CN1477831A - Physical layer encryption method based on time-varying MPSK modulation in wireless local area network - Google Patents
Physical layer encryption method based on time-varying MPSK modulation in wireless local area network Download PDFInfo
- Publication number
- CN1477831A CN1477831A CNA031459501A CN03145950A CN1477831A CN 1477831 A CN1477831 A CN 1477831A CN A031459501 A CNA031459501 A CN A031459501A CN 03145950 A CN03145950 A CN 03145950A CN 1477831 A CN1477831 A CN 1477831A
- Authority
- CN
- China
- Prior art keywords
- mpsk
- physical layer
- area network
- local area
- mpsk modulation
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 22
- 102100026758 Serine/threonine-protein kinase 16 Human genes 0.000 title claims abstract 8
- 101710184778 Serine/threonine-protein kinase 16 Proteins 0.000 title claims abstract 8
- 230000005540 biological transmission Effects 0.000 abstract description 5
- 238000005516 engineering process Methods 0.000 abstract description 3
- 238000004088 simulation Methods 0.000 description 7
- 238000004891 communication Methods 0.000 description 5
- 239000013256 coordination polymer Substances 0.000 description 4
- 238000010586 diagram Methods 0.000 description 3
- 230000010363 phase shift Effects 0.000 description 3
- 239000000654 additive Substances 0.000 description 2
- 230000000996 additive effect Effects 0.000 description 2
- 238000000342 Monte Carlo simulation Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 230000002950 deficient Effects 0.000 description 1
- 238000010606 normalization Methods 0.000 description 1
- 230000003595 spectral effect Effects 0.000 description 1
Images
Landscapes
- Digital Transmission Methods That Use Modulated Carrier Waves (AREA)
Abstract
The physical layer encryption method based on time-varying MPSK modulation in radio local area network belongs to the field of radio local area network information transmission sefaty technology. On the premise of utilizing traditional random PN sequence to continuously change phase deviation it adopts the modulation mode with fixed QPSK or 8PSK lower carry system to maximally raise the performance of system error rate BER on the basis of greatly raising system safity. Besides, whether in low signal noise ratio SNR zone or in high SNR zone said fixed lower-carry-system MPSK modulation mode and random MPSK modulation mode have the obvious advantages.
Description
Technical field
In the WLAN (wireless local area network) based on the time become the MPSK modulation the encryption in physical layer method belong to WLAN (wireless local area network) information transmission security technical field.
Background technology
As the important component part of wireless communication networks, wireless lan (wlan) has become the main developing direction of following radio communication, particularly wireless access technology.Along with the continuous improvement of performance, interoperability and the ease of manageability of WLAN, fail safe has become assembles WLAN (wireless local area network) on a large scale and presses for one of problem of solution.Because WLAN (wireless local area network) is used the wireless mode transmission of data signals, transmission medium is open, so be vulnerable to attack.On the other hand, the physics controlled range of WLAN (wireless local area network) is uncertain, and this is because radio wave can penetrate wall and dividing plate, propagates into sometimes outside the application region, makes the hacker have an opportunity to intercept and capture electric wave and enter in the not protected local area network (LAN).Because these difference of network infrastructure, the fail safe that causes WLAN (wireless local area network) and wired network is not in same level.
At present, the IEEE802.11 committee has recognized the safety defect that WLAN (wireless local area network) is intrinsic, thereby has introduced WEP (Wired Equivalent Privacy) algorithm.But the WEP algorithm also has defective and the weakness of self, can not guarantee the validity of encrypted transmission fully, also can't guarantee the fail safe of WLAN.
Introduce our invention the time modified tone system mode encryption in physical layer algorithm before, be necessary simply to introduce traditional MPSK modulation system.MPSK is with a kind of multi-system digital modulation mode of carrier phase as the parameter of the information of carrying.In M system (for example: M=8, expression octal system) phase shift keyed signal, carrier phase has M kind value, and the pairing M kind duration is T
sSymbol can be expressed as:
Here, E
sBe the signal energy of unit symbol, promptly at 0≤t≤T
sSignal energy in the time interval; ω
CBe carrier angular frequencies; φ
iBe phase place, M kind value is arranged.
The theoretical Bit Error Rate Computation formula of mpsk signal is as follows: during M=2,
During M=4,
During M=8,
During M=16,
Here, Q represents the Q function, and its mathematics connotation is:
It is the tail area of Gaussian Profile probability density function.E
bThe energy of expression single-bit signal, N
0The power spectral density of expression noise.
Under normal conditions, the M value that the MPSK modulation system is adopted is constant, phase deviation φ
iSpan also be constant.Like this, in a single day the signal after the modulation is intercepted and captured, and just easily by demodulation, causes leakage of information.For this reason, when proposing, we become the modulation system of MPSK, to increase the security performance of system.Further, for the error rate that reduces system and the complexity of realization, we also to the time MPSK modulation system that becomes make some and improve, to increase the availability of this method.
Summary of the invention
The object of the present invention is to provide a kind of can on the basis of improving security of system greatly, keep than in the WLAN (wireless local area network) of low error rate based on the time become the encryption in physical layer algorithm of MPSK modulation.
Based on the time become the MPSK modulation system the encryption in physical layer basic idea be: produces two PN pseudo random sequences, constantly change the value of multi-system M according to first PN sequence, while value and second PN sequence according to M constantly changes phase deviation φ
iValue.Each M and φ
iChange a back modulating data once.Like this, the signal after the modulation is at M and φ
iAll do not have statistical law to say on two parameters, have very strong confidentiality, reached the purpose of encrypting.Concrete condition, referring to Fig. 1, existing based on the time MPSK modulation system that becomes the encryption in physical layer algorithm be expressed as follows:
(1) generation of random PN sequence
(i) { 0, the 1} sequence is used for the M value of selected MPSK modulation system to PN1:2bits, and its corresponded manner is as shown in table 1 at random.
(ii) PN2:log
2{ 0, the 1} sequence is used for selected phase deviation φ to M bits at random
iValue, its corresponded manner is as follows:
With log
2M bits { 0, the 1} sequence is regarded a binary number as, is designated as (PN2)
2, be converted into decimal number after, be designated as (PN2)
10Then:
(2) (Encode) encrypted in modulation
Simplify modulating mode, utilize the planisphere of MPSK modulation system to come the mark enciphered data, data encrypted is selected on the unit circle.
For MPSK modulation system and selected M, enciphered data m should satisfy: 0≤m≤M-1 has:
(3) demodulation deciphering (Decode)
(i) deciphering foundation
Adopt complex plane, mark constellation point on unit circle.Because phase deviation φ
iExistence, constellation point can rotate skew.The mark mode of constellation point is as follows:
(K=0,1,2,...,M-1)
The data (RECEIVE) that receive are compared with each constellation point, and nearest point is as the value of these data; That is to say, will with data point on complex plane the nearest pairing K value of constellation point as decrypted data.
(ii) decryption method
Get M constellation point CP
1, CP
2..., CP
MThe corresponding K=0 of difference, 1,2 ..., this M of M-1 point, decryption method is as follows:
IF|RECEIVE-CP
K|=Min(RECEIVE-CP
1,...,RECEIVE-CP
M) (9)
THEN?DECODE=K
Should be noted that, though said method improves a lot on security of system, but because BPSK, QPSK, 8PSK and these 4 kinds of modulation systems of 16PSK all occur with 1/4 probability, the complexity that causes whole system to realize increases, the error rate is also higher, thereby limited the range of application of system, promptly required the signal to noise ratio of system higher (greater than 12dB).For this reason, we will become some improvement of do on the MPSK modulation system encryption in physical layer algorithm when existing, to enlarge its scope of application.The invention is characterized in: it be a kind of adopt and low system QPSK modulation system the time become the encryption in physical layer method of MPSK (Multiple PhaseShift Keying, multi-system phase keying).It is a kind of adopt and low system 8PSK modulation mode the time become the encryption in physical layer method of MPSK (Multiple Phase Shift Keying, multi-system phase keying).Emulation experiment proves: on the basis of improving the system safety performance greatly, can greatly improve the error rate BER performance of system with the MPSK modulation system of low system.
Description of drawings Fig. 1 existing based on the time become the theory diagram of the encryption in physical layer/decryption method of MPSK modulation system.Fig. 2 improved based on the time become the theory diagram of the encryption in physical layer/decryption method of MPSK modulation system.The constellation point diagram of Fig. 3 16PSK modulation system.Become the simulation flow of MPSK encryption in physical layer method during Fig. 4.Become the theoretical BER performance curve of MPSK modulation system during Fig. 5.Become the theoretical BER performance curve of MPSK modulation system during Fig. 6.Become the actual emulation BER performance curve of MPSK modulation system during Fig. 7.Become the actual emulation BER performance curve of MPSK modulation system during Fig. 8.Become the theoretical BER performance of MPSK modulation system and the comparison of actual emulation BER performance during Fig. 9.
Embodiment
To the time become the improved basic thought of MPSK modulation system encryption in physical layer algorithm and be: system does not adopt random PN sequence to change the value of M, and adopts fixing QPSK or 8PSK modulation mode; But, phase deviation φ
iRemain randomly changing and φ in its randomness and the former method
iRandomness be suitable.Like this, owing to there be not the existence of 16PSK modulation system in system, the complexity of system and the error rate all reduce greatly; And since the modulation after signal at φ
iDo not have statistical law on this parameter, still have suitable confidentiality.Concrete condition, referring to Fig. 2, based on the time become MPSK modulation system encryption in physical layer algorithm improvement be expressed as follows:
(1) generation of random PN sequence
{ 0, the 1} sequence is selected phase deviation φ to PN:4bits at random
iValue, its corresponded manner is as follows;
With 4bits { 0, the 1} sequence is regarded a binary number as, is designated as (PN)
2, be converted into decimal number after, be designated as (PN)
10Then:
(2) (Encode) encrypted in modulation
Simplify modulating mode, utilize planisphere to come the mark enciphered data, data encrypted is selected on the unit circle.For the QPSK modulation system, enciphered data m should correspondingly satisfy: 0≤m≤3 have:
For 8PSK modulation mode, enciphered data m should correspondingly satisfy: 0≤m≤7 have:
(3) demodulation deciphering (Decode)
Adopt complex plane, mark constellation point on unit circle.Because phase deviation φ
iExistence, constellation point can rotate skew.
For QPSK, the mark mode of constellation point is as follows:
For 8PSK, the mark mode of constellation point is as follows:
The data and each constellation point that receive are compared, and nearest point is as the value of these data; That is to say, will with data point on complex plane the nearest pairing K value of constellation point as decrypted data.
Compare with existing encryption in physical layer algorithm; encryption in physical layer algorithm major advantage after the improvement is as follows: the form that (1) signal occurs is identical; the two has all adopted the planisphere (as shown in Figure 3) of 16PSK modulation system, and user profile contained in the signal is protected.(2) owing to adopt fixing MPSK modulation system (8PSK or QPSK), so the demodulating process of received signal, just decrypting process is more simple.(3) owing to adopted than the MPSK modulation system of hanging down system, so the error rate of system reduces greatly.
But, be at random mixing MPSK modulation system because existing encryption in physical layer algorithm adopts, and the algorithm after improving has changed fixing MPSK modulation system into, so on encryption performance, compare slightly loss with original method.
From the bit error rate formula of MPSK modulation system, the bit error rate of mpsk signal depends primarily on M and E
b/ N
0Value.Usually, M is big more, and the bit error rate of signal is just high more, and the complexity of simultaneity factor is also just high more, and when M was excessive, system can can't realize because of complexity is too high.Simultaneously, E
b/ N
0Big more, the bit error rate of signal is just low more, works as E
b/ N
0In the time of fully big, channel trends towards not having the ideal communication channel of noise, and the difference that different M values is brought will be no longer obvious.So for the influence of these two factors for the algorithm availability is discussed, we only consider MPSK modulation system commonly used and E generally
b/ N
0Scope is carried out Monte Carlo emulation.System emulation
By the comparison of Monte Carlo emulation and simulation result, our invention the time become MPSK modulation system encryption in physical layer algorithm and have very strong application potential.In the experiment simulation, we consider AWGN (Additive White Gauss Noise, additive white Gaussian noise) channel, pass through E
b/ N
0Value noise energy is controlled; Then noise (NOISE) is superimposed upon above the coded signal (ENCODE) as received signal (RECEIVE), the initial data that obtains sending by deciphering at last.Definition
Span be 5dB~15dB.The flow process principle of experiment simulation as shown in Figure 4.
About the control of generating noise and noise energy, concrete grammar is expressed as follows: (1) generating noise
Produce white multiple noise, i.e. n=n
1+ jn
2Note the normalization of mould, promptly noise is zero-mean equally again, and variance is 1 white noise.
So, if n
1, n
2Be zero-mean, variance is 1 white noise, has:
(2) to the control of noise energy
According to formula:
And signal energy E
s=1.Input
Then:
Have:
(3) in sum: received signal RECEIVE=ENCODE+NOISE wherein:
In order to compare, we have listed theoretic mpsk signal BER performance in simulation result.At first, we consider Fig. 5 and Fig. 6, and it has provided 16PSK, and 8PSK and QPSK BER performance in theory relatively.As can be seen, when M reduced, the corresponding error rate also reduced greatly, that is to say, the MPSK modulation system of low system can improve the BER performance of system greatly.For example, when
The time, the bit error rate of 16PSK, 8PSK, QPSK is respectively 5.42%, 1.20%, 0.15%.In addition, along with E
b/ N
0Increase, the MPSK modulation system of low system trends towards the BER performance of ideal communication channel at faster speed.So, still be high SNR district no matter in low SNR district, the difference of 3 kinds of MPSK modulation systems all is tangible.
Fig. 7 and Fig. 8 are the Monte Carlo simulation results of 200,000 characters on computers, and it has provided MPSK at random, and 8PSK and QPSK BER performance in actual applications relatively.As can be seen, adopt the fixedly MPSK modulation system of hanging down system can improve the BER performance of system greatly.In addition, along with E
b/ N
0Increase, the fixedly MPSK modulation system of low system trends towards the BER performance of ideal communication channel at faster speed.So, still be high SNR district no matter in low SNR district, the MPSK modulation system all is tangible with the difference of fixing low system MPSK modulation system at random.
When having provided, Fig. 9 becomes the theoretical BER performance of MPSK modulation system and the comparison of actual emulation BER performance.As can be seen, adopt the BER performance of the BER performance of MPSK modulation system at random and 16PSK modulation system very approaching.Can draw thus, for the time become the BER performance of MPSK modulation system, 16PSK modulation system decisive role.That is to say, because the existence of 16PSK modulation system makes the bit error rate of whole system increase greatly.Therefore, in system, adopt the fixedly MPSK modulation system of low system, can improve the BER performance of whole system widely.In addition, the simulation curve of 8PSK and QPSK and theoretical curve are very identical, have also further confirmed the correctness of simulation result.
The selection corresponding relation of subordinate list 1PN1 random sequence and modulation system
PN1 | 00 | 01 | 10 | 11 |
M | 2 | 4 | 8 | 16 |
MPSK | BPSK | QPSK | 8PSK | 16PSK |
Claims (2)
- In the WLAN (wireless local area network) based on the time become the encryption in physical layer method of MPSK modulation, adopt random PN sequence constantly to change phase deviation φ iValue, it is characterized in that: it be a kind of adopt and low system QPSK modulation system the time become the encryption in physical layer method of MPSK (MultiplePhase Shift Keying, multi-system phase keying).
- In the WLAN (wireless local area network) based on the time become the encryption in physical layer method of MPSK modulation, adopt random PN sequence constantly to change phase deviation φ iValue, it is characterized in that: it be a kind of adopt and low system 8PSK modulation mode the time become the encryption in physical layer method of MPSK (MultiplePhase Shift Keying, multi-system phase keying).
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 03145950 CN1213573C (en) | 2003-07-18 | 2003-07-18 | Physical layer encryption method based on time-varying MPSK modulation in wireless local area network |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 03145950 CN1213573C (en) | 2003-07-18 | 2003-07-18 | Physical layer encryption method based on time-varying MPSK modulation in wireless local area network |
Publications (2)
Publication Number | Publication Date |
---|---|
CN1477831A true CN1477831A (en) | 2004-02-25 |
CN1213573C CN1213573C (en) | 2005-08-03 |
Family
ID=34155934
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN 03145950 Expired - Fee Related CN1213573C (en) | 2003-07-18 | 2003-07-18 | Physical layer encryption method based on time-varying MPSK modulation in wireless local area network |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN1213573C (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1670171A1 (en) * | 2004-12-10 | 2006-06-14 | Tata Consultancy Services Limited | Method and apparatus for a security system for wireless networks |
CN102217263A (en) * | 2008-11-17 | 2011-10-12 | 汤姆森特许公司 | Fec frame header design for cable television signals |
US8744084B2 (en) | 2008-05-05 | 2014-06-03 | Kunal Kandekar | Methods, systems, and computer readable media for scrambled communication of data to, from, or over a medium |
CN101027849B (en) * | 2004-09-23 | 2014-11-12 | 摩托罗拉移动公司 | Method and apparatus for encryption of over-the-air communications in a wireless communication system |
US8995533B2 (en) | 2008-12-10 | 2015-03-31 | Thomson Licensing | Method and apparatus for transmitting and receiving FEC frame headers with variable header modulation |
CN106452719A (en) * | 2016-07-15 | 2017-02-22 | 浙江工业大学 | Safety communication method based on combination of artificial Rayleigh fading and adaptive modulation |
CN108234062A (en) * | 2017-12-19 | 2018-06-29 | 中国电子科技集团公司第三十研究所 | A kind of safe transmission method based on signal characteristic complication of eating dishes without rice or wine |
-
2003
- 2003-07-18 CN CN 03145950 patent/CN1213573C/en not_active Expired - Fee Related
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101027849B (en) * | 2004-09-23 | 2014-11-12 | 摩托罗拉移动公司 | Method and apparatus for encryption of over-the-air communications in a wireless communication system |
EP1670171A1 (en) * | 2004-12-10 | 2006-06-14 | Tata Consultancy Services Limited | Method and apparatus for a security system for wireless networks |
US8744084B2 (en) | 2008-05-05 | 2014-06-03 | Kunal Kandekar | Methods, systems, and computer readable media for scrambled communication of data to, from, or over a medium |
CN102217263A (en) * | 2008-11-17 | 2011-10-12 | 汤姆森特许公司 | Fec frame header design for cable television signals |
US9350489B2 (en) | 2008-11-17 | 2016-05-24 | Thomson Licensing | FEC frame header design for cable television signals |
US8995533B2 (en) | 2008-12-10 | 2015-03-31 | Thomson Licensing | Method and apparatus for transmitting and receiving FEC frame headers with variable header modulation |
CN106452719A (en) * | 2016-07-15 | 2017-02-22 | 浙江工业大学 | Safety communication method based on combination of artificial Rayleigh fading and adaptive modulation |
CN108234062A (en) * | 2017-12-19 | 2018-06-29 | 中国电子科技集团公司第三十研究所 | A kind of safe transmission method based on signal characteristic complication of eating dishes without rice or wine |
Also Published As
Publication number | Publication date |
---|---|
CN1213573C (en) | 2005-08-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Kumar et al. | Steg-OFDM blend for highly secure multi-user communication | |
Huo et al. | XOR encryption versus phase encryption, an in-depth analysis | |
CN110233701B (en) | Coding and decoding method for wireless communication physical layer communication safety | |
Bai et al. | Absolute value layered ACO-OFDM for intensity-modulated optical wireless channels | |
CN111614590A (en) | Anti-detection transmission method based on extended weighted fractional Fourier transform | |
CN113225174A (en) | Quantum noise stream encryption system based on one-dimensional chaotic sequence and encoding and decoding method | |
Huang et al. | Reliable and secure constellation shifting aided differential radio frequency watermark design for NB-IoT systems | |
Komeylian et al. | Deploying an OFDM physical layer security with high rate data for 5G wireless networks | |
Ameen et al. | Securing Physical Layer of 5G Wireless Network System over GFDM Using Linear Precoding Algorithm for Massive MIMO and Hyperchaotic QRDecomposition. | |
CN1477831A (en) | Physical layer encryption method based on time-varying MPSK modulation in wireless local area network | |
Chen et al. | Performance evaluation of a tactical data-link system based on MSK and 16QAM | |
Deng et al. | Security enhancement for OFDM-UWOC system using three-layer chaotic encryption and chaotic DFT precoding | |
CN112532555A (en) | Constellation rotation encryption method based on codebook mapping and constellation expansion | |
Ni et al. | PHY‐Aided Secure Communication via Weighted Fractional Fourier Transform | |
JP2018137702A (en) | Radio transmission method | |
CN116389651A (en) | Image safe transmission method based on ACO-OFDM visible light communication | |
Zhang et al. | Cream: Unauthorized secondary user detection in fading environments | |
Hou et al. | Physical Layer Encryption Scheme Based on Dynamic Constellation Rotation | |
Kumar et al. | Transmitter authentication using hierarchical modulation in dynamic spectrum sharing | |
Wang et al. | Dual-stream transceiver structure with single antenna for phase-modulated OFDM | |
Tan et al. | Subcarrier index modulated OFDM with soft decoder | |
Zhang et al. | A physical layer encryption scheme based on chaotic maps in OFDM systems | |
Yang et al. | Physical-layer Security Improvement Based on 2D-SCL Map and Brownian motion in CO-OFDM System | |
Gerasimov et al. | Accumulation of Interference of Modulation Schemes of Communications in Saturated Traffic Flows | |
García et al. | Faster-than-Nyquist signaling for physical layer security on wireless smart grid |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
C17 | Cessation of patent right | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20050803 Termination date: 20100718 |