CN113746766B - Channel self-adaptive noise aggregation wireless secure transmission method - Google Patents

Channel self-adaptive noise aggregation wireless secure transmission method Download PDF

Info

Publication number
CN113746766B
CN113746766B CN202110699551.1A CN202110699551A CN113746766B CN 113746766 B CN113746766 B CN 113746766B CN 202110699551 A CN202110699551 A CN 202110699551A CN 113746766 B CN113746766 B CN 113746766B
Authority
CN
China
Prior art keywords
group
legal
packets
noise
packet
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110699551.1A
Other languages
Chinese (zh)
Other versions
CN113746766A (en
Inventor
任品毅
黄黎伟
杜清河
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xian Jiaotong University
Original Assignee
Xian Jiaotong University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xian Jiaotong University filed Critical Xian Jiaotong University
Priority to CN202110699551.1A priority Critical patent/CN113746766B/en
Publication of CN113746766A publication Critical patent/CN113746766A/en
Application granted granted Critical
Publication of CN113746766B publication Critical patent/CN113746766B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L25/00Baseband systems
    • H04L25/02Details ; arrangements for supplying electrical power along data transmission lines
    • H04L25/03Shaping networks in transmitter or receiver, e.g. adaptive shaping networks
    • H04L25/03006Arrangements for removing intersymbol interference
    • H04L25/03012Arrangements for removing intersymbol interference operating in the time domain
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/004Arrangements for detecting or preventing errors in the information received by using forward error control
    • H04L1/0041Arrangements at the transmitter end
    • H04L1/0042Encoding specially adapted to other signal generation operation, e.g. in order to reduce transmit distortions, jitter, or to improve signal shape
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Detection And Prevention Of Errors In Transmission (AREA)

Abstract

The invention discloses a channel self-adaptive noise aggregation wireless safe transmission method, which comprises the following steps: 1) Determining the optimum of the preset digital modulation modeNumber of each group of packets P group Relation P with signal-to-noise level group = f (SNR); 2) In the current time slot, the legal sending end Alice utilizes P according to the signal-to-noise ratio information fed back by the legal receiving end Bob group = f (SNR), and calculating the number m of the corresponding optimal packets in each group under the level of the SNR; 3) And dividing the data packets to be sent into a plurality of groups by the legal sending end Alice according to the optimal number m of each group obtained by calculation, performing noise aggregation coding on the data packets in each group, and then sending the data packets subjected to the noise aggregation coding.

Description

Channel self-adaptive noise aggregation wireless secure transmission method
Technical Field
The invention belongs to the technical field of wireless communication, and relates to a channel adaptive noise aggregation wireless security transmission method.
Background
In this age of everything interconnection, the development of the internet of things greatly promotes the application of wireless communication, but also puts higher requirements on the security of wireless communication. It is apparent that wireless communication is at risk of interception due to the open channel environment and the broadcast nature. Unlike the conventional mechanism, the physical layer security (PSL) technique can guarantee the security of the wireless communication system without increasing the computational complexity by relying on the independent fading and random characteristics of the channel. In a physical layer security technology system, a noise aggregation scheme adopts a simple security coding method and an automatic feedback retransmission mechanism to be combined, makes full use of inherent noise in a wireless channel to reduce power consumption, and is a simple and efficient security transmission scheme. The basic idea is to equivalently reduce the eavesdropping channel by using simple exclusive-or operation in cooperation with an automatic feedback retransmission protocol (ARQ), thereby realizing safe transmission. A legitimate receiver may send an ACK or NACK over the feedback link, informing the sender that a lost or erroneous data packet has been successfully received or requested for retransmission, but that an illegal eavesdropper cannot provide the feedback. Due to the independent fading characteristics of the channels, the noise aggregation scheme can equivalently reduce the quality of the eavesdropping channel, thereby achieving the purpose of safe transmission.
Generally, noise aggregation techniques associate individual packets with feedback retransmissions (e.g., ARQ protocols) to achieve secure wireless transmissions. The existing noise aggregation schemes have two types, namely an original noise aggregation scheme and a noise aggregation scheme combining error diffusion. In the original noise aggregation scheme, equal-length data packets to be transmitted are divided into odd and even data packets. Odd packets are sent directly without encoding, while even packets are sent bitwise exclusive OR (bit-XOR) with the corresponding odd packets. The legal receiver ensures the correct reception of the odd packets through the ARQ protocol, while the eavesdropper cannot. The odd packets are not encoded and exposed in the wireless channel, and are easily intercepted and decrypted, so that the signal-to-noise ratio gain is limited. While the joint error diffusion noise aggregation scheme requires the current packet to be decoded along with all the previous odd packets. If any of the previous odd or current packets are lost or erroneous, the data will not be recovered correctly. However, due to the strong correlation between the data packets in this scheme, even a legitimate receiving end cannot recover the original data when experiencing deep channel fading. Thus, the two existing noise aggregation schemes have respective advantages and disadvantages.
Disclosure of Invention
The present invention is directed to overcome the drawbacks of the prior art, and provides a channel adaptive noise aggregation wireless security transmission method, which can improve the security of wireless communication on the premise of improving the receiving quality of a legal receiving end at a low signal-to-noise ratio.
In order to achieve the above object, the channel adaptive noise aggregation wireless security transmission method according to the present invention includes:
1) Determining the optimal number P of each group of packets under the preset digital modulation mode group Relation P with signal-to-noise level group =f(SNR);
2) In the current time slot, a legal sending end Alice utilizes P according to the signal-to-noise ratio information fed back by a legal receiving end Bob group = f (SNR), and calculating the number m of the corresponding optimal packets in each group under the level of the SNR;
3) According to the calculated optimal number m of each group, dividing a data packet to be sent into a plurality of groups by a legal sending end Alice, carrying out noise aggregation coding on the data packets in each group, and sending the data packet subjected to the noise aggregation coding;
further comprising:
and the legal receiving end decodes the received data packet and then sends ACK/NACK information to the legal sending end Alice by using the feedback link.
Further comprising:
and the legal sending end retransmits the odd packets which are not received by the legal receiving end and are within the retransmission time limit.
When the legal sender starts to transmit the original data packet S i If i is an odd number greater than 1 and indicates its number in the corresponding packet, the corresponding encoded data packet X i Comprises the following steps:
Figure GDA0003339979070000031
the first packet in each group is transmitted directly, i.e. when i =1, X 1 Is equal to S 1
If i is the odd number in the packet, the encoded even packet X i+1 Comprises the following steps:
Figure GDA0003339979070000032
is provided with Y 1 ,Y 2 ,…,Y m For a data packet received by a legitimate receiving end,
Figure GDA0003339979070000033
for a decoded packet, then when i is odd, then->
Figure GDA0003339979070000034
Comprises the following steps:
Figure GDA0003339979070000035
decoded even data packets
Figure GDA0003339979070000036
Comprises the following steps:
Figure GDA0003339979070000037
the invention has the following beneficial effects:
the channel self-adaptive noise aggregation wireless safe transmission method calculates the number m of the corresponding optimal groups of packets under the signal-to-noise level during specific operation, then divides the data packets to be transmitted into a plurality of groups, and finally carries out noise aggregation safe coding on the data packets to be transmitted. The number P of data packets in each group in the invention group The invention can be adapted to the channels with different SNR conditions, and the number P of the data packets in the group can be selected adaptively through experiments group The method has the advantages that the method can be flexibly selected, the safety performance and the transmission reliability can be effectively balanced, the error rate of a legal receiving end can be obviously reduced aiming at the channel condition with low signal-to-noise ratio, and the receiving quality of the picture is also obviously improved.
Drawings
FIG. 1 is a diagram of a system model of the present invention;
FIG. 2 is a block diagram of a legal receiving end Alice in the present invention;
FIG. 3 is a graph showing the relationship between the bit error rate of a legal receiver and an eavesdropper and the signal-to-noise ratio of a system according to the present invention and a comparison scheme;
FIG. 4 is a diagram showing the relationship between the Structural Similarity (SSIM) of a legal receiver and an eavesdropper and the variation of the signal-to-noise ratio of a system under the comparison scheme of the present invention;
fig. 5 is a graph showing the variation of peak signal-to-noise ratio (PSNR) between a legal receiver and an eavesdropper and the signal-to-noise ratio of a system according to the present invention and the comparison scheme.
Detailed Description
The invention is described in further detail below with reference to the accompanying drawings:
referring to fig. 1, the system includes a legal sending end Alice, a legal receiving end Bob and an eavesdropper Eve, wherein the legal sending end Alice sends encoded data to the legal receiving end Bob, the legal receiving end Bob sends feedback information to the legal sending end Alice according to the received data, the eavesdropper Eve passively monitors the data sent by the legal sending end Alice, data packets with equal length are divided into groups with preset size, and each group independently performs noise aggregation coding.
Aiming at a point-to-point secret transmission scene with a single eavesdropper, an additional feedback link exists between a legal transmitting end Alice and a legal receiving end Bob to ensure reliable transmission and self-adaptive adjustment transmission of the legal receiving end Bob, the legal receiving end Bob hopes to correctly recover secret data and cannot be intercepted by the eavesdropper Eve, and in the transmission process, the eavesdropper Eve can only passively receive the data on an eavesdropping channel so as to conceal the eavesdropper. Only the legitimate receiver Bob can request retransmission of lost or erroneous data packets via the feedback link. However, the legal sending end Alice is provided with the maximum retransmission times, and the purpose of the maximum retransmission times is to avoid that the chance that an eavesdropper Eve correctly recovers confidential data by a Maximum Ratio Combining (MRC) method is increased due to the excessive retransmission times, that is, when the legal receiving end Bob correctly receives a data packet or the retransmission times exceed the maximum times, whether the eavesdropper Eve correctly receives the previous data packet or not, and the eavesdropper Alice starts to send the next data packet.
It is assumed that both the legitimate channel and the eavesdropping channel obey independent quasi-static fading channels, i.e. the legitimate channel and the eavesdropping channel are independent. The legal sending end Alice and the legal receiving end Bob are both provided with a single sending antenna and a single receiving antenna, and the eavesdropper Eve is only provided with a single receiving antenna for eavesdropping. When a legal sending end Alice sends a symbol x at the time i, the receiving signals of a legal receiving end Bob and an eavesdropper Eve end are respectively as follows:
y b,i =h b,i x+n b,i
y e,i =h e,i x+n e,i
wherein h is b,i Legal channel coefficient representing time i, h e,i Indicating the eavesdropping channel coefficient at time i, n b,i Represents the additive white Gaussian noise at the Bob end at the i moment, n e,i Represents the additive white gaussian noise at the end of the i instant Eve,
Figure GDA0003339979070000051
represents the Bob-side noise variance, < >>
Figure GDA0003339979070000052
Representing the Eve-end noise variance.
After receiving the signals, both the legal receiving end Bob and the eavesdropper Eve try to recover the confidential information, and assuming that the eavesdropper Eve knows the principle of noise aggregation coding adopted by the legal sending end Alice, the legal receiving end Bob and the eavesdropper Eve recover the original information through corresponding decoding, and in addition, both the legal receiving end Bob and the eavesdropper Eve use the optimal judgment criterion.
The main idea of noise aggregation coding is to divide the data to be transmitted into K original data packets S 1 ,S 2 ,…,S K The odd data packets are sent directly without encoding, and the even data packets are sent after being subjected to exclusive-or operation with the corresponding odd data packets before the even data packets. The reliability of the odd-numbered data packets of the legal receiving end Bob is ensured by the ARQ protocol, and the eavesdropping end Eve has no feedback channel. In this original scheme, odd packets are not encoded, are exposed in the wireless channel, and are easily eavesdropped and decrypted. If the channel quality of the interception end Eve is relatively good, the interception end Eve can directly decode the data of the odd data packets at the moment, and therefore the security of the confidential data cannot be guaranteed. In the noise aggregation safety scheme, the odd data packet noise is only aggregated to the next even data packet, error code diffusion is limited, and the receiving effect of the subsequent data packet cannot be influenced. Compared with the error rate of an eavesdropping end Eve, the legal receiving end Bob brings 1dB signal-to-noise ratio gain, and is slightly insufficient.
The above problem is supplemented by a noise aggregation enhancement scheme that combines error diffusion. The encoding rule is that all the other encoding packets except the first data packet are directly transmitted and are formed by the XOR of two original data packets, the XOR operation is carried out on the odd data packet and the last odd data packet of the packet and the odd data packet is transmitted, the XOR operation is carried out on the even data packet and the last odd data packet and the even data packet and the last odd data packet are transmitted, and the original secret information cannot be directly obtained by decoding after the receiving end demodulates. The joint error diffusion noise aggregation enhancement scheme requires the current packet to be decoded together with all the previous odd packets. If any of the previous odd data packets or the current data packet is in error, the original security data cannot be decoded completely and correctly.
Unlike two existing noise aggregation security transmission schemes, the present invention introduces an optimal number of packets per group, P group The concept of (2) adaptively adjusting the correlation between the data packets, and reducing the dependence on correct decoding of the related data packets under the poor channel condition, thereby reducing the dependence on feedback retransmission, and improving the receiving effect of a legal receiving end under the poor channel condition on the premise of ensuring that the eavesdropping end Eve still cannot recover the original data.
Referring to fig. 2, the channel adaptive noise aggregation wireless security transmission method according to the present invention includes the following steps:
1) Introducing the optimal number P of packets per group group That is, according to the signal-to-noise ratio fed back by the legal receiving end Bob, the legal transmitting end Alice divides the data packets to be transmitted into a plurality of groups, each group contains the same number of data packets, and the exclusive-or operation can only be performed between the data packets in the group, that is, the data packets between the groups are mutually independent group With respect to the signal-to-noise level, i.e. P group =f(SNR);
2) Within a time slot, P is utilized according to the signal-to-noise ratio information fed back by a legal receiving end Bob group = f (SNR), and calculating the number m of the corresponding optimal packets in each group under the level of the SNR;
3) Multiple data packets S to be sent of legal sending end Alice 1 ,S 2 ,…,S m Wherein, each data packet is composed of binary data with the same length, the legal sending end Alice performs XOR operation between the data packets in the group, when the legal sending end Alice starts to transmit the original data packet S i Wherein i is an odd number greater than 1, indicating the number of the packet, and the corresponding encoded data packet X i Comprises the following steps:
Figure GDA0003339979070000071
wherein the first data packet in each group is transmitted directly, i.e. when i =1, X 1 Is equal to S 1 . If i is the odd number in the packet, the corresponding coded even data packet X i+1 Comprises the following steps:
Figure GDA0003339979070000072
4) Let Y 1 ,Y 2 ,…,Y m For the data packet received after demodulation, it is assumed
Figure GDA0003339979070000073
Is a decoded data packet, and therefore when i is odd, based on the number of bits in the decoded data packet>
Figure GDA0003339979070000074
Comprises the following steps:
Figure GDA0003339979070000075
decoded even number data packet
Figure GDA0003339979070000076
Comprises the following steps:
Figure GDA0003339979070000077
as can be seen from the above formula, the data packets in each group (except the first data packet in each group) are affected not only by the noise of the time slot in which they are located, but also by the noise of all the previous odd-numbered packets. In fact, each data packet received by the legal receiving end Bob or the eavesdropping end Eve is affected by inherent noise and random fading. In contrast, the legal receiving end Bob may request retransmission of odd-numbered data packets through the feedback link, but there is a limit to the maximum number of retransmissions.
5) And the legal receiving terminal Bob sends ACK/NACK information by using the feedback link, feeds back the receiving condition of the data packet and sends SNR information to the legal sending terminal Alice, so that the legal sending terminal Alice carries out self-adaptive adjustment on the noise aggregation coding.
As can be seen from fig. 2, initially the video stream consists of frames of pictures, and the data to be transmitted is actually a series of pictures. The image file contains configuration information and image pixel information, and in order to prevent the receiver from being unable to display the image due to the loss or error of the image configuration information, only the pixel information part is transmitted in the transmission process. After transmission, the receiver combines the received information with known configuration information to recover the original picture. In practical application, pictures can be sent to the source data processing module to obtain better security performance. For example, they are suitably divided into blocks, all of which are randomly ordered and transmitted. However, the processing procedure of the source data should be shared by the transmitting end and the receiving end, as shown in fig. 2, the system is based on the ARQ protocol, and Alice decides which data packet to send next according to the ACK/NACK of the feedback channel. The pixel information is then converted to a bit stream and packed in a certain order. In addition, channel coding is indispensable, the reliability of transmission can be improved by using proper channel coding, and a legal sending end Alice generates self-adaptive P according to the average signal-to-noise ratio of a feedback channel group And then, carrying out noise aggregation coding, and using interleaving to avoid serial errors in consideration of possible continuous deep fading, wherein the interleaved data packet sequentially passes through a modulation module, a pulse shaping filtering module, an up-conversion module and a digital-to-analog conversion (DAC) module.
Simulation experiment
In order to better evaluate the safety performance of the invention, a noise aggregation scheme combined with error diffusion is used as a comparison scheme in a simulation test.
Firstly, the optimal number P of each group of packets under 16QAM modulation is obtained through simulation group The results are shown in table 1, as a function of the signal-to-noise level SNR:
TABLE 1
Figure GDA0003339979070000091
Due to P to be tested group There are many possible values, and to reduce the simulation time properly, consider 1000 packets to be transmitted, each of which contains 128 bits, and the receiving end uses Maximum Likelihood (ML) hard decision decoding. In addition, unlike the legitimate receiver Bob, the eavesdropper Eve employs Maximal Ratio Combining (MRC) in an effort to recover the secret data. The simulation adopts a Rayleigh fading channel and considers additive white Gaussian noise, and the channel coding adopts a convolutional code to overcome the channel fading.
Firstly, a legal sending end Alice sends random 0-1 bits, and then the net error rate performance of the noise aggregation scheme of the invention and the combined error diffusion is compared.
Fig. 3 shows the net error rates of the legal receiving end Bob and the eavesdropper Eve under the same channel condition in the two schemes. As can be seen from fig. 3, the net bit error rate of the eavesdropper Eve is stable around 0.5 in both schemes. In addition, the net error rate of the eavesdropper Eve is slightly lower than that of the comparison scheme, which shows that the invention still keeps good safety performance. And observing the net error rates of the legal receiving end Bob in the two schemes, the net error rate of the legal receiving end Bob in the noise polymerization scheme combining error code diffusion is basically kept about 0.5 when the signal-to-noise ratio is lower than 9dB, which shows that under the poor channel condition, the original data cannot be recovered by the legal receiving end, the signal-to-noise ratio is further increased, and the net error rate of the legal receiving end Bob is sharply reduced.
Then, in order to compare the difference between the two schemes more intuitively, a legal sending end Alice transmits a picture, and in order that a receiving end cannot recover the picture due to configuration data loss, only pixel information is transmitted here.
Fig. 4 is a graph of the peak signal-to-noise ratio (PSNR) of the legal receiving end Bob and the eavesdropper Eve according to the variation of the PSNR of the system under the same channel condition in the two schemes, and it can be seen from fig. 4 that the PSNR of the eavesdropper Eve is lower in both schemes and is stable at about 8.6. When the signal-to-noise ratio is lower than 8dB, the PSNR of the legal receiving end Bob in the contrast scheme is the same as that of the eavesdropper Eve, and generally, compared with the contrast scheme, the invention has obvious improvement on the PSNR.
Fig. 5 is a diagram of Structural Similarity (SSIM) of a legal receiving end Bob and an eavesdropper Eve according to the change of the signal-to-noise ratio of the system under the same channel condition in the two schemes, and it can be seen from fig. 5 that the structural similarity of the eavesdropper in the two schemes is close to zero, which indicates that the eavesdropper cannot recover the original information at all.
In conclusion, under the poor channel condition, the invention has better performance compared with the comparison scheme, improves the receiving effect of the legal receiving end under the poor channel condition and reduces the net error rate of the legal receiving end on the premise of ensuring that the eavesdropper still cannot recover the original data.

Claims (3)

1. A channel adaptive noise aggregation wireless security transmission method is characterized by comprising the following steps:
introducing the optimal number P of packets in each group group According to the signal-to-noise ratio fed back by the legal receiving end Bob, the legal sending end Alice divides the data packets to be transmitted into a plurality of groups, each group comprises the same number of data packets, the signal-to-noise ratio is divided into a plurality of discrete intervals, and the optimal number P of each group of packets under the preset digital modulation mode is obtained through simulation before the safe transmission is started group The relation to the signal-to-noise level, i.e. P group =f(SNR);
Within a time slot, P is utilized according to the signal-to-noise ratio information fed back by a legal receiving end Bob group = f (SNR), and calculating the number of the corresponding optimal packets in each group under the level of the SNR;
multiple data packets S to be sent of legal sending end Alice 1 ,S 2 ,…,S m Wherein, each data packet is composed of binary data with the same length, the legal sending end Alice performs XOR operation between the data packets in the group, when the legal sending end Alice starts to transmit the original data packet S i Wherein i is an odd number greater than 1, indicating the number of the group to which i belongs;
according to the optimal number P of each group of packets obtained by calculation group The legal sending end Alice divides the data packets to be sent into a plurality of groups, carries out noise aggregation coding on the data packets in each group, and then sends the data packets subjected to the noise aggregation coding;
when the legal sender starts to transmit the original data packet S i Where i is an odd number greater than 1, indicating its number in the packet to which it belongs, the corresponding encoded packet X i Comprises the following steps:
Figure QLYQS_1
the first packet in each group is transmitted directly, i.e. when i =1, X 1 Is equal to S 1
If i is the odd number in the packet, the encoded even packet X i+1 Comprises the following steps:
Figure QLYQS_2
is provided with Y 1 ,Y 2 ,…,Y m For a data packet received by a legitimate receiving end,
Figure QLYQS_3
for a decoded packet, then when i is odd, then->
Figure QLYQS_4
Comprises the following steps:
Figure QLYQS_5
decoded even number data packet
Figure QLYQS_6
Comprises the following steps:
Figure QLYQS_7
2. the channel-adaptive noise-aggregated wireless security transmission method according to claim 1, further comprising:
and the legal receiving end decodes the received data packet and then sends ACK/NACK information to the legal sending end Alice by using the feedback link.
3. The channel-adaptive noise-aggregated wireless secure transmission method according to claim 1, further comprising:
and the legal sending end retransmits the odd packets which are not received by the legal receiving end and are within the retransmission time limit.
CN202110699551.1A 2021-06-23 2021-06-23 Channel self-adaptive noise aggregation wireless secure transmission method Active CN113746766B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110699551.1A CN113746766B (en) 2021-06-23 2021-06-23 Channel self-adaptive noise aggregation wireless secure transmission method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110699551.1A CN113746766B (en) 2021-06-23 2021-06-23 Channel self-adaptive noise aggregation wireless secure transmission method

Publications (2)

Publication Number Publication Date
CN113746766A CN113746766A (en) 2021-12-03
CN113746766B true CN113746766B (en) 2023-04-14

Family

ID=78728500

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110699551.1A Active CN113746766B (en) 2021-06-23 2021-06-23 Channel self-adaptive noise aggregation wireless secure transmission method

Country Status (1)

Country Link
CN (1) CN113746766B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116321289B (en) * 2023-02-22 2023-10-17 北纬实捌(海口)科技有限公司 Wireless transmission data packet length conversion system
CN116112124B (en) * 2023-03-23 2023-06-23 深圳国人无线通信有限公司 Method and device for configuring uplink shared channel in adaptive adjustment coding

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111245571A (en) * 2020-01-15 2020-06-05 西安交通大学 Receiver design method combined with coding modulation technology under noise aggregation system

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106131824B (en) * 2016-06-06 2019-07-19 西安交通大学 Cordless communication network allied signal feedback and man made noise's safety of physical layer communication means
CN108134997B (en) * 2017-12-18 2020-05-22 西安交通大学 Asymmetric privacy protection method based on constellation overlapping and noise aggregation
US10931067B2 (en) * 2018-09-24 2021-02-23 Holland Electronics, Llc Common mode choke
CN109462456B (en) * 2018-11-15 2020-07-28 西安交通大学 Streaming media safe transmission method based on error code diffusion and noise aggregation

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111245571A (en) * 2020-01-15 2020-06-05 西安交通大学 Receiver design method combined with coding modulation technology under noise aggregation system

Also Published As

Publication number Publication date
CN113746766A (en) 2021-12-03

Similar Documents

Publication Publication Date Title
CN101136722B (en) Data transmitting method and transmitting equipment suitable for high speed mobile terminal
EP2638653B1 (en) Method and arrangement for retransmission control
EP1798926B1 (en) A HARQ method and system
US6778558B2 (en) System and method for incremental redundancy transmission in a communication system
EP1496639A2 (en) Hybrid automatic repeat request combining method and system in orthogonal frequency division multiplexing system
CN113746766B (en) Channel self-adaptive noise aggregation wireless secure transmission method
EP1531571A2 (en) Method and apparatus for bit scrambling for packet transmission/reception in a wireless communication system
JP5298648B2 (en) Transmitter, receiver, transmission method and reception method
US8068462B2 (en) Method and apparatus for retransmitting data based on antenna scheduling in MIMO system
JP5484693B2 (en) Hybrid automatic retransmission request method, transmitter, receiver, and communication system
US8726131B2 (en) Spatial multiplexing communication system with enhanced codeword mapping with flexible rate selection on each spatial layer and with single HARQ process
KR20090061561A (en) Method and apparatus of communication using random linear coding
CN109462456B (en) Streaming media safe transmission method based on error code diffusion and noise aggregation
Du et al. Security enhancement for multicast over internet of things by dynamically constructed fountain codes
US9397793B2 (en) Method for securely transmitting packets for wireless telecommunications system
CN113507347B (en) Soft switching method for laser and microwave hybrid communication
CN109889254B (en) Satellite-ground link physical layer secure communication method suitable for satellite communication
Oh et al. Efficient hybrid ARQ with space-time coding and low-complexity decoding
CN111556222B (en) Fountain code-based image data variable-rate safe transmission method
CN113965293B (en) PAM4 signal forward error correction method based on RS coding optimal redundancy bit
EP3821552A1 (en) Device and method for supporting harq for wi-fi
CN113366785B (en) Communication transmitter for retransmitting MAC Protocol Data Units (MPDUs)
EP3657717B1 (en) Hybrid arq with varying modulation and coding
CN103401641B (en) Placeholder y de-scrambling method in LTE UCI coding information and system
CN114499752B (en) Fountain code safe transmission method based on multipath interlocking

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant