,N E The x 1-dimensional received combined vector, after being received and combined, is represented by the signals received by Bob and Eve as follows:
wherein n is A And n E The power covariance of the white noise vectors corresponding to the Bob and Eve received signals is matrix:
H A and H E Independent of each other, is a channel matrix of the main channel and the eavesdropping channel, and Alice and Bob are unknown H E The method comprises the steps of carrying out a first treatment on the surface of the Wherein Alice feeds back w A =H A f. For Bob, then there are:
due to H A G·z⊥H A f, there are:
that is, bob is not disturbed by artificial noise, and the received signal-to-interference-and-noise ratio is expressed as:
eve receives artificial noise H E G·z interference, whose reception quality decreases with increasing noise power, and whose reception signal-to-interference-and-noise ratio is expressed as:
legal receiver Bob gets the sequenceIs a noisy version of sequence s; at the same time, the eavesdropper Eve can also observe noisy symbol sequences +.>Selecting a transmit power P S And noise power P AN So that the received signal-to-noise ratio of Bob is better than that of Eve, thereby realizing the interference effect on Eve when Bob normally receives signals and leading to
It is difficult for an eavesdropper to obtain the and key message b= (b) by demodulating and securely decoding the received signal 1 ,b 2 ,...b m ) A consistent key bit; and the legal terminal Bob can obtain the and key message b= (b) through demodulating and safely decoding the received signal 1 ,b 2 ,...b m ) Consistent m-bit key bits
S6, repeatedly executing the steps S3 to S5 until Bob obtains the keys with L symbol lengths.
In the step S6, bob, after having obtained the L symbol-length keys, further includes a consistency confirmation step:
and (3) confirming the consistency of the key between Bob and Alice, if the key obtained by Bob is consistent with the Alice sharing key, completing the key sharing, and if the key obtained by Bob is consistent with the Alice sharing key, returning to the step S2, and re-executing the key sharing process according to the steps S2-S6.
Preferably, when Bob and Alice perform the key consistency confirmation, the adopted consistency confirmation method comprises the following steps:
alice generates a signature by using the shared secret key through a hash function, encrypts the digital signature by using the shared secret key to obtain a ciphertext signature to be transmitted, and transmits the ciphertext signature to Bob;
and (3) the Bob decrypts the ciphertext digital signature by using the obtained key, generates the digital signature by using the hash function through the obtained key, compares the solved digital signature with the digital signature, and if the solved digital signature is consistent with the digital signature, the consistency of the key is passed.
The beneficial effects of the invention are as follows: (1) According to the invention, only 2 times of interaction are needed to realize physical layer key distribution, so that the low error rate of the terminal is realized, and the time delay and complexity caused by key sharing are reduced; meanwhile, only one channel estimation is needed in the process of key sharing, so that the cost is saved. (2) The key distribution process does not need to carry out key quantization, negotiation and privacy amplification by both sides, so that the multiple interactive negotiations related to the process are not needed by both sides on a public channel, and the complexity is reduced. (3) The current technology needs to perform at least 3 interactions (including the processes of mutual pilot frequency transmission, key negotiation, privacy amplification, final consistency confirmation and the like of the receiving and transmitting sides) on a public channel in the process of establishing the key, so that the complexity of a communication protocol is higher, and the hidden danger of information leakage is improved. The technology does not need the process of key quantization, negotiation and privacy amplification in the common channel negotiation, avoids hidden danger of information leakage, and improves the safety.
Drawings
FIG. 1 is a flow chart of the method of the present invention;
FIG. 2 is a schematic diagram of a physical layer key distribution architecture under an edge computing network;
FIG. 3 is a schematic diagram of the key bit error probabilities for Bob and Eve;
fig. 4 is a schematic diagram of key bit error probabilities of Bob and Eve at different transmission signal-to-noise ratios.
Detailed Description
The technical solution of the present invention will be described in further detail with reference to the accompanying drawings, but the scope of the present invention is not limited to the following description.
As shown in FIG. 1, a key sharing method based on artificial noise and security coding in edge calculation comprises the following steps of
S1, setting a protection area:
setting edge side equipment Alice and legal terminal Bob to share a secret key, wherein Eve is an eavesdropper;
the edge equipment Alice and the legal terminal Bob respectively use a protection area with the radius R to surround the edge equipment Alice and the legal terminal Bob, wherein the protection area is an area which can not be accessed by an eavesdropper Eve, so that the eavesdropper Eve can not access the protection area to eavesdrop, and the eavesdropping can be realized through a fence or an enclosing wall on a physical level or can be a forbidden area on an artificial duty; namely, ensuring that the distance between Eve and Alice is larger than R, and ensuring that the distance between Eve and Bob is larger than R; the radius length of the guard area is typically greater than the uncorrelated distance of the channel, and in the embodiments of the present application, the length is determined by the channel propagation environment and carrier frequency, and the scattering is typically 10cm-100cm in a sufficient environment.
N A And N B Respectively represent the antenna numbers of Alice and Bob, N A >N B ≥1;
S2, channel estimation: bob sends a channel estimation sequence to Alice, and Alice estimates to obtain a channel matrix H A ;
S3, safety coding: edge side device Alice encodes key message b= (b) by security coding 1 ,b 2 ,...b m ) Encoding into binary bits s=(s) 1 ,s 2 ,...s n );
Assuming binary security coding is used, the code rate is described as R S For code rate R =m/n S Where m is the legal user information bit packet length and n is the code length, by adjusting the transmit SNR signal-to-noise ratio such that Bob's interpretationCode BER ρ c The following conditions are satisfied
S4, combining artificial noise to form a transmitting signal:
alice forms the transmit signal x by MIMO beamforming in combination with artificial noise:
x=fs+Gz;
where s is the modulated unit scalar transmit key symbol and z is N T -1 x 1-dimensional randomly generated complex gaussian artificial noise AN vector; the transmit beamformer is denoted as:
f=V(:,1);
wherein H is A =UΣV H A first column vector representing singular value decomposition, f=v (: 1) being V;
meanwhile, the interference signal needs to be in the null space of Bob so as not to generate interference to the legitimate user, and the interference signal is denoted by g=v (: 2:n T -1), therefore there are:
H A G·z⊥H A f
in terms of power allocation, the transmit signal covariance matrix E { xx } H }=Q x ,T r (Q x )≤P max Wherein T is r (. Cndot.) represents a trace operator; the power allocated to the legitimate signal is P S Transmitting interference signal with residual power, P AN =P max -P S And E is% ZZ H )=[P AN /(N T -1)I];
S5, signal receiving and decoding: legal terminal Bob receives and demodulates the signal and decodes m-bit key bits from the received signal
In the step S5, N is set A >N B Not less than 1 and N is required to be ensured A -1>N E The method comprises the steps of carrying out a first treatment on the surface of the Wherein N is E The number of antennas for an eavesdropper; at the receiving end, w A And w E Respectively represent N R ×1,N E The x 1-dimensional received combined vector, after being received and combined, is represented by the signals received by Bob and Eve as follows:
wherein n is A And n E The power covariance of the white noise vectors corresponding to the Bob and Eve received signals is matrix:
H A and H E Independent of each other, is a channel matrix of the main channel and the eavesdropping channel, and Alice and Bob are unknown H E The method comprises the steps of carrying out a first treatment on the surface of the Wherein Alice feeds back w A =H A f. For Bob, then there are:
due to H A G·z⊥H A f, there are:
that is, bob is not disturbed by artificial noise, and the received signal-to-interference-and-noise ratio is expressed as:
eve receives artificial noise H E G·z interference, whose reception quality decreases with increasing noise power, and whose reception signal-to-interference-and-noise ratio is expressed as:
legal receiver Bob gets the sequenceIs a noisy version of sequence s; at the same time, the eavesdropper Eve can also observe noisy symbol sequences +.>Selecting a transmit power P S And noise power P AN So that the received signal-to-noise ratio of Bob is better than that of Eve, thereby realizing the interference effect on Eve when Bob normally receives signals and leading to
It is difficult for an eavesdropper to obtain the and key message b= (b) by demodulating and securely decoding the received signal 1 ,b 2 ,...b m ) A consistent key bit; and the legal terminal Bob can obtain the and key message b= (b) through demodulating and safely decoding the received signal 1 ,b 2 ,...b m ) Consistent m-bit key bits
S6, repeatedly executing the steps S3 to S5 until Bob obtains keys with L symbol lengths, wherein L is larger than m, L is generally an integer multiple of m, and generally, for the keys to be shared, L is a determined known value, and codes m with different lengths can be selected according to actual conditions and L obtaining requirements.
In the step S6, bob, after having obtained the L symbol-length keys, further includes a consistency confirmation step:
and (3) confirming the consistency of the key between Bob and Alice, if the key obtained by Bob is consistent with the Alice sharing key, completing the key sharing, and if the key obtained by Bob is consistent with the Alice sharing key, returning to the step S2, and re-executing the key sharing process according to the steps S2-S6.
In the embodiment of the application, when Bob and Alice perform the key consistency confirmation, the adopted consistency confirmation method includes:
alice generates a signature by using the shared secret key through a hash function, encrypts the digital signature by using the shared secret key to obtain a ciphertext signature to be transmitted, and transmits the ciphertext signature to Bob;
and (3) the Bob decrypts the ciphertext digital signature by using the obtained key, generates the digital signature by using the hash function through the obtained key, compares the solved digital signature with the digital signature, and if the solved digital signature is consistent with the digital signature, the consistency of the key is passed.
In the embodiment of the present application, as shown in fig. 2, the physical layer key distribution architecture under the edge computing network is shown in fig. 3 of the key bit error probabilities (the error probabilities under pan=10 dB, 20dB and with or without security coding) of Bob and Eve, the key bit error probabilities of Bob and Eve under different transmission signal-to-noise ratios are shown in fig. 4, it can be seen that, as the signal-to-noise ratio and the artificial interference power of the transmission signal increase, the error rate of the Eve decoding key bit remains 0.5, ensuring the security thereof, while the error probability of Bob key bit decoding decreases exponentially and tends to 0, ensuring the high consistency thereof.
The foregoing is a preferred embodiment of the invention, and it is to be understood that the invention is not limited to the form disclosed herein, but is not to be construed as limited to other embodiments, but is capable of other combinations, modifications and environments and is capable of changes or modifications within the scope of the inventive concept, either as a result of the foregoing teachings or as a result of the knowledge or knowledge of the relevant art. And that modifications and variations which do not depart from the spirit and scope of the invention are intended to be within the scope of the appended claims.
Claims (2)
1. A key sharing method based on artificial noise and security coding in edge calculation is characterized in that: comprises the following steps
S1, setting a protection area:
setting edge side equipment Alice and legal terminal Bob to share a secret key, wherein Eve is an eavesdropper;
the edge equipment Alice and the legal terminal Bob respectively use a protection area with the radius of R to surround the edge equipment Alice and the legal terminal Bob, so that an eavesdropper Eve cannot enter the protection area to eavesdrop, namely the distance between Eve and Alice is ensured to be larger than R, and the distance between Eve and Bob is ensured to be larger than R;
N A and N B Respectively represent the antenna numbers of Alice and Bob, N A >N B ≥1;
S2, channel estimation: bob sends a channel estimation sequence to Alice, and Alice estimates to obtain a channel matrix H A ;
S3, safety coding: edge side device Alice encodes key message b= (b) by security coding 1 ,b 2 ,...b m ) Encoding into binary bits s=(s) 1 ,s 2 ,...s n );
Assuming binary security coding is used, the code rate is described as R S For code rate R =m/n S Where m is the legal user information bit packet length and n is the code length, by adjusting the transmit SNR signal-to-noise ratio such that Bob's decoding BER ρ c The following conditions are satisfied
S4, combining artificial noise to form a transmitting signal:
alice forms the transmit signal x by MIMO beamforming in combination with artificial noise:
x=fs+Gz;
where s is the modulated unit scalar transmit key symbol and z is N T -1 x 1-dimensional randomly generated complex gaussian artificial noise AN vector; the transmit beamformer is denoted as:
f=V(:,1);
wherein H is A =UΣV H Representing singular value decomposition, f=v (: 1) is the first column vector of V;
meanwhile, the interference signal needs to be in the null space of Bob so as not to generate interference to the legitimate user, and the interference signal is denoted by g=v (: 2:n T -1), therefore there are:
H A G·z⊥H A f
in terms of power allocation, the transmit signal covariance matrix E { xx } H }=Q x ,T r (Q x )≤P max Wherein T is r (. Cndot.) represents a trace operator; the power allocated to the legitimate signal is P S Transmitting interference signal with residual power, P AN =P max -P S And E is% ZZ H )=[P AN /(N T -1)]I;
S5, signal receiving and decoding: legal terminal Bob receives and demodulates the signal and decodes m-bit key bits from the received signal
In the step S5, N is set A >N B Not less than 1 and N is required to be ensured A -1>N E The method comprises the steps of carrying out a first treatment on the surface of the Wherein N is E The number of antennas for an eavesdropper;
at the receiving end, w A And w E Respectively represent N R ×1,N E The x 1-dimensional received combined vector, after being received and combined, is represented by the signals received by Bob and Eve as follows:
wherein n is A And n E White noise vectors corresponding to Bob and Eve received signals respectively, and the power covariance of the white noise vectors is matrixThe method meets the following conditions:
H A and H E Independent of each other, is a channel matrix of the main channel and the eavesdropping channel, and Alice and Bob are unknown H E The method comprises the steps of carrying out a first treatment on the surface of the Wherein Alice feeds back w A =H A f. For Bob, then there are:
due to H A G·z⊥H A f, there are:
that is, bob is not disturbed by artificial noise, and the received signal-to-interference-and-noise ratio is expressed as:
eve receives artificial noise H E G·z interference, whose reception quality decreases with increasing noise power, and whose reception signal-to-interference-and-noise ratio is expressed as:
legal receiver Bob gets the sequenceIs a noisy version of sequence s; at the same time, the eavesdropper Eve can also observe noisy symbol sequences +.>Selecting a transmit power P S And noise power P AN So that the received signal-to-noise ratio of Bob is better than that of Eve, thereby realizing the interference effect on Eve when Bob normally receives signals and leading to
It is difficult for an eavesdropper to obtain the and key message b= (b) by demodulating and securely decoding the received signal 1 ,b 2 ,...b m ) A consistent key bit; and the legal terminal Bob can obtain the and key message b= (b) through demodulating and safely decoding the received signal 1 ,b 2 ,...b m ) Consistent m-bit key bits
S6, repeatedly executing the steps S3 to S5 until Bob obtains the keys with L symbol lengths.
2. The method for sharing keys based on artificial noise and security coding in edge computing according to claim 1, wherein: in the step S6, bob, after having obtained the L symbol-length keys, further includes a consistency confirmation step:
and (3) confirming the consistency of the key between Bob and Alice, if the key obtained by Bob is consistent with the Alice sharing key, completing the key sharing, and if the key obtained by Bob is consistent with the Alice sharing key, returning to the step S2, and re-executing the key sharing process according to the steps S2-S6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010801225.2A CN111934863B (en) | 2020-08-11 | 2020-08-11 | Key sharing method based on artificial noise and security coding in edge calculation |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010801225.2A CN111934863B (en) | 2020-08-11 | 2020-08-11 | Key sharing method based on artificial noise and security coding in edge calculation |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111934863A CN111934863A (en) | 2020-11-13 |
CN111934863B true CN111934863B (en) | 2024-01-09 |
Family
ID=73310256
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010801225.2A Active CN111934863B (en) | 2020-08-11 | 2020-08-11 | Key sharing method based on artificial noise and security coding in edge calculation |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111934863B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114745235B (en) * | 2022-04-07 | 2024-04-19 | 展讯通信(上海)有限公司 | Data preprocessing method and device for transform domain channel estimation and communication equipment |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106357373A (en) * | 2016-08-30 | 2017-01-25 | 湖南国天电子科技有限公司 | Security transmission method, based on man made noise, of spatially modulated physical layer |
CN106374980A (en) * | 2016-07-27 | 2017-02-01 | 西安交通大学 | Safe transmission method in MIMO Y eavesdropping network based on real interference alignment |
CN106685639A (en) * | 2016-12-15 | 2017-05-17 | 西安交通大学 | Encrypted safe transmission method for sequential cipher based on artificial added noise in 5G communication system |
CN106789027A (en) * | 2017-01-03 | 2017-05-31 | 电子科技大学 | It is a kind of that uniformity confirmation method and system are carried out to key using unconditional security transmission |
US10069592B1 (en) * | 2015-10-27 | 2018-09-04 | Arizona Board Of Regents On Behalf Of The University Of Arizona | Systems and methods for securing wireless communications |
CN111082933A (en) * | 2019-12-27 | 2020-04-28 | 电子科技大学 | Multi-user physical layer safety communication method capable of resisting any plurality of cooperation eavesdroppers |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10999000B2 (en) * | 2018-01-24 | 2021-05-04 | Korea Advanced Institute Of Science And Technology | Apparatus and method for secure communication using artificial noise scheme |
-
2020
- 2020-08-11 CN CN202010801225.2A patent/CN111934863B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10069592B1 (en) * | 2015-10-27 | 2018-09-04 | Arizona Board Of Regents On Behalf Of The University Of Arizona | Systems and methods for securing wireless communications |
CN106374980A (en) * | 2016-07-27 | 2017-02-01 | 西安交通大学 | Safe transmission method in MIMO Y eavesdropping network based on real interference alignment |
CN106357373A (en) * | 2016-08-30 | 2017-01-25 | 湖南国天电子科技有限公司 | Security transmission method, based on man made noise, of spatially modulated physical layer |
CN106685639A (en) * | 2016-12-15 | 2017-05-17 | 西安交通大学 | Encrypted safe transmission method for sequential cipher based on artificial added noise in 5G communication system |
CN106789027A (en) * | 2017-01-03 | 2017-05-31 | 电子科技大学 | It is a kind of that uniformity confirmation method and system are carried out to key using unconditional security transmission |
CN111082933A (en) * | 2019-12-27 | 2020-04-28 | 电子科技大学 | Multi-user physical layer safety communication method capable of resisting any plurality of cooperation eavesdroppers |
Non-Patent Citations (3)
Title |
---|
Secret Key Attaches in MIMO IoT Communications by Using Self-injection Artificial Noise;Jie Tang et.al.;2020 IEEE International Conference on Artificial Intelligence and Information Systems (ICAIIS);225-229 * |
未来无线通信中基于物理信道的安全技术研究;唐杰;万方学位论文集;56-83 * |
结合无条件安全传输的密钥一致性确认方法;程伟等;通信技术;第50卷(第6期);1281-1283 * |
Also Published As
Publication number | Publication date |
---|---|
CN111934863A (en) | 2020-11-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Yan et al. | Low probability of detection communication: Opportunities and challenges | |
Aldaghri et al. | Physical layer secret key generation in static environments | |
Xiong et al. | Secure transmission against pilot spoofing attack: A two-way training-based scheme | |
Badawy et al. | Unleashing the secure potential of the wireless physical layer: Secret key generation methods | |
Chen et al. | Fast power allocation for secure communication with full-duplex radio | |
CN111082933B (en) | Multi-user physical layer safety communication method capable of resisting any plurality of cooperation eavesdroppers | |
Vázquez-Castro et al. | Physical layer security for RF satellite channels in the finite-length regime | |
Alves et al. | Enhanced physical layer security through transmit antenna selection | |
US11516655B2 (en) | Physical layer key generation | |
US11483704B2 (en) | Physical layer secure communication against an eavesdropper with arbitrary number of eavesdropping antennas | |
Osorio et al. | Safeguarding MTC at the physical layer: Potentials and challenges | |
US20120140922A1 (en) | Method for Generating Private Keys in Wireless Networks | |
CN111065096A (en) | Physical layer encryption transmission system for wireless communication and method thereof | |
Tang et al. | Sharing secrets via wireless broadcasting: A new efficient physical layer group secret key generation for multiple IoT devices | |
Hyadi et al. | Secure broadcasting with imperfect channel state information at the transmitter | |
Ismayil Siyad et al. | Chaotic deep neural network based physical layer key generation for massive MIMO | |
CN111934863B (en) | Key sharing method based on artificial noise and security coding in edge calculation | |
Zhang et al. | Impact of imperfect angle estimation on spatial and directional modulation | |
CN111786789B (en) | Physical layer key distribution method based on random wave beam and edge calculation | |
Tang et al. | Secure MIMO-SVD communications against eavesdroppers with any number of antennas | |
CN111726221B (en) | Physical layer safety transmission method capable of resisting arbitrary eavesdropping antenna number | |
Taha et al. | Secret key establishment technique using channel state information driven phase randomisation in multiple‐input multiple‐output orthogonal frequency division multiplexing | |
Hentila et al. | Secure key generation for distributed inference in IoT invited presentation | |
Cepheli et al. | An encryption aware physical layer security system | |
Zhang et al. | Wireless Communication Physical Layer Sensing Antenna Array Construction and Information Security Analysis |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |