CN117336715A - Physical layer secure communication method based on wireless channel direct encryption - Google Patents

Physical layer secure communication method based on wireless channel direct encryption Download PDF

Info

Publication number
CN117336715A
CN117336715A CN202311365688.9A CN202311365688A CN117336715A CN 117336715 A CN117336715 A CN 117336715A CN 202311365688 A CN202311365688 A CN 202311365688A CN 117336715 A CN117336715 A CN 117336715A
Authority
CN
China
Prior art keywords
information
channel
error correction
local
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311365688.9A
Other languages
Chinese (zh)
Inventor
石煜昊
唐杰
王睿斐
文红
王永丰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
University of Electronic Science and Technology of China
Original Assignee
University of Electronic Science and Technology of China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by University of Electronic Science and Technology of China filed Critical University of Electronic Science and Technology of China
Priority to CN202311365688.9A priority Critical patent/CN117336715A/en
Publication of CN117336715A publication Critical patent/CN117336715A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/004Arrangements for detecting or preventing errors in the information received by using forward error control
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0875Generation of secret information including derivation or calculation of cryptographic keys or passwords based on channel impulse response [CIR]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/041Key generation or derivation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention provides a physical layer safety communication method based on wireless channel direct encryption, which comprises the following steps: the two communication parties firstly use the mutual sending detection signals of the wireless channels; calculating local channel gain according to channel state information provided by the detection signal, and then quantizing the local channel gain to obtain a local physical key; an information transmission step: the sender performs error correction code encoding on information to be transmitted, and then performs symmetric encryption processing on the information subjected to error correction code encoding by using a local physical key of the sender to obtain sent information; the receiving party uses the received sending information as receiving information, symmetrically decrypts the receiving information by utilizing the local physical key of the receiving party, and then decodes the decrypted information into error correction codes to recover the transmission information. The invention can also enable the two communication parties to carry out information transmission under the condition of not obtaining the accurate secret key, thereby avoiding the complicated secret key negotiation process and having the characteristics of low cost, low complexity, high safety and high efficiency.

Description

Physical layer secure communication method based on wireless channel direct encryption
Technical Field
Relates to a wireless communication encryption technology, in particular to a physical layer communication technology based on wireless channel direct encryption.
Background
Traditional encryption methods in the communication field play a key role in data transmission, however, with the improvement of computing power and the continuous evolution of attack means, the security of the traditional encryption methods is gradually challenged. In this context, information encryption models based on physical layer keys are attracting attention of the technicians.
The physical layer key is an encryption mode based on channel characteristics, and unlike the conventional cryptography-based method, it uses the randomness and noise characteristics of the channel to generate a key, thereby enhancing the confidentiality of information to some extent.
In practical application, the existing physical layer key generation method often needs to obtain accurate key information, and both communication parties need to use an error-free channel to carry out a secondary information negotiation process so as to obtain a completely consistent physical layer key through negotiation. Because a key can be generated by secondary negotiation, the communication overhead is high, the efficiency is low, and the application range of the physical layer key is greatly limited. Moreover, the existing physical layer key is not generally related to encryption and decryption of information, so that the physical layer key is not better practically applied.
Disclosure of Invention
The technical problem to be solved by the invention is to provide a physical layer safety communication method which has small communication cost and high efficiency and applies a physical layer secret key to information encryption.
The invention adopts the technical proposal that the physical layer safety communication method based on the direct encryption of wireless channels comprises the following steps:
and a channel detection step: the two communication parties firstly use the mutual sending detection signals of the wireless channels; one party calculates a local channel gain according to the channel state information provided by the acquired detection signal sent by the other party, and then quantizes the local channel gain to obtain a local physical key;
an information transmission step: the sender performs error correction code encoding on information to be transmitted, and then performs symmetric encryption processing on the information subjected to error correction code encoding by using a local physical key of the sender to obtain sent information; the sender sends the sending information to the receiver through a public error channel; the receiving party uses the received sending information as receiving information, symmetrically decrypts the receiving information by utilizing the local physical key of the receiving party, and then decodes the decrypted information into error correction codes to recover the transmission information.
Further, in the information transmission step, before error correction code encoding is performed on the information to be transmitted, the information to be transmitted is subjected to confusion processing and then is subjected to subsequent processing.
The invention is unique in that the invention skillfully realizes that both communication parties can transmit information under the condition that the accurate secret key is not obtained, thereby avoiding the complicated secret key negotiation process, overcoming the limitation of the use of the secret key of the prior physical layer and realizing higher-level information protection and safe transmission.
The beneficial effects of the invention are as follows:
1 performance advantage:
1.1 the existing method requires an error-free channel to transmit the shared key to avoid key corruption or leakage. The present scheme is able to reliably extract information even in the presence of noise interference, which benefits from advanced error correction coding, and therefore lower channel requirements.
1.2 in the prior art methods, a shared key is used to encrypt and decrypt messages, often requiring complex encryption algorithms. In the scheme, the legal communication parties use the local physical key to encrypt and decrypt the message, so that the direct dependence on the shared key is reduced.
2 cost advantages:
2.1 low overhead: the key distribution parties of the invention do not need to negotiate to transfer information with each other, and only need unidirectional transmission.
2.2 low complexity the key distribution process of the invention does not need to carry out negotiation and privacy amplification by both sides, thus the process of the invention does not need to carry out multiple interactive negotiation related to the process by both sides on a common channel, and the complexity is reduced.
2.3 high security: the current technology uses a secure communication scheme of symmetric encryption+BCH scheme in the process of establishing the secret key, so as to ensure the security of system information transmission.
2.4 high efficiency: compared with a classical key distribution model, the method has lower average inconsistency rate when the channel error rate is lower, avoids pain points needing error-free channel negotiation, and realizes effective information transmission when the channel error rate is lower.
Drawings
FIG. 1 is a schematic diagram of a model for implementing the method of the embodiments;
fig. 2 is a schematic diagram of embodiment information transmission.
Detailed Description
Channels of Alice and Bob of two communication parties obey Rayleigh distribution, and uplink and downlink channels are generated through the following model: alice channel characteristics H A And Bob channel characteristics H B The degree of reciprocity, i.e. similarity, of (a) can be described by a correlation coefficient ρ and gaussian white noise δ:
ρ is chosen to range from 0 to 1, with the closer to 1, the better alice and Bob reciprocity.
Similarly, an illegal eavesdropper Eve eavesdropping on Alice can obtain
ρ E For Alice channel characteristics H A And Eve channel characteristics H E Ranging from 0 to 1. Delta E Is gaussian white noise of the Eve channel.
Since the generated secret key after the equal probability quantization has better information entropy, the embodiment adopts equal probability quantization, and the selected parameters are amplitude, phase and real part to generate the local secret key. The error correction coding adopts BCH [ n, k, t ], the codeword length n of the BCH code is fixed to 127, k is the number of data bits, and t is the number of error bits which can be corrected, and the error correction capability is represented. k decreases with increasing t. The value of k is specifically selected to be [120,113,106,99,92,85,78,71,64,57,50,43,36,29,22,15,8].
Model for secure communication to be implemented at physical layer fig. 1 shows:
1) Channel sounding channel detection steps:
alice and Bob mutually transmit probe signals using a wireless channel;
alice calculates local channel gain according to Channel State Information (CSI) provided by a detection signal sent by captured Bob, namely, alice channel gain, and then obtains a local physical Key (KA) according to local channel gain quantization;
bob calculates a local channel gain according to channel state information CSI provided by a probe signal sent by Alice, that is, bob channel gain, and then quantizes a local physical key KB according to the local channel gain.
Since Alice physical key KA and Bob physical key KB are calculated based on the channel gain of the common channel (Alice to Bob, bob to Alice) between the two parties, K is therefore A And K B Has strong similarity and almost the same. Eve does not belong to both communication parties and cannot generate an approximation K A And K B Is used for the key(s).
Through this step Alice and Bob obtain the physical keys locally, respectively, for subsequent encryption and decryption of the information using the local keys. Eve can also eavesdrop on the channel estimation message and estimate Alice and Bob's uplink and downlink channels to Eve, and KE is obtained by channel quantization.
2) Information transmission information transmission steps:
further, before encoding the information M to be transmitted, in order to prevent the influence of the correlation of the information, the correlation of the information bits transmitted each time is reduced as much as possible. The purpose of confusion of the information M can be achieved by means of bit-shift substitution, etc.
The information transmission process is as shown in fig. 2:
alice codes the information M with BCH [ n, k, t ] to obtain C
C=BCH(M)
Alice encodes the BCH-encoded information C and the local physical key K A Exclusive-or to obtain a transmission signal S
The exclusive-or is regarded as RC4 encryption in symmetric encryption, namely, an implementation method for carrying out exclusive-or operation on a pseudo random stream and a plaintext to obtain a ciphertext in encryption and carrying out exclusive-or operation on the ciphertext and the pseudo random stream to obtain an original plaintext in decryption. Those skilled in the art can also utilize K according to specific requirements A C, performing other symmetrical encryption modes; k (K) A Is an encryption key;
alice sends a transmission signal S to Bob via the common error channel error-process channel. The signal received by Bob is denoted S'. S' and S will be slightly inconsistent due to the effects of channel noise
S≠S'
Bob uses the local physical key K B Exclusive-or with S 'to obtain signal C'
Accordingly, those skilled in the art can also use K according to specific encryption means B Decrypting S';
bob performs BCH decoding BCHD corresponding to BCH coding on the signal C 'to finally obtain information M'
M'=BCHD(C")。
Since the BCH code has error correction capability, the encryption key K is used in decryption A Almost the same K B To decrypt the obtainedThe decryption result has high similarity with the original signal C, and the information M' is finally recovered by a decoding algorithm of error correction coding, namely, the decryption result is equivalent to the original information M. Eve attempts to recover the stolen signal even according to the same method, but due to the generated physical key K E Failure to match with K A Strong similarity, information M is obtained by error correction decoding E Will be far from the original information M and the effect of recovering the original information M cannot be achieved.
In particular, one skilled in the art may specifically and practically need to select different quantization methods and application effects of error correction coding in the encryption model.
The invention avoids the complex information negotiation process, and no longer has error requirement on the channel, so that Alice and Bob can encrypt and decrypt information by using the channel coding and the locally generated key without obtaining the completely consistent key through error correction. And the generated secret key is directly combined with encryption and decryption of the information, so that the physical layer secret key is fully used.

Claims (4)

1. The physical layer safety communication method based on wireless channel direct encryption is characterized by comprising the following steps:
and a channel detection step: the two communication parties firstly use the mutual sending detection signals of the wireless channels; one party calculates a local channel gain according to the channel state information provided by the acquired detection signal sent by the other party, and then quantizes the local channel gain to obtain a local physical key;
an information transmission step: the sender performs error correction code encoding on information to be transmitted, and then performs symmetric encryption processing on the information subjected to error correction code encoding by using a local physical key of the sender to obtain sent information; the sender sends the sending information to the receiver through a public error channel; the receiving party uses the received sending information as receiving information, symmetrically decrypts the receiving information by utilizing the local physical key of the receiving party, and then decodes the decrypted information into error correction codes to recover the transmission information.
2. The method of claim 1, wherein in the information transmitting step, the information to be transmitted is subjected to a post-processing after being subjected to a confusion process before the information to be transmitted is subjected to error correction code encoding.
3. The method of claim 1, wherein the error correction code encoding and decoding is BCH encoding and decoding.
4. The method of claim 1, wherein symmetric encryption and symmetric decryption are exclusive-or processes.
CN202311365688.9A 2023-10-20 2023-10-20 Physical layer secure communication method based on wireless channel direct encryption Pending CN117336715A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311365688.9A CN117336715A (en) 2023-10-20 2023-10-20 Physical layer secure communication method based on wireless channel direct encryption

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311365688.9A CN117336715A (en) 2023-10-20 2023-10-20 Physical layer secure communication method based on wireless channel direct encryption

Publications (1)

Publication Number Publication Date
CN117336715A true CN117336715A (en) 2024-01-02

Family

ID=89295095

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311365688.9A Pending CN117336715A (en) 2023-10-20 2023-10-20 Physical layer secure communication method based on wireless channel direct encryption

Country Status (1)

Country Link
CN (1) CN117336715A (en)

Similar Documents

Publication Publication Date Title
US9172529B2 (en) Hybrid encryption schemes
US8687800B2 (en) Encryption method for message authentication
CN108366370B (en) A kind of information transferring method quantifying privately owned asymmetric key based on radio channel characteristic
CN107148015B (en) Continuous encryption physical layer secure transmission method based on polarization code structure
CN108696867B (en) Lightweight group key distribution method based on wireless channel characteristics
CN110086616B (en) Forward one-time pad secret communication method based on wireless channel
KR20150129328A (en) Method and apparatus for secure communication
US20240048371A1 (en) Secure relay-based quantum communication method and communication network
US8213616B2 (en) Systems and methods for providing opportunistic security for physical communication channels
Fay et al. Compressive sensing encryption modes and their security
CN110336657B (en) Optical OFDM dynamic key generation method based on channel characteristics
CN109743155B (en) Physical layer secure transmission method based on antenna selection differential chaos keying
Armanuzzaman et al. A secure and efficient data transmission technique using quantum key distribution
CN111641500B (en) Encryption and decryption method for wireless video transmission safety of unmanned aerial vehicle
CN116669022A (en) Data safety transmission method for wireless communication system
Mihaljević et al. An approach for stream ciphers design based on joint computing over random and secret data
CN102918795A (en) Method and apparatus for authenticated encryption of audio
CN109889327B (en) Shared key generation method and device
CN114785484B (en) Big data safety transmission method and system
EP2571192A1 (en) Hybrid encryption schemes
CN117336715A (en) Physical layer secure communication method based on wireless channel direct encryption
Hu et al. Modulated symbol-based one-time pad secure transmission scheme using physical layer keys
CN111464299B (en) Physical layer key generation method for constructing reciprocal channel parameters based on frequency division duplex mode
Abduljabbar et al. Robust scheme to protect authentication code of message/image documents in cloud computing
US20050201563A1 (en) Quantum cryptography with fewer random numbers

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination