WO2019061514A1 - 安全的无线通信物理层斜率认证方法和装置 - Google Patents
安全的无线通信物理层斜率认证方法和装置 Download PDFInfo
- Publication number
- WO2019061514A1 WO2019061514A1 PCT/CN2017/105068 CN2017105068W WO2019061514A1 WO 2019061514 A1 WO2019061514 A1 WO 2019061514A1 CN 2017105068 W CN2017105068 W CN 2017105068W WO 2019061514 A1 WO2019061514 A1 WO 2019061514A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- signal
- power
- parameter adjustment
- threshold
- power parameter
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/10—Complex mathematical operations
- G06F17/18—Complex mathematical operations for evaluating statistical data, e.g. average values, frequency distributions, probability functions, regression analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
- H04W12/121—Wireless intrusion detection systems [WIDS]; Wireless intrusion prevention systems [WIPS]
- H04W12/122—Counter-measures against attacks; Protection against rogue devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W52/00—Power management, e.g. TPC [Transmission Power Control], power saving or power classes
- H04W52/04—TPC
- H04W52/18—TPC being performed according to specific parameters
- H04W52/28—TPC being performed according to specific parameters using user profile, e.g. mobile speed, priority or network state, e.g. standby, idle or non transmission
- H04W52/281—TPC being performed according to specific parameters using user profile, e.g. mobile speed, priority or network state, e.g. standby, idle or non transmission taking into account user or data type priority
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W52/00—Power management, e.g. TPC [Transmission Power Control], power saving or power classes
- H04W52/04—TPC
- H04W52/30—TPC using constraints in the total amount of available transmission power
- H04W52/36—TPC using constraints in the total amount of available transmission power with a discrete range or set of values, e.g. step size, ramping or offsets
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B1/00—Details of transmission systems, not covered by a single one of groups H04B3/00 - H04B13/00; Details of transmission systems not characterised by the medium used for transmission
- H04B1/02—Transmitters
- H04B1/04—Circuits
- H04B2001/0408—Circuits with power amplifiers
- H04B2001/0416—Circuits with power amplifiers having gain or transmission power control
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W52/00—Power management, e.g. TPC [Transmission Power Control], power saving or power classes
- H04W52/04—TPC
- H04W52/38—TPC being performed in particular situations
- H04W52/50—TPC being performed in particular situations at the moment of starting communication in a multiple access environment
Definitions
- the present invention relates to the field of communications technologies, and in particular, to a secure wireless communication physical layer slope authentication method and apparatus.
- the first authentication technology is the Spread Spectrum Authentication method (Auth-SS).
- Auth-SS Spread Spectrum Authentication method
- the basic idea is to use traditional direct sequence spread spectrum or frequency hopping technology.
- the second is based on the Auth-TDM.
- the basic idea is that the transmitting device periodically sends information signals and tag information alternately.
- the receiving device directly extracts the expected information after receiving the signal.
- Tag information for the purpose of signal authentication.
- the third authentication technology is the Authentication with Superimposed Tag (Auth-SUP).
- Auth-SUP Authentication with Superimposed Tag
- the basic idea is to use the key to superimpose the tag information on the information signal, and then the transmitter device simultaneously transmits the signal, and the receiving device receives the signal. Then, the tag information in the superimposed signal is extracted by using the key to achieve the purpose of signal authentication.
- Auth-TDM Auth-SS
- Auth-SUP Auth-SUP
- Auth-SS and Auth-TDM technologies are compared to the rule that does not contain authentication information.
- Signals can easily attract the attention of other users in the scene, especially hostile users. Once the hostile user discovers that the communication system will attempt to communicate and authenticate, it will attack.
- Common attack models include interference attacks, replay attacks, and fake attacks. The security of the transmission is compromised.
- the embodiment of the invention discloses a secure wireless communication physical layer slope authentication method and device, which can improve the security of information transmission.
- a first aspect of the embodiments of the present invention discloses a secure wireless communication physical layer slope authentication method. Applied to a transmitting device, the method includes:
- the signal to be transmitted after the power is adjusted is transmitted.
- determining, according to the threshold of the doubt degree, determining a power parameter adjustment factor of each of the packets includes:
- the method further includes:
- the degree of doubt threshold is determined based on a condition that the power modified location information is not obtained.
- a second aspect of the embodiments of the present invention discloses a secure wireless communication physical layer slope authentication method, which is applied to a receiving end device, and the method includes:
- the signals are grouped according to a pre-agreed key and the power of each packet is calculated;
- test statistic is greater than or equal to a preset statistic threshold, determining that the signal is a tag signal, wherein the tag signal is an authentication signal received by the receiving device.
- the method further includes:
- the conventional signal is a non-authentication signal received by the receiving end device.
- a third aspect of the embodiments of the present invention discloses a secure wireless communication physical layer slope authentication apparatus, which is implemented on a transmitting end device, and includes:
- a dividing unit configured to divide the signal to be transmitted into a plurality of packets by using a pre-agreed key
- the obtaining unit is configured to obtain a preset threshold of doubt degree
- a determining unit configured to determine a power parameter adjustment factor of each of the packets according to the doubt threshold
- an adjusting unit configured to perform power adjustment on the signal of the packet according to a power parameter adjustment factor of the packet for each of the packets
- a sending unit configured to send the to-be-transmitted signal after adjusting the power.
- the determining, by the determining unit, the power parameter adjustment factor of each of the packets according to the doubt threshold is specifically:
- the determining unit is further configured to determine the suspect degree threshold according to a condition that the power modified location information is not obtained.
- a fourth aspect of the embodiments of the present invention discloses a secure wireless communication physical layer slope authentication apparatus, which is configured to operate on a receiving end device, and includes:
- a receiving unit configured to receive a signal sent by the transmitting device
- a packet calculation unit configured to group the signals according to a pre-agreed key, and calculate a power of each packet
- a first determining unit configured to determine a test statistic according to the power of each of the packets
- a determining unit configured to determine whether the test statistic is greater than or equal to a preset statistic threshold
- a second determining unit configured to: when the determining unit determines that the check statistic is greater than or equal to a preset statistic threshold, determine that the signal is a tag signal, where the tag signal is the The authentication signal received by the receiving device.
- the second determining unit is further configured to: when the determining unit determines that the check statistic is less than the statistic threshold, determine The signal is a conventional signal, wherein the conventional signal is a non-authentication signal received by the receiving device.
- the embodiment of the invention has the following beneficial effects:
- the transmitting end device may divide the to-be-transmitted signal into multiple packets by using a pre-agreed key, and obtain a preset suspect degree threshold; and determine a power parameter of each of the packets according to the doubt threshold. Adjusting a factor; for each of the packets, performing power adjustment on the signal of the packet according to a power parameter adjustment factor of the packet; and transmitting a signal to be transmitted after adjusting power. It can be seen that, in the embodiment of the present invention, before transmitting the to-be-sent signal, the transmitting device uses the key agreed by the two parties to group the transmitted signals, and uses the determined power parameter adjustment factor to allocate and adjust the power of each group of signals.
- the receiving device can also use the key agreed by the two parties to identify whether the received signal satisfies the power allocation feature of the signal transmitted by the transmitting device to achieve the purpose of information authentication. During the entire information transmission, the hostile user does not obtain power.
- the modified location information can improve the security of information transmission.
- FIG. 1 is a schematic diagram of a model of a communication system according to an embodiment of the present invention.
- FIG. 2 is a schematic flowchart of a wireless communication method according to an embodiment of the present invention.
- FIG. 3 is a schematic diagram of a power allocation mechanism of a signal according to an embodiment of the present invention.
- FIG. 4 is a schematic flowchart diagram of another wireless communication method according to an embodiment of the present invention.
- FIG. 5 is a schematic flowchart diagram of another wireless communication method according to an embodiment of the present disclosure.
- FIG. 6 is a schematic diagram showing a change curve of a doubt degree regarding a signal to noise ratio according to an embodiment of the present invention
- FIG. 7 is a schematic diagram showing a change curve of a doubt degree with respect to a power parameter adjustment factor according to an embodiment of the present invention.
- FIG. 8 is a schematic structural diagram of a wireless communication apparatus according to an embodiment of the present invention.
- FIG. 9 is a schematic structural diagram of another wireless communication apparatus according to an embodiment of the present invention.
- the embodiment of the invention discloses a secure wireless communication physical layer slope authentication method and device, which can improve the security of information transmission.
- the details are described below in conjunction with the drawings.
- FIG. 1 is a schematic diagram of a model of a communication system according to an embodiment of the present invention.
- the communication system may include a transmitting end device, a receiving end device, a listening device 1 and a listening device 2, wherein:
- the transmitting device is legal and is mainly used to transmit a label signal that needs to be authenticated.
- the signal to which the label is added is called a label signal, and the signal without the label is called a regular signal.
- the transmitting end device may include but is not limited to a base station and a user equipment.
- a base station e.g., an access point
- the base station can refer to a device in an access network that communicates with a wireless terminal over one or more sectors over an air interface.
- the base station can be used to convert the received air frame and IP packet into each other as a wireless terminal and access A router between the rest of the network, wherein the remainder of the access network may include an Internet Protocol (IP) network.
- IP Internet Protocol
- the base station can also coordinate attribute management of the air interface.
- the base station may be a base station (BTS, Base Transceiver Station) in GSM or CDMA, or may be a base station (NodeB) in WCDMA, or may be an evolved base station in LTE (NodeB or eNB or e-NodeB, evolutional Node B), the embodiment of the present invention is not limited.
- User equipment may include, but is not limited to, a smart phone, a notebook computer, a personal computer (PC), a personal digital assistant (PDA), a mobile internet device (MID), a wearable device (such as a smart watch).
- the operating system of the user device may include, but is not limited to, an Android operating system, an IOS operating system, a Symbian operating system, and a BlackBerry operating system.
- the Windows Phone 8 operating system and the like are not limited in the embodiment of the present invention.
- the receiving device is legal, mainly used to receive signals, and the signal is authenticated to determine whether the signal is a regular signal or a tag signal.
- the receiving end device may include but is not limited to a base station and a user equipment.
- a base station e.g., an access point
- the base station can refer to a device in an access network that communicates with a wireless terminal over one or more sectors over an air interface.
- the base station can be used to convert the received air frame to the IP packet as a router between the wireless terminal and the rest of the access network, wherein the remainder of the access network can include an Internet Protocol (IP) network.
- IP Internet Protocol
- the base station can also coordinate attribute management of the air interface.
- the base station may be a base station (BTS, Base Transceiver Station) in GSM or CDMA, or may be a base station (NodeB) in WCDMA, or may be an evolved base station in LTE (NodeB or eNB or e-NodeB, evolutional Node B), the embodiment of the present invention is not limited.
- User equipment may include, but is not limited to, a smart phone, a notebook computer, a personal computer (PC), a personal digital assistant (PDA), a mobile internet device (MID), a wearable device (such as a smart watch).
- the operating system of the user device may include, but is not limited to, an Android operating system, an IOS operating system, a Symbian operating system, and a BlackBerry operating system.
- the Windows Phone 8 operating system and the like are not limited in the embodiment of the present invention.
- the monitoring device 1 is an illegal receiver (ie, a hostile user), and is mainly used to monitor the transmitting device.
- the transmitted signal once it is found that there may be authentication information (ie, the tag signal) in the signal sent by the transmitting device, will analyze the signal and attempt to extract, destroy, or even tamper with the authentication information.
- the monitoring device 2 is a relatively neutral receiver, and the monitoring device 2 can receive the signal transmitted by the transmitting device, but the monitoring device 2 has no knowledge of the authentication method, and does not attempt to analyze whether the received signal contains the authentication information. It does not interfere with the signal received by the receiving device, and does not affect the authentication process of the signal by the receiving device.
- the transmitting end device, the receiving end device, the listening device 1 and the listening device 2 in the communication system described in FIG. 1 all represent different types of devices, that is, the transmitting in the communication system described in FIG.
- the terminal device is not limited to the one described in FIG. 1, and may be plural.
- the receiving device in the communication system described in FIG. 1 is not limited to only one described in FIG.
- the listening device 1 in the communication system described in FIG. 1 is not limited to the one described in FIG. 1, but may be plural.
- the listening device 2 in the communication system described in FIG. 1 is not limited to the figure.
- the one described in 1 can also have more than one.
- the signal blocks are independent and identically distributed random variables.
- the channels between different devices are modeled as fast fading channels, which means that the channel fading corresponding to different signal blocks is also independent.
- the signal received by the receiving device can be expressed as follows:
- ⁇ i represents the random variable of short-term fading
- n i ⁇ n i1 , n i2 , ..., n iL ⁇ , It is Gaussian white noise.
- the transmitting device may further divide the to-be-transmitted signal into a plurality of packets by using a pre-agreed key, and further obtain a preset susceptibility threshold; and further, the transmitting device may determine, according to the susceptibility threshold, each Power parameter adjustment factors for the packets, for each of the points The group performs power adjustment on the signal of the packet according to the power parameter adjustment factor of the packet, and sends the signal to be transmitted after adjusting the power.
- the receiving device may determine the power allocation feature of the signal according to the pre-agreed key to determine the test statistic, and further determine whether the check statistic is greater than or equal to a preset statistic threshold; Determining that the signal is a tag signal, and if not, determining that the signal is a conventional signal, wherein the tag signal is an authentication signal received by the receiving device, and the conventional signal is received by the receiving device Non-certified signal.
- the receiving end device knows the label signal and the encryption mode added by the transmitting end device, and agrees with the transmitting end device to use the used key in advance.
- the above physical layer authentication technology may be referred to as a slope authentication technology (Auth-SLO).
- the transmitting end device uses the key agreed by the two parties to group the sending signals, and uses the determined power parameter adjustment factor to allocate and adjust the power of each group of signals, and at the same time, the receiving end device can also utilize The key agreed by the two parties to identify whether the received signal satisfies the power allocation feature of the signal transmitted by the transmitting device to achieve the purpose of information authentication, and the host user does not obtain the position information of the power modification during the entire information transmission process, thereby Can improve the security of information transmission.
- FIG. 2 is a schematic flowchart diagram of a wireless communication method according to an embodiment of the present invention.
- the wireless communication method is applicable to a transmitting device. As shown in FIG. 2, the wireless communication method may include the following steps:
- Step 201 The transmitting device divides the to-be-transmitted signal into multiple packets by using a pre-agreed key.
- the transmitting end device may divide the signal to be transmitted into multiple packets by using a pre-agreed key, where the number of specific packets and the length of each group of signals are all by the transmitting device. It is determined by a key that is pre-agreed by the receiving device and commonly known.
- a string of information signals of length N has a string of keys of length N, and N is a positive integer.
- the number of 0s and 1s in the key is the same.
- the transmitting device can align the information signal with the key, the bit corresponding to the key being 0 is divided into the first group, and the bit corresponding to the key is divided into the second group, that is, the information signal is divided into two groups.
- the transmitting end device and the receiving end device can establish a relationship between the doubt degree and the power parameter adjusting factor through multiple communications, and each time the transmitting end device receives the receiving end device before transmitting the signal.
- the feedback information sent is used to indicate the relationship between the doubt threshold and the power parameter adjustment factor.
- Step 202 The transmitting device acquires a preset threshold value.
- the degree of doubt refers to the entropy of the power modification position for all received signal sequences.
- a threshold of doubt may be preset.
- the listening device 1 can attempt to find the location of the power modification.
- the listening device 1 first estimates the channel response h i and then obtains the residual signal by removing the information signal from y i .
- the residual signal can be expressed as:
- the listening device 1 judges the value of 1- ⁇ by performing a symbol check on y k .
- the bit error rate can be simply expressed as:
- the degree of doubt is only related to two parameters, ⁇ and ⁇ i .
- the degree of doubt is 1, the location information about the power modification is not obtained.
- the transmitting end device may determine the threshold of the doubt degree according to the condition that the position information of the power modification is not obtained, for example, the threshold of the doubt degree is 1.
- the transmitting end device and the receiving end device have a training phase to obtain the mutual relationship between the doubt degree and the power parameter adjustment factor, and determine the degree according to the degree of the obtained position information of the power modification and the security requirement of the actual communication scenario. Doubt threshold.
- Step 203 The transmitting device determines a power parameter adjustment factor of each of the packets according to the doubt threshold.
- the transmitting end device determines, according to the doubt threshold, that the power parameter adjustment factor of each of the packets includes:
- the preset suspect degree threshold may be determined in advance according to a condition that the power modified location information is not obtained.
- (n+1) power parameter adjustment factors may be first determined according to the doubt threshold and the initialized value, and then adjusted according to the total energy of the signal. The principle of no change before and after, determine the remaining power parameter adjustment factor.
- Step 204 For each of the packets, the transmitting device performs power adjustment on the signal of the packet according to a power parameter adjustment factor of the packet.
- FIG. 3 is a schematic diagram of a power allocation mechanism of a signal according to an embodiment of the present invention.
- the information signal is divided into two groups, the first group and the second group.
- the transmitting device may multiply the power of the first group by the power parameter adjustment factor ⁇ , and multiply the power of the second group by the power parameter adjustment factor ⁇ to perform power adjustment on the signal of each group. Among them, it is necessary to satisfy 0 ⁇ ⁇ ⁇ 1 ⁇ ⁇ .
- the tag signal can be expressed as follows:
- l 1 ⁇ l 2 ⁇ 1,...,L/2 ⁇ represents the subscript of each group of signals.
- the signals x i,1 and x i,2 are both L/2 in length.
- Step 205 The transmitting device sends the to-be-transmitted signal after adjusting the power.
- a certain power allocation feature may be formed, and the to-be-transmitted signal after the power adjustment is sent to the receiving device.
- the power allocation feature may include: a tag signal, a power parameter adjustment factor, and a packet mode (ie, at which locations are grouped).
- the transmitting end device before transmitting the to-be-transmitted signal, uses the key agreed by the two parties to group the transmitted signals, and uses the determined power parameter adjustment factor to allocate and adjust the power of each group of signals. After that, the signal after the power adjustment is transmitted, and the host user does not obtain the position information of the power modification during the whole information transmission, thereby improving the security of the information transmission.
- FIG. 4 is a schematic flowchart diagram of another wireless communication method according to an embodiment of the present invention.
- the wireless communication method is applicable to the receiving end device. As shown in FIG. 4, the wireless communication method may include the following steps:
- Step 401 The receiving end device receives a signal sent by the transmitting end device.
- the signal sent by the receiving end device to the transmitting end device may be expressed as:
- the SINR of the receiving device is,
- the superimposed tag signal does not sacrifice the SINR of the receiving device.
- the receiving end device it is not necessary to estimate the channel parameters (channel fading), there is no need to compensate the channel, and even the signal is not required to be demodulated and decoded, only by judging whether the received signal conforms to the transmitting end.
- the signal can be authenticated by the power distribution characteristics of the device.
- Step 402 The receiving end device groups the signals according to a pre-agreed key, and calculates the power of each packet.
- the receiving end device determines the power allocation feature of the signal, that is, the power of each packet, according to a pre-agreed key.
- the two packets described above are the power of the first packet.
- Power of the second packet among them Conjugated transpose for y i,1 . i denotes the sequence number of the received data block, and 1 denotes the signal corresponding to the first group.
- Step 403 The receiving end device determines a check statistic according to the power of each of the packets.
- the receiving device after determining the power of each packet, can A test statistic is determined based on the power of each of the packets.
- Step 404 The receiving end device determines whether the test statistic is greater than or equal to a preset statistic threshold. If yes, go to step 405. If no, go to step 406.
- a statistic threshold for determining whether the signal is a regular signal or a label signal can be obtained in advance through multiple experiments, for example, Represents a statistic threshold.
- Step 405 The receiving end device determines that the signal is a label signal, and ends the process.
- the tag signal is an authentication signal received by the receiving device.
- the signal when the receiving end device determines that the test statistic is greater than or equal to a preset statistic threshold, the signal may be determined to be a tag signal.
- the test statistic ⁇ i may be expressed as follows:
- Step 406 The receiving end device determines that the signal is a regular signal.
- the conventional signal is a non-authentication signal received by the receiving end device.
- the signal when the receiving end device determines that the test statistic is less than a preset statistic threshold, the signal may be determined to be a regular signal.
- the test statistic ⁇ i may be expressed as follows:
- the authentication technology described in the present invention may be referred to as a slope authentication technology (Auth-SLO).
- the receiving end device can use the key agreed by the two parties to identify whether the received signal satisfies the power allocation feature of the signal transmitted by the transmitting device to achieve the purpose of information authentication, signal transmission and reception. Throughout the process, the hostile user does not obtain the location information of the power modification, thereby improving the security of information transmission.
- FIG. 5 is a flowchart showing another wireless communication method according to an embodiment of the present invention. intention.
- the wireless communication method is described from both the transmitting end device and the receiving end device.
- the wireless communication method may include the following steps:
- Step 501 The transmitting device divides the to-be-transmitted signal into multiple packets by using a pre-agreed key.
- Step 502 The transmitting device acquires a preset threshold value.
- Step 503 The transmitting device determines a power parameter adjustment factor of each of the packets according to the doubt threshold.
- Step 504 Perform power adjustment on the signal of the packet according to a power parameter adjustment factor of the packet for each of the packets.
- Step 505 Send the to-be-transmitted signal after adjusting the power.
- Step 506 The receiving end device groups the signals according to a pre-agreed key, and calculates the power of each packet.
- Step 507 The receiving end device determines a test statistic according to the power of each of the packets.
- Step 508 The receiving end device determines whether the check statistic is greater than or equal to a preset statistic threshold. If yes, the receiving device determines that the signal is a label signal, and if not, the receiving device determines that the signal is a regular signal.
- FIG. 6 is a schematic diagram showing a change curve of the susceptibility degree with respect to the signal-to-noise ratio according to an embodiment of the present invention
- FIG. 7 is another disambiguation degree disclosed in the embodiment of the present invention regarding power parameter adjustment.
- the transmitting end device should increase the value of ⁇ as much as possible when performing power adjustment.
- the wireless communication physical layer authentication technology (Auth-SLO) proposed in the present invention implements the wireless communication physical layer compared with the existing wireless communication physical layer authentication technology (Auth-SS, Auth-SUP, Auth-TDM). Authentication does not require additional signal bandwidth, and the tag signal does not become affected. The noise extracted by the signal received by the receiving device does not affect the statistical characteristics of the noise of the receiving device.
- the Auth-SLO authentication technology proposed by the present invention is viewed from the analysis of the spectrum characteristics or the influence of other users in the communication scenario. The security is higher than the prior art.
- the transmitting end device Before transmitting the to-be-transmitted signal, the transmitting end device uses the key agreed by the two parties to group the sending signals, and uses the determined power parameter adjustment factor to allocate and adjust the power of each group of signals.
- the receiving end device can also use the key agreed by the two parties to identify whether the received signal satisfies the power allocation feature of the signal transmitted by the transmitting device to achieve the purpose of information authentication.
- the hostile user does not The position information of the power modification is obtained, so that the security of information transmission can be improved.
- FIG. 8 is a schematic structural diagram of a wireless communication apparatus according to an embodiment of the present invention.
- the wireless communication device shown in FIG. 8 operates on a transmitting device, wherein the wireless communication device described in FIG. 8 can be used to perform some or all of the steps in the wireless communication method described in FIG. 2 and FIG. Referring to the related descriptions in FIG. 2 and FIG. 5, details are not described herein again.
- the wireless communication device can include:
- a dividing unit 801 configured to divide the to-be-transmitted signal into multiple packets by using a pre-agreed key
- the obtaining unit 802 is configured to obtain a preset threshold of the degree of doubt
- a determining unit 803 configured to determine, according to the doubt degree threshold, a power parameter adjustment factor of each of the packets
- the adjusting unit 804 is configured to perform power adjustment on the signal of the packet according to a power parameter adjustment factor of the packet for each of the packets;
- the sending unit 805 is configured to send the to-be-transmitted signal after adjusting the power.
- the determining unit 803 is configured to determine, according to the doubt threshold, a power parameter adjustment factor of each of the packets:
- the determining unit 803 is further configured to determine the suspect degree threshold according to a condition that the power modified location information is not obtained.
- the wireless communication device described in FIG. 8 is configured to group the signals to be transmitted by using the agreed key of the two parties before transmitting the signal to be transmitted, and allocate and adjust the power of each group of signals by using the determined power parameter adjustment factor. After that, the signal after the power adjustment is transmitted, and the host user does not obtain the position information of the power modification during the whole information transmission, thereby improving the security of the information transmission.
- FIG. 9 is a schematic structural diagram of another wireless communication apparatus according to an embodiment of the present invention.
- the wireless communication device shown in FIG. 9 is operated by the receiving device, wherein the wireless communication device described in FIG. 9 can be used to perform some or all of the steps in the wireless communication method described in FIG. 4 and FIG. Referring to the related descriptions in FIG. 4 and FIG. 5, details are not described herein again.
- the wireless communication device can include:
- the receiving unit 901 is configured to receive a signal sent by the transmitting device.
- a packet calculation unit 902 configured to group the signals according to a pre-agreed key, and calculate a power of each packet
- a first determining unit 903 configured to determine a check statistic according to the power of each of the packets
- the determining unit 904 is configured to determine whether the test statistic is greater than or equal to a preset statistic threshold
- the second determining unit 905 is configured to determine, when the determining unit 904 determines that the check statistic is greater than or equal to a preset statistic threshold, the signal is a label signal, where the label signal is the receiving end The authentication signal received by the device.
- the second determining unit 905 is further configured to: when the determining unit 904 determines that the check statistic is less than the statistic threshold, determine that the signal is a regular signal, where the conventional signal is the receiving end The non-authentication signal received by the device.
- the agreed key can be used to identify the received Whether the received signal satisfies the power allocation characteristics of the signal transmitted by the transmitting device to achieve the purpose of information authentication, and the host user does not obtain the position information of the power modification during the whole process of signal transmission and reception, thereby improving the security of information transmission. Sex.
- the above-described integrated unit implemented in the form of a software function module can be stored in a computer readable storage medium.
- the computer readable storage medium can store a computer program, which when executed by the processor, can implement the steps in the foregoing method embodiments.
- the computer program comprises computer program code, which may be in the form of source code, object code form, executable file or some intermediate form.
- the computer readable storage medium may include any entity or device capable of carrying the computer program code, a recording medium, a USB flash drive, a removable hard disk, a magnetic disk, an optical disk, a computer memory, a read only memory (ROM, Read-Only Memory). ), random access memory (RAM, Random-Access Memory), electrical carrier signals, telecommunications signals, and software distribution media. It should be noted that the content contained in the computer readable storage medium may be appropriately increased or decreased according to the requirements of legislation and patent practice in a jurisdiction.
- the disclosed apparatus may be implemented in other ways.
- the device embodiments described above are merely illustrative.
- the division of the unit is only a logical function division.
- there may be another division manner for example, multiple units or components may be combined or may be Integrate into another system, or some features can be ignored or not executed.
- the mutual coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection through some interface, device or unit, and may be electrical or otherwise.
- the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of the embodiment.
- each functional unit in various embodiments of the present invention may be integrated in one processing unit. It is also possible that each unit physically exists alone, or two or more units may be integrated in one unit.
- the above integrated unit can be implemented in the form of hardware or in the form of a software functional unit.
- the integrated unit if implemented in the form of a software functional unit and sold or used as a standalone product, may be stored in a computer readable memory. Based on such understanding, the technical solution of the present invention may contribute to the prior art or all or part of the technical solution may be embodied in the form of a software product stored in a memory. A number of instructions are included to cause a computer device (which may be a personal computer, server or network device, etc.) to perform all or part of the steps of the methods described in various embodiments of the present invention.
- the foregoing memory includes: a U disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic disk, or an optical disk, and the like, which can store program codes.
- ROM Read-Only Memory
- RAM Random Access Memory
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Data Mining & Analysis (AREA)
- General Engineering & Computer Science (AREA)
- Mathematical Physics (AREA)
- Mathematical Analysis (AREA)
- Mathematical Optimization (AREA)
- Theoretical Computer Science (AREA)
- Computational Mathematics (AREA)
- Pure & Applied Mathematics (AREA)
- Databases & Information Systems (AREA)
- Algebra (AREA)
- Evolutionary Biology (AREA)
- Software Systems (AREA)
- Probability & Statistics with Applications (AREA)
- Operations Research (AREA)
- Bioinformatics & Computational Biology (AREA)
- Bioinformatics & Cheminformatics (AREA)
- Life Sciences & Earth Sciences (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
Claims (10)
- 一种安全的无线通信物理层斜率认证方法,其特征在于,应用于发射端设备,所述方法包括:利用预先约定的密钥将待发送信号划分成多个分组;获取预设的疑义度阈值;根据所述疑义度阈值,确定每个所述分组的功率参数调整因子;针对每个所述分组,按照所述分组的功率参数调整因子,对所述分组的信号进行功率调整;将调整功率后的待发送信号进行发送。
- 根据权利要求1所述的方法,其特征在于,所述根据所述疑义度阈值,确定每个所述分组的功率参数调整因子包括:根据所述疑义度阈值,确定多个所述分组的功率参数调整因子中的第一功率参数调整因子;根据所述第一功率参数调整因子以及所述待发送信号功率的能量受限条件,确定多个所述分组的功率参数调整因子中除所述第一功率参数调整因子之外的功率参数调整因子。
- 根据权利要求1或2所述的方法,其特征在于,所述方法还包括:根据功率修改的位置信息不被获得的条件,确定所述疑义度阈值。
- 一种无线通信方法,其特征在于,应用于接收端设备,所述方法包括:接收发射端设备发送的信号;根据预先约定的密钥,将所述信号进行分组,并计算每个分组的功率;根据所述每个分组的功率确定检验统计量;判断所述检验统计量是否大于或等于预设的统计量阈值;若所述检验统计量大于或等于预设的统计量阈值,则确定所述信号为标签信号,其中,所述标签信号为所述接收端设备接收的认证信号。
- 根据权利要求4所述的方法,其特征在于,所述方法还包括:若所述检验统计量小于所述统计量阈值,则确定所述信号为常规信号,其中,所述常规信号为所述接收端设备接收的非认证信号。
- 一种安全的无线通信物理层斜率认证装置,其特征在于,运行于发射 端设备,包括:划分单元,用于利用预先约定的密钥将待发送信号划分成多个分组;获取单元,用于获取预设的疑义度阈值;确定单元,用于根据所述疑义度阈值,确定每个所述分组的功率参数调整因子;调整单元,用于针对每个所述分组,按照所述分组的功率参数调整因子,对所述分组的信号进行功率调整;发送单元,用于将调整功率后的待发送信号进行发送。
- 根据权利要求6所述的装置,其特征在于,所述确定单元根据所述疑义度阈值,确定每个所述分组的功率参数调整因子的方式具体为:根据所述疑义度阈值,确定多个所述分组的功率参数调整因子中的第一功率参数调整因子;根据所述第一功率参数调整因子以及所述待发送信号功率的能量受限条件,确定多个所述分组的功率参数调整因子中除所述第一功率参数调整因子之外的功率参数调整因子。
- 根据权利要求6或7所述的无线通信装置,其特征在于,所述确定单元,还用于根据功率修改的位置信息不被获得的条件,确定所述疑义度阈值。
- 一种安全的无线通信物理层斜率认证方法装置,其特征在于,运行于接收端设备,包括:接收单元,用于接收发射端设备发送的信号;分组计算单元,用于根据预先约定的密钥,将所述信号进行分组,并计算每个分组的功率;第一确定单元,用于根据所述每个分组的功率确定检验统计量;判断单元,用于判断所述检验统计量是否大于或等于预设的统计量阈值;第二确定单元,用于当所述判断单元判断所述检验统计量大于或等于预设的统计量阈值时,确定所述信号为标签信号,其中,所述标签信号为所述接收端设备接收的认证信号。
- 根据权利要求9所述的装置,其特征在于,所述第二确定单元,还用于当所述判断单元判断所述检验统计量小于所述统计量阈值时,确定所述信号为常规信号,其中,所述常规信号为所述接收端设备接收的非认证信号。
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2017/105068 WO2019061514A1 (zh) | 2017-09-30 | 2017-09-30 | 安全的无线通信物理层斜率认证方法和装置 |
US16/574,143 US11082841B2 (en) | 2017-09-30 | 2019-09-18 | Secure physical layer slope authentication method in wireless communications and apparatus |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2017/105068 WO2019061514A1 (zh) | 2017-09-30 | 2017-09-30 | 安全的无线通信物理层斜率认证方法和装置 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US16/574,143 Continuation US11082841B2 (en) | 2017-09-30 | 2019-09-18 | Secure physical layer slope authentication method in wireless communications and apparatus |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2019061514A1 true WO2019061514A1 (zh) | 2019-04-04 |
Family
ID=65902696
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2017/105068 WO2019061514A1 (zh) | 2017-09-30 | 2017-09-30 | 安全的无线通信物理层斜率认证方法和装置 |
Country Status (2)
Country | Link |
---|---|
US (1) | US11082841B2 (zh) |
WO (1) | WO2019061514A1 (zh) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111465017A (zh) * | 2020-04-07 | 2020-07-28 | 电子科技大学 | 双跳网络中基于信道的物理层认证方法 |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11238105B2 (en) * | 2019-03-29 | 2022-02-01 | Salesforce.Com, Inc. | Correlating user device attribute groups |
AU2020408215A1 (en) | 2019-12-18 | 2022-06-09 | Grail, Llc | Systems and methods for estimating cell source fractions using methylation information |
US11336447B2 (en) * | 2020-04-22 | 2022-05-17 | Gideon Samid | Split security solutions for video/audio using SpaceFlip class ciphers |
US11539519B2 (en) * | 2020-08-24 | 2022-12-27 | Gideon Samid | Privacy solutions for cyber space |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN204442406U (zh) * | 2014-12-31 | 2015-07-01 | 重庆川仪自动化股份有限公司 | Profibus pa协议物理层参数自动测试系统 |
CN105636242A (zh) * | 2014-10-25 | 2016-06-01 | 史军 | 基于蓝牙技术的家庭办公网络 |
US20160287142A1 (en) * | 2015-04-06 | 2016-10-06 | Samsung Electronics Co., Ltd. | Method for processing data and electronic device thereof |
CN106100710A (zh) * | 2016-06-08 | 2016-11-09 | 中国电子科技集团公司第五十四研究所 | 一种基于干扰对齐技术的无条件物理层安全协作传输方法 |
Family Cites Families (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030012372A1 (en) * | 2001-04-25 | 2003-01-16 | Cheng Siu Lung | System and method for joint encryption and error-correcting coding |
US7295119B2 (en) * | 2003-01-22 | 2007-11-13 | Wireless Valley Communications, Inc. | System and method for indicating the presence or physical location of persons or devices in a site specific representation of a physical environment |
US20050213553A1 (en) * | 2004-03-25 | 2005-09-29 | Wang Huayan A | Method for wireless LAN intrusion detection based on protocol anomaly analysis |
US20060183462A1 (en) * | 2005-02-11 | 2006-08-17 | Nokia Corporation | Managing an access account using personal area networks and credentials on a mobile device |
US8559947B2 (en) * | 2006-09-13 | 2013-10-15 | Mformation Software Technologies Llc | System and method to enable subscriber self-activation of wireless data terminals |
WO2009032324A2 (en) * | 2007-09-07 | 2009-03-12 | University Of Maryland | Wireless communication method and system for transmission authentication at the physical layer |
US8023425B2 (en) * | 2009-01-28 | 2011-09-20 | Headwater Partners I | Verifiable service billing for intermediate networking devices |
US20120226955A1 (en) * | 2011-03-02 | 2012-09-06 | John Peter Norair | Method and apparatus for forward error correction (fec) in a resource-constrained network |
US8995381B2 (en) * | 2012-04-16 | 2015-03-31 | Ofinno Technologies, Llc | Power control in a wireless device |
EP2989770A1 (en) * | 2013-04-26 | 2016-03-02 | Interdigital Patent Holdings, Inc. | Multi-factor authentication to achieve required authentication assurance level |
US9350550B2 (en) * | 2013-09-10 | 2016-05-24 | M2M And Iot Technologies, Llc | Power management and security for wireless modules in “machine-to-machine” communications |
GB2593025B (en) * | 2014-04-02 | 2021-12-01 | Walmart Apollo Llc | Apparatus and method of determining an open status of a container using RFID tag devices |
US9763063B2 (en) * | 2014-10-06 | 2017-09-12 | Derek D. Kumar | Secure broadcast beacon communications |
US20160112944A1 (en) * | 2014-10-17 | 2016-04-21 | Qualcomm Incorporated | Access point selection based on association performance |
CN107534658B (zh) * | 2015-03-16 | 2020-11-17 | 康维达无线有限责任公司 | 使用公钥机制在服务层的端对端认证 |
US10284566B2 (en) * | 2016-04-01 | 2019-05-07 | Intel Corporation | Proximity detection system |
MX2018013639A (es) * | 2016-05-11 | 2019-05-15 | Sony Corp | Control distribuido en sistemas inalambricos. |
EP3577878B1 (en) * | 2017-02-06 | 2021-07-07 | PCMS Holdings, Inc. | Securing communication of devices in the internet of things |
WO2019061516A1 (zh) * | 2017-09-30 | 2019-04-04 | 深圳大学 | 隐蔽的无线通信物理层斜率认证方法和装置 |
CN109168166B (zh) * | 2018-11-22 | 2020-08-18 | 深圳大学 | 物理层认证系统的安全性检测方法 |
-
2017
- 2017-09-30 WO PCT/CN2017/105068 patent/WO2019061514A1/zh active Application Filing
-
2019
- 2019-09-18 US US16/574,143 patent/US11082841B2/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105636242A (zh) * | 2014-10-25 | 2016-06-01 | 史军 | 基于蓝牙技术的家庭办公网络 |
CN204442406U (zh) * | 2014-12-31 | 2015-07-01 | 重庆川仪自动化股份有限公司 | Profibus pa协议物理层参数自动测试系统 |
US20160287142A1 (en) * | 2015-04-06 | 2016-10-06 | Samsung Electronics Co., Ltd. | Method for processing data and electronic device thereof |
CN106100710A (zh) * | 2016-06-08 | 2016-11-09 | 中国电子科技集团公司第五十四研究所 | 一种基于干扰对齐技术的无条件物理层安全协作传输方法 |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111465017A (zh) * | 2020-04-07 | 2020-07-28 | 电子科技大学 | 双跳网络中基于信道的物理层认证方法 |
Also Published As
Publication number | Publication date |
---|---|
US11082841B2 (en) | 2021-08-03 |
US20200015082A1 (en) | 2020-01-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11082841B2 (en) | Secure physical layer slope authentication method in wireless communications and apparatus | |
US11082847B2 (en) | Covert physical layer slope authentication method in wireless communications and apparatus | |
CN109168166B (zh) | 物理层认证系统的安全性检测方法 | |
US11330434B2 (en) | Security detection for a physical layer authentication system that considers signal-discriminating capability of an active adversary | |
CN103997736B (zh) | 无线通信系统中用于检测窃听者的方法 | |
CN110381510B (zh) | 基于叠加物理层认证标签的非正交多址认证系统 | |
Gao et al. | A novel model-based security scheme for LoRa key generation | |
CN110381511B (zh) | 基于共享物理层认证标签的非正交多址认证系统 | |
US20200015083A1 (en) | Robust Physical Layer Slope Authentication Method in Wireless Communications and Apparatus | |
CN106953819B (zh) | 基于多无线电协作预编码的物理层保密通信方法 | |
CN110312255B (zh) | 基于叠加认证标签的非正交多址认证系统的参数优化方法 | |
CN110380798B (zh) | 基于共享认证标签的非正交多址认证系统及参数优化方法 | |
CN108173791A (zh) | 基于平滑技术的时变衰落信道的物理层盲认证方法及系统 | |
WO2019113864A1 (zh) | 基于平滑技术的频率选择性衰落信道的盲认证方法和系统 | |
CN109600742B (zh) | 隐蔽的无线通信物理层斜率认证方法和装置 | |
Refaey et al. | Multilayer authentication for communication systems based on physical-layer attributes | |
CN108966211B (zh) | 安全的无线通信物理层斜率认证方法和装置 | |
CN109600767B (zh) | 鲁棒的无线通信物理层斜率认证方法和装置 | |
CN111683363B (zh) | 空域调制系统中的物理层认证方法及系统 | |
CN109982326B (zh) | 一种基于大尺度衰落特征的物理层安全认证方法 | |
Karas et al. | Neural network based PHY-layer key exchange for wireless communications | |
CN114629626A (zh) | 一种智能反射阵面提升物理层密钥生成性能系统与方法 | |
Ormond et al. | Error rate analysis of physical layer security for sub-6 GHz 5G network planning | |
Srinivasan et al. | HMAC-RSA: A security mechanism in cognitive radio for enhancing the security in a radio cognitive system | |
US11510055B2 (en) | Smoothing-technology-based physical layer blind authentication method and system for time-varying fading channel |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 17926624 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 17926624 Country of ref document: EP Kind code of ref document: A1 |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 20/10/2020) |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 17926624 Country of ref document: EP Kind code of ref document: A1 |