CN113727301B - Hash security access method and system for V2N low-delay communication service - Google Patents

Hash security access method and system for V2N low-delay communication service Download PDF

Info

Publication number
CN113727301B
CN113727301B CN202110897425.7A CN202110897425A CN113727301B CN 113727301 B CN113727301 B CN 113727301B CN 202110897425 A CN202110897425 A CN 202110897425A CN 113727301 B CN113727301 B CN 113727301B
Authority
CN
China
Prior art keywords
pilot
vehicle
hash
subcarrier
attack
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110897425.7A
Other languages
Chinese (zh)
Other versions
CN113727301A (en
Inventor
徐东阳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xian Jiaotong University
Original Assignee
Xian Jiaotong University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xian Jiaotong University filed Critical Xian Jiaotong University
Priority to CN202110897425.7A priority Critical patent/CN113727301B/en
Publication of CN113727301A publication Critical patent/CN113727301A/en
Application granted granted Critical
Publication of CN113727301B publication Critical patent/CN113727301B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/40Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/14Network analysis or design
    • H04L41/145Network analysis or design involving simulating, designing, planning or modelling of a network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/121Wireless intrusion detection systems [WIDS]; Wireless intrusion prevention systems [WIPS]
    • H04W12/122Counter-measures against attacks; Protection against rogue devices
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The original pilot signals appointed by each vehicle-mounted device are randomized and coded into subcarrier activating modes (SAP), and the coded SAP can be separated, identified, reliably decoded into code words and finally converted into corresponding pilot signals although being covered by malicious signals and overlapped and interfered with each other in a wireless environment, so that the safety access of the vehicle-mounted device is ensured. The invention constructs a hash coding technology based on signal characteristics, establishes a hash coding and decoding frame, provides a load detection mechanism, and can identify the access of legal vehicle-mounted equipment with higher probability based on the detected vehicle-mounted equipment identity. The invention can minimize the influence of the attack behavior from the probability domain through the support of the hash coding based on the signal characteristics.

Description

Hash security access method and system for V2N low-delay communication service
Technical Field
The invention relates to the field of wireless communication, in particular to a hash security access method and a hash security access system for V2N low-delay communication service.
Background
With the increasing development of wireless communication technology, on one hand, the performance requirements of V2N communication networks for high reliability and low delay are increasing; on the other hand, the security risk brought by the broadcast nature of the wireless channel is increasing. The wireless access security is used as a first security line of wireless communication, and a security protection mechanism based on a high-level password encryption and decryption system is widely adopted to protect wireless data generated in the access process. However, with the development of quantum computer technology, the mechanism faces the risk of being deciphered, while at the same time, the post quantum cryptography system is not mature, and the security threat faced by wireless access is dramatically increased, so that more advanced underlying information coding technology needs to be adopted to ensure the security of data in the wireless access process.
And researching a wireless safety access mechanism capable of preventing pilot attack in the wireless access process of the V2N communication system. The pilot frequency is an important guarantee of V2N wireless access, and through a pilot frequency sharing mechanism of a receiving and transmitting end, the system can accurately acquire the identity of the access equipment activated in the access process by measuring a pilot frequency signal, so that normal wireless access is guaranteed. The existing pilot sharing mechanism is based on public known pilots and is public and deterministic. Therefore, the pilot signals can be known by an attacker, and after the attacker obtains the frame synchronization information and the pilot information of the legal transceiver, the attacker can accurately launch pilot attack, and the wireless data transmission service in the wireless access process is further disabled by sending specific pilot signals synchronously with a certain legal user so as to further interfere with a pilot sharing mechanism between the pairing of the legal transceivers. The random pilot information is encoded to effectively resist attack, and the existing research mostly adopts a subcarrier encoding mode to carry and transmit the pilot information. However, in these studies, the pilot codec mostly adopts a codec scheme having a deterministic coding structure, and the security performance is limited.
Disclosure of Invention
The invention aims to provide a hash security access method and a hash security access system for V2N low-delay communication service, so as to solve the problems.
In order to achieve the above purpose, the present invention adopts the following technical scheme:
the hash security access method for the V2N low-delay communication service comprises the following steps:
step 1, establishing a system model: a plurality of vehicles in a communication activation state are accessed to a base station in an uplink manner by adopting random pilot frequencies, and an active attacker adopts a hybrid attack mode which comprises the following steps: partial band interference legal user access and full band interference legal user access and silence keeping;
in step 2, in order to reduce the interference of the attack on the uplink access and ensure the normal access of legal vehicle equipment, a pilot frequency coding and decoding technology is required to be constructed in a code frequency domain, and the activation mode of each subcarrier can bear pilot frequency information by coding the activation mode of the subcarrier, so that a hash coding and decoding criterion based on signal characteristics is constructed.
Further, in step 1, in the system model, K activated uplink vehicle-mounted devices, a base station and a pilot frequency perception attacker generate k+1 uplink communication links, which are uplink vehicle-mounted devices- & gt base station, pilot frequency perception attacker- & gt base station respectively; the base station has N T The root antenna, the activated uplink vehicle-mounted equipment and the pilot frequency perception attacker are both single antennas; in the frequency domain, each antenna of each uplink occupies N subcarriers simultaneously in each OFDM symbol; each activated uplink vehicle-mounted device transmits random pilot signals at random on different frequency points, and pilot perception attackers transmit random pilot signals at random on different frequency pointsThe pilot signal on the ith subcarrier is the frequency signal
Figure GDA0004248648520000021
Wherein ρ is A Transmit power for its pilot, +.>
Figure GDA0004248648520000023
Indicating pilot phases on the ith subcarrier of the kth OFDM symbol time, the subcarrier activation patterns on different frequency points follow a mixed attack pattern.
Further, the pilot signal is configured to: during the kth OFDM symbol, the pilot signal of the mth active upstream vehicle device on the ith subcarrier is
Figure GDA0004248648520000022
Wherein ρ is L,m For its pilot transmit power, phi k,m Indicating pilot frequency phase in kth OFDM symbol time, subcarrier activating modes on different frequency points follow hash coding mode.
Further, in step 2, k+2 OFDM symbol times, where K represents the number of users; carrying out energy detection on signals received by any single subcarrier, realizing accurate signal number detection on each subcarrier by configuring a detection threshold, and if signals exist, encoding the subcarrier into 1, otherwise, 0; according to the obtained binary code, obtaining a binary codeword vector set as follows: s is S 1 ={s 1 =[s 1,m ]|s 1,m ∈{0,1},1≤m≤L s -wherein s 1,m Representing an mth binary codeword unit; l (L) s Representing the length of the code word, and obtaining an M+1 element code word vector set S by the same method 2 ={s 2 |s 2,m ∈{0,...,M},1≤m≤L s },s 2,m Representing an m+1th codeword unit;
the code frequency domain is established as follows:
Figure GDA0004248648520000032
wherein b represents the position of the codeword s corresponding to the frequency domain, and N represents the number of occupied subcarriers; obtain binary codebook c=of n×c[c i,j ]The ith codeword in the codebook is defined as c i =[c 1,i ... c N,i ] T
Hash coding and decoding criteria based on signal characteristics are constructed, and the hash coding and decoding criteria specifically comprise coding criteria and decoding criteria.
Further, in the step 2,
coding criteria: n×c binary codebook c= [ b ] i,j ]Known as a hash code matrix, the method of generating the matrix is as follows:
3) Any one random pilot is transmitted via k hash functions f 1 ,...,f k Mapped to a binary codeword column vector with a weight of k.
4) Traversing the C random pilots, generating C binary code words through code word scrambling, and forming a binary codebook matrix C together;
first, C is uniformly divided into K sub-codebooks, denoted as C i And secondly, representing that a subcarrier activation mode adopted by the ith uplink vehicle-mounted equipment is b i ∈C i The subcarrier activation mode adopted by the attacker is c, and then, for the superposition phenomenon generated by the signals generated by the K+1 nodes, the superposition phenomenon is described as follows:
b 1 ∨...∨b K =b S,K ,b S,K ∨c=b I
and is also provided with
m 1 +...+m K =m S,K ,m S,K +c=m I
Wherein b S,K ,m S,K Representing the mutual superposition of independent subcarrier activation modes generated by K nodes; c is a subcarrier activation mode adopted by an attacker, and the following conditions are satisfied:
Figure GDA0004248648520000031
b I ,m I then the only two codes that the receiver can ultimately obtain; all possible column vectors b S,K Form a codeword matrix B K Also b S,K Is B K Is a certain column vector of (a); similarly, for B K Any one of the column vector code words can be uniquely decomposed into a group of code words b i ,1≤i≤K。
Further, in the step 2,
decoding criteria: the decoding flow is as follows:
1) Traversing N sub-carriers, obtaining a differential coding matrix D= [ D ] through the mutual inner product of signals on each sub-carrier j∈[1,N] ]Wherein d j =[d 1,j ... d N,j ]The method comprises the steps of carrying out a first treatment on the surface of the The specific method comprises the following steps: for j is more than or equal to 1 and less than or equal to N, the j sub-carriers are taken as reference sub-carriers, and the signal independence characteristics of different equipment among adjacent sub-carriers are extracted through a signal difference inner product technology, so that a binary codeword d is obtained j
2) Identifying the currently encountered attack type from the three attack types;
3) Decoding is performed according to the identified attack type.
Further, the specific flow of the step 2) is as follows:
load detection: 1. the base station defines a set
Figure GDA0004248648520000042
All the vehicle-mounted devices in the network are accessed to the base station in an uplink mode. 2. The base station sends paging information to the vehicle-mounted equipment through broadcasting, and each vehicle-mounted equipment decides whether to access the base station according to the received paging information, wherein the specific principle is as follows: as long as the vehicle-mounted device is located in the set +.>
Figure GDA0004248648520000043
And if the vehicle-mounted equipment is in the range, the vehicle-mounted equipment is accessed, otherwise, the vehicle-mounted equipment is not accessed.
Judgment b I If all elements in D are 1, if so, indicating that full-band attack occurs, outputting codeword b I The method comprises the steps of carrying out a first treatment on the surface of the Otherwise, executing the next operation;
judgment b I Whether or not it is B K If not, partial band attack occurs and codeword b is output I If yes, continuing to execute the next operation;
if m is present I =m S,K Then knowing that the attacker is currently keeping silent state, outputting codeword b S,K Otherwise, judging that partial band attack occurs currently, and outputting codeword b I
Further, the specific flow of the step 3) is as follows:
whether the attack mode is full-band attack, partial-band attack or silence, according to the set
Figure GDA0004248648520000044
Device in the base station directly decodes b I The error probability P of the identification pilot satisfies:
P=P K+1
wherein,,
Figure GDA0004248648520000041
N E k is the number of the subcarriers, K is the number of hash functions, and K is the number of vehicle-mounted devices.
Further, the hash security access system for the V2N ultra-reliable low-latency communication service includes:
the system model building module is used for enabling a plurality of vehicles in a communication activation state to be accessed to the base station in an uplink mode by adopting random pilot frequencies, and an active attacker adopts a hybrid attack mode, wherein the hybrid attack mode comprises: partial band interference legal user access and full band interference legal user access and silence keeping;
and the encoding and decoding module is used for creating a code frequency domain through encoding the activation modes of the subcarriers and constructing a hash encoding and decoding criterion based on the signal characteristics.
Compared with the prior art, the invention has the following technical effects:
the invention successfully introduces the probability coding structure of the hash coding into the uplink wireless access process of the vehicle-mounted equipment for the first time. The core is as follows: the vehicle-mounted equipment needs to carry out hash coding on the activation mode of the subcarrier carrying the vehicle-mounted pilot signal; the base station as a receiving end needs to enhance the hash decoding process by means of the pilot signal characteristics so as to accurately recover the pilot signal transmitted by the vehicle-mounted equipment. In essence, attacks can have an uncertainty impact on wireless access, however, the hash coding technique itself is a probabilistic coding structure, and interference to uncertainty can exhibit good statistical robustness. The hash coding and decoding scheme can minimize the influence of the attack on the pilot signal in the probability domain, and finally improves the reliability of wireless access of the vehicle-mounted equipment in the attack environment.
Drawings
Fig. 1 is a system model diagram.
Fig. 2 is a coding framework diagram.
Fig. 3 is a decoding framework diagram.
Detailed Description
The invention is further described below with reference to the accompanying drawings:
the original pilot signals appointed by each vehicle-mounted device are randomized and coded into subcarrier activation modes (SAP), and the coded SAP can be separated, identified, reliably decoded into code words and finally converted into corresponding pilot signals although being covered by malicious signals and overlapped and interfered with each other in a wireless environment, so that the safety access of the vehicle-mounted device is ensured. The invention constructs a hash coding technology based on signal characteristics, establishes a hash coding and decoding frame, provides a load detection mechanism, and can identify the access of legal vehicle-mounted equipment with higher probability based on the detected vehicle-mounted equipment identity. The invention can minimize the influence of the attack behavior from the probability domain through the support of the hash coding based on the signal characteristics.
The system model diagram shown in fig. 1 considers K activated uplink vehicle-mounted devices, a base station and a pilot frequency perception attacker, and generates k+1 uplink communication links, namely uplink vehicle-mounted device- & gt base station, pilot frequency perception attacker- & gt base station; the base station has N T The root antenna, the activated uplink vehicle-mounted equipment and the pilot frequency perception attacker are both single antennas; in the frequency domain, each antenna of each uplink occupies N subcarriers simultaneously within each OFDM symbol. Each activated uplink vehicle-mounted device transmits random pilot signals on different frequency points randomly, and the pilot signals are configured to: in the kth OFDM symbol periodThe pilot signal of the mth activated uplink vehicle-mounted equipment on the ith subcarrier is that
Figure GDA0004248648520000061
Wherein ρ is L,m For its pilot transmit power, phi k,m Indicating pilot frequency phase in kth OFDM symbol time, and enabling subcarrier activating modes on different frequency points to follow a coding mode of a hash coding technology; the pilot frequency perception attacker transmits random pilot frequency signals at different frequency points randomly, and the pilot frequency signal on the ith subcarrier is +.>
Figure GDA0004248648520000062
Wherein ρ is A Transmit power for its pilot, +.>
Figure GDA0004248648520000063
Indicating pilot phases on the ith subcarrier of the kth OFDM symbol time, the subcarrier activation patterns on different frequency points follow a mixed attack pattern.
Fig. 2 shows a proposed coding framework comprising the steps of:
step 1, considering K+2 OFDM symbol time, wherein K represents the number of users; carrying out energy detection on signals received by any single subcarrier, realizing accurate signal number detection on each subcarrier by configuring a detection threshold, and if signals exist, encoding the subcarrier into 1, otherwise, 0; according to the obtained binary code, obtaining a binary codeword vector set as follows: s is S 1 ={s 1 =[s 1,m ]|s 1,m ∈{0,1},1≤m≤L s -wherein s 1,m Representing an mth binary codeword unit; l (L) s Representing the length of the code word, and obtaining an M+1 element code word vector set S by the same method 2 ={s 2 |s 2,m ∈{0,...,M},1≤m≤L s },s 2,m Representing an m+1th codeword unit;
the code frequency domain is established as follows:
Figure GDA0004248648520000064
where b represents the position of codeword s corresponding to the frequency domain, whereN represents the number of occupied subcarriers; obtain N×C binary codebook C= [ C ] i,j ]The ith codeword in the codebook is defined as c i =[c 1,i ... c N,i ] T
Step 2, constructing hash coding technical criteria based on signal characteristics, wherein the hash coding technical criteria can specifically comprise coding criteria and decoding criteria.
Coding criteria: n×c binary codebook c= [ b ] i,j ]Known as a hash code matrix, the method of generating the matrix is as follows:
1) Any one random pilot is transmitted via k hash functions f 1 ,...,f k Mapped to a binary codeword column vector with a weight of k. C random pilots are traversed, and C binary code words are generated through code word scrambling, so that a binary codebook matrix C is formed.
First, C is uniformly divided into K sub-codebooks, denoted as C i And secondly, representing that a subcarrier activation mode adopted by the ith uplink vehicle-mounted equipment is b i ∈C i The subcarrier activation mode adopted by the attacker is c, and then, for the superposition phenomenon generated by the signals generated by the K+1 nodes, the superposition phenomenon is described as follows:
b 1 ∨...∨b K =b S,K ,b S,K ∨c=b I
and is also provided with
m 1 +...+m K =m S,K ,m S,K +c=m I
Wherein b S,K ,m S,K Representing the mutual superposition of independent subcarrier activation modes generated by K nodes; c is a subcarrier activation mode adopted by an attacker, and the following conditions are satisfied:
Figure GDA0004248648520000071
b I ,m I then the only two codes that the receiver can ultimately obtain; all possible column vectors b S,K Form a codeword matrix B K I.e. b S,K Is B K Is a column of (1)Vector; similarly, for B K Any one of the column vector code words can be unique
One into a set of codewords b i ,1≤i≤K;
Fig. 3 gives the proposed decoding criteria: the decoding flow is as follows:
1) Traversing N sub-carriers to obtain a differential coding matrix D= [ D ] j∈[1,N] ]Wherein d j =[d 1,j ... d N,j ];
2) Identifying the currently encountered attack type from the three attack types; the specific flow is as follows:
i) Judgment b I If all elements in D are 1, if so, indicating that full-band attack occurs, outputting codeword b I The method comprises the steps of carrying out a first treatment on the surface of the Otherwise, executing the next operation;
II) judgment of b I Whether or not it is B K If not, partial band attack occurs and codeword b is output I If yes, continuing to execute the next operation
III) if m is present I =m S,K Then knowing that the attacker is currently keeping silent state, outputting codeword b S,K Otherwise, judging that partial band attack occurs currently, and outputting codeword b I
3) Whether the attack mode is full-band attack, partial-band attack or silence, according to the set
Figure GDA0004248648520000082
Device in the base station directly decodes b I The error probability P of the identification pilot frequency meets
P=P K+l
Wherein,,
Figure GDA0004248648520000081
N E k is the number of the subcarriers, K is the number of hash functions, and K is the number of vehicle-mounted devices.

Claims (8)

1. The hash security access method for the V2N low-delay communication service is characterized by comprising the following steps of:
step 1, establishing a system model: a plurality of vehicles in a communication activation state are accessed to a base station in an uplink manner by adopting random pilot frequencies, and an active attacker adopts a hybrid attack mode which comprises the following steps: partial band interference legal user access and full band interference legal user access and silence keeping;
step 2, in order to reduce the interference of the attack on the uplink access and ensure the normal access of legal vehicle equipment, constructing a pilot frequency coding and decoding technology in a code frequency domain, and enabling the activation mode of each subcarrier to bear pilot frequency information by coding the activation mode of the subcarrier so as to construct a hash coding and decoding criterion based on signal characteristics;
in the step 2 of the process, the process is carried out,
coding criteria: n×c binary codebook c= [ b ] i,j ]Known as a hash code matrix, the method of generating the matrix is as follows:
1) Any one random pilot is transmitted via k hash functions f 1 ,…,f k Mapping into a binary code word column vector with a weight of k;
2) Traversing the C random pilots, generating C binary code words through code word scrambling, and forming a binary codebook matrix C together;
first, C is uniformly divided into K sub-codebooks, denoted as C i And secondly, representing that a subcarrier activation mode adopted by the ith uplink vehicle-mounted equipment is b i ∈C i The subcarrier activation mode adopted by the attacker is c, and then, for the superposition phenomenon generated by the signals generated by the K+1 nodes, the superposition phenomenon is described as follows:
b 1 ∨…∨b K =b S,K ,b S,K ∨c=b I
and is also provided with
m 1 +…+m K =m S,K ,m S,K +c=m I
Wherein b S,K ,m S,K Representing the mutual superposition of independent subcarrier activation modes generated by K nodes; c is a subcarrier activation mode adopted by an attacker, and the following conditions are satisfied:
Figure FDA0004248648480000011
b I ,m I then the only two codes that the receiver can ultimately obtain; all possible column vectors b S,K Form a codeword matrix B K Also b S,K Is B K Is a certain column vector of (a); similarly, for B K Any one of the column vector code words can be uniquely decomposed into a group of code words b i ,1≤i≤K。
2. The hash security access method for V2N low-delay communication service according to claim 1, wherein in step 1, in the system model, K active uplink vehicle-mounted devices, a base station and a pilot frequency perception attacker generate k+1 uplink communication links, which are uplink vehicle-mounted devices→base stations, pilot frequency perception attacker→base stations, respectively; the base station has N T The root antenna, the activated uplink vehicle-mounted equipment and the pilot frequency perception attacker are both single antennas; in the frequency domain, each antenna of each uplink occupies N subcarriers simultaneously in each OFDM symbol; each activated uplink vehicle-mounted device transmits random pilot signals at random on different frequency points, a pilot perception attacker transmits random pilot signals at random on different frequency points, and the pilot signals on the ith subcarrier are
Figure FDA0004248648480000021
Wherein ρ is A Transmit power for its pilot, +.>
Figure FDA0004248648480000022
Indicating pilot phases on the ith subcarrier of the kth OFDM symbol time, the subcarrier activation patterns on different frequency points follow a mixed attack pattern.
3. The V2N low latency communication service oriented hash security access method of claim 1, wherein the pilot signal is configured to: in the first placeThe pilot signal of the mth activated uplink on-board device on the ith subcarrier during k OFDM symbols is
Figure FDA0004248648480000023
Wherein ρ is L,m For its pilot transmit power, phi k,m Indicating pilot frequency phase in kth OFDM symbol time, subcarrier activating modes on different frequency points follow hash coding mode.
4. The hash security access method for the V2N low-latency communication service according to claim 1, wherein in step 2, k+2 OFDM symbol times, K representing the number of users; carrying out energy detection on signals received by any single subcarrier, realizing accurate signal number detection on each subcarrier by configuring a detection threshold, and if signals exist, encoding the subcarrier into 1, otherwise, 0; according to the obtained binary code, obtaining a binary codeword vector set as follows: s is S 1 ={s 1 =[s 1,m ]|s 1,m ∈{0,1},1≤m≤L s -wherein s 1,m Representing an mth binary codeword unit; l (L) s Representing the length of the code word, and obtaining an M+1 element code word vector set S by the same method 2 ={s 2 |s 2,m ∈{0,…,M},1≤m≤L s },s 2,m Representing an m+1th codeword unit;
the code frequency domain is established as follows:
Figure FDA0004248648480000024
wherein b represents the position of the codeword s corresponding to the frequency domain, and N represents the number of occupied subcarriers; obtain N×C binary codebook C= [ C ] i,j ]The ith codeword in the codebook is defined as c i =[c 1,i …c N,i ] T
Hash coding and decoding criteria based on signal characteristics are constructed, and the hash coding and decoding criteria specifically comprise coding criteria and decoding criteria.
5. The hash security access method for V2N low latency communication service according to claim 1, wherein in step 2,
decoding criteria: the decoding flow is as follows:
1) Traversing N sub-carriers, obtaining a differential coding matrix D= [ D ] through the mutual inner product of signals on each sub-carrier j∈[1,N] ]Wherein d j =[d 1,j …d N,j ]The method comprises the steps of carrying out a first treatment on the surface of the The specific method comprises the following steps: for j is more than or equal to 1 and less than or equal to N, the j sub-carriers are taken as reference sub-carriers, and the signal independence characteristics of different equipment among adjacent sub-carriers are extracted through a signal difference inner product technology, so that a binary codeword d is obtained j
2) Identifying the currently encountered attack type from the three attack types;
3) Decoding is performed according to the identified attack type.
6. The hash security access method for the V2N low-latency communication service according to claim 5, wherein the specific flow of step 2) is as follows:
load detection: 1. the base station defines a set
Figure FDA0004248648480000032
All the vehicle-mounted devices in the network are uplink accessed to the base station; 2. the base station sends paging information to the vehicle-mounted equipment through broadcasting, and each vehicle-mounted equipment decides whether to access the base station according to the received paging information, wherein the specific principle is as follows: as long as the in-vehicle device is located in the collection->
Figure FDA0004248648480000033
If the vehicle-mounted equipment is in the internal state, the vehicle-mounted equipment is accessed, otherwise, the vehicle-mounted equipment is not accessed;
judgment b I If all elements in D are 1, if so, indicating that full-band attack occurs, outputting codeword b I The method comprises the steps of carrying out a first treatment on the surface of the Otherwise, executing the next operation;
judgment b I Whether or not it is B K If not, partial band attack occurs and codeword b is output I If yes, continuing to execute the next operation;
if m is present I =m S,K Then knowing that the attacker is currently keeping silent state, outputting codeword b S,K Otherwise, judging that partial band attack occurs currently, and outputting codeword b I
7. The hash security access method for the V2N low-latency communication service according to claim 5, wherein the specific flow of step 3) is as follows:
whether the attack mode is full-band attack, partial-band attack or silence, according to the set
Figure FDA0004248648480000031
Device in the base station directly decodes b I The error probability P of the identification pilot satisfies:
P=P K+1
wherein,,
Figure FDA0004248648480000041
N E k is the number of the subcarriers, K is the number of hash functions, and K is the number of vehicle-mounted devices.
8. The hash security access system for the V2N ultra-reliable low-latency communication service is characterized in that the hash security access method for the V2N low-latency communication service according to any one of claims 1 to 7 comprises:
the system model building module is used for enabling a plurality of vehicles in a communication activation state to be accessed to the base station in an uplink mode by adopting random pilot frequencies, and an active attacker adopts a hybrid attack mode, wherein the hybrid attack mode comprises: partial band interference legal user access and full band interference legal user access and silence keeping;
and the encoding and decoding module is used for creating a code frequency domain through encoding the activation modes of the subcarriers and constructing a hash encoding and decoding criterion based on the signal characteristics.
CN202110897425.7A 2021-08-05 2021-08-05 Hash security access method and system for V2N low-delay communication service Active CN113727301B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110897425.7A CN113727301B (en) 2021-08-05 2021-08-05 Hash security access method and system for V2N low-delay communication service

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110897425.7A CN113727301B (en) 2021-08-05 2021-08-05 Hash security access method and system for V2N low-delay communication service

Publications (2)

Publication Number Publication Date
CN113727301A CN113727301A (en) 2021-11-30
CN113727301B true CN113727301B (en) 2023-07-11

Family

ID=78674935

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110897425.7A Active CN113727301B (en) 2021-08-05 2021-08-05 Hash security access method and system for V2N low-delay communication service

Country Status (1)

Country Link
CN (1) CN113727301B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106130935A (en) * 2016-06-30 2016-11-16 西安交通大学 A kind of self adaptation anti-pilot tone spoofing attack channel estimation methods based on random BPSK sequence auxiliary
CN108881217A (en) * 2018-06-14 2018-11-23 西安交通大学 A kind of safety multi-purpose family pilot tone method for authenticating based on layering two dimensional character coding
CN112115317A (en) * 2020-08-20 2020-12-22 鹏城实验室 Targeted attack method for deep hash retrieval and terminal device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106130935A (en) * 2016-06-30 2016-11-16 西安交通大学 A kind of self adaptation anti-pilot tone spoofing attack channel estimation methods based on random BPSK sequence auxiliary
CN108881217A (en) * 2018-06-14 2018-11-23 西安交通大学 A kind of safety multi-purpose family pilot tone method for authenticating based on layering two dimensional character coding
CN112115317A (en) * 2020-08-20 2020-12-22 鹏城实验室 Targeted attack method for deep hash retrieval and terminal device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
拒绝服务攻击防御技术探讨;孙锐;《软件》;20121115(第11期);全文 *

Also Published As

Publication number Publication date
CN113727301A (en) 2021-11-30

Similar Documents

Publication Publication Date Title
CN110730452B (en) Performance analysis method for joint relay and interference selection scheme in wireless communication system
CN107148015B (en) Continuous encryption physical layer secure transmission method based on polarization code structure
US20190097858A1 (en) Pseudo random multi-carrier method and system
CN108770069A (en) Power distribution method for the communication of satellite communication network safety of physical layer
CN105375956A (en) Queue cache relay transmission method in physical layer safety communication
Bharati et al. Threats and countermeasures of cyber security in direct and remote vehicle communication systems
CN106685639A (en) Encrypted safe transmission method for sequential cipher based on artificial added noise in 5G communication system
Zia et al. An advanced non-orthogonal multiple access security technique for future wireless communication networks
KR101506239B1 (en) Beacon and management information elements with integrity protection
WO2019237476A1 (en) Ofdm channel training authentication method based on independent check coding
CN110278068B (en) LoRa communication encryption system based on chaos sequence
CN113727301B (en) Hash security access method and system for V2N low-delay communication service
CN108881217B (en) Safe multi-user pilot frequency authentication method based on layered two-dimensional feature coding
US11736229B2 (en) Transmission apparatus and method, in particular for use in a low throughput network
CN110278537A (en) A kind of incoherent transmission plan of safety for move vehicle system
CN102223628A (en) Frequency domain encryption method and device for random subcarrier weight
JP2019193306A (en) Transmitter and transmission method, receiver and reception method, and program
CN115801238A (en) Communication method, communication apparatus, electronic device, and storage medium
Sharma et al. Deep learning-based authentication framework for secure terrestrial communications in next generation heterogeneous networks
US11218171B2 (en) Shortened LDPC codes with repetition of code bits for low throughput networks
CN108882232B (en) Authentication code embedded message transmission method between Internet of things devices
CN112769858B (en) Quantum learning-based safe non-random superposition coding method in wireless communication
CN111935713A (en) Method, device and system for enhancing randomness of wireless channel key
CN115696313B (en) Encryption communication method and system of unmanned mobile equipment based on channel detection
Oh et al. Dual channel transmission for reliable V2X broadcasting messages

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant