CN113473420A - Scientific research data privacy protection enhancement method and system oriented to wireless network environment - Google Patents
Scientific research data privacy protection enhancement method and system oriented to wireless network environment Download PDFInfo
- Publication number
- CN113473420A CN113473420A CN202110746244.4A CN202110746244A CN113473420A CN 113473420 A CN113473420 A CN 113473420A CN 202110746244 A CN202110746244 A CN 202110746244A CN 113473420 A CN113473420 A CN 113473420A
- Authority
- CN
- China
- Prior art keywords
- wireless network
- sequence
- data
- privacy protection
- network environment
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 38
- 238000011160 research Methods 0.000 title claims abstract description 23
- 238000012545 processing Methods 0.000 claims abstract description 21
- 238000006073 displacement reaction Methods 0.000 claims abstract description 8
- 238000012795 verification Methods 0.000 claims description 16
- 238000009499 grossing Methods 0.000 claims description 12
- 230000036544 posture Effects 0.000 claims description 11
- 238000005070 sampling Methods 0.000 claims description 11
- 230000004044 response Effects 0.000 claims description 10
- 238000001914 filtration Methods 0.000 claims description 7
- 238000000605 extraction Methods 0.000 claims description 6
- 238000013139 quantization Methods 0.000 claims description 6
- 230000001360 synchronised effect Effects 0.000 claims description 5
- 238000001514 detection method Methods 0.000 claims description 4
- 230000002708 enhancing effect Effects 0.000 claims description 4
- 238000010606 normalization Methods 0.000 claims description 4
- 238000013459 approach Methods 0.000 claims description 3
- 238000004364 calculation method Methods 0.000 claims description 3
- 235000019580 granularity Nutrition 0.000 claims description 3
- 230000006399 behavior Effects 0.000 description 12
- 238000004891 communication Methods 0.000 description 4
- 238000010586 diagram Methods 0.000 description 4
- 230000006870 function Effects 0.000 description 2
- 230000035939 shock Effects 0.000 description 2
- 230000002269 spontaneous effect Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000002457 bidirectional effect Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000008447 perception Effects 0.000 description 1
- 230000035945 sensitivity Effects 0.000 description 1
- 238000010200 validation analysis Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/70—Services for machine-to-machine communication [M2M] or machine type communication [MTC]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/041—Key generation or derivation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/10—Integrity
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a scientific research data privacy protection enhancement method and a scientific research data privacy protection enhancement system facing to a wireless network environment, wherein the method comprises the following steps: establishing different posture and displacement change modes of the mobile equipment, detecting a starting point of equipment state change according to signal intensity change of a wireless network signal received by the mobile equipment from a wireless network signal emission source, and calibrating the received signal; quantizing the data sequence subjected to the calibration processing into a bit sequence; the key is calculated from the bit sequence, the consistency of mutual authentication is verified by exchanging encryption messages between the mobile devices, a unique and random symmetric key is generated and a full connection is established. The invention quantifies the dithering mode of the mobile equipment and generates the key by measuring the intensity change of the received signal of the wireless network channel, thereby improving the privacy protection of research data in the wireless network environment.
Description
Technical Field
The invention relates to the technical field of wireless network passive sensing and D2D communication, in particular to a scientific research data privacy protection enhancement method and system based on a wireless network environment.
Background
In device-to-device (D2D) communication via wireless channel, mutual authentication between mobile devices and establishment of spontaneous secure connection are indispensable requirements for exchanging data between devices, and with the development of D2D communication, scientific data transmission by D2D is also a trend. Users need to authenticate each other and establish spontaneous secure connections between devices, i.e. to achieve mutual authentication and key generation of these mobile devices, otherwise an attacker can intercept this information by launching an eavesdropping attack in the wireless channel. The current major device authentication schemes include: 1) device authentication methods based on passwords or patterns that enable efficient authentication and secure connection establishment by users creating password sequences or patterns in advance, however, the use of passwords or patterns is inconvenient, requiring frequent user input, which results in users creating simple patterns that make sensitive information susceptible to theft, and for devices without touch screens, users cannot enter passwords or patterns, which are vulnerable to network attacks because they are easily monitored in public places. 2) The equipment authentication method based on the embedded sensor touch screen mainly utilizes sensors such as an accelerometer and the touch screen to capture user behaviors in a vibration process, but the perception of the sensors is coarse-grained and is easy to be simulated by an attacker. An effective solution to these problems is urgently needed.
Disclosure of Invention
Aiming at the defects of the prior art, the invention aims to provide a scientific research data privacy protection enhancement method and system facing to a wireless network environment, and solves the problems of authentication between mobile devices and interception of information by an attacker launching interception attack on a wireless channel in the prior art.
In order to achieve the purpose, the invention adopts the following technical scheme:
according to a first aspect of the invention, a scientific research data privacy protection enhancement method facing a wireless network environment is provided, and the method comprises the following steps:
s1, establishing a change mode of different postures and displacements of the mobile equipment, detecting a starting point of equipment state change according to signal intensity change of a wireless network signal received by the mobile equipment from a wireless network signal emission source, and calibrating the received signal;
s2, quantizing the data sequence subjected to the calibration processing into a bit sequence;
s3, calculating a key according to the bit sequence of each mobile device by using a Hash coding mode, exchanging encryption messages among the mobile devices to verify the consistency of mutual authentication, generating a unique and random symmetric key and establishing complete connection.
In some embodiments of the first aspect of the present invention, the step S1 includes: establishing different changing modes of postures and displacements for the mobile device by executing the behavior of shaking or overturning the mobile device; the RSSI sequence is subjected to numerical value anomaly detection by taking the received signal strength RSSI of a wireless network signal received by the mobile equipment as feedback for wireless channel change, the RSSI characteristic value of a vibration event of the mobile equipment is detected to be taken as the initial point of equipment posture or position change, and the initial points and tracks of a plurality of mobile equipment are synchronized; carrying out interpolation processing on the data sequence and smoothing the track of the RSSI sequence; and filtering the RSSI sequences of different frequency bands by adopting an infinite impulse response filter.
In some embodiments of the first aspect of the present invention, the synchronizing the starting points and the trajectories of the plurality of mobile devices comprises: sliding a window along the original RSSI data sequence, wherein the size of the sliding window is calculated in the following way: f. ofsp/fskWherein f isspFor sampling the sample data at a sampling frequency, fskFor shaking or flipping the frequency of shaking of the mobile device and calculating the average value v of the data sequence for each sliding windowi(ii) a When v isi>tiWhen t isiFor the set threshold, the sliding window is stopped with the starting point of the window set to P.
In some embodiments of the first aspect of the present invention, the interpolating the data sequence comprises: dividing the data sequence S into a plurality of subsequences D, performing data interpolation processing on each subsequence, smoothing data by using a smoothing window filter with adjustable window size, adjusting the value of window size omega by evaluating the size of the cross-correlation coefficient theta and a threshold value t, continuously iterating until the cross-correlation coefficient approaches the threshold value, and finishing the smoothing process.
In some embodiments of the first aspect of the present invention, the filtering, by using an infinite impulse response filter, the RSSI sequences of different frequency bands includes: dividing the whole frequency band into 16 sub-frequency bands by adopting an 1/2Octave method, combining three low-frequency sub-frequency bands into one sub-frequency band, splicing and cascading 14 sub-frequency bands into different granularities, and obtaining 105 frequency band samples with different lengths; these band samples are then filtered using an infinite impulse response filter.
In some embodiments of the first aspect of the present invention, the step S2 includes: and performing Fourier transform on the data sequence obtained in the step S1 to obtain a frequency band with active equipment shaking behavior, and performing normalization processing on the RSSI sequence of the frequency band to quantize the RSSI sequence into a bit sequence.
In some embodiments of the first aspect of the present invention, the calculation method of the active frequency band of the device shaking behavior is as follows: calculating the first k main components in the frequency domain after Fourier transform, and expressing the highest frequency of the components as fiDetermining the frequency band of the active shaking behavior of the equipment as [0, fi]At a sampling frequency of 2fiThe quantized data sequence is a bit sequence.
In some embodiments of the first aspect of the present invention, the calculating, in step S3, a key according to the bit sequence of each mobile device by using a hash coding method, and exchanging encryption messages between the mobile devices to verify consistency of mutual authentication includes: and for each mobile device, calculating the Hash verification code of the bit sequence of the mobile device, exchanging the Hash verification code with other devices, comparing the editing distance between the Hash verification code sequence generated by the mobile device and the received Hash verification code sequence by each mobile device, and determining whether the authentication is successful according to the relationship between the editing distance and the set threshold.
According to a second aspect of the present invention, there is provided a scientific research data privacy protection enhancement system facing a wireless network environment, including:
the data calibration module is used for establishing different posture and displacement change modes of the mobile equipment, detecting a starting point of equipment state change according to signal intensity change of a wireless network signal received by the mobile equipment from a wireless network signal emission source, and calibrating the received signal;
the data quantization module is used for quantizing the data sequence subjected to the calibration processing into a bit sequence;
and the key extraction module is used for calculating keys according to the bit sequence of each mobile device in a Hash coding mode, exchanging encryption messages among the mobile devices to verify the consistency of mutual authentication, generating unique and random symmetric keys and establishing complete connection.
The invention has the following beneficial effects: aiming at the anti-imitation mutual authentication of the mobile equipment, the invention provides a key generation framework based on a wireless network environment, which generates a unique and consistent symmetric key according to wireless network signals collected from the mobile equipment and realizes the identity authentication of multiple equipment. The method can effectively improve the privacy protection of research data in a wireless network environment.
Drawings
Fig. 1 is a general schematic diagram of scientific research data privacy protection in a wireless network scenario according to an embodiment of the present invention;
fig. 2 is a block diagram of a scientific research data privacy protection system in a wireless network scenario according to an embodiment of the present invention;
fig. 3 is a schematic flowchart of a scientific research data privacy protection method in a wireless network scenario according to an embodiment of the present invention;
fig. 4 is a diagram illustrating a relationship between mutual authentication and key generation of mobile devices according to an embodiment of the present invention;
fig. 5 is a schematic bit diagram of a decoding peer device according to an embodiment of the present invention.
Detailed Description
In order to facilitate understanding of those skilled in the art, the present invention will be further described with reference to the following examples and drawings, which are not intended to limit the present invention.
Referring to fig. 1 to 2, the present invention provides a bidirectional authentication and key generation framework under a wireless network, which forms a system for enhancing scientific research data privacy protection, and the system mainly includes the following functional modules: the device comprises a data calibration module, a quantization module and a key extraction module. The mobile device continuously receives wireless network signals transmitted by devices such as a gateway and a base station, and the mobile device includes, but is not limited to, an intelligent mobile terminal such as a smart phone, a smart band, a personal digital assistant, and a tablet computer. The user first shakes the devices in any manner, such as shaking or whipping, to create a shock. Upon detecting a shock event, each device begins sampling the user's behavior through the RSSI information of the wireless network signals. In the data calibration module, the device performs tracking synchronization and data interpolation processing on the sampled original data in a self-adaptive manner, so that the data can be effectively subjected to synchronous smooth processing, and the influence of track asynchronism caused by different positions of the device is reduced. In the quantization module, bit sequences are generated from the RSSI data, respectively, according to the sensitivity of the device to user behavior. In the key extraction module, devices exchange a limited number of encrypted messages with each other to verify the consistency of mutual authentication, and selectively use the consistent bits for key generation. In this way, the devices can generate a unique and consistent key through dithering.
Specifically, referring to fig. 3 to 4, the present invention is a scientific research data privacy protection enhancement method based on a wireless network environment, which is based on the above system, and includes the following steps:
the method comprises the steps of data calibration, wherein the mobile equipment continuously receives wireless network signals sent by equipment such as a gateway and a base station, the wireless network signals comprise wireless network signals such as WiFi signals and cellular network signals, the wireless network signals can sense the channel state change of the surrounding environment of the mobile equipment, the RSSI of the received signal strength of the wireless network signals is used as feedback of the wireless channel change, the RSSI sequence is subjected to numerical value abnormity detection, the RSSI characteristic value of the equipment with a vibration event is detected and is used as the starting point of the equipment posture or position change, the starting point of the equipment state change and the RSSI track are synchronized for a plurality of pieces of equipment, then the data sequence is subjected to interpolation processing, the track of the RSSI sequence is smoothed, and the RSSI sequences of different frequency bands are subjected to filtering processing by adopting an infinite impulse response filter;
a data quantization step, namely performing Fourier transform on the sequence to obtain a frequency band with active behaviors, performing normalization processing on an RSSI sequence of the frequency band, and quantizing the RSSI sequence into a bit sequence;
and a key extraction step, namely calculating the Hash verification code of the bit sequence by using the Hash verification code as a signature and exchanging the Hash verification code to the same-level equipment, and comparing the editing distances of the Hash verification code sequences of the multiple equipment to judge whether the authentication is successful.
Specifically, in the data calibration step, different change patterns of posture and displacement are established for the mobile device by performing the behavior of shaking or turning the mobile device; the RSSI sequence is subjected to numerical value anomaly detection by taking the received signal strength RSSI of a wireless network signal received by the mobile equipment as feedback for wireless channel change, the RSSI characteristic value of a vibration event of the mobile equipment is detected to be taken as the initial point of equipment posture or position change, and the initial points and tracks of a plurality of mobile equipment are synchronized; carrying out interpolation processing on the data sequence and smoothing the track of the RSSI sequence; and filtering the RSSI sequences of different frequency bands by adopting an infinite impulse response filter.
In one embodiment, synchronizing the starting points and trajectories of the plurality of mobile devices comprises: sliding a window along the original RSSI data sequence, wherein the size of the sliding window is calculated in the following way: f. ofsp/fskWherein f isspFor sampling the sample data at a sampling frequency, fskFor shaking or turning the mobile device, e.g. frequency f of shaking of the usersk10HZ, sampling frequency fsp100hz, window size fsp/fsk20; and calculating the average value v of the data sequence of each sliding windowi(ii) a Comparing the average value of the sliding window with a preset threshold value when v isi>tiWhen t isiFor the set threshold, the sliding window is stopped with the starting point of the window set to P.
In one embodiment, interpolating a data sequence comprises: dividing the data sequence S into a plurality of subsequences D, performing data interpolation processing on each subsequence, smoothing data by using a smoothing window filter with adjustable window size, adjusting the value of window size omega by evaluating the size of the cross-correlation coefficient theta and a threshold value t, continuously iterating until the cross-correlation coefficient approaches the threshold value, and finishing the smoothing process.
In one embodiment, the filtering the RSSI sequences of different frequency bands by using an infinite impulse response filter comprises: dividing the whole frequency band into 16 sub-frequency bands by adopting an 1/2Octave method, combining three low-frequency sub-frequency bands into one sub-frequency band, splicing and cascading 14 sub-frequency bands into different granularities, and obtaining 105 frequency band samples with different lengths; these band samples are then filtered using an infinite impulse response filter.
In the data quantization step, the data sequence obtained in the calibration step is subjected to Fourier transform to obtain a frequency band with active equipment shaking behavior, and then the RSSI sequence of the frequency band is subjected to normalization processing to quantize the RSSI sequence into a bit sequence.
In one embodiment, the calculation method of the active frequency band of the device shaking behavior is as follows: calculating the first k main components in the frequency domain after Fourier transform, and expressing the highest frequency of the components as fiDetermining the frequency band of the active shaking behavior of the equipment as [0, fi]At a sampling frequency of 2fiThe quantized data sequence is a bit sequence.
In the key extraction step, for each mobile device, a hash verification code of a bit sequence of the mobile device is calculated and exchanged to other devices, and each mobile device compares the editing distance between the hash verification code sequence generated by the mobile device and the received hash verification code sequence, and determines whether authentication is successful according to the relationship between the editing distance and a set threshold.
Referring to fig. 5, the method for calculating the hash verification code of the bit sequence includes:
1) initializing a sliding window W of a bit sequence S of a device A and a bit sequence S' of a device B, wherein the lengths of the two bit sequences are respectively expressed as lXAnd lYThe sliding window size is ω.
2) Respectively obtaining the bit strings M of the windows WiAnd Mi', generating a random number riAnd ri', i denotes window W index, call hash function HAMC (r)i,Mi) To obtain a bit string BiAnd Bi'。
3) And moving a window forwards on the sequences S and S' by taking 1 bit as a step length, and executing 2) operation to obtain all bit character strings of the corresponding sequences to form a bit character string sequence.
4) By means of broadcasting, device a sends a signal of length lXSequence of (a) X ═ ri||BiAnd (1 ≦ i ≦ l) for device B, l representing the length of the bit sequence.
5) By means of broadcasting, the device B sends a signal of length lYSequence of (a) Y ═ ri'||Bi' } (1 is less than or equal to i and less than or equal to l) is given to the equipment A.
7) If α < t, t represents a mutual authentication threshold, the mutual authentication partner device is an authorized device. Finding matching components B of X and Y based on bit sequence S and bit sequence S' of peer deviceiAnd Bi' calculating the next matching result to verify the consistency of the hash code of the bit sequence.
8) Calculating the edit distance d of S and S ', dividing them into a plurality of blocks, calculating the hash code M' of each block M, i.e. HAMC (r)iM), assuming that they are used as a bit sequence, the first K bits are extracted as a key K, and the key K is used for subsequent communication of the device to prevent interference of other attackers.
As a preferred embodiment, the sliding window for computing the hashed validation code is greater than 64 bits.
It should be understood that, the scientific research data privacy protection enhancement system for a wireless network environment provided in the embodiment of the present invention may implement all technical solutions in the method embodiments, functions of each functional module may be implemented specifically according to the method in the method embodiments, and specific implementation processes of each functional module that are not described in detail may refer to relevant descriptions in the method embodiments, and are not described in detail in the specification.
While the invention has been described in terms of its preferred embodiments, it will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the invention.
Claims (10)
1. A scientific research data privacy protection enhancement method oriented to a wireless network environment is characterized by comprising the following steps:
s1, establishing a change mode of different postures and displacements of the mobile equipment, detecting a starting point of equipment state change according to signal intensity change of a wireless network signal received by the mobile equipment from a wireless network signal emission source, and calibrating the received signal;
s2, quantizing the data sequence subjected to the calibration processing into a bit sequence;
s3, calculating a key according to the bit sequence of each mobile device by using a Hash coding mode, exchanging encryption messages among the mobile devices to verify the consistency of mutual authentication, generating a unique and random symmetric key and establishing complete connection.
2. The method for enhancing privacy protection of scientific research data oriented to wireless network environment as claimed in claim 1, wherein said step S1 includes: establishing different changing modes of postures and displacements for the mobile device by executing the behavior of shaking or overturning the mobile device; the RSSI sequence is subjected to numerical value anomaly detection by taking the received signal strength RSSI of a wireless network signal received by the mobile equipment as feedback for wireless channel change, the RSSI characteristic value of a vibration event of the mobile equipment is detected to be taken as the initial point of equipment posture or position change, and the initial points and tracks of a plurality of mobile equipment are synchronized; carrying out interpolation processing on the data sequence and smoothing the track of the RSSI sequence; and filtering the RSSI sequences of different frequency bands by adopting an infinite impulse response filter.
3. The wireless network environment-oriented scientific data privacy protection enhancement method of claim 2, wherein synchronizing the starting points and trajectories of the plurality of mobile devices comprises: sliding a window along the original RSSI data sequence, wherein the size of the sliding window is calculated in the following way: f. ofsp/fskWherein f isspFor sampling the sample data at a sampling frequency, fskFor shaking or flipping the frequency of shaking of the mobile device and calculating the average value v of the data sequence for each sliding windowi(ii) a When v isi>tiWhen t isiFor the set threshold, the sliding window is stopped with the starting point of the window set to P.
4. The scientific data privacy protection enhancement method for wireless network environment according to claim 2, wherein the interpolation processing of the data sequence comprises: dividing the data sequence S into a plurality of subsequences D, performing data interpolation processing on each subsequence, smoothing data by using a smoothing window filter with adjustable window size, adjusting the value of window size omega by evaluating the size of the cross-correlation coefficient theta and a threshold value t, continuously iterating until the cross-correlation coefficient approaches the threshold value, and finishing the smoothing process.
5. The scientific research data privacy protection enhancement method oriented to the wireless network environment as claimed in claim 2, wherein the filtering processing of the RSSI sequences of different frequency bands by using an infinite impulse response filter includes: dividing the whole frequency band into 16 sub-frequency bands by adopting an 1/2Octave method, combining three low-frequency sub-frequency bands into one sub-frequency band, splicing and cascading 14 sub-frequency bands into different granularities, and obtaining 105 frequency band samples with different lengths; these band samples are then filtered using an infinite impulse response filter.
6. The method for enhancing privacy protection of scientific research data oriented to wireless network environment as claimed in claim 1, wherein said step S2 includes: and performing Fourier transform on the data sequence obtained in the step S1 to obtain a frequency band with active equipment shaking behavior, and performing normalization processing on the RSSI sequence of the frequency band to quantize the RSSI sequence into a bit sequence.
7. The wireless network environment-oriented scientific research data privacy protection enhancement method according to claim 6, wherein the calculation mode of the active frequency band of the equipment shaking behavior is as follows: calculating the first k main components in the frequency domain after Fourier transform, and expressing the highest frequency of the components as fiDetermining the frequency band of the active shaking behavior of the equipment as [0, fi]At a sampling frequency of 2fiThe quantized data sequence is a bit sequence.
8. The scientific data privacy protection enhancement method for wireless network environment according to claim 1, wherein the step S3 of calculating a key according to the bit sequence of each mobile device by using a hash coding method, and exchanging encryption messages among the mobile devices to verify consistency of mutual authentication comprises: and for each mobile device, calculating the Hash verification code of the bit sequence of the mobile device, exchanging the Hash verification code with other devices, comparing the editing distance between the Hash verification code sequence generated by the mobile device and the received Hash verification code sequence by each mobile device, and determining whether the authentication is successful according to the relationship between the editing distance and the set threshold.
9. The method for enhancing privacy protection of scientific research data oriented to wireless network environment according to claim 8, wherein the step S3 of mutually exchanging encryption messages between mobile devices to verify consistency of mutual authentication comprises:
1) initializing a sliding window W of a bit sequence S of a device A and a bit sequence S' of a device B, wherein the lengths of the two bit sequences are respectively expressed as lXAnd lYThe size of the sliding window is omega;
2) respectively obtaining the bit strings M of the windows WiAnd Mi', generating a random number riAnd ri', i denotes window W index, call hash function HAMC (r)i,Mi) To obtain a bit string BiAnd Bi';
3) Moving the window forwards on the sequences S and S' by taking 1 bit as a step length, and executing 2) operation to obtain all bit character strings of the corresponding sequences to form a bit character string sequence;
4) by means of broadcasting, device a sends a signal of length lXSequence of (a) X ═ ri||BiGiving the device B;
5) by means of broadcasting, the device B sends a signal of length lYSequence of (a) Y ═ ri'||B′iGiving the device A;
7) If α < t, t represents a mutual authentication threshold, the mutual authentication partner device is an authorized device.
10. A scientific research data privacy protection enhancement system oriented to a wireless network environment is characterized by comprising:
the data calibration module is used for establishing different posture and displacement change modes of the mobile equipment, detecting a starting point of equipment state change according to signal intensity change of a wireless network signal received by the mobile equipment from a wireless network signal emission source, and calibrating the received signal;
the data quantization module is used for quantizing the data sequence subjected to the calibration processing into a bit sequence;
and the key extraction module is used for calculating keys according to the bit sequence of each mobile device in a Hash coding mode, exchanging encryption messages among the mobile devices to verify the consistency of mutual authentication, generating unique and random symmetric keys and establishing complete connection.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110746244.4A CN113473420B (en) | 2021-07-02 | 2021-07-02 | Scientific research data privacy protection enhancement method and system oriented to wireless network environment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110746244.4A CN113473420B (en) | 2021-07-02 | 2021-07-02 | Scientific research data privacy protection enhancement method and system oriented to wireless network environment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113473420A true CN113473420A (en) | 2021-10-01 |
CN113473420B CN113473420B (en) | 2023-01-31 |
Family
ID=77877434
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110746244.4A Active CN113473420B (en) | 2021-07-02 | 2021-07-02 | Scientific research data privacy protection enhancement method and system oriented to wireless network environment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113473420B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114338431A (en) * | 2021-12-29 | 2022-04-12 | 锐捷网络股份有限公司 | Identity registration method, device and system |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2006130725A2 (en) * | 2005-05-31 | 2006-12-07 | Interdigital Technology Corporation | Authentication and encryption methods using shared secret randomness in a joint channel |
CN106658494A (en) * | 2016-12-12 | 2017-05-10 | 西安电子科技大学 | Wireless equipment secret key building method based on signal intensity track |
US20200070777A1 (en) * | 2018-08-30 | 2020-03-05 | Nio Usa, Inc. | Systems and methods for a digital key |
-
2021
- 2021-07-02 CN CN202110746244.4A patent/CN113473420B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2006130725A2 (en) * | 2005-05-31 | 2006-12-07 | Interdigital Technology Corporation | Authentication and encryption methods using shared secret randomness in a joint channel |
CN106658494A (en) * | 2016-12-12 | 2017-05-10 | 西安电子科技大学 | Wireless equipment secret key building method based on signal intensity track |
US20200070777A1 (en) * | 2018-08-30 | 2020-03-05 | Nio Usa, Inc. | Systems and methods for a digital key |
Non-Patent Citations (2)
Title |
---|
FABRIZIO GUERRINI;: "Minimal Information Exchange for Secure Image Hash-Based Geometric Transformations Estimation", 《IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY》 * |
廖润发: "基于无线信道特征和智能算法的物理层安全技术研究", 《中国优秀博士学位论文全文数据库》 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114338431A (en) * | 2021-12-29 | 2022-04-12 | 锐捷网络股份有限公司 | Identity registration method, device and system |
Also Published As
Publication number | Publication date |
---|---|
CN113473420B (en) | 2023-01-31 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Liu et al. | Real-time identification of rogue WiFi connections using environment-independent physical features | |
Chen et al. | S2M: A lightweight acoustic fingerprints-based wireless device authentication protocol | |
Cassola et al. | A Practical, Targeted, and Stealthy Attack Against WPA Enterprise Authentication. | |
Studer et al. | Don't bump, shake on it: The exploitation of a popular accelerometer-based smart phone exchange and its secure replacement | |
KR102594996B1 (en) | System and method for authenticating a connection between a user device and a vehicle | |
EA036987B1 (en) | Systems and methods for device authentication | |
US20090167487A1 (en) | Secure association between devices | |
Haataja et al. | Bluetooth security attacks: comparative analysis, attacks, and countermeasures | |
Sethi et al. | Commitment-based device pairing with synchronized drawing | |
Ometov et al. | Mobile social networking under side-channel attacks: Practical security challenges | |
CN107040372B (en) | Method for generating a confidential sequence of values from measured physical properties of a transmission channel in a device | |
CN113473420B (en) | Scientific research data privacy protection enhancement method and system oriented to wireless network environment | |
Zhou et al. | Nauth: Secure face-to-face device authentication via nonlinearity | |
Ho | Covert channel establishment through the dynamic adaptation of the sequential probability ratio test to sensor data in IoT | |
Zhang et al. | A key agreement scheme for smart homes using the secret mismatch problem | |
Mei et al. | Listen!: Audio-based smart iot device pairing protocol | |
CN113056738A (en) | Method for increasing authentication security | |
Bhosale et al. | Detection of Anomalous User Activity for Home IoT Devices [Detection of Anomalous User Activity for Home IoT Devices] | |
Shah et al. | Wi-sign: Device-free second factor user authentication | |
Zhang et al. | An adaptive and robust secret key extraction scheme from high noise wireless channel in IIoT | |
Luo et al. | Ambient audio authentication | |
Shi et al. | iShake: Imitation-resistant secure pairing of smart devices via shaking | |
Ji et al. | A nonlinearity-based secure face-to-face device authentication for mobile devices | |
KR101031450B1 (en) | Secure association between devices | |
Shang et al. | AudioKey: a usable device pairing system using audio signals on smartwatches |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |