CN1477831A - Physical layer encryption method based on time-varying MPSK modulation in wireless local area network - Google Patents

Physical layer encryption method based on time-varying MPSK modulation in wireless local area network Download PDF

Info

Publication number
CN1477831A
CN1477831A CNA031459501A CN03145950A CN1477831A CN 1477831 A CN1477831 A CN 1477831A CN A031459501 A CNA031459501 A CN A031459501A CN 03145950 A CN03145950 A CN 03145950A CN 1477831 A CN1477831 A CN 1477831A
Authority
CN
China
Prior art keywords
mpsk
physical layer
area network
local area
mpsk modulation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CNA031459501A
Other languages
Chinese (zh)
Other versions
CN1213573C (en
Inventor
樊平毅
刘忱
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tsinghua University
Original Assignee
Tsinghua University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tsinghua University filed Critical Tsinghua University
Priority to CN 03145950 priority Critical patent/CN1213573C/en
Publication of CN1477831A publication Critical patent/CN1477831A/en
Application granted granted Critical
Publication of CN1213573C publication Critical patent/CN1213573C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Landscapes

  • Digital Transmission Methods That Use Modulated Carrier Waves (AREA)

Abstract

The physical layer encryption method based on time-varying MPSK modulation in radio local area network belongs to the field of radio local area network information transmission sefaty technology. On the premise of utilizing traditional random PN sequence to continuously change phase deviation it adopts the modulation mode with fixed QPSK or 8PSK lower carry system to maximally raise the performance of system error rate BER on the basis of greatly raising system safity. Besides, whether in low signal noise ratio SNR zone or in high SNR zone said fixed lower-carry-system MPSK modulation mode and random MPSK modulation mode have the obvious advantages.

Description

In the WLAN (wireless local area network) based on the time become the encryption in physical layer method of MPSK modulation
Technical field
In the WLAN (wireless local area network) based on the time become the MPSK modulation the encryption in physical layer method belong to WLAN (wireless local area network) information transmission security technical field.
Background technology
As the important component part of wireless communication networks, wireless lan (wlan) has become the main developing direction of following radio communication, particularly wireless access technology.Along with the continuous improvement of performance, interoperability and the ease of manageability of WLAN, fail safe has become assembles WLAN (wireless local area network) on a large scale and presses for one of problem of solution.Because WLAN (wireless local area network) is used the wireless mode transmission of data signals, transmission medium is open, so be vulnerable to attack.On the other hand, the physics controlled range of WLAN (wireless local area network) is uncertain, and this is because radio wave can penetrate wall and dividing plate, propagates into sometimes outside the application region, makes the hacker have an opportunity to intercept and capture electric wave and enter in the not protected local area network (LAN).Because these difference of network infrastructure, the fail safe that causes WLAN (wireless local area network) and wired network is not in same level.
At present, the IEEE802.11 committee has recognized the safety defect that WLAN (wireless local area network) is intrinsic, thereby has introduced WEP (Wired Equivalent Privacy) algorithm.But the WEP algorithm also has defective and the weakness of self, can not guarantee the validity of encrypted transmission fully, also can't guarantee the fail safe of WLAN.
Introduce our invention the time modified tone system mode encryption in physical layer algorithm before, be necessary simply to introduce traditional MPSK modulation system.MPSK is with a kind of multi-system digital modulation mode of carrier phase as the parameter of the information of carrying.In M system (for example: M=8, expression octal system) phase shift keyed signal, carrier phase has M kind value, and the pairing M kind duration is T sSymbol can be expressed as: S i ( t ) = 2 E s T s cos ( ω C t + φ i ) 0 ≤ t ≤ T s , i = 0,1 , . . . , M - 1 - - - ( 1 ) Here, E sBe the signal energy of unit symbol, promptly at 0≤t≤T sSignal energy in the time interval; ω CBe carrier angular frequencies; φ iBe phase place, M kind value is arranged.
The theoretical Bit Error Rate Computation formula of mpsk signal is as follows: during M=2, P b , BPSK = Q ( 2 E b N 0 ) - - - ( 2 ) During M=4, P b , QPSK = 2 Q ( 2 E b N 0 ) [ 1 - 1 4 Q ( 2 E b N 0 ) ] - - - ( 3 ) During M=8, P b , 8 PSK = 2 Q ( 6 E b N 0 sin π 8 ) - - - ( 4 ) During M=16, P b , 16 PSK = 2 Q ( 8 E b N 0 sin π 16 ) - - - ( 5 ) Here, Q represents the Q function, and its mathematics connotation is: Q ( a ) = ∫ a ∞ 1 2 π e - x 2 2 dx , It is the tail area of Gaussian Profile probability density function.E bThe energy of expression single-bit signal, N 0The power spectral density of expression noise.
Under normal conditions, the M value that the MPSK modulation system is adopted is constant, phase deviation φ iSpan also be constant.Like this, in a single day the signal after the modulation is intercepted and captured, and just easily by demodulation, causes leakage of information.For this reason, when proposing, we become the modulation system of MPSK, to increase the security performance of system.Further, for the error rate that reduces system and the complexity of realization, we also to the time MPSK modulation system that becomes make some and improve, to increase the availability of this method.
Summary of the invention
The object of the present invention is to provide a kind of can on the basis of improving security of system greatly, keep than in the WLAN (wireless local area network) of low error rate based on the time become the encryption in physical layer algorithm of MPSK modulation.
Based on the time become the MPSK modulation system the encryption in physical layer basic idea be: produces two PN pseudo random sequences, constantly change the value of multi-system M according to first PN sequence, while value and second PN sequence according to M constantly changes phase deviation φ iValue.Each M and φ iChange a back modulating data once.Like this, the signal after the modulation is at M and φ iAll do not have statistical law to say on two parameters, have very strong confidentiality, reached the purpose of encrypting.Concrete condition, referring to Fig. 1, existing based on the time MPSK modulation system that becomes the encryption in physical layer algorithm be expressed as follows:
(1) generation of random PN sequence
(i) { 0, the 1} sequence is used for the M value of selected MPSK modulation system to PN1:2bits, and its corresponded manner is as shown in table 1 at random.
(ii) PN2:log 2{ 0, the 1} sequence is used for selected phase deviation φ to M bits at random iValue, its corresponded manner is as follows:
With log 2M bits { 0, the 1} sequence is regarded a binary number as, is designated as (PN2) 2, be converted into decimal number after, be designated as (PN2) 10Then: φ i = 2 π ( PN 2 ) 10 M - - - ( 6 )
(2) (Encode) encrypted in modulation
Simplify modulating mode, utilize the planisphere of MPSK modulation system to come the mark enciphered data, data encrypted is selected on the unit circle.
For MPSK modulation system and selected M, enciphered data m should satisfy: 0≤m≤M-1 has: SIGNAL = m , ENCODE = exp [ j · ( 2 π m M + φ i ) ] - - - ( 7 )
(3) demodulation deciphering (Decode)
(i) deciphering foundation
Adopt complex plane, mark constellation point on unit circle.Because phase deviation φ iExistence, constellation point can rotate skew.The mark mode of constellation point is as follows: CONSTELLATION POINTS = exp [ j · ( 2 π K M + φ i ) ] - - - ( 8 )
(K=0,1,2,...,M-1)
The data (RECEIVE) that receive are compared with each constellation point, and nearest point is as the value of these data; That is to say, will with data point on complex plane the nearest pairing K value of constellation point as decrypted data.
(ii) decryption method
Get M constellation point CP 1, CP 2..., CP MThe corresponding K=0 of difference, 1,2 ..., this M of M-1 point, decryption method is as follows:
IF|RECEIVE-CP K|=Min(RECEIVE-CP 1,...,RECEIVE-CP M) (9)
THEN?DECODE=K
Should be noted that, though said method improves a lot on security of system, but because BPSK, QPSK, 8PSK and these 4 kinds of modulation systems of 16PSK all occur with 1/4 probability, the complexity that causes whole system to realize increases, the error rate is also higher, thereby limited the range of application of system, promptly required the signal to noise ratio of system higher (greater than 12dB).For this reason, we will become some improvement of do on the MPSK modulation system encryption in physical layer algorithm when existing, to enlarge its scope of application.The invention is characterized in: it be a kind of adopt and low system QPSK modulation system the time become the encryption in physical layer method of MPSK (Multiple PhaseShift Keying, multi-system phase keying).It is a kind of adopt and low system 8PSK modulation mode the time become the encryption in physical layer method of MPSK (Multiple Phase Shift Keying, multi-system phase keying).Emulation experiment proves: on the basis of improving the system safety performance greatly, can greatly improve the error rate BER performance of system with the MPSK modulation system of low system.
Description of drawings Fig. 1 existing based on the time become the theory diagram of the encryption in physical layer/decryption method of MPSK modulation system.Fig. 2 improved based on the time become the theory diagram of the encryption in physical layer/decryption method of MPSK modulation system.The constellation point diagram of Fig. 3 16PSK modulation system.Become the simulation flow of MPSK encryption in physical layer method during Fig. 4.Become the theoretical BER performance curve of MPSK modulation system during Fig. 5.Become the theoretical BER performance curve of MPSK modulation system during Fig. 6.Become the actual emulation BER performance curve of MPSK modulation system during Fig. 7.Become the actual emulation BER performance curve of MPSK modulation system during Fig. 8.Become the theoretical BER performance of MPSK modulation system and the comparison of actual emulation BER performance during Fig. 9.
Embodiment
To the time become the improved basic thought of MPSK modulation system encryption in physical layer algorithm and be: system does not adopt random PN sequence to change the value of M, and adopts fixing QPSK or 8PSK modulation mode; But, phase deviation φ iRemain randomly changing and φ in its randomness and the former method iRandomness be suitable.Like this, owing to there be not the existence of 16PSK modulation system in system, the complexity of system and the error rate all reduce greatly; And since the modulation after signal at φ iDo not have statistical law on this parameter, still have suitable confidentiality.Concrete condition, referring to Fig. 2, based on the time become MPSK modulation system encryption in physical layer algorithm improvement be expressed as follows:
(1) generation of random PN sequence
{ 0, the 1} sequence is selected phase deviation φ to PN:4bits at random iValue, its corresponded manner is as follows;
With 4bits { 0, the 1} sequence is regarded a binary number as, is designated as (PN) 2, be converted into decimal number after, be designated as (PN) 10Then: φ i = 2 π ( PN ) 10 16 - - - ( 10 )
(2) (Encode) encrypted in modulation
Simplify modulating mode, utilize planisphere to come the mark enciphered data, data encrypted is selected on the unit circle.For the QPSK modulation system, enciphered data m should correspondingly satisfy: 0≤m≤3 have: SIGNAL QPSK = m , ENCODE QPSK = exp [ j · ( 2 π m 4 + φ i ) ] - - - ( 11 )
For 8PSK modulation mode, enciphered data m should correspondingly satisfy: 0≤m≤7 have: SIGNAL 8 PSK = m , ENCODE 8 PSK = exp [ j · ( 2 π m 8 + φ i ) ] - - - ( 12 )
(3) demodulation deciphering (Decode)
Adopt complex plane, mark constellation point on unit circle.Because phase deviation φ iExistence, constellation point can rotate skew.
For QPSK, the mark mode of constellation point is as follows: CONSTELLATION POINT S QPSK = exp [ j · ( 2 π K 4 + φ i ) ] ( K = 0,1,2,3 ) - - - ( 13 )
For 8PSK, the mark mode of constellation point is as follows: CONSTELLATION POIN TS 8 PSK = exp [ j · ( 2 π K 8 + φ i ) ] ( K = 0,1 , . . . , 7 ) - - - ( 14 )
The data and each constellation point that receive are compared, and nearest point is as the value of these data; That is to say, will with data point on complex plane the nearest pairing K value of constellation point as decrypted data.
Compare with existing encryption in physical layer algorithm; encryption in physical layer algorithm major advantage after the improvement is as follows: the form that (1) signal occurs is identical; the two has all adopted the planisphere (as shown in Figure 3) of 16PSK modulation system, and user profile contained in the signal is protected.(2) owing to adopt fixing MPSK modulation system (8PSK or QPSK), so the demodulating process of received signal, just decrypting process is more simple.(3) owing to adopted than the MPSK modulation system of hanging down system, so the error rate of system reduces greatly.
But, be at random mixing MPSK modulation system because existing encryption in physical layer algorithm adopts, and the algorithm after improving has changed fixing MPSK modulation system into, so on encryption performance, compare slightly loss with original method.
From the bit error rate formula of MPSK modulation system, the bit error rate of mpsk signal depends primarily on M and E b/ N 0Value.Usually, M is big more, and the bit error rate of signal is just high more, and the complexity of simultaneity factor is also just high more, and when M was excessive, system can can't realize because of complexity is too high.Simultaneously, E b/ N 0Big more, the bit error rate of signal is just low more, works as E b/ N 0In the time of fully big, channel trends towards not having the ideal communication channel of noise, and the difference that different M values is brought will be no longer obvious.So for the influence of these two factors for the algorithm availability is discussed, we only consider MPSK modulation system commonly used and E generally b/ N 0Scope is carried out Monte Carlo emulation.System emulation
By the comparison of Monte Carlo emulation and simulation result, our invention the time become MPSK modulation system encryption in physical layer algorithm and have very strong application potential.In the experiment simulation, we consider AWGN (Additive White Gauss Noise, additive white Gaussian noise) channel, pass through E b/ N 0Value noise energy is controlled; Then noise (NOISE) is superimposed upon above the coded signal (ENCODE) as received signal (RECEIVE), the initial data that obtains sending by deciphering at last.Definition
Figure A0314595000071
Span be 5dB~15dB.The flow process principle of experiment simulation as shown in Figure 4.
About the control of generating noise and noise energy, concrete grammar is expressed as follows: (1) generating noise
Produce white multiple noise, i.e. n=n 1+ jn 2Note the normalization of mould, promptly noise is zero-mean equally again, and variance is 1 white noise.
So, if n 1, n 2Be zero-mean, variance is 1 white noise, has: n = 1 2 ( n 1 + j · n 2 ) - - - ( 15 ) (2) to the control of noise energy
According to formula: SNR = log 2 M · E b N 0 = E s E n , And signal energy E s=1.Input
Figure A0314595000074
Then: E s E n = SNR = log 2 M · 10 ( E b N 0 ) dB 10 - - - ( 16 ) Have: E n = E s SNR = 1 SNR - - - ( 17 ) (3) in sum: received signal RECEIVE=ENCODE+NOISE wherein: NOISE = n SNR , SNR = log 2 M · 10 ( E b N 0 ) dB 10 , n = 1 2 ( n 1 + j · n 2 ) .
In order to compare, we have listed theoretic mpsk signal BER performance in simulation result.At first, we consider Fig. 5 and Fig. 6, and it has provided 16PSK, and 8PSK and QPSK BER performance in theory relatively.As can be seen, when M reduced, the corresponding error rate also reduced greatly, that is to say, the MPSK modulation system of low system can improve the BER performance of system greatly.For example, when ( E b N 0 ) dB = 7 dB The time, the bit error rate of 16PSK, 8PSK, QPSK is respectively 5.42%, 1.20%, 0.15%.In addition, along with E b/ N 0Increase, the MPSK modulation system of low system trends towards the BER performance of ideal communication channel at faster speed.So, still be high SNR district no matter in low SNR district, the difference of 3 kinds of MPSK modulation systems all is tangible.
Fig. 7 and Fig. 8 are the Monte Carlo simulation results of 200,000 characters on computers, and it has provided MPSK at random, and 8PSK and QPSK BER performance in actual applications relatively.As can be seen, adopt the fixedly MPSK modulation system of hanging down system can improve the BER performance of system greatly.In addition, along with E b/ N 0Increase, the fixedly MPSK modulation system of low system trends towards the BER performance of ideal communication channel at faster speed.So, still be high SNR district no matter in low SNR district, the MPSK modulation system all is tangible with the difference of fixing low system MPSK modulation system at random.
When having provided, Fig. 9 becomes the theoretical BER performance of MPSK modulation system and the comparison of actual emulation BER performance.As can be seen, adopt the BER performance of the BER performance of MPSK modulation system at random and 16PSK modulation system very approaching.Can draw thus, for the time become the BER performance of MPSK modulation system, 16PSK modulation system decisive role.That is to say, because the existence of 16PSK modulation system makes the bit error rate of whole system increase greatly.Therefore, in system, adopt the fixedly MPSK modulation system of low system, can improve the BER performance of whole system widely.In addition, the simulation curve of 8PSK and QPSK and theoretical curve are very identical, have also further confirmed the correctness of simulation result.
The selection corresponding relation of subordinate list 1PN1 random sequence and modulation system
   PN1    00    01    10    11
   M    2    4    8    16
   MPSK    BPSK    QPSK    8PSK    16PSK

Claims (2)

  1. In the WLAN (wireless local area network) based on the time become the encryption in physical layer method of MPSK modulation, adopt random PN sequence constantly to change phase deviation φ iValue, it is characterized in that: it be a kind of adopt and low system QPSK modulation system the time become the encryption in physical layer method of MPSK (MultiplePhase Shift Keying, multi-system phase keying).
  2. In the WLAN (wireless local area network) based on the time become the encryption in physical layer method of MPSK modulation, adopt random PN sequence constantly to change phase deviation φ iValue, it is characterized in that: it be a kind of adopt and low system 8PSK modulation mode the time become the encryption in physical layer method of MPSK (MultiplePhase Shift Keying, multi-system phase keying).
CN 03145950 2003-07-18 2003-07-18 Physical layer encryption method based on time-varying MPSK modulation in wireless local area network Expired - Fee Related CN1213573C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 03145950 CN1213573C (en) 2003-07-18 2003-07-18 Physical layer encryption method based on time-varying MPSK modulation in wireless local area network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 03145950 CN1213573C (en) 2003-07-18 2003-07-18 Physical layer encryption method based on time-varying MPSK modulation in wireless local area network

Publications (2)

Publication Number Publication Date
CN1477831A true CN1477831A (en) 2004-02-25
CN1213573C CN1213573C (en) 2005-08-03

Family

ID=34155934

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 03145950 Expired - Fee Related CN1213573C (en) 2003-07-18 2003-07-18 Physical layer encryption method based on time-varying MPSK modulation in wireless local area network

Country Status (1)

Country Link
CN (1) CN1213573C (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1670171A1 (en) * 2004-12-10 2006-06-14 Tata Consultancy Services Limited Method and apparatus for a security system for wireless networks
CN102217263A (en) * 2008-11-17 2011-10-12 汤姆森特许公司 Fec frame header design for cable television signals
US8744084B2 (en) 2008-05-05 2014-06-03 Kunal Kandekar Methods, systems, and computer readable media for scrambled communication of data to, from, or over a medium
CN101027849B (en) * 2004-09-23 2014-11-12 摩托罗拉移动公司 Method and apparatus for encryption of over-the-air communications in a wireless communication system
US8995533B2 (en) 2008-12-10 2015-03-31 Thomson Licensing Method and apparatus for transmitting and receiving FEC frame headers with variable header modulation
CN106452719A (en) * 2016-07-15 2017-02-22 浙江工业大学 Safety communication method based on combination of artificial Rayleigh fading and adaptive modulation
CN108234062A (en) * 2017-12-19 2018-06-29 中国电子科技集团公司第三十研究所 A kind of safe transmission method based on signal characteristic complication of eating dishes without rice or wine

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101027849B (en) * 2004-09-23 2014-11-12 摩托罗拉移动公司 Method and apparatus for encryption of over-the-air communications in a wireless communication system
EP1670171A1 (en) * 2004-12-10 2006-06-14 Tata Consultancy Services Limited Method and apparatus for a security system for wireless networks
US8744084B2 (en) 2008-05-05 2014-06-03 Kunal Kandekar Methods, systems, and computer readable media for scrambled communication of data to, from, or over a medium
CN102217263A (en) * 2008-11-17 2011-10-12 汤姆森特许公司 Fec frame header design for cable television signals
US9350489B2 (en) 2008-11-17 2016-05-24 Thomson Licensing FEC frame header design for cable television signals
US8995533B2 (en) 2008-12-10 2015-03-31 Thomson Licensing Method and apparatus for transmitting and receiving FEC frame headers with variable header modulation
CN106452719A (en) * 2016-07-15 2017-02-22 浙江工业大学 Safety communication method based on combination of artificial Rayleigh fading and adaptive modulation
CN108234062A (en) * 2017-12-19 2018-06-29 中国电子科技集团公司第三十研究所 A kind of safe transmission method based on signal characteristic complication of eating dishes without rice or wine

Also Published As

Publication number Publication date
CN1213573C (en) 2005-08-03

Similar Documents

Publication Publication Date Title
Kumar et al. Steg-OFDM blend for highly secure multi-user communication
Huo et al. XOR encryption versus phase encryption, an in-depth analysis
CN110233701B (en) Coding and decoding method for wireless communication physical layer communication safety
Bai et al. Absolute value layered ACO-OFDM for intensity-modulated optical wireless channels
CN111614590A (en) Anti-detection transmission method based on extended weighted fractional Fourier transform
CN113225174A (en) Quantum noise stream encryption system based on one-dimensional chaotic sequence and encoding and decoding method
Huang et al. Reliable and secure constellation shifting aided differential radio frequency watermark design for NB-IoT systems
Komeylian et al. Deploying an OFDM physical layer security with high rate data for 5G wireless networks
Ameen et al. Securing Physical Layer of 5G Wireless Network System over GFDM Using Linear Precoding Algorithm for Massive MIMO and Hyperchaotic QRDecomposition.
CN1477831A (en) Physical layer encryption method based on time-varying MPSK modulation in wireless local area network
Chen et al. Performance evaluation of a tactical data-link system based on MSK and 16QAM
Deng et al. Security enhancement for OFDM-UWOC system using three-layer chaotic encryption and chaotic DFT precoding
CN112532555A (en) Constellation rotation encryption method based on codebook mapping and constellation expansion
Ni et al. PHY‐Aided Secure Communication via Weighted Fractional Fourier Transform
JP2018137702A (en) Radio transmission method
CN116389651A (en) Image safe transmission method based on ACO-OFDM visible light communication
Zhang et al. Cream: Unauthorized secondary user detection in fading environments
Hou et al. Physical Layer Encryption Scheme Based on Dynamic Constellation Rotation
Kumar et al. Transmitter authentication using hierarchical modulation in dynamic spectrum sharing
Wang et al. Dual-stream transceiver structure with single antenna for phase-modulated OFDM
Tan et al. Subcarrier index modulated OFDM with soft decoder
Zhang et al. A physical layer encryption scheme based on chaotic maps in OFDM systems
Yang et al. Physical-layer Security Improvement Based on 2D-SCL Map and Brownian motion in CO-OFDM System
Gerasimov et al. Accumulation of Interference of Modulation Schemes of Communications in Saturated Traffic Flows
García et al. Faster-than-Nyquist signaling for physical layer security on wireless smart grid

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20050803

Termination date: 20100718