CN113473420A - Scientific research data privacy protection enhancement method and system oriented to wireless network environment - Google Patents

Scientific research data privacy protection enhancement method and system oriented to wireless network environment Download PDF

Info

Publication number
CN113473420A
CN113473420A CN202110746244.4A CN202110746244A CN113473420A CN 113473420 A CN113473420 A CN 113473420A CN 202110746244 A CN202110746244 A CN 202110746244A CN 113473420 A CN113473420 A CN 113473420A
Authority
CN
China
Prior art keywords
sequence
wireless network
data
mobile device
scientific research
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110746244.4A
Other languages
Chinese (zh)
Other versions
CN113473420B (en
Inventor
马诗源
谢磊
叶保留
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing University
Original Assignee
Nanjing University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing University filed Critical Nanjing University
Priority to CN202110746244.4A priority Critical patent/CN113473420B/en
Publication of CN113473420A publication Critical patent/CN113473420A/en
Application granted granted Critical
Publication of CN113473420B publication Critical patent/CN113473420B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/70Services for machine-to-machine communication [M2M] or machine type communication [MTC]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/041Key generation or derivation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/10Integrity

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本发明公开了一种面向无线网络环境的科研数据隐私保护增强方法及系统,所述方法包括:建立移动设备不同姿势和位移的变化模式,根据移动设备从无线网络信号发射源接收的无线网络信号的信号强度变化来检测设备状态变化的起始点,并对接收到的信号进行校准处理;将经过校准处理的数据序列量化为比特序列;根据比特序列计算密钥,通过移动设备之间相互交换加密消息来验证相互认证的一致性,生成独特且随机的对称密钥并建立完全连接。本发明通过测量无线网络信道的接收信号强度变化来量化移动设备的抖动模式并生成密钥,提高无线网络环境下科研数据的隐私保护性。

Figure 202110746244

The invention discloses a method and a system for enhancing the privacy protection of scientific research data oriented to a wireless network environment. Detect the starting point of the device state change by changing the signal strength of the device, and perform calibration processing on the received signal; quantize the calibrated data sequence into a bit sequence; calculate the key according to the bit sequence, and exchange encryption between mobile devices. messages to verify the consistency of mutual authentication, generate unique and random symmetric keys and establish a full connection. The invention quantifies the jitter pattern of the mobile device and generates the key by measuring the change of the received signal strength of the wireless network channel, thereby improving the privacy protection of scientific research data in the wireless network environment.

Figure 202110746244

Description

Scientific research data privacy protection enhancement method and system oriented to wireless network environment
Technical Field
The invention relates to the technical field of wireless network passive sensing and D2D communication, in particular to a scientific research data privacy protection enhancement method and system based on a wireless network environment.
Background
In device-to-device (D2D) communication via wireless channel, mutual authentication between mobile devices and establishment of spontaneous secure connection are indispensable requirements for exchanging data between devices, and with the development of D2D communication, scientific data transmission by D2D is also a trend. Users need to authenticate each other and establish spontaneous secure connections between devices, i.e. to achieve mutual authentication and key generation of these mobile devices, otherwise an attacker can intercept this information by launching an eavesdropping attack in the wireless channel. The current major device authentication schemes include: 1) device authentication methods based on passwords or patterns that enable efficient authentication and secure connection establishment by users creating password sequences or patterns in advance, however, the use of passwords or patterns is inconvenient, requiring frequent user input, which results in users creating simple patterns that make sensitive information susceptible to theft, and for devices without touch screens, users cannot enter passwords or patterns, which are vulnerable to network attacks because they are easily monitored in public places. 2) The equipment authentication method based on the embedded sensor touch screen mainly utilizes sensors such as an accelerometer and the touch screen to capture user behaviors in a vibration process, but the perception of the sensors is coarse-grained and is easy to be simulated by an attacker. An effective solution to these problems is urgently needed.
Disclosure of Invention
Aiming at the defects of the prior art, the invention aims to provide a scientific research data privacy protection enhancement method and system facing to a wireless network environment, and solves the problems of authentication between mobile devices and interception of information by an attacker launching interception attack on a wireless channel in the prior art.
In order to achieve the purpose, the invention adopts the following technical scheme:
according to a first aspect of the invention, a scientific research data privacy protection enhancement method facing a wireless network environment is provided, and the method comprises the following steps:
s1, establishing a change mode of different postures and displacements of the mobile equipment, detecting a starting point of equipment state change according to signal intensity change of a wireless network signal received by the mobile equipment from a wireless network signal emission source, and calibrating the received signal;
s2, quantizing the data sequence subjected to the calibration processing into a bit sequence;
s3, calculating a key according to the bit sequence of each mobile device by using a Hash coding mode, exchanging encryption messages among the mobile devices to verify the consistency of mutual authentication, generating a unique and random symmetric key and establishing complete connection.
In some embodiments of the first aspect of the present invention, the step S1 includes: establishing different changing modes of postures and displacements for the mobile device by executing the behavior of shaking or overturning the mobile device; the RSSI sequence is subjected to numerical value anomaly detection by taking the received signal strength RSSI of a wireless network signal received by the mobile equipment as feedback for wireless channel change, the RSSI characteristic value of a vibration event of the mobile equipment is detected to be taken as the initial point of equipment posture or position change, and the initial points and tracks of a plurality of mobile equipment are synchronized; carrying out interpolation processing on the data sequence and smoothing the track of the RSSI sequence; and filtering the RSSI sequences of different frequency bands by adopting an infinite impulse response filter.
In some embodiments of the first aspect of the present invention, the synchronizing the starting points and the trajectories of the plurality of mobile devices comprises: sliding a window along the original RSSI data sequence, wherein the size of the sliding window is calculated in the following way: f. ofsp/fskWherein f isspFor sampling the sample data at a sampling frequency, fskFor shaking or flipping the frequency of shaking of the mobile device and calculating the average value v of the data sequence for each sliding windowi(ii) a When v isi>tiWhen t isiFor the set threshold, the sliding window is stopped with the starting point of the window set to P.
In some embodiments of the first aspect of the present invention, the interpolating the data sequence comprises: dividing the data sequence S into a plurality of subsequences D, performing data interpolation processing on each subsequence, smoothing data by using a smoothing window filter with adjustable window size, adjusting the value of window size omega by evaluating the size of the cross-correlation coefficient theta and a threshold value t, continuously iterating until the cross-correlation coefficient approaches the threshold value, and finishing the smoothing process.
In some embodiments of the first aspect of the present invention, the filtering, by using an infinite impulse response filter, the RSSI sequences of different frequency bands includes: dividing the whole frequency band into 16 sub-frequency bands by adopting an 1/2Octave method, combining three low-frequency sub-frequency bands into one sub-frequency band, splicing and cascading 14 sub-frequency bands into different granularities, and obtaining 105 frequency band samples with different lengths; these band samples are then filtered using an infinite impulse response filter.
In some embodiments of the first aspect of the present invention, the step S2 includes: and performing Fourier transform on the data sequence obtained in the step S1 to obtain a frequency band with active equipment shaking behavior, and performing normalization processing on the RSSI sequence of the frequency band to quantize the RSSI sequence into a bit sequence.
In some embodiments of the first aspect of the present invention, the calculation method of the active frequency band of the device shaking behavior is as follows: calculating the first k main components in the frequency domain after Fourier transform, and expressing the highest frequency of the components as fiDetermining the frequency band of the active shaking behavior of the equipment as [0, fi]At a sampling frequency of 2fiThe quantized data sequence is a bit sequence.
In some embodiments of the first aspect of the present invention, the calculating, in step S3, a key according to the bit sequence of each mobile device by using a hash coding method, and exchanging encryption messages between the mobile devices to verify consistency of mutual authentication includes: and for each mobile device, calculating the Hash verification code of the bit sequence of the mobile device, exchanging the Hash verification code with other devices, comparing the editing distance between the Hash verification code sequence generated by the mobile device and the received Hash verification code sequence by each mobile device, and determining whether the authentication is successful according to the relationship between the editing distance and the set threshold.
According to a second aspect of the present invention, there is provided a scientific research data privacy protection enhancement system facing a wireless network environment, including:
the data calibration module is used for establishing different posture and displacement change modes of the mobile equipment, detecting a starting point of equipment state change according to signal intensity change of a wireless network signal received by the mobile equipment from a wireless network signal emission source, and calibrating the received signal;
the data quantization module is used for quantizing the data sequence subjected to the calibration processing into a bit sequence;
and the key extraction module is used for calculating keys according to the bit sequence of each mobile device in a Hash coding mode, exchanging encryption messages among the mobile devices to verify the consistency of mutual authentication, generating unique and random symmetric keys and establishing complete connection.
The invention has the following beneficial effects: aiming at the anti-imitation mutual authentication of the mobile equipment, the invention provides a key generation framework based on a wireless network environment, which generates a unique and consistent symmetric key according to wireless network signals collected from the mobile equipment and realizes the identity authentication of multiple equipment. The method can effectively improve the privacy protection of research data in a wireless network environment.
Drawings
Fig. 1 is a general schematic diagram of scientific research data privacy protection in a wireless network scenario according to an embodiment of the present invention;
fig. 2 is a block diagram of a scientific research data privacy protection system in a wireless network scenario according to an embodiment of the present invention;
fig. 3 is a schematic flowchart of a scientific research data privacy protection method in a wireless network scenario according to an embodiment of the present invention;
fig. 4 is a diagram illustrating a relationship between mutual authentication and key generation of mobile devices according to an embodiment of the present invention;
fig. 5 is a schematic bit diagram of a decoding peer device according to an embodiment of the present invention.
Detailed Description
In order to facilitate understanding of those skilled in the art, the present invention will be further described with reference to the following examples and drawings, which are not intended to limit the present invention.
Referring to fig. 1 to 2, the present invention provides a bidirectional authentication and key generation framework under a wireless network, which forms a system for enhancing scientific research data privacy protection, and the system mainly includes the following functional modules: the device comprises a data calibration module, a quantization module and a key extraction module. The mobile device continuously receives wireless network signals transmitted by devices such as a gateway and a base station, and the mobile device includes, but is not limited to, an intelligent mobile terminal such as a smart phone, a smart band, a personal digital assistant, and a tablet computer. The user first shakes the devices in any manner, such as shaking or whipping, to create a shock. Upon detecting a shock event, each device begins sampling the user's behavior through the RSSI information of the wireless network signals. In the data calibration module, the device performs tracking synchronization and data interpolation processing on the sampled original data in a self-adaptive manner, so that the data can be effectively subjected to synchronous smooth processing, and the influence of track asynchronism caused by different positions of the device is reduced. In the quantization module, bit sequences are generated from the RSSI data, respectively, according to the sensitivity of the device to user behavior. In the key extraction module, devices exchange a limited number of encrypted messages with each other to verify the consistency of mutual authentication, and selectively use the consistent bits for key generation. In this way, the devices can generate a unique and consistent key through dithering.
Specifically, referring to fig. 3 to 4, the present invention is a scientific research data privacy protection enhancement method based on a wireless network environment, which is based on the above system, and includes the following steps:
the method comprises the steps of data calibration, wherein the mobile equipment continuously receives wireless network signals sent by equipment such as a gateway and a base station, the wireless network signals comprise wireless network signals such as WiFi signals and cellular network signals, the wireless network signals can sense the channel state change of the surrounding environment of the mobile equipment, the RSSI of the received signal strength of the wireless network signals is used as feedback of the wireless channel change, the RSSI sequence is subjected to numerical value abnormity detection, the RSSI characteristic value of the equipment with a vibration event is detected and is used as the starting point of the equipment posture or position change, the starting point of the equipment state change and the RSSI track are synchronized for a plurality of pieces of equipment, then the data sequence is subjected to interpolation processing, the track of the RSSI sequence is smoothed, and the RSSI sequences of different frequency bands are subjected to filtering processing by adopting an infinite impulse response filter;
a data quantization step, namely performing Fourier transform on the sequence to obtain a frequency band with active behaviors, performing normalization processing on an RSSI sequence of the frequency band, and quantizing the RSSI sequence into a bit sequence;
and a key extraction step, namely calculating the Hash verification code of the bit sequence by using the Hash verification code as a signature and exchanging the Hash verification code to the same-level equipment, and comparing the editing distances of the Hash verification code sequences of the multiple equipment to judge whether the authentication is successful.
Specifically, in the data calibration step, different change patterns of posture and displacement are established for the mobile device by performing the behavior of shaking or turning the mobile device; the RSSI sequence is subjected to numerical value anomaly detection by taking the received signal strength RSSI of a wireless network signal received by the mobile equipment as feedback for wireless channel change, the RSSI characteristic value of a vibration event of the mobile equipment is detected to be taken as the initial point of equipment posture or position change, and the initial points and tracks of a plurality of mobile equipment are synchronized; carrying out interpolation processing on the data sequence and smoothing the track of the RSSI sequence; and filtering the RSSI sequences of different frequency bands by adopting an infinite impulse response filter.
In one embodiment, synchronizing the starting points and trajectories of the plurality of mobile devices comprises: sliding a window along the original RSSI data sequence, wherein the size of the sliding window is calculated in the following way: f. ofsp/fskWherein f isspFor sampling the sample data at a sampling frequency, fskFor shaking or turning the mobile device, e.g. frequency f of shaking of the usersk10HZ, sampling frequency fsp100hz, window size fsp/fsk20; and calculating the average value v of the data sequence of each sliding windowi(ii) a Comparing the average value of the sliding window with a preset threshold value when v isi>tiWhen t isiFor the set threshold, the sliding window is stopped with the starting point of the window set to P.
In one embodiment, interpolating a data sequence comprises: dividing the data sequence S into a plurality of subsequences D, performing data interpolation processing on each subsequence, smoothing data by using a smoothing window filter with adjustable window size, adjusting the value of window size omega by evaluating the size of the cross-correlation coefficient theta and a threshold value t, continuously iterating until the cross-correlation coefficient approaches the threshold value, and finishing the smoothing process.
In one embodiment, the filtering the RSSI sequences of different frequency bands by using an infinite impulse response filter comprises: dividing the whole frequency band into 16 sub-frequency bands by adopting an 1/2Octave method, combining three low-frequency sub-frequency bands into one sub-frequency band, splicing and cascading 14 sub-frequency bands into different granularities, and obtaining 105 frequency band samples with different lengths; these band samples are then filtered using an infinite impulse response filter.
In the data quantization step, the data sequence obtained in the calibration step is subjected to Fourier transform to obtain a frequency band with active equipment shaking behavior, and then the RSSI sequence of the frequency band is subjected to normalization processing to quantize the RSSI sequence into a bit sequence.
In one embodiment, the calculation method of the active frequency band of the device shaking behavior is as follows: calculating the first k main components in the frequency domain after Fourier transform, and expressing the highest frequency of the components as fiDetermining the frequency band of the active shaking behavior of the equipment as [0, fi]At a sampling frequency of 2fiThe quantized data sequence is a bit sequence.
In the key extraction step, for each mobile device, a hash verification code of a bit sequence of the mobile device is calculated and exchanged to other devices, and each mobile device compares the editing distance between the hash verification code sequence generated by the mobile device and the received hash verification code sequence, and determines whether authentication is successful according to the relationship between the editing distance and a set threshold.
Referring to fig. 5, the method for calculating the hash verification code of the bit sequence includes:
1) initializing a sliding window W of a bit sequence S of a device A and a bit sequence S' of a device B, wherein the lengths of the two bit sequences are respectively expressed as lXAnd lYThe sliding window size is ω.
2) Respectively obtaining the bit strings M of the windows WiAnd Mi', generating a random number riAnd ri', i denotes window W index, call hash function HAMC (r)i,Mi) To obtain a bit string BiAnd Bi'。
3) And moving a window forwards on the sequences S and S' by taking 1 bit as a step length, and executing 2) operation to obtain all bit character strings of the corresponding sequences to form a bit character string sequence.
4) By means of broadcasting, device a sends a signal of length lXSequence of (a) X ═ ri||BiAnd (1 ≦ i ≦ l) for device B, l representing the length of the bit sequence.
5) By means of broadcasting, the device B sends a signal of length lYSequence of (a) Y ═ ri'||Bi' } (1 is less than or equal to i and less than or equal to l) is given to the equipment A.
6) Calculate the edit distance d between X and Y, and calculate BiAnd BiDegree of matching of `
Figure BDA0003144509030000061
7) If α < t, t represents a mutual authentication threshold, the mutual authentication partner device is an authorized device. Finding matching components B of X and Y based on bit sequence S and bit sequence S' of peer deviceiAnd Bi' calculating the next matching result to verify the consistency of the hash code of the bit sequence.
8) Calculating the edit distance d of S and S ', dividing them into a plurality of blocks, calculating the hash code M' of each block M, i.e. HAMC (r)iM), assuming that they are used as a bit sequence, the first K bits are extracted as a key K, and the key K is used for subsequent communication of the device to prevent interference of other attackers.
As a preferred embodiment, the sliding window for computing the hashed validation code is greater than 64 bits.
It should be understood that, the scientific research data privacy protection enhancement system for a wireless network environment provided in the embodiment of the present invention may implement all technical solutions in the method embodiments, functions of each functional module may be implemented specifically according to the method in the method embodiments, and specific implementation processes of each functional module that are not described in detail may refer to relevant descriptions in the method embodiments, and are not described in detail in the specification.
While the invention has been described in terms of its preferred embodiments, it will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the invention.

Claims (10)

1.一种面向无线网络环境的科研数据隐私保护增强方法,其特征在于,包括以下步骤:1. a method for enhancing the privacy protection of scientific research data facing wireless network environment, is characterized in that, comprises the following steps: S1、建立移动设备不同姿势和位移的变化模式,根据移动设备从无线网络信号发射源接收的无线网络信号的信号强度变化来检测设备状态变化的起始点,并对接收到的信号进行校准处理;S1, establish the change mode of different postures and displacements of the mobile device, detect the starting point of the state change of the device according to the signal strength change of the wireless network signal received by the mobile device from the wireless network signal transmission source, and perform calibration processing on the received signal; S2、将经过校准处理的数据序列量化为比特序列;S2. Quantize the calibrated data sequence into a bit sequence; S3、利用哈希编码方式,根据每台移动设备的比特序列计算密钥,并在移动设备之间相互交换加密消息来验证相互认证的一致性,生成独特且随机的对称密钥并建立完全连接。S3. Using the hash coding method, calculate the key according to the bit sequence of each mobile device, and exchange encrypted messages between the mobile devices to verify the consistency of mutual authentication, generate a unique and random symmetric key and establish a full connection . 2.根据权利要求1所述的面向无线网络环境的科研数据隐私保护增强方法,其特征在于,所述步骤S1包括:通过执行摇晃或翻转移动设备的行为对移动设备建立不同的姿势和位移的变化模式;以移动设备接收的无线网络信号的接收信号强度RSSI作为对无线信道变化的反馈,对RSSI序列进行数值异常检测,检测到移动设备发生震动事件的RSSI特征值,作为设备姿态或位置变化的起始点,并对多台移动设备的起始点和轨迹进行同步;对数据序列进行插值处理,平滑RSSI序列的轨迹;采用无限脉冲响应滤波器对不同频段的RSSI序列进行滤波处理。2. The method for enhancing the privacy protection of scientific research data oriented to a wireless network environment according to claim 1, wherein the step S1 comprises: establishing different postures and displacements for the mobile device by performing the behavior of shaking or flipping the mobile device. Change mode: The RSSI of the received signal strength of the wireless network signal received by the mobile device is used as the feedback for the change of the wireless channel, and the numerical anomaly detection is performed on the RSSI sequence, and the RSSI characteristic value of the vibration event of the mobile device is detected as the device attitude or position change. and synchronize the starting points and trajectories of multiple mobile devices; perform interpolation processing on the data sequence to smooth the trajectory of the RSSI sequence; use an infinite impulse response filter to filter the RSSI sequences in different frequency bands. 3.根据权利要求2所述的面向无线网络环境的科研数据隐私保护增强方法,其特征在于,所述对多台移动设备的起始点和轨迹进行同步包括:沿着原始RSSI数据序列进行滑动窗口,滑动窗口大小的计算方式为:fsp/fsk,其中fsp为采集样本数据的采样频率,fsk为摇晃或翻转移动设备的晃动频率,并计算每个滑动窗口的数据序列的平均值vi;当vi>ti时,ti为设置的阈值,将窗口的起始点设为P,停止滑动窗口。3. The method for enhancing the privacy protection of scientific research data oriented to a wireless network environment according to claim 2, wherein the synchronization of the starting points and tracks of multiple mobile devices comprises: performing a sliding window along the original RSSI data sequence , the calculation method of the sliding window size is: f sp /f sk , where f sp is the sampling frequency of collecting sample data, f sk is the shaking frequency of shaking or flipping the mobile device, and calculate the average value of the data sequence of each sliding window v i ; when v i >t i , t i is the set threshold, the starting point of the window is set to P, and the sliding window is stopped. 4.根据权利要求2所述的面向无线网络环境的科研数据隐私保护增强方法,其特征在于,所述对数据序列进行插值处理包括:将数据序列S分成多个子序列D,对每个子序列采用数据插值处理,采用窗口大小可调节的平滑窗口滤波器对数据进行平滑,通过评估互相关系数θ和阈值t的大小,来调节窗口大小ω的值,不断迭代,直至互相关系数接近阈值,平滑过程结束。4. The method for enhancing the privacy protection of scientific research data oriented to a wireless network environment according to claim 2, wherein the interpolation processing on the data sequence comprises: dividing the data sequence S into a plurality of subsequences D, and for each subsequence adopting In data interpolation processing, a smoothing window filter with adjustable window size is used to smooth the data. By evaluating the size of the cross-correlation coefficient θ and the threshold t, the value of the window size ω is adjusted, and iterates continuously until the cross-correlation coefficient is close to the threshold value. Process ends. 5.根据权利要求2所述的面向无线网络环境的科研数据隐私保护增强方法,其特征在于,所述采用无限脉冲响应滤波器对不同频段的RSSI序列进行滤波处理包括:先采用1/2Octave法将整个频段分为16个子频段,将其中三个低频子频段合并为一个子频段,再将14个子频段拼接并级联成不同的粒度,获得105个不同长度的频段样本;然后应用无限脉冲响应滤波器对这些频段样本进行滤波。5. the method for enhancing the privacy protection of scientific research data facing wireless network environment according to claim 2, is characterized in that, described adopting infinite impulse response filter to carry out filtering processing to the RSSI sequence of different frequency bands comprises: first adopt 1/2Octave method Divide the entire frequency band into 16 sub-bands, combine three of the low-frequency sub-bands into one sub-band, then splicing and cascading the 14 sub-bands into different granularities to obtain 105 frequency band samples of different lengths; then apply an infinite impulse response The filter filters these frequency band samples. 6.根据权利要求1所述的面向无线网络环境的科研数据隐私保护增强方法,其特征在于,所述步骤S2包括:对步骤S1得到的数据序列进行傅里叶变换,获得设备晃动行为活跃频段,并对该频段的RSSI序列进行归一化处理,将RSSI序列量化为比特序列。6. The method for enhancing the privacy protection of scientific research data oriented to a wireless network environment according to claim 1, wherein the step S2 comprises: performing a Fourier transform on the data sequence obtained in the step S1 to obtain an active frequency band for equipment shaking behavior , and normalize the RSSI sequence of the frequency band to quantize the RSSI sequence into a bit sequence. 7.根据权利要求6所述的面向无线网络环境的科研数据隐私保护增强方法,其特征在于,所述设备晃动行为活跃频段计算方式如下:计算傅里叶变换后频域上前k个主成分,将这些成分的最高频率表示为fi,确定设备晃动行为活跃频段为[0,fi],以采样频率为2fi,量化数据序列为比特序列。7. The method for enhancing the privacy protection of scientific research data oriented to a wireless network environment according to claim 6, wherein the device shaking behavior active frequency band calculation method is as follows: the first k principal components in the frequency domain after calculating the Fourier transform , denote the highest frequency of these components as f i , determine the active frequency band of equipment shaking behavior as [0, f i ], take the sampling frequency as 2f i , and the quantized data sequence as a bit sequence. 8.根据权利要求1所述的面向无线网络环境的科研数据隐私保护增强方法,其特征在于,所述步骤S3中利用哈希编码方式,根据每台移动设备的比特序列计算密钥,并在移动设备之间相互交换加密消息来验证相互认证的一致性包括:对于每台移动设备,计算其比特序列的哈希验证码,并交换给其他设备,每台移动设备对比本设备生成的哈希验证码序列和接收到的哈希验证码序列的编辑距离,并根据编辑距离与所设阈值的关系决定是否认证成功。8. the method for enhancing the privacy protection of scientific research data oriented to wireless network environment according to claim 1, is characterized in that, utilizes hash coding mode in described step S3, calculates key according to the bit sequence of each mobile device, and in the step S3. The mutual exchange of encrypted messages between mobile devices to verify the consistency of mutual authentication includes: for each mobile device, calculate the hash verification code of its bit sequence, and exchange it to other devices. Each mobile device compares the hash generated by the device. The edit distance between the verification code sequence and the received hash verification code sequence, and whether the authentication is successful is determined according to the relationship between the edit distance and the set threshold. 9.根据权利要求8所述的面向无线网络环境的科研数据隐私保护增强方法,其特征在于,所述步骤S3中移动设备之间相互交换加密消息来验证相互认证的一致性包括:9. The method for enhancing the privacy protection of scientific research data oriented to a wireless network environment according to claim 8, wherein in the step S3, the mobile devices exchange encrypted messages with each other to verify the consistency of mutual authentication and include: 1)对设备A的比特序列S和设备B的比特序列S’的滑动窗口W进行初始化,两设备比特序列的长度分别表示为lX和lY,滑动窗口大小为ω;1) Initialize the sliding window W of the bit sequence S of the device A and the bit sequence S' of the device B, the lengths of the bit sequences of the two devices are respectively expressed as l X and l Y , and the sliding window size is ω; 2)分别获得窗口W的比特字符串Mi和Mi',生成随机数值ri和ri',i表示窗口W索引,调用哈希函数HAMC(ri,Mi)来获得比特字符串Bi和Bi';2) Respectively obtain the bit strings Mi and Mi ' of the window W, generate random values ri and ri ', i represents the index of the window W, and call the hash function HAMC(ri , Mi ) to obtain the bit string B i and B i '; 3)以1比特为步长,在序列S和S’上向前移动窗口,并执行2)操作,获得对应序列的所有比特字符串,构成比特字符串序列;3) take 1 bit as a step, move the window forward on the sequence S and S', and perform 2) operation, obtain all the bit strings of the corresponding sequence, and form a bit string sequence; 4)通过广播的方式,设备A发送长度为lX的序列X={ri||Bi}给设备B;4) By means of broadcasting, device A sends a sequence X={r i ||B i } with a length of l X to device B; 5)通过广播的方式,设备B发送长度为lY的序列Y={ri'||B′i}给设备A;5) By means of broadcasting, device B sends a sequence Y={r i '||B' i } with a length of l Y to device A; 6)计算X和Y之间的编辑距离d,并计算Bi和B′i的匹配度
Figure FDA0003144509020000021
6) Calculate the edit distance d between X and Y, and calculate the matching degree of B i and B' i
Figure FDA0003144509020000021
7)如果α<t,t表示相互认证阈值,那么相互认证对方设备为授权设备。7) If α<t, t represents the mutual authentication threshold, then the mutual authentication of the opposite device is an authorized device.
10.一种面向无线网络环境的科研数据隐私保护增强系统,其特征在于,包括:10. A system for enhancing the privacy protection of scientific research data oriented to a wireless network environment, comprising: 数据校准模块,用于建立移动设备不同姿势和位移的变化模式,根据移动设备从无线网络信号发射源接收的无线网络信号的信号强度变化来检测设备状态变化的起始点,并对接收到的信号进行校准处理;The data calibration module is used to establish the change mode of different postures and displacements of the mobile device, and detect the starting point of the state change of the device according to the signal strength change of the wireless network signal received by the mobile device from the wireless network signal transmission source, and analyze the received signal. carry out calibration processing; 数据量化模块,用于将经过校准处理的数据序列量化为比特序列;A data quantization module for quantizing the calibrated data sequence into a bit sequence; 密钥提取模块,用于通过哈希编码方式,根据每台移动设备的比特序列计算密钥,并在移动设备之间相互交换加密消息来验证相互认证的一致性,生成独特且随机的对称密钥并建立完全连接。The key extraction module is used to calculate the key according to the bit sequence of each mobile device through hash coding, and exchange encrypted messages between mobile devices to verify the consistency of mutual authentication, and generate a unique and random symmetric key. key and establish a full connection.
CN202110746244.4A 2021-07-02 2021-07-02 Scientific research data privacy protection enhancement method and system oriented to wireless network environment Active CN113473420B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110746244.4A CN113473420B (en) 2021-07-02 2021-07-02 Scientific research data privacy protection enhancement method and system oriented to wireless network environment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110746244.4A CN113473420B (en) 2021-07-02 2021-07-02 Scientific research data privacy protection enhancement method and system oriented to wireless network environment

Publications (2)

Publication Number Publication Date
CN113473420A true CN113473420A (en) 2021-10-01
CN113473420B CN113473420B (en) 2023-01-31

Family

ID=77877434

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110746244.4A Active CN113473420B (en) 2021-07-02 2021-07-02 Scientific research data privacy protection enhancement method and system oriented to wireless network environment

Country Status (1)

Country Link
CN (1) CN113473420B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114338431A (en) * 2021-12-29 2022-04-12 锐捷网络股份有限公司 Identity registration method, device and system
CN120017274A (en) * 2025-04-21 2025-05-16 电子科技大学 Physical layer key generation method based on self-adaptive non-uniform segmentation and tree sequence matching

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2006130725A2 (en) * 2005-05-31 2006-12-07 Interdigital Technology Corporation Authentication and encryption methods using shared secret randomness in a joint channel
CN106658494A (en) * 2016-12-12 2017-05-10 西安电子科技大学 Wireless equipment secret key building method based on signal intensity track
US20200070777A1 (en) * 2018-08-30 2020-03-05 Nio Usa, Inc. Systems and methods for a digital key

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2006130725A2 (en) * 2005-05-31 2006-12-07 Interdigital Technology Corporation Authentication and encryption methods using shared secret randomness in a joint channel
CN106658494A (en) * 2016-12-12 2017-05-10 西安电子科技大学 Wireless equipment secret key building method based on signal intensity track
US20200070777A1 (en) * 2018-08-30 2020-03-05 Nio Usa, Inc. Systems and methods for a digital key

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
FABRIZIO GUERRINI;: "Minimal Information Exchange for Secure Image Hash-Based Geometric Transformations Estimation", 《IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY》 *
廖润发: "基于无线信道特征和智能算法的物理层安全技术研究", 《中国优秀博士学位论文全文数据库》 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114338431A (en) * 2021-12-29 2022-04-12 锐捷网络股份有限公司 Identity registration method, device and system
CN120017274A (en) * 2025-04-21 2025-05-16 电子科技大学 Physical layer key generation method based on self-adaptive non-uniform segmentation and tree sequence matching
CN120017274B (en) * 2025-04-21 2025-06-06 电子科技大学 Physical layer key generation method based on self-adaptive non-uniform segmentation and tree sequence matching

Also Published As

Publication number Publication date
CN113473420B (en) 2023-01-31

Similar Documents

Publication Publication Date Title
Liu et al. Real-time identification of rogue WiFi connections using environment-independent physical features
Cassola et al. A Practical, Targeted, and Stealthy Attack Against WPA Enterprise Authentication.
JP2022528815A (en) Systems and methods for authenticating the connection between the user device and the vehicle
CN113473420A (en) Scientific research data privacy protection enhancement method and system oriented to wireless network environment
Ometov et al. Mobile social networking under side-channel attacks: Practical security challenges
CN107040372B (en) Method for generating a confidential sequence of values from measured physical properties of a transmission channel in a device
Ho Covert channel establishment through the dynamic adaptation of the sequential probability ratio test to sensor data in IoT
Zhang et al. An adaptive and robust secret key extraction scheme from high noise wireless channel in IIoT
Bhosale et al. Detection of Anomalous User Activity for Home IoT Devices [Detection of Anomalous User Activity for Home IoT Devices]
Shah et al. Wi-sign: Device-free second factor user authentication
CN108173791B (en) Physical layer blind authentication method and system for time-varying fading channel based on smoothing technology
Ji et al. A nonlinearity-based secure face-to-face device authentication for mobile devices
Luo et al. Ambient audio authentication
Shi et al. iShake: Imitation-resistant secure pairing of smart devices via shaking
CN108683500B (en) A WBAN Privacy Protection Method Based on Channel Characteristics
CN116647842A (en) Security authentication method for industrial mobile equipment based on image channel time-varying features
CN108199991B (en) Physical layer blind authentication method and system of time-varying fading channel based on confidence transfer
Qiu et al. MAGIK: An efficient key extraction mechanism based on dynamic geomagnetic field
Sandosh et al. State-of-the-Art of Voice Assistance Technology, Mitigating Replay Attacks: A Comprehensive Discussion
Guo et al. Secure device pairing via handshake detection
CN114845299A (en) Communication authentication method, system and electronic device based on channel polarization response
Shi et al. Just Shake Them Together: Imitation‐Resistant Secure Pairing of Smart Devices via Shaking
Zhang et al. Key extraction using ambient sounds for smart devices
CN109982326B (en) Physical layer security authentication method based on large-scale fading characteristics
Wu et al. Learning for device pairing in body area networks

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant