WO2018119890A1 - Cdma system physical layer security configuration method and device - Google Patents

Cdma system physical layer security configuration method and device Download PDF

Info

Publication number
WO2018119890A1
WO2018119890A1 PCT/CN2016/113062 CN2016113062W WO2018119890A1 WO 2018119890 A1 WO2018119890 A1 WO 2018119890A1 CN 2016113062 W CN2016113062 W CN 2016113062W WO 2018119890 A1 WO2018119890 A1 WO 2018119890A1
Authority
WO
WIPO (PCT)
Prior art keywords
user
matrix
spreading code
channel information
legal user
Prior art date
Application number
PCT/CN2016/113062
Other languages
French (fr)
Chinese (zh)
Inventor
李明
遆光宇
Original Assignee
深圳天珑无线科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳天珑无线科技有限公司 filed Critical 深圳天珑无线科技有限公司
Priority to PCT/CN2016/113062 priority Critical patent/WO2018119890A1/en
Publication of WO2018119890A1 publication Critical patent/WO2018119890A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W52/00Power management, e.g. TPC [Transmission Power Control], power saving or power classes
    • H04W52/04TPC
    • H04W52/18TPC being performed according to specific parameters
    • H04W52/24TPC being performed according to specific parameters using SIR [Signal to Interference Ratio] or other wireless path parameters

Definitions

  • the present invention relates to the field of wireless communication technologies, and in particular, to a physical layer security configuration method and apparatus for a CDMA system.
  • CDMA CodeDivision Multiple Access
  • CDMA CodeDivision Multiple Access
  • each legal user separately shares a unique spreading code with the base station and communicates with the base station through a spreading code.
  • the spreading codes are orthogonal or nearly orthogonal to each other, thereby It can be guaranteed that the transmitted signals of multiple legitimate users will not interfere with each other.
  • the spread spectrum characteristic of CDMA ensures that the spread spectrum signal can resist the spectrum analysis attack and has the security feature that is difficult to be detected, the illegal user can extract the spread code of the legitimate user with relatively high accuracy through blind detection and the like. And send a signal.
  • the security technology developed for CDMA systems is becoming more and more important.
  • the security technology of the existing CDMA system is mainly applied to the upper layer security protocol of the communication system, and the information sent between the legitimate user and the base station is encrypted by means of the authentication and encryption algorithm.
  • the existing security technology has the following problems: if the security protection of the CDMA system is implemented by the symmetric encryption algorithm, since the symmetric encryption algorithm needs to distribute and manage the key, the security technology is realized. The complexity is higher; if the security protection of the CDMA system is realized by the asymmetric encryption algorithm, the computational complexity of the asymmetric encryption algorithm is high, resulting in large system resource consumption.
  • the embodiments of the present invention provide a physical layer security configuration method and device for a CDMA system, and the main purpose thereof is to solve the problem that the implementation security technology of the existing CDMA system has high complexity and large system resource consumption.
  • the present invention provides the following technical solutions:
  • the present invention provides a physical layer security configuration method for a CDMA system, including:
  • the present invention provides a physical layer security configuration apparatus for a CDMA system, including:
  • An acquiring unit configured to obtain channel information of a legal user and channel information of an illegal user
  • the acquiring unit is further configured to obtain a first matrix corresponding to the legal user according to the channel information of the legal user and the interference noise autocorrelation matrix of the legal user, and according to the channel information of the illegal user and the interference noise autocorrelation matrix of the illegal user, Obtaining a second matrix corresponding to the illegal user;
  • a generating unit configured to generate, according to the first matrix and the second matrix, a spreading code group and a sending power corresponding to the legal user by using a preset iterative algorithm.
  • the technical solution provided by the embodiment of the present invention has at least the following advantages:
  • the physical layer security configuration method and device for the CDMA system provided by the embodiment of the present invention, when the physical layer security configuration of the CDMA system needs to be performed, firstly, the channel information of the legal user and the channel information of the illegal user are obtained, and then according to the legitimate user
  • the channel information and the interference noise autocorrelation matrix of the legal user acquire the first matrix corresponding to the legal user, and obtain the second matrix corresponding to the illegal user according to the channel information of the illegal user and the interference noise autocorrelation matrix of the illegal user, and finally obtain the second matrix corresponding to the illegal user.
  • the first matrix and the second matrix are obtained by using a preset iterative algorithm to obtain a spreading code group and a transmission power corresponding to the legal user.
  • the security technology of the existing CDMA system is mainly applied to the upper layer security protocol of the communication system, and relies on the authentication and encryption algorithm to encrypt the information transmitted between the legitimate user and the base station, because the channel is unique in the wireless communication environment.
  • the present invention utilizes the degree of freedom of the base station in the code domain space, realizes the physical layer security protection method of the CDMA system through the iterative manner of the spreading code, and avoids the implementation complexity of the existing CDMA system security technology. High, the problem of large system resource consumption.
  • FIG. 1 is a flowchart of a physical layer security configuration method of a CDMA system according to an embodiment of the present invention
  • FIG. 2 is a schematic diagram showing the principle of a CDMA system according to an embodiment of the present invention
  • FIG. 3 is a flowchart of a physical layer security configuration method of another CDMA system according to an embodiment of the present invention.
  • FIG. 4 is a schematic structural diagram of a physical layer security configuration apparatus of a CDMA system according to an embodiment of the present invention
  • FIG. 5 is a schematic structural diagram of another physical layer security configuration apparatus of a CDMA system according to an embodiment of the present invention.
  • FIG. 1 A physical layer security configuration method for a CDMA system according to an embodiment of the present invention is shown in FIG. 1 , where the method includes:
  • the legal user is a user who should perform normal communication with the base station
  • the illegal user is a user who maliciously steals the transmission signal and the spreading code between the legal user and the base station.
  • the implementation principle of the CDMA system can be as shown in FIG. 2, where the square block is a base station, the circular block is a legitimate user, and the triangular block is an illegal user.
  • the first matrix and the second matrix may be Q matrices.
  • the method for obtaining the interference noise self-correlation matrix of the legal user may specifically include: adopting a formula Acquired, where c k represents interference from other users in the environment, n k is Gaussian white noise, and z k is multiple access interference.
  • the method for obtaining the interference noise autocorrelation matrix of the illegal user is similar to the above method, and will not be described herein.
  • the physical layer security configuration method of the CDMA system provided by the embodiment of the present invention, when the physical layer security configuration of the CDMA system needs to be performed, firstly, the channel information of the legal user and the channel information of the illegal user are obtained, and then the channel information of the legal user is obtained. And the interference noise autocorrelation matrix of the legal user acquires the first matrix corresponding to the legal user, and obtains the second matrix corresponding to the illegal user according to the channel information of the illegal user and the interference noise autocorrelation matrix of the illegal user, and finally according to the A matrix and the second matrix obtain a spreading code group and a transmission power corresponding to the legal user by using a preset iterative algorithm.
  • the security technology of the existing CDMA system is mainly applied to the upper layer security protocol of the communication system, and relies on the authentication and encryption algorithm to encrypt the information transmitted between the legitimate user and the base station, because the channel is unique in the wireless communication environment.
  • the present invention utilizes the degree of freedom of the base station in the code domain space, realizes the physical layer security protection method of the CDMA system through the iterative manner of the spreading code, and avoids the implementation complexity of the existing CDMA system security technology. High, the problem of large system resource consumption.
  • the embodiment of the present invention provides another physical layer security configuration method for a CDMA system. As shown in FIG. 3, the method includes:
  • the step 201 may include: acquiring channel information of the legal user and channel information of the illegal user according to the preset training signal. Specifically, the legal user sends the channel information of the legal user by sending a training pilot signal that is pre-agreed with the base station, and then the legitimate user estimates the channel information when the received signal and the transmitted signal are known.
  • the preset wireless channel between the legal user and the base station obeys the common Rayleigh multi-fading distribution.
  • the received signal of the kth legitimate user It can be expressed as: Where H k is the multipath channel matrix of the sender and the kth legitimate user, c k represents interference from other users in the environment, n k is Gaussian white noise, and z k represents multiple access interference.
  • the information bit detection of the preset legal user is filtered by using a linear maximum signal to interference and noise ratio as: among them, Indicates the maximum signal to noise ratio filtering, and R k is the autocorrelation matrix of interference and noise.
  • the SINR of the output signal filtered using the maximum SINR is
  • the maximum SINR filtering can also be used to steal secret information.
  • the maximum SINR of the output is
  • ⁇ k represents the quality of service QoS requirement of the legitimate user channel
  • E max represents the maximum distributable energy of each legitimate user.
  • the preset Rayleigh quotient quantization algorithm is used to iteratively optimize the spreading code, so that the above-mentioned target equation is optimized and the problem of multiple access interference is avoided, thereby realizing the CDMA system.
  • the physical layer security protection method in particular, the iterative spreading code group algorithm used in the embodiment of the present invention has the advantages of fast convergence and low computational complexity, thereby ensuring the implementability of the physical layer security protection method.
  • step 202 may specifically include: according to a formula Obtaining a first matrix corresponding to the legal user, where Q k is a first matrix corresponding to the legal user, H k is channel information of the legal user, and R k is an interference noise autocorrelation matrix of the legal user, and then according to the formula Obtaining a second matrix corresponding to the illegal user, wherein, Q ek second matrix corresponding to the illegal user, H e is the channel information of unauthorized users, R ek illegal user interference noise autocorrelation matrix.
  • the convergence condition corresponding to the preset iterative algorithm is that the spreading code and the transmission power energy obtained by two consecutive iterations remain almost unchanged, that is,
  • 0 and
  • the spreading code group corresponding to the legal user obtained by the preset iterative algorithm and the sending power meet the convergence condition corresponding to the preset iterative algorithm, output the spreading code group and the sending power.
  • Step 204b which is parallel to step 204a, if the spreading code group and the transmission power corresponding to the legal user currently obtained by the preset iterative algorithm do not meet the convergence condition corresponding to the preset iterative algorithm and whether the current number of iterations is less than or equal to
  • the preset threshold is obtained, according to the first matrix and the second matrix, obtaining a spreading code group and a transmission power corresponding to the legal user by using a preset Rayleigh quotient quantization algorithm.
  • the preamble Rayleigh quotation algorithm is used to obtain the spreading code group and the sending power corresponding to the legal user, so as to ensure that the legal user's signal to interference ratio is greater than a certain quality of service QoS requirement, and the maximum is The information of the illegal users is reduced, thereby preventing the illegal users from stealing signals, realizing the physical layer security of the CDMA system, and avoiding the problem of multiple access interference.
  • j is the current number of iterations, and then according to the formula Update the first matrix and according to the formula Update the second matrix among them
  • H k is the multipath channel matrix of the transmitting end and the kth legitimate user
  • H e is the multipath channel matrix of the illegal user
  • E i represents the bit energy of the i th user transmitting signal
  • c k represents interference from other users in the environment
  • n k is Gaussian white noise
  • the spreading code and transmission power of the value condition are used as the spreading code of the kth legal user. And transmit power, and remove
  • the embodiment of the present invention approximates the method of decomposing the feature vectors of the Q e matrix to generate an alternative set P. .
  • Step 2034c which is parallel to step 2034a and step 2034b, if the current iteration number is greater than the preset threshold and does not meet the convergence condition corresponding to the preset iteration algorithm, reconfigure the order of the legitimate users.
  • the order of the legitimate users can be randomly re-scrambled in the case where the calculation does not converge. That is, the acquisition order of the spreading code is re-scrambled, so that the spreading code group is obtained again to ensure the physical layer security configuration.
  • Another physical layer security configuration method of the CDMA system when the physical layer security configuration of the CDMA system needs to be performed, first acquires channel information of the legal user and channel information of the illegal user, and then according to the channel of the legal user. Acquiring the first matrix corresponding to the legal user by the interference noise autocorrelation matrix of the legal user, and acquiring the second matrix corresponding to the illegal user according to the channel information of the illegal user and the interference noise autocorrelation matrix of the illegal user, and finally according to the The first matrix and the second matrix obtain a spreading code group and a transmission power corresponding to the legal user by using a preset iterative algorithm.
  • the security technology of the existing CDMA system is mainly applied to the upper layer security protocol of the communication system, and relies on the authentication and encryption algorithm to encrypt the information transmitted between the legitimate user and the base station, because the channel is unique in the wireless communication environment.
  • the present invention utilizes the degree of freedom of the base station in the code domain space, and realizes the physical layer security of the CDMA system through the iterative manner of the spreading code.
  • the protection method avoids the problem that the implementation of the security technology of the existing CDMA system is high in complexity and the system resource consumption is large.
  • an embodiment of the present invention provides a physical layer security configuration apparatus for a CDMA system.
  • the apparatus may include: an obtaining unit 31 and a generating unit 32.
  • the obtaining unit 31 is configured to obtain channel information of a legal user and channel information of an illegal user.
  • the obtaining unit 31 is further configured to obtain a first matrix corresponding to the legal user according to the channel information of the legal user and the interference noise autocorrelation matrix of the legal user, and according to the channel information of the illegal user and the interference noise autocorrelation matrix of the illegal user. Obtaining a second matrix corresponding to the illegal user;
  • the generating unit 32 is configured to generate, according to the first matrix and the second matrix, a spreading code group and a transmission power corresponding to the legal user by using a preset iterative algorithm.
  • the device embodiment corresponds to the foregoing method embodiment.
  • the device embodiment does not describe the details in the foregoing method embodiments one by one, but it should be clear that the device in this embodiment can Corresponding to implementing all of the foregoing method embodiments.
  • the physical layer security configuration device of the CDMA system provided by the embodiment of the present invention firstly obtains the channel information of the legal user and the channel information of the illegal user when the physical layer security configuration of the CDMA system needs to be performed, and then according to the channel information of the legal user.
  • the interference noise autocorrelation matrix of the legal user acquires the first matrix corresponding to the legal user, and obtains the second matrix corresponding to the illegal user according to the channel information of the illegal user and the interference noise autocorrelation matrix of the illegal user, and finally according to the A matrix and the second matrix obtain a spreading code group and a transmission power corresponding to the legal user by using a preset iterative algorithm.
  • the security technology of the existing CDMA system is mainly applied to the upper layer security protocol of the communication system, and relies on the authentication and encryption algorithm to encrypt the information transmitted between the legitimate user and the base station, because the channel is unique in the wireless communication environment.
  • the present invention utilizes the degree of freedom of the base station in the code domain space, realizes the physical layer security protection method of the CDMA system through the iterative manner of the spreading code, and avoids the implementation complexity of the existing CDMA system security technology. High, the problem of large system resource consumption.
  • an embodiment of the present invention provides another physical layer security configuration apparatus for a CDMA system.
  • the apparatus may include: an obtaining unit 41 and a generating unit 42.
  • the obtaining unit 41 is configured to obtain channel information of a legal user and channel information of an illegal user.
  • the obtaining unit 41 is further configured to obtain a first matrix corresponding to the legal user according to the channel information of the legal user and the interference noise autocorrelation matrix of the legal user, and according to the channel information of the illegal user and the interference noise autocorrelation matrix of the illegal user. Obtaining a second matrix corresponding to the illegal user;
  • the generating unit 42 is configured to generate, according to the first matrix and the second matrix, a spreading code group and a transmission power corresponding to the legal user by using a preset iterative algorithm.
  • the generating unit 42 includes:
  • the determining module 4201 is configured to determine whether the spreading code group and the sending power corresponding to the legal user obtained by the preset iterative algorithm meet the convergence condition corresponding to the preset iterative algorithm, and the convergence condition is two consecutive iterations.
  • the difference between the obtained difference between the spreading codes and the transmission power energy is less than or equal to a preset threshold;
  • the output module 4202 is configured to: if yes, output the spreading code group and the sending power;
  • the obtaining module 4203 is configured to obtain, according to the first matrix and the second matrix, a spreading code group and a transmission power corresponding to the legal user by using a preset Rayleigh quotient quantization algorithm.
  • H k is the multipath channel matrix of the transmitting end and the kth legitimate user
  • H e is the multipath channel matrix of the illegal user
  • E i represents the bit energy of the ith user transmitting signal
  • c k represents interference from other users in the environment
  • n k is Gaussian white noise
  • the spreading code and transmission power of the value condition are used as the spreading code of the kth legal user. And transmit power, and remove the spreading code from the candidate set P j
  • the spreading code group and the transmission power of the legal user are obtained according to the spreading code and the transmission power of each legal user.
  • the determining module 4201 is further configured to determine whether the current number of iterations is less than or equal to a preset threshold
  • the generating unit 42 further includes:
  • the configuration module 4204 is configured to reconfigure the order of the legitimate users if the current iteration number is greater than the preset threshold and does not meet the convergence condition corresponding to the preset iteration algorithm.
  • the obtaining unit 41 is specifically configured according to a formula Obtaining a first matrix corresponding to the legitimate user, wherein the first matrix Q k corresponding to a legitimate user, the channel information H k is a legitimate user, R k is a legitimate user interference noise autocorrelation matrix;
  • the obtaining unit 41 is specifically used according to a formula Obtaining a second matrix corresponding to the illegal user, wherein, Q ek second matrix corresponding to the illegal user, H e is the channel information of unauthorized users, R ek illegal user interference noise autocorrelation matrix.
  • the obtaining unit 41 is further configured to acquire channel information of the legal user and channel information of the illegal user according to the preset training signal.
  • the device embodiment corresponds to the foregoing method embodiment.
  • the device embodiment does not describe the details in the foregoing method embodiments one by one, but it should be clear that the device in this embodiment can Corresponding to implementing all of the foregoing method embodiments.
  • Another physical layer security configuration device of the CDMA system when the physical layer security configuration of the CDMA system needs to be performed, first acquires channel information of the legal user and channel information of the illegal user, and then according to the channel of the legal user. Acquiring the first matrix corresponding to the legal user by the interference noise autocorrelation matrix of the legal user, and acquiring the second matrix corresponding to the illegal user according to the channel information of the illegal user and the interference noise autocorrelation matrix of the illegal user, and finally according to the The first matrix and the second matrix obtain a spreading code group and a transmission power corresponding to the legal user by using a preset iterative algorithm.
  • the security technology of the existing CDMA system is mainly applied to the upper layer security protocol of the communication system, and relies on the authentication and encryption algorithm to encrypt the information transmitted between the legitimate user and the base station, because the channel is unique in the wireless communication environment.
  • the present invention utilizes the degree of freedom of the base station in the code domain space, realizes the physical layer security protection method of the CDMA system through the iterative manner of the spreading code, and avoids the implementation complexity of the existing CDMA system security technology. High, the problem of large system resource consumption.
  • the physical layer security configuration device of the CDMA system includes a processor and a memory.
  • the acquisition unit, the generation unit, and the like are all stored as a program unit in a memory, and the program unit stored in the memory is executed by the processor to implement a corresponding function.
  • the processor contains a kernel, and the kernel removes the corresponding program unit from the memory.
  • the kernel can be set to one or more. By adjusting the kernel parameters, the limitations of the existing interference technology are higher and the difficulty is realized.
  • the memory may include non-persistent memory, random access memory (RAM), and/or non-volatile memory in a computer readable medium, such as read only memory (ROM) or flash memory (flash RAM), the memory including at least one Memory chip.
  • RAM random access memory
  • ROM read only memory
  • flash RAM flash memory
  • the present application also provides a computer program product, when executed on a data processing device, adapted to perform program code for initializing the following method steps: obtaining channel information of a legitimate user and channel information of an illegal user;
  • the information and the interference noise autocorrelation matrix of the legal user acquire the first matrix corresponding to the legal user, and obtain the second matrix corresponding to the illegal user according to the channel information of the illegal user and the interference noise autocorrelation matrix of the illegal user;
  • a matrix and the second matrix obtain a spreading code group and a transmission power corresponding to the legal user by using a preset iterative algorithm.
  • embodiments of the present application can be provided as a method, system, or computer program product.
  • the present application can take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment in combination of software and hardware.
  • the application can take the form of a computer program product embodied on one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) including computer usable program code.
  • the computer program instructions can also be stored in a computer readable memory that can direct a computer or other programmable data processing device to operate in a particular manner, such that the instructions stored in the computer readable memory produce an article of manufacture comprising the instruction device.
  • the apparatus implements the functions specified in one or more blocks of a flow or a flow and/or block diagram of the flowchart.
  • These computer program instructions can also be loaded onto a computer or other programmable data processing device such that a series of operational steps are performed on a computer or other programmable device to produce computer-implemented processing for execution on a computer or other programmable device.
  • the instructions provide steps for implementing the functions specified in one or more of the flow or in a block or blocks of a flow diagram.
  • a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
  • processors CPUs
  • input/output interfaces network interfaces
  • memory volatile and non-volatile memory
  • the memory may include non-persistent memory, random access memory (RAM), and/or non-volatile memory in a computer readable medium, such as read only memory (ROM) or flash memory.
  • RAM random access memory
  • ROM read only memory
  • Memory is an example of a computer readable medium.
  • Computer readable media includes both permanent and non-persistent, removable and non-removable media.
  • Information storage can be implemented by any method or technology.
  • the information can be computer readable instructions, data structures, modules of programs, or other data.
  • Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other types of random access memory (RAM), read only memory. (ROM), electrically erasable programmable read only memory (EEPROM), flash memory or other memory technology, compact disk read only memory (CD-ROM), digital versatile disk (DVD) or other optical storage, Magnetic tape cartridges, magnetic tape storage or other magnetic storage devices or any other non-transportable media can be used to store information that can be accessed by a computing device.
  • computer readable media does not include temporary storage of computer readable media, such as modulated data signals and carrier waves.

Abstract

Disclosed are a CDMA system physical layer security configuration method and device, relating to the technical field of wireless communication. The invention achieves a method of physical layer security protection for a CDMA system, and avoids the problems of high implementation complexity of technical security measures and large system resource consumption in existing CDMA systems. The main technical solution of the invention is: first, obtaining channel information of a legal user and channel information of an illegal user; then, according to the channel information of the legal user and an interference noise autocorrelation matrix of the legal user, obtaining a first matrix corresponding to the legal user; and according to the channel information of the illegal user and the interference noise autocorrelation matrix of the illegal user, obtaining a second matrix corresponding to the illegal user; finally, according to the first matrix and the second matrix, obtaining a spreading code group and a transmission power corresponding to the legal user by means of a preset iteration algorithm. The present invention is mainly used in the technical field of interference in wireless communication systems.

Description

CDMA系统的物理层安全配置方法及装置Physical layer security configuration method and device for CDMA system 技术领域Technical field
本发明涉及无线通信技术领域,尤其涉及一种CDMA系统的物理层安全配置方法及装置。The present invention relates to the field of wireless communication technologies, and in particular, to a physical layer security configuration method and apparatus for a CDMA system.
背景技术Background technique
随着无线通信技术的不断发展,无线通信系统的使用率也越来越高。其中,CDMA(CodeDivisionMultipleAccess,码分多址)系统为无线通信系统中比较常用的系统之一。在CDMA系统中,每个合法用户单独与基站共享一个唯一的扩频码,并通过扩频码与基站进行通信,在CDMA系统的下行链路中扩频码相互正交或近似正交,从而可以保证多个合法用户的发送信号不会相互干扰。虽然CDMA的扩频特性保证了扩频后的信号可以抵抗频谱分析的攻击,具有不易被检测的安全特性,但是非法用户可以通过盲检测等手段以比较高的准确度提取合法用户的扩频码和发送信号。有鉴于此,针对CDMA系统开发的安全技术手段显得越发的重要。With the continuous development of wireless communication technologies, the usage rate of wireless communication systems is also increasing. Among them, CDMA (CodeDivision Multiple Access) system is one of the more commonly used systems in wireless communication systems. In a CDMA system, each legal user separately shares a unique spreading code with the base station and communicates with the base station through a spreading code. In the downlink of the CDMA system, the spreading codes are orthogonal or nearly orthogonal to each other, thereby It can be guaranteed that the transmitted signals of multiple legitimate users will not interfere with each other. Although the spread spectrum characteristic of CDMA ensures that the spread spectrum signal can resist the spectrum analysis attack and has the security feature that is difficult to be detected, the illegal user can extract the spread code of the legitimate user with relatively high accuracy through blind detection and the like. And send a signal. In view of this, the security technology developed for CDMA systems is becoming more and more important.
目前,现有CDMA系统的安全技术手段主要是应用在通信系统的上层安全协议,依靠认证和加密算法对合法用户与基站之间发送的信息进行加密。然而,在无线通信环境中,现有的安全技术手段存在如下问题:如果通过对称加密算法实现对CDMA系统的安全保护,由于对称加密算法需要对密钥进行分发和管理,造成安全技术手段的实现复杂度较高;如果通过非对称加密算法实现对CDMA系统的安全保护,由于非对称加密算法计算复杂度较高,从而造成系统资源消耗较大。At present, the security technology of the existing CDMA system is mainly applied to the upper layer security protocol of the communication system, and the information sent between the legitimate user and the base station is encrypted by means of the authentication and encryption algorithm. However, in the wireless communication environment, the existing security technology has the following problems: if the security protection of the CDMA system is implemented by the symmetric encryption algorithm, since the symmetric encryption algorithm needs to distribute and manage the key, the security technology is realized. The complexity is higher; if the security protection of the CDMA system is realized by the asymmetric encryption algorithm, the computational complexity of the asymmetric encryption algorithm is high, resulting in large system resource consumption.
发明内容Summary of the invention
有鉴于此,本发明实施例提供一种CDMA系统的物理层安全配置方法及装置,主要目的是解决现有CDMA系统安全技术手段的实现复杂度较高,系统资源消耗较大的问题。In view of this, the embodiments of the present invention provide a physical layer security configuration method and device for a CDMA system, and the main purpose thereof is to solve the problem that the implementation security technology of the existing CDMA system has high complexity and large system resource consumption.
为达到上述目的,本发明提供如下技术方案:In order to achieve the above object, the present invention provides the following technical solutions:
一方面,本发明提供一种CDMA系统的物理层安全配置方法,包括: In one aspect, the present invention provides a physical layer security configuration method for a CDMA system, including:
获取合法用户的信道信息和非法用户的信道信息;Obtaining channel information of a legitimate user and channel information of an illegal user;
根据合法用户的信道信息和合法用户的干扰噪声自相关矩阵,获取合法用户对应的第一矩阵,并且根据非法用户的信道信息和非法用户的干扰噪声自相关矩阵,获取非法用户对应的第二矩阵;Acquiring the first matrix corresponding to the legal user according to the channel information of the legal user and the interference noise autocorrelation matrix of the legal user, and acquiring the second matrix corresponding to the illegal user according to the channel information of the illegal user and the interference noise autocorrelation matrix of the illegal user ;
根据所述第一矩阵和所述第二矩阵,通过预置迭代算法得到所述合法用户对应的扩频码组和发送功率。And obtaining, according to the first matrix and the second matrix, a spreading code group and a transmission power corresponding to the legal user by using a preset iterative algorithm.
另一方面,本发明提供一种CDMA系统的物理层安全配置装置,包括:In another aspect, the present invention provides a physical layer security configuration apparatus for a CDMA system, including:
获取单元,用于获取合法用户的信道信息和非法用户的信道信息;An acquiring unit, configured to obtain channel information of a legal user and channel information of an illegal user;
所述获取单元,还用于根据合法用户的信道信息和合法用户的干扰噪声自相关矩阵,获取合法用户对应的第一矩阵,并且根据非法用户的信道信息和非法用户的干扰噪声自相关矩阵,获取非法用户对应的第二矩阵;The acquiring unit is further configured to obtain a first matrix corresponding to the legal user according to the channel information of the legal user and the interference noise autocorrelation matrix of the legal user, and according to the channel information of the illegal user and the interference noise autocorrelation matrix of the illegal user, Obtaining a second matrix corresponding to the illegal user;
生成单元,用于根据所述第一矩阵和所述第二矩阵,通过预置迭代算法生成所述合法用户对应的扩频码组和发送功率。And a generating unit, configured to generate, according to the first matrix and the second matrix, a spreading code group and a sending power corresponding to the legal user by using a preset iterative algorithm.
借由上述技术方案,本发明实施例提供的技术方案至少具有下列优点:With the above technical solution, the technical solution provided by the embodiment of the present invention has at least the following advantages:
本发明实施例提供的一种CDMA系统的物理层安全配置方法及装置,当需要进行CDMA系统的物理层安全配置时,首先获取合法用户的信道信息和非法用户的信道信息,然后根据合法用户的信道信息和合法用户的干扰噪声自相关矩阵,获取合法用户对应的第一矩阵,并且根据非法用户的信道信息和非法用户的干扰噪声自相关矩阵,获取非法用户对应的第二矩阵,最后根据所述第一矩阵和所述第二矩阵,通过预置迭代算法得到所述合法用户对应的扩频码组和发送功率。与目前现有CDMA系统的安全技术手段主要是应用在通信系统的上层安全协议,依靠认证和加密算法对合法用户与基站之间发送的信息进行加密相比,由于无线通信环境下信道的独一性和差异性,本发明利用基站在码域空间上的自由度,通过扩频码迭代方式,实现了CDMA系统的物理层安全保护方法,避免了现有CDMA系统安全技术手段的实现复杂度较高,系统资源消耗较大的问题。上述说明仅是本发明技术方案的概述,为了能够更清楚了解本发明的技术手段,而可依照说明书的内容予以实施,并且为了让本发明的上述和其它目的、特征和优点能够更明显易懂,以下特举本发明的具体实施方式。The physical layer security configuration method and device for the CDMA system provided by the embodiment of the present invention, when the physical layer security configuration of the CDMA system needs to be performed, firstly, the channel information of the legal user and the channel information of the illegal user are obtained, and then according to the legitimate user The channel information and the interference noise autocorrelation matrix of the legal user acquire the first matrix corresponding to the legal user, and obtain the second matrix corresponding to the illegal user according to the channel information of the illegal user and the interference noise autocorrelation matrix of the illegal user, and finally obtain the second matrix corresponding to the illegal user. The first matrix and the second matrix are obtained by using a preset iterative algorithm to obtain a spreading code group and a transmission power corresponding to the legal user. The security technology of the existing CDMA system is mainly applied to the upper layer security protocol of the communication system, and relies on the authentication and encryption algorithm to encrypt the information transmitted between the legitimate user and the base station, because the channel is unique in the wireless communication environment. Sexuality and difference, the present invention utilizes the degree of freedom of the base station in the code domain space, realizes the physical layer security protection method of the CDMA system through the iterative manner of the spreading code, and avoids the implementation complexity of the existing CDMA system security technology. High, the problem of large system resource consumption. The above description is only an overview of the technical solutions of the present invention, and the above-described and other objects, features and advantages of the present invention can be more clearly understood. Specific embodiments of the invention are set forth below.
附图说明 DRAWINGS
通过阅读下文优选实施方式的详细描述,各种其他的优点和益处对于本领域普通技术人员将变得清楚明了。附图仅用于示出优选实施方式的目的,而并不认为是对本发明的限制。而且在整个附图中,用相同的参考符号表示相同的部件。在附图中:Various other advantages and benefits will become apparent to those skilled in the art from a The drawings are only for the purpose of illustrating the preferred embodiments and are not to be construed as limiting. Throughout the drawings, the same reference numerals are used to refer to the same parts. In the drawing:
图1示出了本发明实施例提供的一种CDMA系统的物理层安全配置方法的流程图;1 is a flowchart of a physical layer security configuration method of a CDMA system according to an embodiment of the present invention;
图2示出了本发明实施例提供的CDMA系统原理示意图;FIG. 2 is a schematic diagram showing the principle of a CDMA system according to an embodiment of the present invention;
图3示出了本发明实施例提供的另一种CDMA系统的物理层安全配置方法的流程图;FIG. 3 is a flowchart of a physical layer security configuration method of another CDMA system according to an embodiment of the present invention;
图4示出了本发明实施例提供的一种CDMA系统的物理层安全配置装置的结构示意图;4 is a schematic structural diagram of a physical layer security configuration apparatus of a CDMA system according to an embodiment of the present invention;
图5示出了本发明实施例提供的另一种CDMA系统的物理层安全配置装置的结构示意图。FIG. 5 is a schematic structural diagram of another physical layer security configuration apparatus of a CDMA system according to an embodiment of the present invention.
具体实施方式detailed description
下面将参照附图更详细地描述本公开的示例性实施例。虽然附图中显示了本公开的示例性实施例,然而应当理解,可以以各种形式实现本公开而不应被这里阐述的实施例所限制。相反,提供这些实施例是为了能够更透彻地理解本公开,并且能够将本公开的范围完整的传达给本领域的技术人员。Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While the embodiments of the present invention have been shown in the drawings, the embodiments Rather, these embodiments are provided so that this disclosure will be more fully understood and the scope of the disclosure will be fully disclosed.
本发明实施例提供的一种CDMA系统的物理层安全配置方法,如图1所示,所述方法包括:A physical layer security configuration method for a CDMA system according to an embodiment of the present invention is shown in FIG. 1 , where the method includes:
101、获取合法用户的信道信息和非法用户的信道信息。101. Obtain channel information of a legal user and channel information of an illegal user.
其中,合法用户为应当与基站进行正常通信的用户,非法用户为恶意窃取合法用户与基站之间的发送信号和扩频码的用户。对于本发明实施例,CDMA系统的实现原理可以如图2所示,其中,方形块为基站,圆形块为合法用户,三角形块为非法用户。The legal user is a user who should perform normal communication with the base station, and the illegal user is a user who maliciously steals the transmission signal and the spreading code between the legal user and the base station. For the embodiment of the present invention, the implementation principle of the CDMA system can be as shown in FIG. 2, where the square block is a base station, the circular block is a legitimate user, and the triangular block is an illegal user.
102、根据合法用户的信道信息和合法用户的干扰噪声自相关矩阵,获取合法用户对应的第一矩阵,并且根据非法用户的信道信息和非法用户的干扰噪声自相关矩阵,获取非法用户对应的第二矩阵。102. Obtain a first matrix corresponding to a legal user according to the channel information of the legal user and the interference noise autocorrelation matrix of the legal user, and obtain the corresponding number of the illegal user according to the channel information of the illegal user and the interference noise autocorrelation matrix of the illegal user. Two matrix.
其中,第一矩阵和第二矩阵可以为Q矩阵。所述合法用户的干扰噪声自相 关矩阵的获取方法具体可以包括:通过公式
Figure PCTCN2016113062-appb-000001
获取,其中,ck代表来自环境中其他用户的干扰,nk是高斯白噪声,zk是多址干扰。同理,非法用户的干扰噪声自相关矩阵的获取方法与上述方法相近,在此不再赘述。
The first matrix and the second matrix may be Q matrices. The method for obtaining the interference noise self-correlation matrix of the legal user may specifically include: adopting a formula
Figure PCTCN2016113062-appb-000001
Acquired, where c k represents interference from other users in the environment, n k is Gaussian white noise, and z k is multiple access interference. Similarly, the method for obtaining the interference noise autocorrelation matrix of the illegal user is similar to the above method, and will not be described herein.
103、根据所述第一矩阵和所述第二矩阵,通过预置迭代算法得到所述合法用户对应的扩频码组和发送功率。103. Obtain, according to the first matrix and the second matrix, a spreading code group and a sending power corresponding to the legal user by using a preset iterative algorithm.
本发明实施例提供的一种CDMA系统的物理层安全配置方法,当需要进行CDMA系统的物理层安全配置时,首先获取合法用户的信道信息和非法用户的信道信息,然后根据合法用户的信道信息和合法用户的干扰噪声自相关矩阵,获取合法用户对应的第一矩阵,并且根据非法用户的信道信息和非法用户的干扰噪声自相关矩阵,获取非法用户对应的第二矩阵,最后根据所述第一矩阵和所述第二矩阵,通过预置迭代算法得到所述合法用户对应的扩频码组和发送功率。与目前现有CDMA系统的安全技术手段主要是应用在通信系统的上层安全协议,依靠认证和加密算法对合法用户与基站之间发送的信息进行加密相比,由于无线通信环境下信道的独一性和差异性,本发明利用基站在码域空间上的自由度,通过扩频码迭代方式,实现了CDMA系统的物理层安全保护方法,避免了现有CDMA系统安全技术手段的实现复杂度较高,系统资源消耗较大的问题。The physical layer security configuration method of the CDMA system provided by the embodiment of the present invention, when the physical layer security configuration of the CDMA system needs to be performed, firstly, the channel information of the legal user and the channel information of the illegal user are obtained, and then the channel information of the legal user is obtained. And the interference noise autocorrelation matrix of the legal user acquires the first matrix corresponding to the legal user, and obtains the second matrix corresponding to the illegal user according to the channel information of the illegal user and the interference noise autocorrelation matrix of the illegal user, and finally according to the A matrix and the second matrix obtain a spreading code group and a transmission power corresponding to the legal user by using a preset iterative algorithm. The security technology of the existing CDMA system is mainly applied to the upper layer security protocol of the communication system, and relies on the authentication and encryption algorithm to encrypt the information transmitted between the legitimate user and the base station, because the channel is unique in the wireless communication environment. Sexuality and difference, the present invention utilizes the degree of freedom of the base station in the code domain space, realizes the physical layer security protection method of the CDMA system through the iterative manner of the spreading code, and avoids the implementation complexity of the existing CDMA system security technology. High, the problem of large system resource consumption.
进一步地,本发明实施例提供另一种CDMA系统的物理层安全配置方法,如图3所示,所述方法包括:Further, the embodiment of the present invention provides another physical layer security configuration method for a CDMA system. As shown in FIG. 3, the method includes:
201、获取合法用户的信道信息和非法用户的信道信息。201. Obtain channel information of a legal user and channel information of an illegal user.
对于本发明实施例,步骤201具体可以包括:根据预置训练信号,获取合法用户的信道信息和非法用户的信道信息。具体地,合法用户通过发送与基站预先约定的训练导频信号,然后合法用户在已知接收信号和发送信号的情况下对信道信息进行估计,得到合法用户的信道信息。For the embodiment of the present invention, the step 201 may include: acquiring channel information of the legal user and channel information of the illegal user according to the preset training signal. Specifically, the legal user sends the channel information of the legal user by sending a training pilot signal that is pre-agreed with the base station, and then the legitimate user estimates the channel information when the received signal and the transmitted signal are known.
在本实施例中,预设合法用户和基站之间的无线信道服从常见的瑞利多经衰落分布,此时,对于第k个合法用户而言,估计得到的信道信息的参数向量为:hk=[hk,1,hk,2,...,hk,M],k=1,2,…,K,其中,系统中合法用户数目为K。进一步地,在可以获知非法用户的的位置的情况下,非法用户信道信息的 参数向量为he=[he,1,he,2,...,he,M]。In this embodiment, the preset wireless channel between the legal user and the base station obeys the common Rayleigh multi-fading distribution. At this time, for the kth legitimate user, the estimated parameter vector of the channel information is: h k =[h k,1 ,h k,2 ,...,h k,M ],k=1,2,...,K, where the number of legitimate users in the system is K. Further, in the case where the location of the illegal user can be known, the parameter vector of the illegal user channel information is h e =[h e,1 ,h e,2 ,...,h e,M ].
为了进一步展示本发明实施例的实现原理,首先简要给出本发明实施例依据的系统模型,在该系统模型中,发送信号可以表示为:
Figure PCTCN2016113062-appb-000002
其中,Ei表示第i个用户发送信号的比特能量,而bi(n)∈{±1}表示第i个用户的发送的第n个比特信号,
Figure PCTCN2016113062-appb-000003
表示第i个用户的扩频波形,
Figure PCTCN2016113062-appb-000004
l=0,1,...,L-1为需要设计的数字化波形,ψ(t)是周期为Tc=T/L的发送波形脉冲形成器,例如理想方波、升余弦等。然后在经过载波解调、ψ(·)脉冲匹配滤波和长度为LM=L+M-1的多径扩展数据采样后,第k个合法用户的接收信号
Figure PCTCN2016113062-appb-000005
可以表示为:
Figure PCTCN2016113062-appb-000006
其中,Hk是发送端与第k个合法用户的多径信道矩阵,ck代表来自环境中其他用户的干扰,nk是高斯白噪声,zk表示多址干扰。
In order to further demonstrate the implementation principle of the embodiment of the present invention, a system model according to an embodiment of the present invention is first briefly given. In the system model, the transmitted signal can be expressed as:
Figure PCTCN2016113062-appb-000002
Where E i represents the bit energy of the ith user transmitted signal, and b i (n) ∈ {±1} represents the transmitted nth bit signal of the ith user,
Figure PCTCN2016113062-appb-000003
Indicates the spread spectrum waveform of the ith user,
Figure PCTCN2016113062-appb-000004
l = 0, 1, ..., L-1 is a digitized waveform to be designed, and ψ(t) is a transmission waveform pulse former with a period of T c = T/L, such as an ideal square wave, a raised cosine, and the like. Then, after carrier demodulation, ψ(·) pulse matching filtering, and multipath extended data sampling of length L M =L+M-1, the received signal of the kth legitimate user
Figure PCTCN2016113062-appb-000005
It can be expressed as:
Figure PCTCN2016113062-appb-000006
Where H k is the multipath channel matrix of the sender and the kth legitimate user, c k represents interference from other users in the environment, n k is Gaussian white noise, and z k represents multiple access interference.
进一步地,预设合法用户的信息比特检测采用线性最大信干噪比滤波为:
Figure PCTCN2016113062-appb-000007
其中,
Figure PCTCN2016113062-appb-000008
表示最大信干噪比滤波,Rk为干扰和噪音的自相关矩阵。此时,对于第k个用户,使用最大SINR滤波后的输出信号的SINR为
Further, the information bit detection of the preset legal user is filtered by using a linear maximum signal to interference and noise ratio as:
Figure PCTCN2016113062-appb-000007
among them,
Figure PCTCN2016113062-appb-000008
Indicates the maximum signal to noise ratio filtering, and R k is the autocorrelation matrix of interference and noise. At this time, for the kth user, the SINR of the output signal filtered using the maximum SINR is
Figure PCTCN2016113062-appb-000009
由于无线信道的广播特性,非法用户也可以上述接收信号,进而同样可以采用最大SINR滤 波来窃取秘密信息。对于非法用户,输出最大的SINR为
Figure PCTCN2016113062-appb-000009
Due to the broadcast characteristics of the wireless channel, illegal users can also receive signals as described above, and the maximum SINR filtering can also be used to steal secret information. For illegal users, the maximum SINR of the output is
Figure PCTCN2016113062-appb-000010
Figure PCTCN2016113062-appb-000010
进一步地,为了使得合法用户在满足一定服务质量QoS要求的情况下最大可能地恶化非法用户的通信信道。为此,可以将上述问题数学化表示为如下的目标方程:Further, in order to enable a legitimate user to deteriorate the communication channel of the illegal user to the greatest extent possible while satisfying certain quality of service QoS requirements. To this end, the above problem can be mathematically expressed as the following objective equation:
Figure PCTCN2016113062-appb-000011
Figure PCTCN2016113062-appb-000011
其中,γk表示合法用户信道的服务质量QoS要求,Emax表示每个合法用户的的最大可分配能量。Where γ k represents the quality of service QoS requirement of the legitimate user channel, and E max represents the maximum distributable energy of each legitimate user.
基于上述模型,通过后续步骤,利用预置瑞利商量化算法对扩频码进行迭代优化,从而使得上述阐述的目标方程达到最优化的同时,避免了多址干扰的问题,从而实现了CDMA系统的物理层安全保护方法,特别地,本发明实施例中采用的迭代扩频码组算法具有快速收敛,计算复杂度低的优点,从而保证了物理层安全保护方法的可实施性。Based on the above model, through the subsequent steps, the preset Rayleigh quotient quantization algorithm is used to iteratively optimize the spreading code, so that the above-mentioned target equation is optimized and the problem of multiple access interference is avoided, thereby realizing the CDMA system. The physical layer security protection method, in particular, the iterative spreading code group algorithm used in the embodiment of the present invention has the advantages of fast convergence and low computational complexity, thereby ensuring the implementability of the physical layer security protection method.
202、根据合法用户的信道信息和合法用户的干扰噪声自相关矩阵,获取合法用户对应的第一矩阵,并且根据非法用户的信道信息和非法用户的干扰噪声自相关矩阵,获取非法用户对应的第二矩阵。202. Obtain a first matrix corresponding to the legal user according to the channel information of the legal user and the interference noise autocorrelation matrix of the legal user, and obtain the corresponding number of the illegal user according to the channel information of the illegal user and the interference noise autocorrelation matrix of the illegal user. Two matrix.
对于本发明实施例,步骤202具体可以包括:根据公式
Figure PCTCN2016113062-appb-000012
获取合法用户对应的第一矩阵,其中,Qk为合法用户对应的第一矩阵,Hk为合法用户的信道信息,Rk为合法用户的干扰噪声自相关矩阵,然后根据公式
Figure PCTCN2016113062-appb-000013
获取非法用户对应的第二矩阵,其中,Qek为非法用户对应的第二矩阵,He为非法用户的信道信息,Rek为非法用户的干扰噪声自相关矩阵。
For the embodiment of the present invention, step 202 may specifically include: according to a formula
Figure PCTCN2016113062-appb-000012
Obtaining a first matrix corresponding to the legal user, where Q k is a first matrix corresponding to the legal user, H k is channel information of the legal user, and R k is an interference noise autocorrelation matrix of the legal user, and then according to the formula
Figure PCTCN2016113062-appb-000013
Obtaining a second matrix corresponding to the illegal user, wherein, Q ek second matrix corresponding to the illegal user, H e is the channel information of unauthorized users, R ek illegal user interference noise autocorrelation matrix.
203、判断当前迭代次数是否小于或等于预设阈值,并且判断当前通过预置迭代算法得到的所述合法用户对应的扩频码组和发送功率是否符合所述预置迭代算法对应的收敛条件。203. Determine whether the current number of iterations is less than or equal to a preset threshold, and determine whether the current spreading code group and the sending power corresponding to the legal user obtained by the preset iterative algorithm meet the convergence condition corresponding to the preset iterative algorithm.
其中,所述预置迭代算法对应的收敛条件为连续两次迭代得到的扩频码和发送功率能量几乎保持不变,即||Sj-Sj+1||=0以及||ej-ej+1||≤ε,其中,ε可以取为10-5。对于本发明实施例,步骤203之前还可以包括:初始化合法用户的扩频码S0=0,发送功率e0=0。The convergence condition corresponding to the preset iterative algorithm is that the spreading code and the transmission power energy obtained by two consecutive iterations remain almost unchanged, that is, ||S j -S j+1 ||=0 and ||e j -e j+1 || ε, where ε can be taken as 10 -5 . For the embodiment of the present invention, before step 203, the method further includes: initializing a spreading code S 0 =0 of the legal user, and transmitting power e 0 =0.
204a、若当前通过预置迭代算法得到的所述合法用户对应的扩频码组和发送功率符合所述预置迭代算法对应的收敛条件,则输出所述扩频码组和发送功率。204a. If the spreading code group corresponding to the legal user obtained by the preset iterative algorithm and the sending power meet the convergence condition corresponding to the preset iterative algorithm, output the spreading code group and the sending power.
与步骤204a并列的步骤204b、若当前通过预置迭代算法得到的所述合法用户对应的扩频码组和发送功率不符合所述预置迭代算法对应的收敛条件并且当前迭代次数是否小于或等于预设阈值,则根据所述第一矩阵和所述第二矩阵,通过预置瑞利商量化算法获取所述合法用户对应的扩频码组和发送功率。 Step 204b, which is parallel to step 204a, if the spreading code group and the transmission power corresponding to the legal user currently obtained by the preset iterative algorithm do not meet the convergence condition corresponding to the preset iterative algorithm and whether the current number of iterations is less than or equal to The preset threshold is obtained, according to the first matrix and the second matrix, obtaining a spreading code group and a transmission power corresponding to the legal user by using a preset Rayleigh quotient quantization algorithm.
对于本发明实施例,通过预置瑞利商量化算法获取所述合法用户对应的扩频码组和发送功率,可以保证合法用户的信干躁比大于一定的服务质量QoS要求的同时,最大限度降低非法用户的信干躁比,从而达到防止非法用户窃取信号的目的,实现了CDMA系统的物理层安全,并且还可以避免多址干扰的问题。For the embodiment of the present invention, the preamble Rayleigh quotation algorithm is used to obtain the spreading code group and the sending power corresponding to the legal user, so as to ensure that the legal user's signal to interference ratio is greater than a certain quality of service QoS requirement, and the maximum is The information of the illegal users is reduced, thereby preventing the illegal users from stealing signals, realizing the physical layer security of the CDMA system, and avoiding the problem of multiple access interference.
对于本发明实施例,步骤204b具体可以包括:若当前存在未获取扩频码组和发送功率的合法用户,则根据
Figure PCTCN2016113062-appb-000014
生成备选扩频码组集合Pj=[p1,p2,…,pk],其中,
Figure PCTCN2016113062-appb-000015
为第二矩阵,j为当前的迭代次数,然后根据公式
Figure PCTCN2016113062-appb-000016
更新第一矩阵,并且根据公式
Figure PCTCN2016113062-appb-000017
更新第二矩阵
Figure PCTCN2016113062-appb-000018
其中,
Figure PCTCN2016113062-appb-000019
为第一 矩阵,Hk是发送端与第k个合法用户的多径信道矩阵,He是非法用户的多径信道矩阵,Ei表示第i个用户发送信号的比特能量,
Figure PCTCN2016113062-appb-000020
表示第i个用户的扩频波形,ck代表来自环境中其他用户的干扰,nk是高斯白噪声;再从Pj中选择满足功率限制
Figure PCTCN2016113062-appb-000021
并且满足最小瑞利商
Figure PCTCN2016113062-appb-000022
值条件的扩频码和发送功率作为第k个合法用户的扩频码
Figure PCTCN2016113062-appb-000023
和发送功率,并且从备选集Pj中删除扩频码
Figure PCTCN2016113062-appb-000024
最后根据每一个合法用户的扩频码和发送功率得到合法用户的扩频码组和发送功率。
For the embodiment of the present invention, the step 204b may specifically include: if there is a legitimate user that does not acquire the spreading code group and the sending power,
Figure PCTCN2016113062-appb-000014
Generating an alternative set of spreading code groups P j =[p 1 ,p 2 ,...,p k ], wherein
Figure PCTCN2016113062-appb-000015
For the second matrix, j is the current number of iterations, and then according to the formula
Figure PCTCN2016113062-appb-000016
Update the first matrix and according to the formula
Figure PCTCN2016113062-appb-000017
Update the second matrix
Figure PCTCN2016113062-appb-000018
among them,
Figure PCTCN2016113062-appb-000019
For the first matrix, H k is the multipath channel matrix of the transmitting end and the kth legitimate user, H e is the multipath channel matrix of the illegal user, and E i represents the bit energy of the i th user transmitting signal,
Figure PCTCN2016113062-appb-000020
Represents the spread spectrum waveform of the ith user, c k represents interference from other users in the environment, n k is Gaussian white noise; and then selects power limit from P j
Figure PCTCN2016113062-appb-000021
And meet the minimum Rayleigh quotient
Figure PCTCN2016113062-appb-000022
The spreading code and transmission power of the value condition are used as the spreading code of the kth legal user.
Figure PCTCN2016113062-appb-000023
And transmit power, and remove the spreading code from the candidate set P j
Figure PCTCN2016113062-appb-000024
Finally, the spreading code group and the transmission power of the legal user are obtained according to the spreading code and the transmission power of each legal user.
需要说明的是,为了满足生成一组近似正交的扩频码,减小合法用户间的多址干扰,本发明实施例近似采用对Qe矩阵的特征向量进行分解的方法生成备选集合P。It should be noted that, in order to satisfy the generation of a set of approximately orthogonal spreading codes and reduce the multiple access interference between legitimate users, the embodiment of the present invention approximates the method of decomposing the feature vectors of the Q e matrix to generate an alternative set P. .
与步骤2034a和步骤2034b并列的步骤2034c、若当前迭代次数大于所述预设阈值并且不符合所述预置迭代算法对应的收敛条件,则重新配置合法用户的排列顺序。Step 2034c, which is parallel to step 2034a and step 2034b, if the current iteration number is greater than the preset threshold and does not meet the convergence condition corresponding to the preset iteration algorithm, reconfigure the order of the legitimate users.
需要说明的是,由于预置迭代算法的结果与合法用户的排列顺序,即执行获取扩频码的顺序有关,因此,在计算不收敛的情况下,可以随机重新置乱合法用户的排列顺序,即重新置乱扩频码的获取顺序,从而实现再次获取扩频码组,保证实现物理层安全配置。It should be noted that, because the result of the preset iterative algorithm is related to the order of the legitimate users, that is, the order in which the obtaining of the spreading code is performed, the order of the legitimate users can be randomly re-scrambled in the case where the calculation does not converge. That is, the acquisition order of the spreading code is re-scrambled, so that the spreading code group is obtained again to ensure the physical layer security configuration.
本发明实施例提供的另一种CDMA系统的物理层安全配置方法,当需要进行CDMA系统的物理层安全配置时,首先获取合法用户的信道信息和非法用户的信道信息,然后根据合法用户的信道信息和合法用户的干扰噪声自相关矩阵,获取合法用户对应的第一矩阵,并且根据非法用户的信道信息和非法用户的干扰噪声自相关矩阵,获取非法用户对应的第二矩阵,最后根据所述第一矩阵和所述第二矩阵,通过预置迭代算法得到所述合法用户对应的扩频码组和发送功率。与目前现有CDMA系统的安全技术手段主要是应用在通信系统的上层安全协议,依靠认证和加密算法对合法用户与基站之间发送的信息进行加密相比,由于无线通信环境下信道的独一性和差异性,本发明利用基站在码域空间上的自由度,通过扩频码迭代方式,实现了CDMA系统的物理层安全 保护方法,避免了现有CDMA系统安全技术手段的实现复杂度较高,系统资源消耗较大的问题。Another physical layer security configuration method of the CDMA system provided by the embodiment of the present invention, when the physical layer security configuration of the CDMA system needs to be performed, first acquires channel information of the legal user and channel information of the illegal user, and then according to the channel of the legal user. Acquiring the first matrix corresponding to the legal user by the interference noise autocorrelation matrix of the legal user, and acquiring the second matrix corresponding to the illegal user according to the channel information of the illegal user and the interference noise autocorrelation matrix of the illegal user, and finally according to the The first matrix and the second matrix obtain a spreading code group and a transmission power corresponding to the legal user by using a preset iterative algorithm. The security technology of the existing CDMA system is mainly applied to the upper layer security protocol of the communication system, and relies on the authentication and encryption algorithm to encrypt the information transmitted between the legitimate user and the base station, because the channel is unique in the wireless communication environment. Sexuality and difference, the present invention utilizes the degree of freedom of the base station in the code domain space, and realizes the physical layer security of the CDMA system through the iterative manner of the spreading code. The protection method avoids the problem that the implementation of the security technology of the existing CDMA system is high in complexity and the system resource consumption is large.
进一步地,作为图1所示方法的具体实现,本发明实施例提供一种CDMA系统的物理层安全配置装置,如图4所示,所述装置可以包括:获取单元31、生成单元32。Further, as a specific implementation of the method shown in FIG. 1, an embodiment of the present invention provides a physical layer security configuration apparatus for a CDMA system. As shown in FIG. 4, the apparatus may include: an obtaining unit 31 and a generating unit 32.
获取单元31,用于获取合法用户的信道信息和非法用户的信道信息;The obtaining unit 31 is configured to obtain channel information of a legal user and channel information of an illegal user.
所述获取单元31,还用于根据合法用户的信道信息和合法用户的干扰噪声自相关矩阵,获取合法用户对应的第一矩阵,并且根据非法用户的信道信息和非法用户的干扰噪声自相关矩阵,获取非法用户对应的第二矩阵;The obtaining unit 31 is further configured to obtain a first matrix corresponding to the legal user according to the channel information of the legal user and the interference noise autocorrelation matrix of the legal user, and according to the channel information of the illegal user and the interference noise autocorrelation matrix of the illegal user. Obtaining a second matrix corresponding to the illegal user;
生成单元32,用于根据所述第一矩阵和所述第二矩阵,通过预置迭代算法生成所述合法用户对应的扩频码组和发送功率。The generating unit 32 is configured to generate, according to the first matrix and the second matrix, a spreading code group and a transmission power corresponding to the legal user by using a preset iterative algorithm.
需要说明的是,该装置实施例与前述方法实施例对应,为便于阅读,本装置实施例不再对前述方法实施例中的细节内容进行逐一赘述,但应当明确,本实施例中的装置能够对应实现前述方法实施例中的全部内容。It should be noted that the device embodiment corresponds to the foregoing method embodiment. For ease of reading, the device embodiment does not describe the details in the foregoing method embodiments one by one, but it should be clear that the device in this embodiment can Corresponding to implementing all of the foregoing method embodiments.
本发明实施例提供的一种CDMA系统的物理层安全配置装置,当需要进行CDMA系统的物理层安全配置时,首先获取合法用户的信道信息和非法用户的信道信息,然后根据合法用户的信道信息和合法用户的干扰噪声自相关矩阵,获取合法用户对应的第一矩阵,并且根据非法用户的信道信息和非法用户的干扰噪声自相关矩阵,获取非法用户对应的第二矩阵,最后根据所述第一矩阵和所述第二矩阵,通过预置迭代算法得到所述合法用户对应的扩频码组和发送功率。与目前现有CDMA系统的安全技术手段主要是应用在通信系统的上层安全协议,依靠认证和加密算法对合法用户与基站之间发送的信息进行加密相比,由于无线通信环境下信道的独一性和差异性,本发明利用基站在码域空间上的自由度,通过扩频码迭代方式,实现了CDMA系统的物理层安全保护方法,避免了现有CDMA系统安全技术手段的实现复杂度较高,系统资源消耗较大的问题。The physical layer security configuration device of the CDMA system provided by the embodiment of the present invention firstly obtains the channel information of the legal user and the channel information of the illegal user when the physical layer security configuration of the CDMA system needs to be performed, and then according to the channel information of the legal user. And the interference noise autocorrelation matrix of the legal user acquires the first matrix corresponding to the legal user, and obtains the second matrix corresponding to the illegal user according to the channel information of the illegal user and the interference noise autocorrelation matrix of the illegal user, and finally according to the A matrix and the second matrix obtain a spreading code group and a transmission power corresponding to the legal user by using a preset iterative algorithm. The security technology of the existing CDMA system is mainly applied to the upper layer security protocol of the communication system, and relies on the authentication and encryption algorithm to encrypt the information transmitted between the legitimate user and the base station, because the channel is unique in the wireless communication environment. Sexuality and difference, the present invention utilizes the degree of freedom of the base station in the code domain space, realizes the physical layer security protection method of the CDMA system through the iterative manner of the spreading code, and avoids the implementation complexity of the existing CDMA system security technology. High, the problem of large system resource consumption.
进一步地,作为图3所示方法的具体实现,本发明实施例提供另一种CDMA系统的物理层安全配置装置,如图5所示,所述装置可以包括:获取单元41、生成单元42。 Further, as a specific implementation of the method shown in FIG. 3, an embodiment of the present invention provides another physical layer security configuration apparatus for a CDMA system. As shown in FIG. 5, the apparatus may include: an obtaining unit 41 and a generating unit 42.
获取单元41,用于获取合法用户的信道信息和非法用户的信道信息;The obtaining unit 41 is configured to obtain channel information of a legal user and channel information of an illegal user.
所述获取单元41,还用于根据合法用户的信道信息和合法用户的干扰噪声自相关矩阵,获取合法用户对应的第一矩阵,并且根据非法用户的信道信息和非法用户的干扰噪声自相关矩阵,获取非法用户对应的第二矩阵;The obtaining unit 41 is further configured to obtain a first matrix corresponding to the legal user according to the channel information of the legal user and the interference noise autocorrelation matrix of the legal user, and according to the channel information of the illegal user and the interference noise autocorrelation matrix of the illegal user. Obtaining a second matrix corresponding to the illegal user;
生成单元42,用于根据所述第一矩阵和所述第二矩阵,通过预置迭代算法生成所述合法用户对应的扩频码组和发送功率。The generating unit 42 is configured to generate, according to the first matrix and the second matrix, a spreading code group and a transmission power corresponding to the legal user by using a preset iterative algorithm.
进一步地,所述生成单元42包括:Further, the generating unit 42 includes:
判断模块4201,用于判断当前通过预置迭代算法得到的所述合法用户对应的扩频码组和发送功率是否符合所述预置迭代算法对应的收敛条件,所述收敛条件为连续两次迭代得到的扩频码之间的差值和发送功率能量之间的差值小于或等于预设阈值;The determining module 4201 is configured to determine whether the spreading code group and the sending power corresponding to the legal user obtained by the preset iterative algorithm meet the convergence condition corresponding to the preset iterative algorithm, and the convergence condition is two consecutive iterations. The difference between the obtained difference between the spreading codes and the transmission power energy is less than or equal to a preset threshold;
输出模块4202,用于若是,则输出所述扩频码组和发送功率;The output module 4202 is configured to: if yes, output the spreading code group and the sending power;
获取模块4203,用于若否,则根据所述第一矩阵和所述第二矩阵,通过预置瑞利商量化算法获取所述合法用户对应的扩频码组和发送功率。The obtaining module 4203 is configured to obtain, according to the first matrix and the second matrix, a spreading code group and a transmission power corresponding to the legal user by using a preset Rayleigh quotient quantization algorithm.
进一步地,所述获取模块4203,具体用于若当前存在未获取扩频码组和发送功率的合法用户,则根据
Figure PCTCN2016113062-appb-000025
生成备选扩频码组集合Pj=[p1,p2,…,pk],其中,
Figure PCTCN2016113062-appb-000026
为第二矩阵,j为当前的迭代次数;
Further, the acquiring module 4203 is specifically configured to: if there is a legitimate user that does not acquire the spreading code group and the sending power, according to the current
Figure PCTCN2016113062-appb-000025
Generating an alternative set of spreading code groups P j =[p 1 ,p 2 ,...,p k ], wherein
Figure PCTCN2016113062-appb-000026
For the second matrix, j is the current number of iterations;
根据公式
Figure PCTCN2016113062-appb-000027
更新第一矩阵,并且根据公式
Figure PCTCN2016113062-appb-000028
更新第二矩阵
Figure PCTCN2016113062-appb-000029
其中,
Figure PCTCN2016113062-appb-000030
为第一矩阵,Hk是发送端与第k个合法用户的多径信道矩阵,He是非法用户的多径信道矩阵,Ei表示第i个用户发送信号的比特能量,
Figure PCTCN2016113062-appb-000031
表示第i个用户的扩频波形,ck代表来自环境中其他用户的干扰,nk是高斯白噪声;
According to the formula
Figure PCTCN2016113062-appb-000027
Update the first matrix and according to the formula
Figure PCTCN2016113062-appb-000028
Update the second matrix
Figure PCTCN2016113062-appb-000029
among them,
Figure PCTCN2016113062-appb-000030
For the first matrix, H k is the multipath channel matrix of the transmitting end and the kth legitimate user, H e is the multipath channel matrix of the illegal user, and E i represents the bit energy of the ith user transmitting signal,
Figure PCTCN2016113062-appb-000031
Represents the spread spectrum waveform of the ith user, c k represents interference from other users in the environment, and n k is Gaussian white noise;
从Pj中选择满足功率限制
Figure PCTCN2016113062-appb-000032
并且满足最小瑞利商
Figure PCTCN2016113062-appb-000033
值条件的扩频码和发送功率作为第k个合法用户的扩频码
Figure PCTCN2016113062-appb-000034
和发送功率,并且从备选集Pj中删除扩频码
Figure PCTCN2016113062-appb-000035
Select from P j to meet the power limit
Figure PCTCN2016113062-appb-000032
And meet the minimum Rayleigh quotient
Figure PCTCN2016113062-appb-000033
The spreading code and transmission power of the value condition are used as the spreading code of the kth legal user.
Figure PCTCN2016113062-appb-000034
And transmit power, and remove the spreading code from the candidate set P j
Figure PCTCN2016113062-appb-000035
根据每一个合法用户的扩频码和发送功率得到合法用户的扩频码组和发送功率。The spreading code group and the transmission power of the legal user are obtained according to the spreading code and the transmission power of each legal user.
进一步地,所述判断模块4201,具体还用于判断当前迭代次数是否小于或等于预设阈值;Further, the determining module 4201 is further configured to determine whether the current number of iterations is less than or equal to a preset threshold;
若是,则判断当前通过预置迭代算法得到的所述合法用户对应的扩频码组和发送功率是否符合所述预置迭代算法对应的收敛条件。If yes, it is determined whether the current spreading code group and the transmission power corresponding to the legal user obtained by the preset iterative algorithm meet the convergence condition corresponding to the preset iterative algorithm.
进一步地,所述生成单元42还包括:Further, the generating unit 42 further includes:
配置模块4204,用于若当前迭代次数大于所述预设阈值并且不符合所述预置迭代算法对应的收敛条件,则重新配置合法用户的排列顺序。The configuration module 4204 is configured to reconfigure the order of the legitimate users if the current iteration number is greater than the preset threshold and does not meet the convergence condition corresponding to the preset iteration algorithm.
进一步地,所述获取单元41,具体用于根据公式
Figure PCTCN2016113062-appb-000036
获取合法用户对应的第一矩阵,其中,Qk为合法用户对应的第一矩阵,Hk为合法用户的信道信息,Rk为合法用户的干扰噪声自相关矩阵;
Further, the obtaining unit 41 is specifically configured according to a formula
Figure PCTCN2016113062-appb-000036
Obtaining a first matrix corresponding to the legitimate user, wherein the first matrix Q k corresponding to a legitimate user, the channel information H k is a legitimate user, R k is a legitimate user interference noise autocorrelation matrix;
所述获取单元41,具体还用于根据公式
Figure PCTCN2016113062-appb-000037
获取非法用户对应的第二矩阵,其中,Qek为非法用户对应的第二矩阵,He为非法用户的信道信息,Rek为非法用户的干扰噪声自相关矩阵。
The obtaining unit 41 is specifically used according to a formula
Figure PCTCN2016113062-appb-000037
Obtaining a second matrix corresponding to the illegal user, wherein, Q ek second matrix corresponding to the illegal user, H e is the channel information of unauthorized users, R ek illegal user interference noise autocorrelation matrix.
再进一步地,所述获取单元41,具体还用于根据预置训练信号,获取合法用户的信道信息和非法用户的信道信息。Further, the obtaining unit 41 is further configured to acquire channel information of the legal user and channel information of the illegal user according to the preset training signal.
需要说明的是,该装置实施例与前述方法实施例对应,为便于阅读,本装置实施例不再对前述方法实施例中的细节内容进行逐一赘述,但应当明确,本实施例中的装置能够对应实现前述方法实施例中的全部内容。It should be noted that the device embodiment corresponds to the foregoing method embodiment. For ease of reading, the device embodiment does not describe the details in the foregoing method embodiments one by one, but it should be clear that the device in this embodiment can Corresponding to implementing all of the foregoing method embodiments.
本发明实施例提供的另一种CDMA系统的物理层安全配置装置,当需要进行CDMA系统的物理层安全配置时,首先获取合法用户的信道信息和非法用户的信道信息,然后根据合法用户的信道信息和合法用户的干扰噪声自相关矩阵,获取合法用户对应的第一矩阵,并且根据非法用户的信道信息和非法用户的干扰噪声自相关矩阵,获取非法用户对应的第二矩阵,最后根据所述第一矩阵和所述第二矩阵,通过预置迭代算法得到所述合法用户对应的扩频码组和发送功率。 与目前现有CDMA系统的安全技术手段主要是应用在通信系统的上层安全协议,依靠认证和加密算法对合法用户与基站之间发送的信息进行加密相比,由于无线通信环境下信道的独一性和差异性,本发明利用基站在码域空间上的自由度,通过扩频码迭代方式,实现了CDMA系统的物理层安全保护方法,避免了现有CDMA系统安全技术手段的实现复杂度较高,系统资源消耗较大的问题。Another physical layer security configuration device of the CDMA system provided by the embodiment of the present invention, when the physical layer security configuration of the CDMA system needs to be performed, first acquires channel information of the legal user and channel information of the illegal user, and then according to the channel of the legal user. Acquiring the first matrix corresponding to the legal user by the interference noise autocorrelation matrix of the legal user, and acquiring the second matrix corresponding to the illegal user according to the channel information of the illegal user and the interference noise autocorrelation matrix of the illegal user, and finally according to the The first matrix and the second matrix obtain a spreading code group and a transmission power corresponding to the legal user by using a preset iterative algorithm. The security technology of the existing CDMA system is mainly applied to the upper layer security protocol of the communication system, and relies on the authentication and encryption algorithm to encrypt the information transmitted between the legitimate user and the base station, because the channel is unique in the wireless communication environment. Sexuality and difference, the present invention utilizes the degree of freedom of the base station in the code domain space, realizes the physical layer security protection method of the CDMA system through the iterative manner of the spreading code, and avoids the implementation complexity of the existing CDMA system security technology. High, the problem of large system resource consumption.
所述CDMA系统的物理层安全配置装置包括处理器和存储器,上述获取单元、生成单元等均作为程序单元存储在存储器中,由处理器执行存储在存储器中的上述程序单元来实现相应的功能。The physical layer security configuration device of the CDMA system includes a processor and a memory. The acquisition unit, the generation unit, and the like are all stored as a program unit in a memory, and the program unit stored in the memory is executed by the processor to implement a corresponding function.
处理器中包含内核,由内核去存储器中调取相应的程序单元。内核可以设置一个或以上,通过调整内核参数来解决现有干扰技术的局限性较高,实现难度较大的问题。The processor contains a kernel, and the kernel removes the corresponding program unit from the memory. The kernel can be set to one or more. By adjusting the kernel parameters, the limitations of the existing interference technology are higher and the difficulty is realized.
存储器可能包括计算机可读介质中的非永久性存储器,随机存取存储器(RAM)和/或非易失性内存等形式,如只读存储器(ROM)或闪存(flash RAM),存储器包括至少一个存储芯片。The memory may include non-persistent memory, random access memory (RAM), and/or non-volatile memory in a computer readable medium, such as read only memory (ROM) or flash memory (flash RAM), the memory including at least one Memory chip.
本申请还提供了一种计算机程序产品,当在数据处理设备上执行时,适于执行初始化有如下方法步骤的程序代码:获取合法用户的信道信息和非法用户的信道信息;根据合法用户的信道信息和合法用户的干扰噪声自相关矩阵,获取合法用户对应的第一矩阵,并且根据非法用户的信道信息和非法用户的干扰噪声自相关矩阵,获取非法用户对应的第二矩阵;根据所述第一矩阵和所述第二矩阵,通过预置迭代算法得到所述合法用户对应的扩频码组和发送功率。The present application also provides a computer program product, when executed on a data processing device, adapted to perform program code for initializing the following method steps: obtaining channel information of a legitimate user and channel information of an illegal user; The information and the interference noise autocorrelation matrix of the legal user acquire the first matrix corresponding to the legal user, and obtain the second matrix corresponding to the illegal user according to the channel information of the illegal user and the interference noise autocorrelation matrix of the illegal user; A matrix and the second matrix obtain a spreading code group and a transmission power corresponding to the legal user by using a preset iterative algorithm.
本领域内的技术人员应明白,本申请的实施例可提供为方法、系统、或计算机程序产品。因此,本申请可采用完全硬件实施例、完全软件实施例、或结合软件和硬件方面的实施例的形式。而且,本申请可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器、CD-ROM、光学存储器等)上实施的计算机程序产品的形式。Those skilled in the art will appreciate that embodiments of the present application can be provided as a method, system, or computer program product. Thus, the present application can take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment in combination of software and hardware. Moreover, the application can take the form of a computer program product embodied on one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) including computer usable program code.
本申请是参照根据本申请实施例的CDMA系统的物理层安全配置方法、装置、和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框 图中的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式处理机或其他可编程数据处理设备的处理器以产生一个机器,使得通过计算机或其他可编程数据处理设备的处理器执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。The present application is described with reference to flowchart illustrations and/or block diagrams of a physical layer security configuration method, apparatus, and computer program product of a CDMA system in accordance with an embodiment of the present application. It will be understood that each of the flows and/or blocks, and the flowcharts and/or A combination of processes and/or blocks in the figures. These computer program instructions can be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing device to produce a machine for the execution of instructions for execution by a processor of a computer or other programmable data processing device. Means for implementing the functions specified in one or more of the flow or in a block or blocks of the flow chart.
这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能。The computer program instructions can also be stored in a computer readable memory that can direct a computer or other programmable data processing device to operate in a particular manner, such that the instructions stored in the computer readable memory produce an article of manufacture comprising the instruction device. The apparatus implements the functions specified in one or more blocks of a flow or a flow and/or block diagram of the flowchart.
这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上,使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的步骤。These computer program instructions can also be loaded onto a computer or other programmable data processing device such that a series of operational steps are performed on a computer or other programmable device to produce computer-implemented processing for execution on a computer or other programmable device. The instructions provide steps for implementing the functions specified in one or more of the flow or in a block or blocks of a flow diagram.
在一个典型的配置中,计算设备包括一个或多个处理器(CPU)、输入/输出接口、网络接口和内存。In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
存储器可能包括计算机可读介质中的非永久性存储器,随机存取存储器(RAM)和/或非易失性内存等形式,如只读存储器(ROM)或闪存(flash RAM)。存储器是计算机可读介质的示例。The memory may include non-persistent memory, random access memory (RAM), and/or non-volatile memory in a computer readable medium, such as read only memory (ROM) or flash memory. Memory is an example of a computer readable medium.
计算机可读介质包括永久性和非永久性、可移动和非可移动媒体可以由任何方法或技术来实现信息存储。信息可以是计算机可读指令、数据结构、程序的模块或其他数据。计算机的存储介质的例子包括,但不限于相变内存(PRAM)、静态随机存取存储器(SRAM)、动态随机存取存储器(DRAM)、其他类型的随机存取存储器(RAM)、只读存储器(ROM)、电可擦除可编程只读存储器(EEPROM)、快闪记忆体或其他内存技术、只读光盘只读存储器(CD-ROM)、数字多功能光盘(DVD)或其他光学存储、磁盒式磁带,磁带磁磁盘存储或其他磁性存储设备或任何其他非传输介质,可用于存储可以被计算设备访问的信息。按照本文中的界定,计算机可读介质不包括暂存电脑可读媒体(transitory media),如调制的数据信号和载波。Computer readable media includes both permanent and non-persistent, removable and non-removable media. Information storage can be implemented by any method or technology. The information can be computer readable instructions, data structures, modules of programs, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other types of random access memory (RAM), read only memory. (ROM), electrically erasable programmable read only memory (EEPROM), flash memory or other memory technology, compact disk read only memory (CD-ROM), digital versatile disk (DVD) or other optical storage, Magnetic tape cartridges, magnetic tape storage or other magnetic storage devices or any other non-transportable media can be used to store information that can be accessed by a computing device. As defined herein, computer readable media does not include temporary storage of computer readable media, such as modulated data signals and carrier waves.
以上仅为本申请的实施例而已,并不用于限制本申请。对于本领域技术人 员来说,本申请可以有各种更改和变化。凡在本申请的精神和原理之内所作的任何修改、等同替换、改进等,均应包含在本申请的权利要求范围之内。 The above is only an embodiment of the present application and is not intended to limit the application. For those skilled in the art As such, there are various changes and variations to this application. Any modifications, equivalents, improvements, etc. made within the spirit and scope of the present application are intended to be included within the scope of the appended claims.

Claims (14)

  1. 一种CDMA系统的物理层安全配置方法,其特征在于,包括:A physical layer security configuration method for a CDMA system, comprising:
    获取合法用户的信道信息和非法用户的信道信息;Obtaining channel information of a legitimate user and channel information of an illegal user;
    根据合法用户的信道信息和合法用户的干扰噪声自相关矩阵,获取合法用户对应的第一矩阵,并且根据非法用户的信道信息和非法用户的干扰噪声自相关矩阵,获取非法用户对应的第二矩阵;Acquiring the first matrix corresponding to the legal user according to the channel information of the legal user and the interference noise autocorrelation matrix of the legal user, and acquiring the second matrix corresponding to the illegal user according to the channel information of the illegal user and the interference noise autocorrelation matrix of the illegal user ;
    根据所述第一矩阵和所述第二矩阵,通过预置迭代算法得到所述合法用户对应的扩频码组和发送功率。And obtaining, according to the first matrix and the second matrix, a spreading code group and a transmission power corresponding to the legal user by using a preset iterative algorithm.
  2. 根据权利要求1所述的CDMA系统的物理层安全配置方法,其特征在于,所述根据所述第一矩阵和所述第二矩阵,通过预置迭代算法生成所述合法用户对应的扩频码组和发送功率包括:The physical layer security configuration method of the CDMA system according to claim 1, wherein the generating, according to the first matrix and the second matrix, a spreading code corresponding to the legal user by using a preset iterative algorithm Group and transmit power include:
    判断当前通过预置迭代算法得到的所述合法用户对应的扩频码组和发送功率是否符合所述预置迭代算法对应的收敛条件,所述收敛条件为连续两次迭代得到的扩频码之间的差值和发送功率能量之间的差值小于或等于预设阈值;Determining whether the current spreading code group and the transmission power corresponding to the legal user obtained by the preset iterative algorithm meet the convergence condition corresponding to the preset iterative algorithm, and the convergence condition is a spreading code obtained by two consecutive iterations. The difference between the difference between the difference and the power of the transmission power is less than or equal to a preset threshold;
    若是,则输出所述扩频码组和发送功率;If yes, outputting the spreading code group and the transmission power;
    若否,则根据所述第一矩阵和所述第二矩阵,通过预置瑞利商量化算法获取所述合法用户对应的扩频码组和发送功率。If not, obtaining a spreading code group and a transmission power corresponding to the legal user by using a preset Rayleigh quotient algorithm according to the first matrix and the second matrix.
  3. 根据权利要求2所述的CDMA系统的物理层安全配置方法,其特征在于,所述根据所述第一矩阵和所述第二矩阵,通过预置瑞利商量化算法获取所述合法用户对应的扩频码组和发送功率包括:The physical layer security configuration method of the CDMA system according to claim 2, wherein the obtaining, by the preset Rayleigh quotient algorithm, the corresponding user according to the first matrix and the second matrix The spreading code group and transmission power include:
    若当前存在未获取扩频码组和发送功率的合法用户,则根据
    Figure PCTCN2016113062-appb-100001
    生成备选扩频码组集合Pj=[p1,p2,...,pk],其中,
    Figure PCTCN2016113062-appb-100002
    为第二矩阵,j为当前的迭代次数;
    If there is a legitimate user who does not acquire the spreading code group and the transmission power, then according to
    Figure PCTCN2016113062-appb-100001
    Generating an alternative set of spreading code groups P j =[p 1 ,p 2 ,...,p k ], wherein
    Figure PCTCN2016113062-appb-100002
    For the second matrix, j is the current number of iterations;
    根据公式
    Figure PCTCN2016113062-appb-100003
    更新第一矩阵,并且根据公式
    Figure PCTCN2016113062-appb-100004
    更新第二矩阵
    Figure PCTCN2016113062-appb-100005
    其中,
    Figure PCTCN2016113062-appb-100006
    为第一矩阵,Hk是发送端与第k个合法用户的多径信道矩阵,He是非法用户的多径信道矩阵,Ei表示第i个用户发送信号的比特能量,
    Figure PCTCN2016113062-appb-100007
    表示第i个用户的扩频波形,ck代表来自环境中其他用户的干扰,nk是高斯白噪声;
    According to the formula
    Figure PCTCN2016113062-appb-100003
    Update the first matrix and according to the formula
    Figure PCTCN2016113062-appb-100004
    Update the second matrix
    Figure PCTCN2016113062-appb-100005
    among them,
    Figure PCTCN2016113062-appb-100006
    For the first matrix, H k is the multipath channel matrix of the transmitting end and the kth legitimate user, H e is the multipath channel matrix of the illegal user, and E i represents the bit energy of the ith user transmitting signal,
    Figure PCTCN2016113062-appb-100007
    Represents the spread spectrum waveform of the ith user, c k represents interference from other users in the environment, and n k is Gaussian white noise;
    从Pj中选择满足功率限制
    Figure PCTCN2016113062-appb-100008
    并且满足最小瑞利商
    Figure PCTCN2016113062-appb-100009
    值条件的扩频码和发送功率作为第k个合法用户的扩频码
    Figure PCTCN2016113062-appb-100010
    和发送功率,并且从备选集Pj中删除扩频码
    Figure PCTCN2016113062-appb-100011
    Select from P j to meet the power limit
    Figure PCTCN2016113062-appb-100008
    And meet the minimum Rayleigh quotient
    Figure PCTCN2016113062-appb-100009
    The spreading code and transmission power of the value condition are used as the spreading code of the kth legal user.
    Figure PCTCN2016113062-appb-100010
    And transmit power, and remove the spreading code from the candidate set P j
    Figure PCTCN2016113062-appb-100011
    若当前不存在未获取扩频码组和发送功率的合法用户,则根据每一个合法用户的扩频码和发送功率得到合法用户的扩频码组和发送功率。If there is no legal user that does not obtain the spreading code group and the transmission power, the spreading code group and the transmission power of the legal user are obtained according to the spreading code and the transmission power of each legal user.
  4. 根据权利要求2所述的CDMA系统的物理层安全配置方法,其特征在于,所述判断当前通过预置迭代算法得到的所述合法用户对应的扩频码组和发送功率是否符合所述预置迭代算法对应的收敛条件之前,所述方法还包括:The physical layer security configuration method of the CDMA system according to claim 2, wherein the determining whether the spreading code group and the transmission power corresponding to the legal user obtained by the preset iterative algorithm meet the preset Before the convergence condition corresponding to the iterative algorithm, the method further includes:
    判断当前迭代次数是否小于或等于预设阈值;Determining whether the current number of iterations is less than or equal to a preset threshold;
    若是,则判断当前通过预置迭代算法得到的所述合法用户对应的扩频码组和发送功率是否符合所述预置迭代算法对应的收敛条件。If yes, it is determined whether the current spreading code group and the transmission power corresponding to the legal user obtained by the preset iterative algorithm meet the convergence condition corresponding to the preset iterative algorithm.
  5. 根据权利要求4所述的基于MIMO系统的干扰信号配置方法,其特征在于,所述方法还包括:The MIMO system-based interference signal configuration method according to claim 4, wherein the method further comprises:
    若当前迭代次数大于所述预设阈值并且不符合所述预置迭代算法对应的收敛条件,则重新配置合法用户的排列顺序。If the current number of iterations is greater than the preset threshold and does not meet the convergence condition corresponding to the preset iterative algorithm, reconfigure the order of the legitimate users.
  6. 根据权利要求1所述的CDMA系统的物理层安全配置方法,其特征在于,所述根据合法用户的信道信息和合法用户的干扰噪声自相关矩阵,获取合法用户对应的第一矩阵包括:The physical layer security configuration method of the CDMA system according to claim 1, wherein the obtaining the first matrix corresponding to the legal user according to the channel information of the legal user and the interference noise autocorrelation matrix of the legal user includes:
    根据公式
    Figure PCTCN2016113062-appb-100012
    获取合法用户对应的第一矩阵,其中,Qk为合法用户对应的第一矩阵,Hk为合法用户的信道信息,Rk为合法用户的干扰噪声自相关矩阵;
    According to the formula
    Figure PCTCN2016113062-appb-100012
    Obtaining a first matrix corresponding to the legal user, where Q k is a first matrix corresponding to the legal user, H k is channel information of the legal user, and R k is an interference noise autocorrelation matrix of the legal user;
    所述根据非法用户的信道信息和非法用户的干扰噪声自相关矩阵,获取非法用户对应的第二矩阵包括:The obtaining the second matrix corresponding to the illegal user according to the channel information of the illegal user and the interference noise autocorrelation matrix of the illegal user includes:
    根据公式
    Figure PCTCN2016113062-appb-100013
    获取非法用户对应的第二矩阵,其中,Qek为非法用 户对应的第二矩阵,He为非法用户的信道信息,Rek为非法用户的干扰噪声自相关矩阵。
    According to the formula
    Figure PCTCN2016113062-appb-100013
    Obtaining a second matrix corresponding to the illegal user, wherein, Q ek second matrix corresponding to the illegal user, H e is the channel information of unauthorized users, R ek illegal user interference noise autocorrelation matrix.
  7. 根据权利要求1所述的CDMA系统的物理层安全配置方法,其特征在于,所述获取合法用户的信道信息和非法用户的信道信息包括:The physical layer security configuration method of the CDMA system according to claim 1, wherein the acquiring the channel information of the legal user and the channel information of the illegal user comprises:
    根据预置训练信号,获取合法用户的信道信息和非法用户的信道信息。Obtaining channel information of the legal user and channel information of the illegal user according to the preset training signal.
  8. 一种CDMA系统的物理层安全配置装置,其特征在于,包括:A physical layer security configuration device for a CDMA system, comprising:
    获取单元,用于获取合法用户的信道信息和非法用户的信道信息;An acquiring unit, configured to obtain channel information of a legal user and channel information of an illegal user;
    所述获取单元,还用于根据合法用户的信道信息和合法用户的干扰噪声自相关矩阵,获取合法用户对应的第一矩阵,并且根据非法用户的信道信息和非法用户的干扰噪声自相关矩阵,获取非法用户对应的第二矩阵;The acquiring unit is further configured to obtain a first matrix corresponding to the legal user according to the channel information of the legal user and the interference noise autocorrelation matrix of the legal user, and according to the channel information of the illegal user and the interference noise autocorrelation matrix of the illegal user, Obtaining a second matrix corresponding to the illegal user;
    生成单元,用于根据所述第一矩阵和所述第二矩阵,通过预置迭代算法生成所述合法用户对应的扩频码组和发送功率。And a generating unit, configured to generate, according to the first matrix and the second matrix, a spreading code group and a sending power corresponding to the legal user by using a preset iterative algorithm.
  9. 根据权利要求8所述的CDMA系统的物理层安全配置装置,其特征在于,所述生成单元包括:The physical layer security configuration apparatus of the CDMA system according to claim 8, wherein the generating unit comprises:
    判断模块,用于判断当前通过预置迭代算法得到的所述合法用户对应的扩频码组和发送功率是否符合所述预置迭代算法对应的收敛条件,所述收敛条件为连续两次迭代得到的扩频码之间的差值和发送功率能量之间的差值小于或等于预设阈值;The determining module is configured to determine whether the spreading code group and the sending power corresponding to the legal user obtained by the preset iterative algorithm meet the convergence condition corresponding to the preset iterative algorithm, and the convergence condition is obtained by two consecutive iterations. The difference between the difference between the spreading codes and the transmit power energy is less than or equal to a preset threshold;
    输出模块,用于若是,则输出所述扩频码组和发送功率;An output module, if yes, outputting the spreading code group and transmission power;
    获取模块,用于若否,则根据所述第一矩阵和所述第二矩阵,通过预置瑞利商量化算法获取所述合法用户对应的扩频码组和发送功率。And an acquiring module, configured to obtain, according to the first matrix and the second matrix, a spreading code group and a sending power corresponding to the legal user by using a preset Rayleigh quotient quantization algorithm.
  10. 根据权利要求9所述的CDMA系统的物理层安全配置装置,其特征在于,A physical layer security configuration apparatus for a CDMA system according to claim 9, wherein
    所述获取模块,具体用于若当前存在未获取扩频码组和发送功率的合法用户,则根据
    Figure PCTCN2016113062-appb-100014
    生成备选扩频码组集合Pj=[p1,p2,...,pk],其中,
    Figure PCTCN2016113062-appb-100015
    为第二矩阵,j为当前的迭代次数;
    The acquiring module is specifically configured to: if there is a legitimate user that does not acquire the spreading code group and the sending power, according to the current
    Figure PCTCN2016113062-appb-100014
    Generating an alternative set of spreading code groups P j =[p 1 ,p 2 ,...,p k ], wherein
    Figure PCTCN2016113062-appb-100015
    For the second matrix, j is the current number of iterations;
    根据公式
    Figure PCTCN2016113062-appb-100016
    更新第一矩阵,并且根 据公式
    Figure PCTCN2016113062-appb-100017
    更新第二矩阵
    Figure PCTCN2016113062-appb-100018
    其中,
    Figure PCTCN2016113062-appb-100019
    为第一矩阵,Hk是发送端与第k个合法用户的多径信道矩阵,He是非法用户的多径信道矩阵,Ei表示第i个用户发送信号的比特能量,
    Figure PCTCN2016113062-appb-100020
    表示第i个用户的扩频波形,ck代表来自环境中其他用户的干扰,nk是高斯白噪声;
    According to the formula
    Figure PCTCN2016113062-appb-100016
    Update the first matrix and according to the formula
    Figure PCTCN2016113062-appb-100017
    Update the second matrix
    Figure PCTCN2016113062-appb-100018
    among them,
    Figure PCTCN2016113062-appb-100019
    For the first matrix, H k is the multipath channel matrix of the transmitting end and the kth legitimate user, H e is the multipath channel matrix of the illegal user, and E i represents the bit energy of the ith user transmitting signal,
    Figure PCTCN2016113062-appb-100020
    Represents the spread spectrum waveform of the ith user, c k represents interference from other users in the environment, and n k is Gaussian white noise;
    从Pj中选择满足功率限制
    Figure PCTCN2016113062-appb-100021
    并且满足最小瑞利商
    Figure PCTCN2016113062-appb-100022
    值条件的扩频码和发送功率作为第k个合法用户的扩频码
    Figure PCTCN2016113062-appb-100023
    和发送功率,并且从备选集Pj中删除扩频码
    Figure PCTCN2016113062-appb-100024
    Select from P j to meet the power limit
    Figure PCTCN2016113062-appb-100021
    And meet the minimum Rayleigh quotient
    Figure PCTCN2016113062-appb-100022
    The spreading code and transmission power of the value condition are used as the spreading code of the kth legal user.
    Figure PCTCN2016113062-appb-100023
    And transmit power, and remove the spreading code from the candidate set P j
    Figure PCTCN2016113062-appb-100024
    若当前不存在未获取扩频码组和发送功率的合法用户,则根据每一个合法用户的扩频码和发送功率得到合法用户的扩频码组和发送功率。If there is no legal user that does not obtain the spreading code group and the transmission power, the spreading code group and the transmission power of the legal user are obtained according to the spreading code and the transmission power of each legal user.
  11. 根据权利要求9所述的CDMA系统的物理层安全配置装置,其特征在于,A physical layer security configuration apparatus for a CDMA system according to claim 9, wherein
    所述判断模块,具体还用于判断当前迭代次数是否小于或等于预设阈值;The determining module is further configured to determine whether the current number of iterations is less than or equal to a preset threshold;
    若是,则判断当前通过预置迭代算法得到的所述合法用户对应的扩频码组和发送功率是否符合所述预置迭代算法对应的收敛条件。If yes, it is determined whether the current spreading code group and the transmission power corresponding to the legal user obtained by the preset iterative algorithm meet the convergence condition corresponding to the preset iterative algorithm.
  12. 根据权利要求11所述的CDMA系统的物理层安全配置装置,其特征在于,所述生成单元还包括:The apparatus for configuring a physical layer security of a CDMA system according to claim 11, wherein the generating unit further comprises:
    配置模块,用于若当前迭代次数大于所述预设阈值并且不符合所述预置迭代算法对应的收敛条件,则重新配置合法用户的排列顺序。And a configuration module, configured to reconfigure the order of the legal users if the current number of iterations is greater than the preset threshold and does not meet the convergence condition of the preset iteration algorithm.
  13. 根据权利要求8所述的CDMA系统的物理层安全配置装置,其特征在于,A physical layer security configuration apparatus for a CDMA system according to claim 8, wherein
    所述获取单元,具体用于根据公式
    Figure PCTCN2016113062-appb-100025
    获取合法用户对应的第一矩阵,其中,Qk为合法用户对应的第一矩阵,Hk为合法用户的信道信息,Rk为合法用户的干扰噪声自相关矩阵;
    The obtaining unit is specifically used according to a formula
    Figure PCTCN2016113062-appb-100025
    Obtaining a first matrix corresponding to the legitimate user, wherein the first matrix Q k corresponding to a legitimate user, the channel information H k is a legitimate user, R k is a legitimate user interference noise autocorrelation matrix;
    所述获取单元,具体还用于根据公式
    Figure PCTCN2016113062-appb-100026
    获取非法用户对应的第二矩阵,其中,Qek为非法用户对应的第二矩阵,He为非法用户的信道信息,Rek为非法用户的干扰噪声自相关矩阵。
    The obtaining unit is specifically used according to a formula
    Figure PCTCN2016113062-appb-100026
    Obtaining a second matrix corresponding to the illegal user, wherein, Q ek second matrix corresponding to the illegal user, H e is the channel information of unauthorized users, R ek illegal user interference noise autocorrelation matrix.
  14. 根据权利要求8所述的CDMA系统的物理层安全配置装置,其特征在于,所述获取单元,具体还用于根据预置训练信号,获取合法用户的信道信息和非法用户的信道信息。 The physical layer security configuration device of the CDMA system according to claim 8, wherein the acquiring unit is further configured to acquire channel information of the legal user and channel information of the illegal user according to the preset training signal.
PCT/CN2016/113062 2016-12-29 2016-12-29 Cdma system physical layer security configuration method and device WO2018119890A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/CN2016/113062 WO2018119890A1 (en) 2016-12-29 2016-12-29 Cdma system physical layer security configuration method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2016/113062 WO2018119890A1 (en) 2016-12-29 2016-12-29 Cdma system physical layer security configuration method and device

Publications (1)

Publication Number Publication Date
WO2018119890A1 true WO2018119890A1 (en) 2018-07-05

Family

ID=62710151

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/113062 WO2018119890A1 (en) 2016-12-29 2016-12-29 Cdma system physical layer security configuration method and device

Country Status (1)

Country Link
WO (1) WO2018119890A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112533197A (en) * 2020-11-19 2021-03-19 哈尔滨工业大学 Artificial noise assisted physical layer security method based on interference management
CN114245401A (en) * 2021-11-17 2022-03-25 航天科工微电子系统研究院有限公司 Multi-channel communication decision method and system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102651676A (en) * 2011-02-24 2012-08-29 华为技术有限公司 Method and device for determining pre-coding matrix
WO2012114233A2 (en) * 2011-02-22 2012-08-30 Celeno Communications (Israel) Ltd. Phy-level wireless security
CN103199962A (en) * 2013-02-05 2013-07-10 上海交通大学 Signal processing method for safe capacity in Coordinated Multi-Point Transmission (CoMP) system
WO2016054910A1 (en) * 2014-10-11 2016-04-14 华为技术有限公司 Pre-coding method and base station

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2012114233A2 (en) * 2011-02-22 2012-08-30 Celeno Communications (Israel) Ltd. Phy-level wireless security
CN102651676A (en) * 2011-02-24 2012-08-29 华为技术有限公司 Method and device for determining pre-coding matrix
CN103199962A (en) * 2013-02-05 2013-07-10 上海交通大学 Signal processing method for safe capacity in Coordinated Multi-Point Transmission (CoMP) system
WO2016054910A1 (en) * 2014-10-11 2016-04-14 华为技术有限公司 Pre-coding method and base station

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
WANG, JIBING ET AL.: "Novel Multiuser Interference Canceling Scheme in TDD CDMA Systems", CHINESE JOURNAL OF ELECTRONICS, vol. 28, no. 7, 31 July 2000 (2000-07-31) *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112533197A (en) * 2020-11-19 2021-03-19 哈尔滨工业大学 Artificial noise assisted physical layer security method based on interference management
CN114245401A (en) * 2021-11-17 2022-03-25 航天科工微电子系统研究院有限公司 Multi-channel communication decision method and system
CN114245401B (en) * 2021-11-17 2023-12-05 航天科工微电子系统研究院有限公司 Multi-channel communication decision method and system

Similar Documents

Publication Publication Date Title
US10211975B2 (en) Managed secure computations on encrypted data
US10999000B2 (en) Apparatus and method for secure communication using artificial noise scheme
CN107370546B (en) Eavesdropping detection method, data sending method, device and system
CN105915520B (en) It can search for file storage, searching method and the storage system of encryption based on public key
Li et al. Achieving privacy preservation in WiFi fingerprint-based localization
Liu et al. Practical user authentication leveraging channel state information (CSI)
EP2924911B1 (en) Secure pattern matching using somewhat homomorphic encryption
US9774596B2 (en) Privacy-preserving biometric authentication
EP2924912B1 (en) Ciphertext processing device, ciphertext processing method, ciphertext processing program, and information processing device
US11582035B2 (en) Method of generating a secret key for data communication and key generator thereof
CN105553650B (en) Method and apparatus for generating secret key
Yu et al. Secrecy performance analysis of artificial-noise-aided spatial modulation in the presence of imperfect CSI
WO2018119890A1 (en) Cdma system physical layer security configuration method and device
Shen et al. Chip rate and pseudo‐noise sequence estimation for direct sequence spread spectrum signals
KR102041041B1 (en) Apparatus and method for secure communication using artificial noise scheme
WO2017067479A1 (en) Method and device for node location
Lu et al. Physical-layer authentication based on channel phase responses for multi-carriers transmission
CN115643105B (en) Federal learning method and device based on homomorphic encryption and depth gradient compression
Ni et al. PHY-aided secure communication via weighted fractional Fourier transform
WO2013147873A1 (en) Protecting context-sensitive data
KR102163222B1 (en) Apparatus and method for secure communication using artificial noise scheme under correlated main channels and wiretap channels
Nigam et al. Modified Bayesian algorithm‐based compressive sampling for wideband spectrum sensing in cognitive radio network using wavelet transform
Ramesh et al. Enhanced Authntication Mechanism in WLAN via MMBSPS
CN112291052A (en) Quantum noise encryption method and system based on QAM
Harel et al. Non-Bayesian estimation with partially quantized observations

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16925694

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 16925694

Country of ref document: EP

Kind code of ref document: A1