WO2019113864A1 - 基于平滑技术的频率选择性衰落信道的盲认证方法和系统 - Google Patents

基于平滑技术的频率选择性衰落信道的盲认证方法和系统 Download PDF

Info

Publication number
WO2019113864A1
WO2019113864A1 PCT/CN2017/116025 CN2017116025W WO2019113864A1 WO 2019113864 A1 WO2019113864 A1 WO 2019113864A1 CN 2017116025 W CN2017116025 W CN 2017116025W WO 2019113864 A1 WO2019113864 A1 WO 2019113864A1
Authority
WO
WIPO (PCT)
Prior art keywords
signal
authentication
blind
pilot
carrier
Prior art date
Application number
PCT/CN2017/116025
Other languages
English (en)
French (fr)
Inventor
谢宁
张莉
Original Assignee
深圳大学
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳大学 filed Critical 深圳大学
Priority to US16/772,749 priority Critical patent/US11412378B2/en
Priority to PCT/CN2017/116025 priority patent/WO2019113864A1/zh
Publication of WO2019113864A1 publication Critical patent/WO2019113864A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L25/00Baseband systems
    • H04L25/02Details ; arrangements for supplying electrical power along data transmission lines
    • H04L25/03Shaping networks in transmitter or receiver, e.g. adaptive shaping networks
    • H04L25/03006Arrangements for removing intersymbol interference
    • H04L25/03159Arrangements for removing intersymbol interference operating in the frequency domain
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0875Generation of secret information including derivation or calculation of cryptographic keys or passwords based on channel impulse response [CIR]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3215Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a plurality of channels
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3228One-time or temporary data, i.e. information which is sent for every authentication or authorization, e.g. one-time-password, one-time-token or one-time-key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • H04W12/79Radio fingerprint

Definitions

  • the present invention relates to the field of wireless communication technologies, and in particular, to a blind authentication method and system for a frequency selective fading channel based on a smoothing technique.
  • the first authentication technology is spread spectrum technology (Auth-SS).
  • Auth-SS spread spectrum technology
  • the basic idea is to use traditional direct sequence spread spectrum or frequency modulation technology. Since different pulses use different frequencies, this is A technology that implements authentication requires a certain amount of bandwidth to be sacrificed.
  • Auth-SS technology a key limitation of the Auth-SS technology is that only users who are aware of prior knowledge of the spread spectrum technology are allowed to participate in the communication. Therefore, the scope of application of this technology is relatively narrow.
  • the second is based on Time Division Multiplexing (Auth-TDM).
  • Auth-TDM Time Division Multiplexing
  • the basic idea is that the transmitting end periodically transmits information signals and authentication signals alternately. After receiving the signal, the receiving end directly extracts the desired authentication information to achieve the authentication purpose of the signal.
  • Auth-TDM is an authentication technology proposed in the early development of wireless communication. Its advantage is that it is easy to operate. It does not need to pre-process authentication signals and information before transmitting signals (it may be encrypted for security reasons).
  • the authentication signal is transmitted independently of the information signal, so it needs to occupy a certain bandwidth. With the continuous increase of the number of wireless information, and the further improvement of the information privacy of the user and the continuous enhancement of the enemy attack technology, the security of the authentication technology is enhanced. Sex is greatly challenged and cannot meet the needs of users.
  • the third authentication technology is the authentication overlay technology (Auth-SUP).
  • the basic idea is to superimpose the authentication signal on the information signal (the superposition method can be arbitrary, determined by the key), and then transmitted by the transmitting end simultaneously, and the receiving end receives After the signal is used, the authentication signal in the superimposed signal is extracted by using the key to achieve the purpose of signal authentication.
  • the Auth-SUP authentication technology needs to process the authentication signal and the information signal before the signal is transmitted, and puts forward certain requirements on the signal processing capability of the transmitting end, which is more complicated than the Auth-TDM technology.
  • the authentication signal and the information signal are transmitted simultaneously, so no extra bandwidth is occupied.
  • the receiving end since the authentication signal is superimposed on the information signal, the receiving end needs to extract the information after receiving the signal, and the signal processing difficulty is higher than the Auth-TDM technology, but the concealment of the authentication information is higher than that of the Auth-TDM.
  • the authentication signal acts as a noise for the extraction of the information signal, the SNR of the receiving end is correspondingly reduced, which adversely affects the extraction of the information signal.
  • the existing Auth-TDM and Auth-SUP authentication technologies transmit another pilot signal in addition to the information signal and the authentication signal. This is because both authentication technologies require the receiver to estimate the channel parameters and perform symbol recovery after receiving the signal, and then the authentication signal can be extracted. At this time, the signal processing capability of the receiver is also required. In some specific situations, these signal processing techniques may not be feasible, and the estimation error is easily caused in the channel parameter estimation and symbol recovery process, which will adversely affect the extraction of the final authentication signal.
  • Auth-TDM, Auth-SS, and Auth-SUP expose the fact that authentication information is included.
  • Auth-SS and Auth-TDM technologies are more likely to cause scenes than conventional signals that do not contain authentication information.
  • Other users especially the attention of hostile users, the hostile user analyzes the signal, impersonates or falsifies, and the legitimate receiver will not be able to authenticate the desired signal.
  • the cryptacy of Auth-SUP authentication technology is significantly higher than Auth-SS and Auth-TDM.
  • this superiority is based on the premise that the computing power of the hostile user has certain limitations. Once the computing power of the hostile user is improved, it is very likely to extract or even destroy the authentication information.
  • the present invention has been made in view of the above circumstances, and an object thereof is to provide a statistical characteristic that does not need to occupy an extra signal bandwidth, and the authentication signal does not affect the noise extracted by the information signal in the carrier signal, and does not affect the noise of the receiving end.
  • the first aspect of the present invention provides a blind authentication method for a frequency selective fading channel based on a smoothing technique, which is a physical layer authentication method for wireless communication of a wireless communication system having a transmitting end and a receiving end, wherein The method includes: the transmitting end transmitting a carrier signal to a wireless channel, where the carrier signal includes an authentication signal, a pilot signal, and an information signal, the authentication signal is superimposed on the pilot signal, and the wireless channel is configured to have multiple paths a frequency selective fading channel; the receiving end receives the carrier signal, and sequentially performs blind known interference cancellation on the carrier signal in each path of the frequency selective fading channel (Blind Known Interference Cancellation, referred to as BKIC Processing a target signal, performing differential signal processing on the target signal to obtain a target authentication signal, in the BKIC processing, using adjacent symbols, eliminating the pilot signal by a smoothing technique; at the receiving end Calculating a reference authentication signal based on the key and the pilot signal, and calculating the target authentication signal
  • the authentication signal is superimposed on the pilot signal.
  • the BKIC process utilizes adjacent symbols to cancel the pilot signal by a smoothing technique. In this case, the pilot signal can be eliminated without avoiding the estimated channel.
  • the carrier signal is transmitted in blocks in the form of data blocks. This makes it easy to operate on the data.
  • a signal length of the pilot signal and a signal length of the information signal are equal to a signal length of the carrier signal.
  • the reference signal is obtained based on the key and the pilot signal by using a hash matrix.
  • the reference signal is processed to obtain a reference authentication signal, and whether the target authentication signal passes the authentication can be determined according to the correlation between the reference authentication signal and the target authentication signal.
  • the carrier signal passes the authentication if the test statistic is not less than the predetermined threshold.
  • the predetermined threshold is obtained based on a statistical characteristic of the pilot signal and a preset upper limit of a false alarm probability.
  • a second aspect of the present invention provides a blind authentication device for a frequency selective fading channel based on a smoothing technique, comprising a processor that executes the computer program of the memory storage to implement the physical layer blindness described in any of the above Authentication method; and memory.
  • a third aspect of the invention provides a computer readable storage medium.
  • the computer readable storage medium stores at least one instruction that, when executed by a processor, implements the blind authentication method of any of the above aspects.
  • a fourth aspect of the present invention provides a blind authentication system for a frequency selective fading channel based on a smoothing technique, comprising a transmitting device that transmits a carrier signal to a wireless channel, the carrier signal including an authentication signal, a pilot signal, and information a signal, the authentication signal is superimposed on the pilot signal, the wireless channel is a frequency selective fading channel having multiple paths;
  • the receiving device includes a first processing module, a second processing module, and a determining module, the first The processing module receives the carrier signal, and performs blind-known interference cancellation (BKIC) processing on the carrier signal in each path of the frequency selective fading channel to obtain a target signal, and performs differential signals on the target signal.
  • BKIC blind-known interference cancellation
  • the transmitting device of the blind authentication system superimposes the authentication signal on the pilot signal. Thereby, it is possible to not occupy additional transmission bandwidth resources.
  • the receiving device BKIC processing of the blind authentication system uses adjacent symbols to cancel the pilot signal by a smoothing technique. In this case, the receiving device can cancel the pilot signal without evading the estimated channel.
  • the second processing module obtains the reference signal based on the key and the pilot signal by using a hash matrix.
  • the reference signal is processed to obtain a reference authentication signal, and whether the target authentication signal passes the authentication can be determined according to the correlation between the reference authentication signal and the target authentication signal.
  • the predetermined threshold in the determining module is obtained based on a statistical characteristic of the pilot signal and a preset upper limit of a false alarm probability.
  • the authentication of the physical layer of the wireless communication of the present invention does not need to occupy additional signal bandwidth, and the authentication signal does not affect the noise of the received signal, and does not affect the reception.
  • the statistical properties of the end noise The blind authentication technology proposed by the present invention processes a frequency selective fading channel, and is more suitable for a complex and variable wireless communication environment in an actual communication scenario.
  • the authentication signal is superimposed on the pilot signal in the present invention, if the entire signal of the authentication signal and the pilot superimposed signal is used as a pilot signal for channel estimation, the accuracy of channel estimation can be improved. .
  • FIG. 1 is a schematic diagram showing signal transmission of a physical layer blind authentication method according to an embodiment of the present invention.
  • FIG. 2 is a flow chart showing a physical layer blind authentication method according to an embodiment of the present invention.
  • FIG. 3 is a schematic structural diagram showing a transmitting signal transmitted by a transmitting end of a physical layer blind authentication method according to an embodiment of the present invention.
  • BKIC blind-known interference cancellation
  • FIG. 5 is a schematic diagram showing a signal processing module at a transmitting end of a physical layer blind authentication system according to an embodiment of the present invention.
  • FIG. 6 is a schematic diagram showing a signal processing module at the receiving end of a physical layer blind authentication system according to an embodiment of the present invention.
  • FIG. 7 is a schematic structural diagram showing a physical layer blind authentication device according to an embodiment of the present invention.
  • the embodiment discloses a blind authentication method, device and system for a frequency selective fading channel based on a smoothing technique, and is a physical layer authentication method, device and system for wireless communication of a wireless communication system having a transmitting end and a receiving end. That is, the embodiment discloses a physical layer blind authentication method, device and system for a wireless communication frequency selective fading channel based on a smoothing technique. It enables more accurate physical layer authentication.
  • the details are described below in conjunction with the drawings.
  • FIG. 1 is a schematic diagram showing signal transmission of a physical layer blind authentication method according to an embodiment of the present invention.
  • the physical layer blind authentication method of the wireless communication frequency selective fading channel based on the smoothing technique is based on a general signal transmission model.
  • this signal transmission model there are four users, in which the sender (transmitting end) is a legitimate sender, the transmitting end transmits a signal to the legal receiver, that is, the receiving end, and the other two receivers are respectively listening users in the system. Hostile user. Once the hostile user finds that there may be authentication information in the signal sent by the transmitter, the signal will be analyzed and attempted to extract, destroy, or even tamper with the authentication information.
  • the embodiment is not limited thereto, and the transmitting end may be two or more, the legal receiving party may be two or more, and the monitoring user and the enemy user may also be two or more respectively.
  • the transmitting end and the receiving end jointly have a key for authentication, so that the receiving end can use the key to extract the authentication information from the signal transmitted by the transmitting end.
  • the authentication signal contains authentication information.
  • the carrier signal contains an authentication signal, and the conventional signal does not include an authentication signal.
  • the listening user knows nothing about the authentication method. Although it can accept and recover the signal sent by the transmitter, it does not analyze the signal in depth and does not affect the authentication process. By analyzing the characteristics of the signal, the hostile user can perceive the existence of the authentication signal and intends to destroy the authentication signal.
  • the transmitting end in the foregoing signal model may include a base station or a user equipment.
  • a base station e.g., an access point
  • the base station can refer to a device in an access network that communicates with a wireless terminal over one or more sectors over an air interface.
  • the base station can be used to convert the received air frame to the IP packet as a router between the wireless terminal and the rest of the access network, wherein the remainder of the access network can include an Internet Protocol (IP) network.
  • IP Internet Protocol
  • the base station can also coordinate attribute management of the air interface.
  • the base station may be a base station (BTS, Base Transceiver Station) in GSM or CDMA, or may be a base station (NodeB) in WCDMA, or may be an evolved base station in LTE (NodeB or eNB or e-NodeB, evolutional Node B), the embodiment is not limited.
  • BTS Base Transceiver Station
  • NodeB base station
  • NodeB evolved base station in LTE
  • LTE NodeB or eNB or e-NodeB, evolutional Node B
  • User equipment may include, but is not limited to, a smart phone, a notebook computer, a personal computer (PC), a personal digital assistant (PDA), a mobile internet device (MID), a wearable device (such as a smart watch).
  • a smart phone a notebook computer
  • PC personal computer
  • PDA personal digital assistant
  • MID mobile internet device
  • wearable device such as a smart watch
  • Various types of electronic devices, such as smart bracelets and smart glasses wherein the operating system of the user device may include, but is not limited to, an Android operating system, an IOS operating system, a Symbian operating system, and a BlackBerry operating system.
  • the Windows Phone 8 operating system and the like are not limited in this embodiment.
  • the transmitting end of the signal model sends a signal to the receiving end through the wireless channel, where the receiving end may include the base station.
  • a base station e.g., an access point
  • the base station can refer to a device in an access network that communicates with a wireless terminal over one or more sectors over an air interface.
  • the base station can be used to convert the received air frame to the IP packet as a router between the wireless terminal and the rest of the access network, wherein the remainder of the access network can include an Internet Protocol (IP) network.
  • IP Internet Protocol
  • the base station can also coordinate attribute management of the air interface.
  • the base station may be a base station (BTS, Base Transceiver Station) in GSM or CDMA, or may be a base station (NodeB) in WCDMA, or may be an evolved base station in LTE (NodeB or eNB or e-NodeB, evolutional Node B), the embodiment is not limited.
  • BTS Base Transceiver Station
  • NodeB base station
  • NodeB evolved base station in LTE
  • LTE NodeB or eNB or e-NodeB, evolutional Node B
  • the receiving end may further include a user equipment, which may include, but is not limited to, a smart phone, a notebook computer, a personal computer (PC), a personal digital assistant (PDA), a mobile internet device (Mobile Internet Device, MID). ), wearable devices (such as smart watches, smart bracelets, smart glasses) and other electronic devices, wherein the operating system of the user device may include but is not limited to Android operating system, IOS operating system, Symbian (Symbian) operating system The Black Berry (Blackberry) operating system, the Windows Phone 8 operating system, and the like are not limited in this embodiment.
  • a user equipment which may include, but is not limited to, a smart phone, a notebook computer, a personal computer (PC), a personal digital assistant (PDA), a mobile internet device (Mobile Internet Device, MID).
  • wearable devices such as smart watches, smart bracelets, smart glasses
  • the operating system of the user device may include but is not limited to Android operating system, IOS operating system, Symbian (Symbian) operating system
  • the embodiment discloses a physical layer blind authentication method for a wireless communication frequency selective fading channel based on a smoothing technique.
  • 2 is a flow chart showing a physical layer blind authentication method according to an embodiment of the present invention.
  • FIG. 3 is a schematic structural diagram showing a transmitting signal transmitted by a transmitting end of a physical layer blind authentication method according to an embodiment of the present invention.
  • the physical layer blind authentication method of the wireless communication frequency selective fading channel based on the smoothing technique is a physical layer authentication method of wireless communication of the wireless communication system having the transmitting end and the receiving end. Based on the signal transmission model described above, as shown in FIG. 2, the transmitting end transmits a carrier signal to the wireless channel.
  • the carrier signal includes an authentication signal, a pilot signal, and an information signal.
  • the authentication signal is superimposed on the pilot signal.
  • the wireless channel is a frequency selective fading channel having a plurality of paths (step S101).
  • the carrier signal includes an authentication signal, a pilot signal, and an information signal, and the authentication signal is superimposed on the pilot signal.
  • the signal length of the authentication signal is equal to the signal length of the pilot signal.
  • the information signal contains information to be transmitted by the user at the transmitting end.
  • the carrier signal transmitted by the transmitting end is transmitted in blocks in the form of data blocks.
  • Each of the carrier signals includes a pilot portion and an information portion.
  • the pilot portion includes an authentication signal and a pilot signal, and the information portion includes an information signal.
  • the carrier signal is transmitted in blocks in the form of data blocks, which facilitates operation of the data.
  • the signal length of the authentication signal or the pilot signal is the first length
  • the signal length of the information signal is the second length
  • the length of each carrier signal is the total length.
  • the signal length of the authentication signal or pilot signal and the signal length of the information signal are equal to the length of each carrier signal. That is, the sum of the first length and the second length is equal to the total length.
  • the authentication signal is obtained by the pilot signal and the key. That is, the pilot signal and the key use the hash matrix to obtain the authentication signal.
  • the obtained authentication signal is superimposed on the pilot signal, and the pilot part of each carrier signal is obtained.
  • the signal expression of the pilot part is as follows:
  • the signal of the pilot portion and the information signal of the information portion are combined to form each carrier signal.
  • the transmission channel of the bearer signal is a radio channel and is a frequency selective fading channel.
  • the frequency selective fading channel has multiple paths, that is, the frequency selective fading channel is a multipath channel.
  • the carrier signal expression after the frequency selective fading channel is as follows:
  • the channel response h iL+k of the frequency selective fading channel obeys the 0 mean variance as Complex Gaussian distribution,
  • the variance of 0 mean is Gaussian random variable.
  • the fading correlation coefficient a of the frequency selective fading channel is determined by the channel Doppler spread and the transmit bandwidth.
  • a small value of a indicates a fast fading
  • a large value indicates a slow fading.
  • the value of a is available at the receiving end.
  • the value of a is in a very small interval, such as a ⁇ [0.9,1].
  • the physical layer blind authentication method further includes receiving, by the receiving end, a carrier signal, and sequentially performing blind independent interference cancellation (BKIC) processing on the carrier signal in each path of the frequency selective fading channel to obtain a target signal.
  • BKIC blind independent interference cancellation
  • pilot signals are cancelled by a smoothing technique using adjacent symbols (step S102).
  • the receiving end receives the carrier signal.
  • the carrier signal includes a pilot portion and an information portion.
  • the physical layer blind authentication method according to the present embodiment mainly processes the pilot portion of the carrier signal at the receiving end.
  • the expression of the pilot portion of the carrier signal received at the receiving end is as follows:
  • the wireless channel is a frequency selective fading channel.
  • a frequency selective fading channel has multiple paths.
  • D max is the maximum multipath delay information
  • D max are generally known in a broadband wireless communication system.
  • OFDM Orthogonal Frequency Division Multiplexing
  • the predefined cyclic prefix determines the maximum delay in all paths.
  • the following processing for the carrier signal refers to processing for the pilot portion of the carrier signal.
  • a blind authentication technique is used on each potential path of the frequency selective fading channel.
  • a blind known interference cancellation (BKIC) process can be performed on the carrier signal in the first path of the frequency selective fading channel, and then the same blind known interference cancellation (BKIC) processing method can be similarly used.
  • the pilot signals in the carrier signal are sequentially cancelled. That is, blind known interference cancellation (BKIC) processing is performed on the carrier signals in each path of the frequency selective fading channel in sequence.
  • step S102 the receiving end receives the carrier signal, and sequentially performs blind-known interference cancellation (BKIC) processing on the carrier signal in each path of the frequency selective fading channel to obtain a target signal.
  • BKIC blind-known interference cancellation
  • the blind known interference cancellation (BKIC) process uses adjacent symbols to eliminate pilot signals in the carrier signal by smoothing techniques.
  • the pilot signal in the carrier signal is eliminated to estimate the channel condition. If the channel response cannot be effectively estimated, the pilot signal in the carrier signal is difficult to eliminate.
  • the blind known interference cancellation method can eliminate the pilot signal while avoiding estimating the channel.
  • the carrier signal received by the receiving end may or may not include the authentication signal.
  • the carrier signal includes the authentication information as a first condition, and the carrier signal does not include the authentication signal as a second condition.
  • BKIC blind known interference cancellation
  • the method of canceling the pilot signal in the carrier signal is the same on each path of the frequency selective fading channel.
  • the carrier signals on each path of the frequency selective fading channel are eliminated by the BKIC processing method.
  • the BKIC processing method includes determining an expression of each symbol under different conditions (step S401) and estimating the target signal using the expression of the symbol (step S402).
  • step S401 an expression for each symbol under different conditions is determined.
  • step S402 the target signal is estimated using the expression of the symbol, and the above expression (4) is expressed as follows:
  • ⁇ k in expression (9) is the residual signal generated during the interference cancellation process by the BKIC module
  • ⁇ k can be modeled as a Gaussian distribution, and for slow fading, the variance of (a ⁇ 1), ⁇ k Very small, so ⁇ k in y k can be removed, and the estimated h k ⁇ t t k +n k is added to add the estimated h k ⁇ t t k +n k in each path to obtain an estimate without The target signal of the pilot signal.
  • step S102 the carrier signal is subjected to BKIC processing to obtain a target signal, and the target signal is subjected to differential signal processing to obtain a target authentication signal.
  • the method of differential signal processing is as follows:
  • ⁇ k is the residual signal and can be approximated as 0 mean variance Gaussian random variable.
  • the physical layer blind authentication method further includes: in the receiving end, obtaining a reference signal based on the key and the pilot signal, performing differential signal processing on the reference signal to obtain a reference authentication signal, and calculating the target authentication signal and the reference authentication.
  • the correlation of the signals yields a test statistic (step S103).
  • step S103 obtaining the reference signal based on the key and the pilot signal means obtaining the reference signal from the key and the pilot signal using the hash matrix.
  • the reference signal is processed to obtain a reference authentication signal, and whether the target authentication signal passes the authentication can be determined according to the correlation between the reference authentication signal and the target authentication signal.
  • step S103 differential signal processing is performed on the reference signal to obtain a reference authentication signal, and the correlation between the target authentication signal and the reference authentication signal is calculated to obtain a test statistic, and the next judgment may be performed according to the value of the test statistic.
  • the reference signal is subjected to differential signal processing to obtain a reference authentication signal.
  • the method of differential signal processing is the same as the differential processing method in the above step S102.
  • the carrier signal received by the receiving end may include an authentication signal, and the carrier signal includes the authentication information as a first condition, and the carrier signal does not include the authentication signal as a second condition.
  • the carrier signal sequentially performs blind known interference cancellation (BKIC) processing on the carrier signal in each path of the frequency selective fading channel to obtain a target signal, and performs differential signal processing on the target signal to obtain a target authentication signal.
  • BKIC blind known interference cancellation
  • a reference signal is obtained based on the key and the pilot signal, and the reference signal is processed by a differential (DP) signal to obtain a reference authentication signal.
  • DP differential
  • the rules for generating the reference signal for the hash matrix, the key, and the pilot signal at the receiving end are the same as the rules for generating the authentication signal for the hash matrix, the key, and the pilot signal at the transmitting end.
  • the reference authentication signal can be regarded as the authentication signal in the first condition, and the target authentication signal can be regarded as the carrier signal in the first condition.
  • the first condition may be expressed as including the reference authentication signal in the target authentication signal; the second condition may be expressed as not including the reference authentication signal in the target authentication signal.
  • the physical layer blind authentication method further includes comparing the test statistic with a predetermined threshold to determine whether the bearer signal can pass the authentication (step S104).
  • step S104 if the test statistic is not less than the predetermined threshold, it is determined that the carrier signal passes the authentication; if the test statistic is less than the predetermined threshold, it is determined that the carrier signal has not passed the authentication.
  • the carrier signal includes the reference authentication signal, that is, the carrier signal passes the authentication; if the test statistic is less than the specified threshold, the carrier signal does not include the reference authentication signal, ie, the carrier The signal did not pass the certification.
  • the predetermined threshold value is obtained by assuming the verification condition, and the first condition and the second condition described above are the first condition H 1 and the second condition H 0 of the hypothesis verification condition, respectively.
  • test statistic is as follows:
  • the variance of 0 mean is Gaussian random variable
  • ⁇ i is 0 mean variance Gaussian random variable.
  • the threshold is specified Determined by the false alarm probability ⁇ FA associated with the ( ⁇ i
  • H 0 ) is the test statistic obtained under the second condition, that is, the statistical characteristic of the pilot signal.
  • the specified threshold can be derived based on the statistical characteristics of the pilot signal and the preset upper limit of the false alarm probability.
  • the authentication signal can be used as an additional pilot signal to recover the signal. Thereby, the performance of signal symbol recovery and the estimation performance of the channel response can be improved.
  • the authentication signal is superimposed on the pilot signal, thereby avoiding the adverse effect on the extraction of the conventional signal. Thereby, it is avoided to reduce the signal to interference and noise ratio (SINR) of the receiving end.
  • SINR signal to interference and noise ratio
  • the physical layer blind authentication method of the wireless communication frequency selective fading channel based on the smoothing technique does not need to occupy additional signal bandwidth.
  • the authentication signal does not become the noise of the information signal, that is, the authentication signal does not affect the extraction of the information signal.
  • the authentication signal does not affect the statistical characteristics of the noise at the receiving end.
  • the physical layer blind authentication method processes a frequency selective fading channel having multiple paths, that is, a multipath channel, and is more suitable for a complex and variable wireless communication environment in an actual communication scenario.
  • the authentication signal is superimposed on the pilot signal. If the whole of the signal superimposed with the pilot signal and the pilot is used as a pilot signal for channel estimation, the accuracy of channel estimation can be improved.
  • FIG. 5 is a schematic diagram showing a signal processing module at a transmitting end of a physical layer blind authentication system according to an embodiment of the present invention.
  • 6 is a schematic diagram showing a signal processing module at the receiving end of a physical layer blind authentication system according to an embodiment of the present invention.
  • the physical layer blind authentication system includes a transmitting device 20.
  • the transmitting device 20 includes a first generating module 201, a second generating module 202, and a synthesizing module 203.
  • the first generation module 201 generates an authentication signal. That is, the key and pilot signals are generated by the first generation module 201 to generate an authentication signal.
  • the first generation module 201 includes a hash matrix.
  • the authentication signal is obtained by using a hash matrix for the key and pilot signals. Wherein, the obtained authentication signal and the pilot signal have the same signal length.
  • the second generation module 202 generates a pilot portion of the carrier signal. That is, the authentication signal is loaded onto the pilot signal by the second generation module 202 to generate a pilot portion of the carrier signal.
  • the expression of the pilot portion of the carrier signal is Equation (1).
  • the length of the pilot portion of the carrier signal is the signal length of the authentication signal or the signal length of the pilot signal.
  • the synthesizing module 203 generates a carrier signal. That is, the pilot portion and the information portion of the carrier signal are combined by the synthesis module 203 to generate a carrier signal.
  • the information portion of the carrier signal is an information signal.
  • the bearer signal is transmitted in blocks of data blocks.
  • Each of the carrier signals includes a pilot portion and an information portion.
  • the signal length of the authentication signal or pilot signal and the signal length of the information signal are equal to the length of each carrier signal.
  • the carrier signal is transmitted in blocks in the form of data blocks to facilitate operation of the data.
  • the carrier signal generated by the transmitting device 20 at the transmitting end reaches the receiving device 30 at the receiving end via the wireless channel.
  • the wireless channel is a frequency selective fading channel having multiple paths.
  • the physical layer blind authentication system further includes a receiving device 30.
  • the receiving device 30 includes a first processing module, a second processing module, and a determination module.
  • the first processing module includes a blind known interference cancellation (BKIC) module 301.
  • the carrier signal passes through a blind known interference cancellation (BKIC) module 301.
  • BKIC blind known interference cancellation
  • the carrier signals in each path of the frequency selective fading channel are sequentially subjected to blind known interference cancellation (BKIC) processing by the blind known interference cancellation (BKIC) module 301, eliminating pilots in the carrier frequency signal. signal.
  • the blind known interference cancellation (BKIC) module 301 employs the BKIC processing method in which the adjacent symbols are used in step S102 to eliminate the pilot signals by the smoothing technique.
  • the specific steps are as shown in FIG. 4.
  • the BKIC processing includes determining an expression of each symbol under different conditions (step S401) and estimating the target signal using the expression of the symbol (step S402).
  • the first processing module further includes a differential (DP) processing module 302.
  • the DP processing module 302 applies the differential signal processing method in step S102.
  • the DP processing module 302 performs differential signal processing on the target signal to obtain a target authentication signal. Thereby, the influence of h k in the target authentication signal is eliminated, that is, the influence of the channel on the carrier signal is eliminated.
  • the expression of the differential signal processing is the formula (10), where ⁇ k is the residual signal, which can be approximated as 0 mean variance. Gaussian random variable.
  • the expression of the differential signal processing is the formula (11), wherein A zero-mean complex Gaussian random variable.
  • the second processing module further includes a hash matrix processing module 303.
  • the pilot signal and the key are obtained by the hash matrix processing module 303 to obtain a reference signal.
  • the hash matrix processing module 303 applies the method of producing the reference signal in step S103.
  • a hash matrix is included in the hash matrix processing module 303.
  • the second processing module further includes a differential (DP) processing module 304.
  • the differential (DP) processing module 304 performs differential signal processing on the reference signal to obtain a reference authentication signal.
  • the DP processing module 304 applies the differential signal processing method in step S103.
  • the second processing module further includes an operation module 305.
  • the operation module 305 is configured to calculate a test statistic of the target authentication signal and the reference authentication signal.
  • the calculation method used by the operation module 305 is the calculation method in step S103.
  • the second processing module further includes a determination module 306.
  • the decision module 306 determines whether the target authentication signal passes the authentication by comparing the test statistic with the specified threshold. That is, it is determined whether the carrier signal can pass the authentication.
  • the predetermined threshold in the determination module 306 is obtained based on the statistical characteristics of the pilot signal and the preset upper limit of the false alarm probability.
  • the calculation method of the prescribed threshold is the threshold calculation method in step S103.
  • FIG. 7 is a schematic structural diagram showing a physical layer blind authentication device according to an embodiment of the present invention.
  • both the transmitting end and the receiving end include the authentication device 50 as shown in FIG.
  • the authentication device 50 includes a processor 501 and a memory 502.
  • the processor 501 and the memory 502 are respectively connected to the communication bus.
  • the memory 502 may be a high speed RAM memory or a non-volatile memory. It will be understood by those skilled in the art that the structure of the authentication device 50 shown in FIG. 7 does not constitute a limitation of the present invention. It may be a bus-shaped structure or a star-shaped structure, and may also include the same as shown in FIG. 7. More or fewer parts, or some parts, or different parts.
  • the processor 501 is a control center of the authentication device, and may be a central processing unit (CPU).
  • the processor 501 connects various parts of the entire authentication device by using various interfaces and lines, and is stored or executed in the memory 502 by running or executing.
  • the transmitting end transmits a carrier signal to the wireless channel, the carrier signal includes an authentication signal, a pilot signal and an information signal, and the authentication signal is superimposed on the pilot signal, and the wireless channel is a frequency selective fading channel having multiple paths (the authentication device 50 by the transmitting end) carried out).
  • the receiving end receives the carrier signal, sequentially performs blind-known interference cancellation (BKIC) processing on the carrier signal in each path of the frequency selective fading channel to obtain a target signal, and performs differential signal processing on the target signal to obtain a target authentication signal.
  • BKIC blind-known interference cancellation
  • the pilot signal is cancelled by the smoothing technique by using adjacent symbols;
  • the reference signal is obtained based on the key and the pilot signal, and the reference signal is subjected to differential signal processing to obtain a reference authentication signal, and is calculated.
  • the correlation between the target authentication signal and the reference authentication signal results in a test statistic; and the test statistic is compared to a prescribed threshold to determine whether the bearer signal can pass the authentication (performed by the authentication device 50 at the receiving end).
  • the processor 501 of the authentication device 50 at the transmitting end also performs the following operations: the carrier signal is transmitted in blocks in the form of data blocks.
  • the processor 501 of the authentication device 50 at the transmitting end further performs the operation of, in each of the carrier signals, the signal length of the pilot signal and the signal length of the information signal and the signal length equal to the carrier signal.
  • the processor 501 of the authentication device 50 at the receiving end further performs an operation of obtaining a reference signal based on the key and the pilot signal using the hash matrix.
  • the processor 501 of the authentication device 50 at the receiving end further performs the following operation: if the check statistic is not less than a prescribed threshold, the carrier signal passes the authentication.
  • the processor 501 of the authentication device 50 at the receiving end further performs the following operations: the predetermined threshold is obtained based on the statistical characteristic of the pilot signal and the preset upper limit of the false alarm probability.
  • the disclosed device can be implemented in other manners.
  • the device implementations described above are merely illustrative.
  • the division of the unit is only a logical function division.
  • there may be another division manner for example, multiple units or components may be combined or may be Integrate into another system, or some features can be ignored or not executed.
  • the mutual coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection through some interface, device or unit, and may be electrical or otherwise.
  • the units described as separate components may or may not be physically separate, and the components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of the embodiment.
  • each functional unit in the embodiment of the present invention may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit.
  • the above integrated unit can be implemented in the form of hardware or in the form of a software functional unit.
  • the integrated unit if implemented in the form of a software functional unit and sold or used as a standalone product, may be stored in a computer readable memory. Based on such understanding, the technical solution of the present invention may contribute to the prior art or all or part of the technical solution may be embodied in the form of a software product stored in a memory. A number of instructions are included to cause a computer device (which may be a personal computer, server or network device, etc.) to perform all or part of the steps of the methods described in various embodiments of the present invention.
  • the foregoing memory includes: a U disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic disk, or an optical disk, and the like, which can store program codes.
  • the embodiment discloses a computer readable storage medium, and those skilled in the art can understand that all or part of the steps of the various physical layer blind authentication methods of the foregoing embodiments can be completed by instructing related hardware through a program (instruction).
  • the program (instruction) may be stored in a computer readable memory (storage medium), and the memory may include: a flash drive, a read only memory (English: Read-Only Memory, abbreviation: ROM), a random access device (English: Random) Access Memory, referred to as: RAM), disk or CD.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本发明公开一种基于平滑技术的频率选择性衰落信道的盲认证方法,其包括向具有多个路径的频率选择性衰落信道发射载体信号,载体信号包括认证信号、导频信号和信息信号,认证信号叠加到导频信号;接收载体信号,顺序地对每个路径中的载体信号进行盲已知干扰消除(BKIC)处理得到目标信号,对目标信号进行差分信号处理以获得目标认证信号,BKIC处理利用相邻的码元,通过平滑技术消除导频信号;基于密钥和导频信号获得参考信号,对参考信号进行差分信号处理以获得参考认证信号,并计算目标认证信号和参考认证信号的相关性,得到检验统计量;并且将检验统计量与规定阈值进行比较,从而确定载体信号是否能够通过认证。

Description

基于平滑技术的频率选择性衰落信道的盲认证方法和系统 技术领域
本发明涉及无线通信技术领域,具体涉及一种基于平滑技术的频率选择性衰落信道的盲认证方法和系统。
背景技术
当前物理层认证技术主要有三种,第一种认证技术是扩频技术(Auth-SS),基本思想是采用传统的直接序列扩频或者调频技术,由于不同的脉冲采用了不同的频率,因此这种技术实现认证需要牺牲一定的带宽。此外,Auth-SS技术的一个关键的限制是只允许了解扩频技术相关先验知识的用户参与通信。因此这种技术的适用范围比较窄。
第二种是基于时分复用认证技术(Auth-TDM),基本思想是,发射端周期性的交替发送信息信号和认证信号。接收端接收到信号后直接提取期望的认证信息实现信号的认证目的。Auth-TDM是无线通信发展早期提出的认证技术,它的优点是操作简单,发射信号之前不需要对认证信号和信息进行预处理(出于安全考虑可能会进行加密)。认证信号是独立于信息信号发送的,因此需要占用一定的带宽,随着无线信息数量的不断增加,及用户对信息隐私性的进一步提高和敌对方攻击技术的不断增强,这种认证技术的安全性受到极大的挑战,已经无法满足用户的需求。
第三种认证技术是认证叠加技术(Auth-SUP),基本思想是将认证信号叠加在信息信号上(叠加的方式可以任意,由密钥决定),再由发射端同时发射出去,接收端接收到信号之后利用密钥对叠加信号中的认证信号进行提取,达到信号认证的目的。
比起早期的Auth-TDM技术,Auth-SUP认证技术在信号发射前需要对认证信号和信息信号进行处理,对发射端的信号处理能力提出了一定的要求,实现起来比Auth-TDM技术要复杂一些,认证信号和信息信号是同时发送的,因此不会占用额外的带宽。此时,由于将认证 信号叠加在信息信号中,接收端接收到信号后需要对信息进行提取,信号处理难度要比Auth-TDM技术高,但认证信息的隐蔽性较Auth-TDM高。此外,由于认证信号对于信息信号的提取来说相当于扮演了噪声的作用,使得接收端的SNR相应降低,对信息信号的提取带来不利影响。
现有的Auth-TDM和Auth-SUP认证技术除了发射信息信号和认证信号,还发射了另一个导频信号。这是由于,这两种认证技术都需要接收端接收到信号之后对信道参数进行估计并进行码元恢复,之后才能对认证信号进行提取,此时对接收端的信号处理能力也提出了一定的要求,在一些特定的场合,这些信号处理技术可能并不可行,且在对信道参数估计和码元恢复过程中容易引起估算误差,将对最终认证信号的提取带来不利影响。
此外,Auth-TDM、Auth-SS和Auth-SUP均把包含认证信息这一事实暴露出来了,其中Auth-SS和Auth-TDM技术相较于不包含认证信息的常规信号,极易引起场景中其他用户尤其是敌对用户的注意,敌对用户对信号进行分析,假冒或者篡改,合法接收端将无法对期望信号进行认证。相对而言,Auth-SUP认证技术的隐蔽性要明显高于Auth-SS和Auth-TDM。然而,这种优越性是基于敌对用户的计算能力具有一定限制的前提下的,一旦敌对用户计算能力提高,也很有可能提取甚至破坏认证信息。
不得不提的是,现有的Auth-SS技术和Auth-SUP技术频率选择性衰落信道场景下性能衰退得很厉害。而现实是,随着无线通信用户数量的不断增加,通信环境也会愈加复杂,被干扰的可能性越来越大,而随着市区通信用户数的增加及城市的不断发展,单纯的时不变衰落信道或简单的时变衰落信道已经不足以刻画当前的通信环境。尤其因为城市建筑物的阻挡,使得多径衰落成为常态,因此不得不考虑基于频率选择性衰落信道下的无线通信物理层认证技术,来提高无线通信的安全性,满足用户的通信安全性要求。
发明内容
本发明是有鉴于上述的状况而提出的,其目的在于提供一种不需 要占用额外的信号带宽、且认证信号不成为影响载体信号中信息信号提取的噪声,不影响接收端噪声的统计特性的基于平滑技术的频率选择性衰落信道的盲认证方法和系统。
为此,本发明的第一方面提供了一种基于平滑技术的频率选择性衰落信道的盲认证方法,是具有发射端和接收端的无线通信系统的无线通信的物理层认证方法,其特征在于,包括:所述发射端向无线信道发射载体信号,所述载体信号包括认证信号、导频信号和信息信号,所述认证信号叠加到所述导频信号,所述无线信道是具有多个路径的频率选择性衰落信道;所述接收端接收所述载体信号,顺序地对所述频率选择性衰落信道的每个路径中的所述载体信号进行盲己知干扰消除(Blind Known Interference Cancellation,简称BKIC)处理得到目标信号,对所述目标信号进行差分信号处理以获得目标认证信号,在所述BKIC处理中,利用相邻的码元,通过平滑技术消除所述导频信号;在所述接收端中,基于密钥和所述导频信号获得参考认证信号,并计算所述目标认证信号和所述参考认证信号的相关性,得到检验统计量;并且判断所述检验统计量是否不小于规定阈值,从而确定所述载体信号是否能够通过认证。
在本发明中,所述认证信号叠加到所述导频信号。由此,可以不影响接收端的信干噪比。所述BKIC处理利用相邻的码元,通过平滑技术消除所述导频信号。在这种情况下,能够在避免估计信道情况下,消除导频信号。
在本发明第一方面所涉及的盲认证方法中,所述载体信号以数据块的形式分块发射。由此,便于对数据进行操作。
在本发明第一方面所涉及的盲认证方法中,在每块所述载体信号中,所述导频信号的信号长度与所述信息信号的信号长度和等于所述载体信号的信号长度。
另外,在本发明第一方面所涉及的盲认证方法中,利用哈希矩阵,基于所述密钥和所述导频信号获得所述参考信号。由此,参考信号经过处理得到参考认证信号,可以根据参考认证信号与目标认证信号的相关性,确定目标认证信号是否通过认证。
在本发明第一方面所涉及的盲认证方法中,若所述检验统计量不 小于所述规定阈值,则所述载体信号通过认证。
在本发明第一方面所涉及的盲认证方法中,所述规定阈值基于所述导频信号的统计特性以及预设的虚警概率上限得到。
本发明的第二方面提供了一种基于平滑技术的频率选择性衰落信道的盲认证设备,其包括处理器,其执行所述存储器存储的计算机程序以实现上述任一项所述的物理层盲认证方法;以及存储器。
本发明的第三方面提供了一种计算机可读存储介质。所述计算机可读存储介质存储有至少一个指令,所述至少一个指令被处理器执行时实现上述第一方面任一项所述的盲认证方法。
本发明的第四方面提供了一种基于平滑技术的频率选择性衰落信道的盲认证系统,其包括发射装置,其向无线信道发射载体信号,所述载体信号包括认证信号、导频信号和信息信号,所述认证信号叠加到所述导频信号,所述无线信道是具有多个路径的频率选择性衰落信道;接收装置包括第一处理模块、第二处理模块和判定模块,所述第一处理模块接收所述载体信号,顺序地对所述频率选择性衰落信道的每个路径中的所述载体信号进行盲己知干扰消除(BKIC)处理得到目标信号,对所述目标信号进行差分信号处理以获得目标认证信号,在所述BKIC处理中,利用相邻的码元,通过平滑技术消除所述导频信号;第二处理模块,其基于密钥和所述导频信号获得参考信号,对所述参考信号进行差分信号处理以获得参考认证信号,并计算所述目标认证信号和经过差分信号处理的所述参考认证信号的相关性,得到检验统计量;以及判定模块,其将所述检验统计量与规定阈值进行比较,从而确定所述载体信号是否能够通过认证。
在本发明中,盲认证系统的发射装置将认证信号叠加到导频信号。由此,能够不占用额外发射带宽资源。盲认证系统的接收装置BKIC处理利用相邻的码元,通过平滑技术消除所述导频信号。在这种情况下,接收装置能够在避免估计信道情况下,消除导频信号。
在本发明第四方面所涉及的盲认证系统中,所述第二处理模块,利用哈希矩阵,基于所述密钥和所述导频信号获得所述参考信号。由此,参考信号经过处理得到参考认证信号,可以根据参考认证信号与目标认证信号的相关性,确定目标认证信号是否通过认证。
在本发明第四方面所涉及的盲认证系统中,所述判定模块中所述规定阈值基于所述导频信号的统计特性以及预设的虚警概率上限得到。
与现有技术相比,本发明实施方式具备以下有益效果:
与现有的Auth-SS、Auth-SUP、Auth-TDM相比,本发明实现无线通信的物理层的认证不需要占用额外的信号带宽,认证信号不成为影响接收信号提取的噪声,不影响接收端噪声的统计特性。本发明提出的盲认证技术处理的是频率选择性衰落信道,更加适应于实际通信场景中复杂多变的无线通信环境。此外,由于本发明中,认证信号是叠加在导频信号中的,如果将认证信号与导频叠加后的信号的整体当成导频信号,用来进行信道估计,还能提高信道估计的准确性。
附图说明
图1是示出了本发明的实施方式所涉及的物理层盲认证方法的信号传输示意图。
图2是示出了本发明的实施方式所涉及的物理层盲认证方法流程示意图。
图3是示出了本发明的实施方式所涉及的物理层盲认证方法发射端发射信号的结构示意图。
图4是示出了本发明的实施方式所涉及的物理层盲认证方法接收端盲己知干扰消除(BKIC)处理流程示意图。
图5是示出了本发明的实施方式所涉及的物理层盲认证系统发射端信号处理模块示意图。
图6是示出了本发明的实施方式所涉及的物理层盲认证系统接收端信号处理模块示意图。
图7是示出了本发明的实施方式所涉及的一种物理层盲认证设备的结构示意图。
具体实施方式
以下,参考附图,详细地说明本发明的优选实施方式。在下面的说明中,对于相同的部件赋予相同的符号,省略重复的说明。另外, 附图只是示意性的图,部件相互之间的尺寸的比例或者部件的形状等可以与实际的不同。
需要说明的是,本发明的说明书和权利要求书及上述附图中的术语“第一”、“第二”、“第三”和“第四”等是用于区别不同对象,而不是用于描述特定顺序。此外,术语“包括”和“具有”以及它们任何变形,意图在于覆盖不排他的包含。例如包含了一系列步骤或单元的过程、方法、系统、产品或设备没有限定于己列出的步骤或单元,而是可选地还包括没有列出的步骤或单元,或可选地还包括对于这些过程、方法、产品或设备固有的其它步骤或单元。
本实施方式公开了一种基于平滑技术的频率选择性衰落信道的盲认证方法、设备和系统,是具有发射端和接收端的无线通信系统的无线通信的物理层认证方法、设备和系统。也即本实施方式公开了一种基于平滑技术的无线通信频率选择性衰落信道的物理层盲认证方法、设备和系统。其能够更加准确地对进行物理层认证。以下结合附图进行详细描述。
图1是示出了本发明的实施方式所涉及的物理层盲认证方法的信号传输示意图。
在本实施方式中,如图1所示,基于平滑技术的无线通信频率选择性衰落信道的物理层盲认证方法基于一个通用的信号传输模型。在这个信号传输模型中,共包含4个用户,其中发送方(发射端)是合法发送方,发射端发射信号给合法接收方,即接收端,另外两个接收方分别为系统中监听用户和敌对用户。敌对用户一旦发现发射端发出的信号中可能有认证信息,将对该信号进行分析并试图提取、破坏、甚至篡改认证信息。但本实施方式不限于此,发射端可以是两个或两个以上,合法接收方可以是两个或两个以上,监听用户和敌对用户也可以分别是两个或两个以上。
在本实施方式中,假设发射端和接收端共同拥有用于认证的密钥,使得接收端可以利用该密钥从发射端发射的信号中提取认证信息。认证信号包含有认证信息。在本实施方式中,载体信号包含认证信号,常规信号不包含认证信号。监听用户对于认证方法一无所知,尽管可以接受并恢复发射端发送的信号,但是不会对信号进行深入的分析, 不影响认证过程。敌对用户通过分析信号的特点可以察觉到认证信号的存在,并意图破坏认证信号。
在本实施方式中,上述的信号模型中的发射端可以包括基站或用户设备。基站(例如接入点)可以是指接入网中在空中接口上通过一个或多个扇区与无线终端通信的设备。基站可用于将收到的空中帧与IP分组进行相互转换,作为无线终端与接入网的其余部分之间的路由器,其中,接入网的其余部分可包括网际协议(IP)网络。基站还可以协调对空中接口的属性管理。例如,基站可以是GSM或CDMA中的基站(BTS,Base Transceiver Station),也可以是WCDMA中的基站(NodeB),还可以是LTE中的演进型基站(NodeB或eNB或e-NodeB,evolutional Node B),本实施方式不做限定。
用户设备可以包括但不限于智能手机、笔记本电脑、个人计算机(Personal Computer,PC)、个人数字助理(Personal Digital Assistant,PDA)、移动互联网设备(Mobile Internet Device,MID)、穿戴设备(如智能手表、智能手环、智能眼镜)等各类电子设备,其中,该用户设备的操作系统可包括但不限于Android操作系统、IOS操作系统、Symbian(塞班)操作系统、Black Berry(黑莓)操作系统、Windows Phone8操作系统等等,本实施方式不做限定。
在本实施方式中,上述的信号模型中的发射端发送信号经过无线信道到达接收端,其中,接收端可以包括基站。基站(例如接入点)可以是指接入网中在空中接口上通过一个或多个扇区与无线终端通信的设备。基站可用于将收到的空中帧与IP分组进行相互转换,作为无线终端与接入网的其余部分之间的路由器,其中,接入网的其余部分可包括网际协议(IP)网络。基站还可以协调对空中接口的属性管理。例如,基站可以是GSM或CDMA中的基站(BTS,Base Transceiver Station),也可以是WCDMA中的基站(NodeB),还可以是LTE中的演进型基站(NodeB或eNB或e-NodeB,evolutional Node B),本实施方式不做限定。
接收端还可以包括用户设备,用户设备可以包括但不限于智能手机、笔记本电脑、个人计算机(Personal Computer,PC)、个人数字助理(Personal Digital Assistant,PDA)、移动互联网设备(Mobile Internet  Device,MID)、穿戴设备(如智能手表、智能手环、智能眼镜)等各类电子设备,其中,该用户设备的操作系统可包括但不限于Android操作系统、IOS操作系统、Symbian(塞班)操作系统、Black Berry(黑莓)操作系统、Windows Phone8操作系统等等,本实施方式不做限定。
本实施方式公开一种基于平滑技术的无线通信频率选择性衰落信道的物理层盲认证方法。图2是示出了本发明的实施方式所涉及的物理层盲认证方法流程示意图。图3是示出了本发明的实施方式所涉及的物理层盲认证方法发射端发射信号的结构示意图。
在本实施方式中,基于平滑技术的无线通信频率选择性衰落信道的物理层盲认证方法是具有发射端和接收端的无线通信系统的无线通信的物理层认证方法。基于上述的信号传输模型,如图2所示,发射端向无线信道发射载体信号。载体信号包括认证信号、导频信号和信息信号。认证信号叠加到导频信号。无线信道是具有多个路径的频率选择性衰落信道(步骤S101)。
在步骤S101中,如图3所示,载体信号包括认证信号、导频信号和信息信号,认证信号叠加到导频信号上。认证信号的信号长度等于导频信号的信号长度。由此,认证信号叠加到导频信号可以避免占用额外的信号带宽。
在本实施方式中,信息信号包含发射端用户所要传递的信息。发射端发送的载体信号是以数据块的形式分块发射的。每块载体信号包括导频部分和信息部分。导频部分包括认证信号和导频信号,信息部分包括信息信号。另外,载体信号以数据块的形式分块发射,有利于对数据进行操作。
在本实施方式中,认证信号或导频信号的信号长度是第一长度,信息信号的信号长度是第二长度,每块载体信号的长度是总长度。认证信号或导频信号的信号长度与信息信号的信号长度和等于每块载体信号的长度。即第一长度与第二长度的和等于总长度。
在本实施方式中,认证信号是通过导频信号和密钥得到的。也即导频信号和密钥利用哈希矩阵得到了认证信号。将得到的认证信号叠加到导频信号上,得到了每块载体信号的导频部分,导频部分的信号表达式是如下:
m i=ρ sP itt i                (1)
上述导频部分的信号表达式(1)中,
Figure PCTCN2017116025-appb-000001
Figure PCTCN2017116025-appb-000002
为导频信息和认证信号的功率分配因子。假设认证信号和导频信号是相互独立的,则有
Figure PCTCN2017116025-appb-000003
在本实施方式中,将导频部分的信号和信息部分的信息信号组合在一起,构成了每块载体信号。
另外,在本实施方式中,载体信号的传输信道是无线信道,并且是频率选择性衰落信道。频率选择性衰落信道具有多个路径,即频率选择性衰落信道是多路径信道。经过频率选择性衰落信道后载体信号表达式是如下:
y iL+k=h iL+kx iL+k+n iL+k                  (2)
在本实施方式中,频率选择性衰落信道的信道响应h iL+k,服从0均值方差为
Figure PCTCN2017116025-appb-000004
的复高斯分布,
Figure PCTCN2017116025-appb-000005
为接收端的噪声,服从0均值方差为
Figure PCTCN2017116025-appb-000006
的高斯随机变量。
在本实施方式中,在信道响应中,
Figure PCTCN2017116025-appb-000007
为动态噪声,且
Figure PCTCN2017116025-appb-000008
一般情况下,频率选择性衰落信道的衰落相关系数a,由信道多普勒扩展和发射带宽所决定。特别地,a值较小时表示快衰落,a值较大时表示慢衰落。在许多类型的场景中,a的值在接收端是可以获取的。而在实际无线系统场景中,a的取值范围在一个非常小的区间内,如a∈[0.9,1]。
在本实施方式中,物理层盲认证方法还包括接收端接收载体信号,顺序地对频率选择性衰落信道的每个路径中的载体信号进行盲己知干扰消除(BKIC)处理得到目标信号。在BKIC处理中,利用相邻的码元,通过平滑技术消除导频信号(步骤S102)。
在本实施方式中,接收端接收载体信号。载体信号中包含导频部分和信息部分。本实施方式所涉及的物理层盲认证方法在接收端主要是针对载体信号的导频部分进行处理。接收端接收的载体信号的导频部分的表达式是如下:
Figure PCTCN2017116025-appb-000009
在本实施方式中,无线信道是频率选择性衰落信道。频率选择性衰落信道具有多个路径。其中,D max为多径中最大的延时信息,通常在宽带无线通信系统中D max都是己知的。例如,在正交频分复用(OFDM)系统中,预定义的循环前缀决定了所有路径中最大的延时。
在本实施方式中,下述针对载体信号的处理指的是针对载体信号的导频部分的处理。
在本实施方式中,对频率选择性衰落信道的每个潜在的路径上使用盲认证技术。具体而言,首先,可以对频率选择性衰落信道的第一路径中的载体信号进行盲已知干扰消除(BKIC)处理,然后,类似的可以用相同的盲已知干扰消除(BKIC)处理方法除去频率选择性衰落信道的第二路径中的载体信号中的导频信号,重复D max+1次上述的盲己知干扰消除(BKIC)处理过程,使得频率选择性衰落信道的每个路径中的载体信号中的导频信号被顺序地消除。也即顺序地对频率选择性衰落信道的每个路径中的载体信号进行盲己知干扰消除(BKIC)处理。
步骤S102中,接收端接收载体信号,顺序地对频率选择性衰落信道的每个路径中的载体信号进行盲己知干扰消除(BKIC)处理得到目标信号。其中,盲己知干扰消除(BKIC)处理是利用相邻的码元,通过平滑技术消除载体信号中的导频信号。通常将载体信号中的导频信号消除需要估计信道情况,若信道响应不能进行有效估计,载体信号中的导频信号很难消除。盲己知干扰消除方法可以在避免估计信道情况下,消除导频信号。
在本实施方式中,接收端接收到的载体信号可能包含认证信号,也可能不包含认证信号。设载体信号包含认证信息为第一条件,设载体信号不包含认证信号为第二条件。
图4是示出了本发明的实施方式所涉及的物理层盲认证方法接收端盲已知干扰消除(BKIC)处理流程示意图。
在本实施方式中,如图4所示,在频率选择性衰落信道的每个路径上,消除载体信号中导频信号的方法一样。具体而言,频率选择性衰落信道的每个路径上的载体信号都是通过BKIC处理方法消除导频 信号的。BKIC处理方法包括确定不同条件下每个码元的表达式(步骤S401)和利用码元的表达式,估算目标信号(步骤S402)。
在步骤S401中,确定不同条件下每个码元的表达式。
其中,在第一条件下,每个码元的表达式如下:
Figure PCTCN2017116025-appb-000010
在第二条件下,每个码元的表达式如下:
Figure PCTCN2017116025-appb-000011
从上述的公式中可以看出,相邻的码元间存在相关噪声,表达式(4)中的相关噪声不能用普通的噪声白化技术来校正,需要通过步骤S402来消除相关噪声,估算出h kρ tt k+n k
在步骤S402中,利用码元的表达式,估算目标信号,将上述表达式(4)表示如下:
Figure PCTCN2017116025-appb-000012
Figure PCTCN2017116025-appb-000013
可以得到估算结果如下:
Figure PCTCN2017116025-appb-000014
Figure PCTCN2017116025-appb-000015
其中,表达式(9)中ε k是由于BKIC模块进行干扰消除过程中产生的残余信号,ε k可以被建模成高斯分布,对于慢衰落来说,(a→1),ε k的方差很小,因此可以将y k中的ε k去除,得到估算的h kρ tt k+n k将每个路径中估算的h kρ tt k+n k相加,得到估算的不含导频信号的目标信号。
另外,在步骤S102中,载体信号经过BKIC处理后得到目标信号,目标信号进行差分信号处理,得到目标认证信号。
在本实施方式中,差分信号处理的方法如下:
第一条件下,差分信号处理的表达式如下:
Figure PCTCN2017116025-appb-000016
其中Δ k为残余信号,可以近似建模为0均值方差为
Figure PCTCN2017116025-appb-000017
的高斯随机变量。
在第二条件下,差分信号处理的表达式如下:
Figure PCTCN2017116025-appb-000018
其中
Figure PCTCN2017116025-appb-000019
为零均值复高斯随机变量。
在本实施方式中,物理层盲认证方法还包括在接收端中,基于密钥和导频信号获得参考信号,对参考信号进行差分信号处理以获得参考认证信号,并计算目标认证信号和参考认证信号的相关性,得到检验统计量(步骤S103)。
在步骤S103中,基于密钥和导频信号获得参考信号是指利用哈希矩阵,由密钥和导频信号获得参考信号。由此,参考信号经过处理得到参考认证信号,可以根据参考认证信号与目标认证信号的相关性,确定目标认证信号是否通过认证。
在步骤S103中,对参考信号进行差分信号处理以获得参考认证信号,计算目标认证信号和参考认证信号的相关性,得到检验统计量,可以根据检验统计量的值进行下一步判断。
在本实施方式中,对参考信号进行差分信号处理以获得参考认证信号。差分信号处理的方法与上述步骤S102中的差分处理方法相同。
在上述步骤S102中,接收端接收到的载体信号可能包含认证信号,设载体信号包含认证信息为第一条件,设载体信号不包含认证信号为第二条件。
其中,在接收端,载体信号顺序地对频率选择性衰落信道的每个路径中的载体信号进行盲已知干扰消除(BKIC)处理得到目标信号,对目标信号进行差分信号处理以获得目标认证信号。在接收端,基于密钥和导频信号获得参考信号,参考信号经过差分(DP)信号处理后得到参考认证信号。接收端的哈希矩阵、密钥和导频信号生成参考信号的规则与发送端的哈希矩阵、密钥和导频信号生成认证信号的规则相同。参考认证信号可以看做是第一条件中的认证信号,目标认证信 号可以看做是第一条件中的载体信号。由此,第一条件可以表示为目标认证信号中包括参考认证信号;第二条件可以表示为目标认证信号中不包括参考认证信号。
在本实施方式中,物理层盲认证方法还包括将检验统计量与规定阈值进行比较,从而确定载体信号是否能够通过认证(步骤S104)。
在步骤S104中,若检验统计量不小于规定阈值,则判定载体信号通过认证;若检验统计量小于规定阈值,则判定载体信号没有通过认证。
在本实施方式中,若检验统计量不小于规定阈值,则载体信号中包含参考认证信号,即载体信号通过认证;若检验统计量小于规定阈值,则载体信号中不包含参考认证信号,即载体信号没有通过认证。
另外,在本实施方式中,规定阈值是通过假设验证条件得到的,上述的第一条件和第二条件分别是假设验证条件的第一条件H 1和第二条件H 0
在本实施方式中,第一条件H 1下,检验统计量的表达式如下:
Figure PCTCN2017116025-appb-000020
第二条件H 0下,检验统计量的表达式如下:
Figure PCTCN2017116025-appb-000021
其中,
Figure PCTCN2017116025-appb-000022
为0均值方差为
Figure PCTCN2017116025-appb-000023
的高斯随机变量,φ i是0均值方差为
Figure PCTCN2017116025-appb-000024
的高斯随机变量。
另外,规定阈值
Figure PCTCN2017116025-appb-000025
由(τ i|H 0)分布相关的虚警概率ε FA决定,表示如下:
Figure PCTCN2017116025-appb-000026
其中(τ i|H 0)是在第二条件下得到的检验统计量,也即导频信号的统计特性。由此,规定阈值可以基于导频信号的统计特性以及预设的虚警概率上限得到。
另外,在本实施方式中,如果发射端的身份被认证后,将认证信号可以当成额外的导频信号来恢复信号。由此,可以提高信号码元恢复的性能和对信道响应的估计性能。
另外,在本实施方式中,认证信号叠加到导频信号,避免了对常规信号的提取带来的不利影响。由此,避免降低接收端的信干噪比(SINR)。
本实施方式中,基于平滑技术的无线通信频率选择性衰落信道的物理层盲认证方法不需要占用额外的信号带宽。另外,在接收端,对载体信号进行信息信号提取时,认证信号不会成为信息信号的噪声,即认证信号不会影响信息信号的提取。认证信号不影响接收端噪声的统计特性。
在本实施方式中,物理层盲认证方法处理的是具有多个路径的频率选择性衰落信道,也即多路径信道,更加适应于实际通信场景中复杂多变的无线通信环境。另外,认证信号是叠加在导频信号中的,如果将认证信号与导频叠加后的信号的整体当成导频信号,用来进行信道估计,还能提高信道估计的准确性。
本实施方式公开一种基于平滑技术的无线通信频率选择性衰落信道的物理层盲认证系统。图5是示出了本发明的实施方式所涉及的物理层盲认证系统发射端信号处理模块示意图。图6是示出了本发明的实施方式所涉及的物理层盲认证系统接收端信号处理模块示意图。
在本实施方式中,如图5所示,物理层盲认证系统包括发射装置20。发射装置20包括第一生成模块201、第二生成模块202和合成模块203。
在本实施方式中,如图5所示,第一生成模块201生成认证信号。也即密钥和导频信号经过第一生成模块201生成认证信号。第一生成模块201中包含哈希矩阵。认证信号是密钥和导频信号利用哈希矩阵得到的。其中,得到的认证信号与导频信号的信号长度相同。
在本实施方式中,如图5所示,第二生成模块202生成了载体信号的导频部分。也即认证信号通过第二生成模块202加载到导频信号上,生成载体信号的导频部分。载体信号的导频部分的表达式为公式 (1),另外,载体信号的导频部分的长度为认证信号的信号长度或导频信号的信号长度。
在本实施方式中,如图5所示,合成模块203生成了载体信号。也即载体信号的导频部分和信息部分通过合成模块203组合在一起,生成载体信号。载体信号的信息部分是信息信号。
在本实施方式中,载体信号是按数据块分块发送的。每块载体信号包括导频部分和信息部分。认证信号或导频信号的信号长度与信息信号的信号长度和等于每块载体信号的长度。另外,载体信号是以数据块的形式分块发射有利于对数据进行操作。
在本实施方式中,发射端的发射装置20生成的载体信号经过无线信道到达接收端的接收装置30。另外,无线信道是具有多个路径的频率选择性衰落信道。
在本实施方式中,物理层盲认证系统还包括接收装置30。接收装置30包括第一处理模块、第二处理模块和判定模块。
在本实施方式中,第一处理模块包括盲己知干扰消除(BKIC)模块301。载体信号经过盲己知干扰消除(BKIC)模块301。具体而言,频率选择性衰落信道的每个路径中的载体信号顺序地经过盲己知干扰消除(BKIC)模块301进行盲已知干扰消除(BKIC)处理,消除了载频信号中的导频信号。
在本实施方式中,盲己知干扰消除(BKIC)模块301运用了步骤S102中利用相邻的码元,通过平滑技术消除导频信号的BKIC处理方法。具体步骤如图4所示,BKIC处理包括确定不同条件下每个码元的表达式(步骤S401)和利用码元的表达式,估算目标信号(步骤S402)。
在本实施方式中,如图6所示,第一处理模块还包括差分(DP)处理模块302。DP处理模块302运用了步骤S102中差分信号处理方法。DP处理模块302对目标信号进行差分信号处理,得到目标认证信号。由此,消除了目标认证信号中h k的影响,也即消除信道对载体信号的影响。
在DP处理模块302中,第一条件下,差分信号处理的表达式为公式(10),其中Δ k为残余信号,可以近似建模为0均值方差为
Figure PCTCN2017116025-appb-000027
的高 斯随机变量。在第二条件下,差分信号处理的表达式为公式(11),其中
Figure PCTCN2017116025-appb-000028
为零均值复高斯随机变量。
在本实施方式中,如图6所示,第二处理模块还包括哈希矩阵处理模块303。导频信号和密钥通过哈希矩阵处理模块303得到参考信号。哈希矩阵处理模块303运用了步骤S103中生产参考信号的方法。哈希矩阵处理模块303中包括哈希矩阵。
在本实施方式中,如图6所示,第二处理模块还包括差分(DP)处理模块304。差分(DP)处理模块304对参考信号进行差分信号处理,得到参考认证信号。DP处理模块304运用了步骤S103中差分信号处理方法。
在本实施方式中,如图6所示,第二处理模块还包括运算模块305。运算模块305用来计算目标认证信号和参考认证信号的检验统计量。运算模块305运用的计算方法是步骤S103中的计算方法。
在本实施方式中,如图6所示,第二处理模块还包括判定模块306。判定模块306通过比较检验统计量和规定阈值,确定目标认证信号是否通过认证。也即确定载体信号是否能够通过认证。
在本实施方式中,判定模块306中的规定阈值是基于导频信号的统计特性以及预设的虚警概率上限得到。规定阈值的计算方法为步骤S103中的阈值计算方法。
本实施方式公开一种基于平滑技术的无线通信频率选择性衰落信道的物理层盲认证设备50。图7是示出了本发明的实施方式所涉及的一种物理层盲认证设备的结构示意图。在本实施方式中,发射端与接收端都包含如图7所示的认证设备50。
在本实施方式中,如图7所示,认证设备50包括处理器501和存储器502。其中,处理器501以及存储器502分别连接通信总线。存储器502可以是高速RAM存储器,也可以是非易失性的存储器(non-volatile memory)。本领域技术人员可以理解,图7中示出的认证设备50的结构并不构成对本发明的限定,它既可以是总线形结构,也可以是星型结构,还可以包括比图7所示的更多或更少的部件,或者组合某些部件,或者不同的部件布置。
其中,处理器501为认证设备的控制中心,可以是中央处理器(Central Processing Unit,CPU),处理器501利用各种接口和线路连接整个认证设备的各个部分,通过运行或执行存储在存储器502内的软件程序和/或模块,以及调用存储在存储器502内存储的程序代码,用于执行以下操作:
发射端向无线信道发射载体信号,载体信号包括认证信号、导频信号和信息信号,认证信号叠加到导频信号,无线信道是具有多个路径的频率选择性衰落信道(由发射端的认证设备50执行)。
接收端接收载体信号,顺序地对频率选择性衰落信道的每个路径中的载体信号进行盲己知干扰消除(BKIC)处理得到目标信号,对目标信号进行差分信号处理以获得目标认证信号,在BKIC处理中,利用相邻的码元,通过平滑技术消除导频信号;在接收端中,基于密钥和导频信号获得参考信号,对参考信号进行差分信号处理以获得参考认证信号,并计算目标认证信号和参考认证信号的相关性,得到检验统计量;并且将检验统计量与规定阈值进行比较,从而确定载体信号是否能够通过认证(由接收端的认证设备50执行)。
在本实施方式中,发射端的认证设备50的处理器501的还执行以下操作:载体信号以数据块的形式分块发射。
在本实施方式中,发射端的认证设备50的处理器501的还执行以下操作:在每块载体信号中,导频信号的信号长度与信息信号的信号长度和等于载体信号的信号长度。
在本实施方式中,接收端的认证设备50的处理器501的还执行以下操作:利用哈希矩阵,基于密钥和导频信号获得参考信号。
在本实施方式中,接收端的认证设备50的处理器501的还执行以下操作:若检验统计量不小于规定阈值,则载体信号通过认证。
在本实施方式中,接收端的认证设备50的处理器501的还执行以下操作:规定阈值基于导频信号的统计特性以及预设的虚警概率上限得到。
在本实施方式中,应该理解到,所揭露的设备,可通过其它的方式实现。例如,以上所描述的设备实施方式仅仅是示意性的,例如所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的 划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性或其它的形式。
作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。
另外,在本发明实施方式中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。
所述集成的单元如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储器中。基于这样的理解,本发明的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的全部或部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储器中,包括若干指令用以使得一台计算机设备(可为个人计算机、服务器或者网络设备等)执行本发明各个实施例所述方法的全部或部分步骤。而前述的存储器包括:U盘、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、移动硬盘、磁碟或者光盘等各种可以存储程序代码的介质。
本实施方式公开一种计算机可读存储介质,本领域普通技术人员可以理解上述实施方式的各种物理层盲认证方法中的全部或部分步骤是可以通过程序(指令)来指令相关的硬件来完成,该程序(指令)可以存储于计算机可读存储器(存储介质)中,存储器可以包括:闪存盘、只读存储器(英文:Read-Only Memory,简称:ROM)、随机存取器(英文:Random Access Memory,简称:RAM)、磁盘或光盘等。
虽然以上结合附图和实施例对本发明进行了具体说明,但是可以理解,上述说明不以任何形式限制本发明。本领域技术人员在不偏离 本发明的实质精神和范围的情况下可以根据需要对本发明进行变形和变化,这些变形和变化均落入本发明的范围内。

Claims (11)

  1. 一种基于平滑技术的频率选择性衰落信道的盲认证方法,是具有发射端和接收端的无线通信系统的无线通信的物理层认证方法,其特征在于,
    包括:
    所述发射端向无线信道发射载体信号,所述载体信号包括认证信号、导频信号和信息信号,所述认证信号叠加到所述导频信号,所述无线信道是具有多个路径的频率选择性衰落信道;
    所述接收端接收所述载体信号,顺序地对所述频率选择性衰落信道的每个路径中的所述载体信号进行盲已知干扰消除(BKIC)处理得到目标信号,对所述目标信号进行差分信号处理以获得目标认证信号,在所述BKIC处理中,利用相邻的码元,通过平滑技术消除所述导频信号;
    在所述接收端中,基于密钥和所述导频信号获得参考信号,对所述参考信号进行差分信号处理以获得参考认证信号,并计算所述目标认证信号和所述参考认证信号的相关性,得到检验统计量;并且
    将所述检验统计量与规定阈值进行比较,从而确定所述载体信号是否能够通过认证。
  2. 根据权利要求1所述的盲认证方法,其特征在于:
    所述载体信号以数据块的形式分块发射。
  3. 根据权利要求2所述的盲认证方法,其特征在于:
    在每块所述载体信号中,所述导频信号的信号长度与所述信息信号的信号长度和等于所述载体信号的信号长度。
  4. 根据权利要求1所述的盲认证方法,其特征在于,
    利用哈希矩阵,基于所述密钥和所述导频信号获得所述参考信号。
  5. 根据权利要求1所述的盲认证方法,其特征在于,
    若所述检验统计量不小于所述规定阈值,则所述载体信号通过认 证。
  6. 根据权利要求1所述的盲认证方法,其特征在于,
    所述规定阈值基于所述导频信号的统计特性以及预设的虚警概率上限得到。
  7. 一种基于平滑技术的频率选择性衰落信道的盲认证设备,其特征在于,
    包括:
    处理器,其执行所述存储器存储的计算机程序以实现如权利要求1至6任一项所述的盲认证方法;以及
    存储器。
  8. 一种计算机可读存储介质,其特征在于,
    所述计算机可读存储介质存储有至少一个指令,所述至少一个指令被处理器执行时实现如权利要求1至6任一项所述的盲认证方法。
  9. 一种基于平滑技术的频率选择性衰落信道的盲认证系统,其特征在于,
    发射装置,其向无线信道发射载体信号,所述载体信号包括认证信号、导频信号和信息信号,所述认证信号叠加到所述导频信号,所述无线信道是具有多个路径的频率选择性衰落信道;以及
    接收装置,其包括:第一处理模块,其接收所述载体信号,顺序地对所述频率选择性衰落信道的每个路径中的所述载体信号进行盲已知干扰消除(BKIC)处理得到目标信号,对所述目标信号进行差分信号处理以获得目标认证信号,在所述BKIC处理中,利用相邻的码元,通过平滑技术消除所述导频信号;第二处理模块,其基于密钥和所述导频信号获得参考信号,对所述参考信号进行差分信号处理以获得参考认证信号,并计算所述目标认证信号和经过差分信号处理的所述参考认证信号的相关性,得到检验统计量;以及判定模块,其将所述检验统计量与规定阈值进行比较,从而确定所述载体信号是否能够通过 认证。
  10. 根据权利要求9所述的认证系统,其特征在于,
    所述第二处理模块利用哈希矩阵基于所述密钥和所述导频信号获得所述参考信号。
  11. 根据权利要求9所述的盲认证系统,其特征在于,
    在所述判定模块中,所述规定阈值基于所述导频信号的统计特性和预设的虚警概率上限得到。
PCT/CN2017/116025 2017-12-13 2017-12-13 基于平滑技术的频率选择性衰落信道的盲认证方法和系统 WO2019113864A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US16/772,749 US11412378B2 (en) 2017-12-13 2017-12-13 Smoothing technology-based blind authentication method and system for frequency selective fading channel
PCT/CN2017/116025 WO2019113864A1 (zh) 2017-12-13 2017-12-13 基于平滑技术的频率选择性衰落信道的盲认证方法和系统

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2017/116025 WO2019113864A1 (zh) 2017-12-13 2017-12-13 基于平滑技术的频率选择性衰落信道的盲认证方法和系统

Publications (1)

Publication Number Publication Date
WO2019113864A1 true WO2019113864A1 (zh) 2019-06-20

Family

ID=66819860

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/116025 WO2019113864A1 (zh) 2017-12-13 2017-12-13 基于平滑技术的频率选择性衰落信道的盲认证方法和系统

Country Status (2)

Country Link
US (1) US11412378B2 (zh)
WO (1) WO2019113864A1 (zh)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US12035134B2 (en) * 2018-06-19 2024-07-09 University Of Notre Dame Du Lac Security for wireless communications
WO2022234454A1 (en) * 2021-05-03 2022-11-10 Lenovo (Singapore) Pte. Ltd. Key establishment using wireless channel information

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105635125A (zh) * 2015-12-25 2016-06-01 电子科技大学 基于射频指纹和信道信息的物理层联合认证方法
US9538040B2 (en) * 2011-12-16 2017-01-03 University Of Maryland, College Park Active sensing for dynamic spectrum access
CN107196920A (zh) * 2017-04-28 2017-09-22 中国人民解放军信息工程大学 一种面向无线通信系统的密钥产生分配方法

Family Cites Families (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7079480B2 (en) * 2000-10-28 2006-07-18 Agee Brian G Enhancing security and efficiency of wireless communications through structural embedding
US7313167B2 (en) * 2002-09-30 2007-12-25 Telefonaktiebolaget Lm Ericsson (Publ) Signal-to-noise ratio estimation of CDMA signals
US7415043B2 (en) * 2004-01-13 2008-08-19 Interdigital Technology Corporation Code division multiple access (CDMA) method and apparatus for protecting and authenticating wirelessly transmitted digital information
KR100978876B1 (ko) * 2005-12-20 2010-08-31 인터디지탈 테크날러지 코포레이션 결합 랜덤성으로부터 비밀키를 발생하는 방법 및 시스템
US20100246825A1 (en) * 2007-09-07 2010-09-30 University Of Maryland Wireless communication method and system for transmission authentication at the physical layer
US9117235B2 (en) * 2008-01-25 2015-08-25 The Trustees Of Columbia University In The City Of New York Belief propagation for generalized matching
US9161214B2 (en) * 2010-03-05 2015-10-13 University Of Maryland Wireless communication method and system for transmission authentication at the physical layer
FR2976760A1 (fr) * 2011-06-17 2012-12-21 France Telecom Procede de traitement d’un paquet de donnees a l’emission, procede de traitement d’un paquet de donnees a la reception, dispositifs et equipements noeuds associes
US8971435B2 (en) * 2011-07-25 2015-03-03 Blackberry Limited Multi-user communication using sparse space codes
KR101209908B1 (ko) * 2011-08-04 2012-12-11 광주과학기술원 희소 신호 전송 방법 및 장치, 그리고 희소 신호 복구 방법 및 장치
US9713019B2 (en) * 2011-08-17 2017-07-18 CBF Networks, Inc. Self organizing backhaul radio
US8931053B2 (en) * 2011-12-29 2015-01-06 The University Of Western Ontario Method and apparatus for wireless security enhancement using multiple attributes monitoring, continuous and interleaved authentication, and system adaptation
CN103475680B (zh) * 2012-06-07 2018-12-11 南京中兴新软件有限责任公司 一种物联网能力集成方法与系统
US9935951B2 (en) * 2012-07-18 2018-04-03 TapLink, Inc. Remote blind hashing
US9673920B2 (en) * 2012-12-18 2017-06-06 Department 13, LLC Intrusion detection and radio fingerprint tracking
US9088447B1 (en) * 2014-03-21 2015-07-21 Mitsubishi Electric Research Laboratories, Inc. Non-coherent transmission and equalization in doubly-selective MIMO channels
US10491261B1 (en) * 2014-11-06 2019-11-26 Abdullah A. Al-Eidan Multi carrier frequency modulation spread spectrum communication system
US20170085396A1 (en) * 2015-09-22 2017-03-23 Qualcomm Incorporated Dynamic smoothing based on channel flatness detection
US10536315B2 (en) * 2016-03-30 2020-01-14 Idac Holdings, Inc. Methods and procedures to improve physical layer efficiency using unique word (UW) discrete fourier transform spread orthogonal frequency division multiplexing (DFT-S-OFDM)
US10129709B1 (en) * 2016-07-14 2018-11-13 Mbit Wireless, Inc. Method and apparatus for fading profile detection
US12111895B2 (en) * 2020-07-09 2024-10-08 Veracity, Inc. Group-based authentication technique

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9538040B2 (en) * 2011-12-16 2017-01-03 University Of Maryland, College Park Active sensing for dynamic spectrum access
CN105635125A (zh) * 2015-12-25 2016-06-01 电子科技大学 基于射频指纹和信道信息的物理层联合认证方法
CN107196920A (zh) * 2017-04-28 2017-09-22 中国人民解放军信息工程大学 一种面向无线通信系统的密钥产生分配方法

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
JI, . XINSHENG ET AL.: "Physical Layer Authentication Scheme Based on Hash Method", JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, vol. 38, no. 11, 30 November 2016 (2016-11-30), XP033109576 *

Also Published As

Publication number Publication date
US20200322796A1 (en) 2020-10-08
US11412378B2 (en) 2022-08-09

Similar Documents

Publication Publication Date Title
KR20200005477A (ko) 초광대역 보안 레인징
US20220116212A1 (en) Process for monovalent one-to-one extraction of keys from the propagation channel
CN110381510B (zh) 基于叠加物理层认证标签的非正交多址认证系统
US11082841B2 (en) Secure physical layer slope authentication method in wireless communications and apparatus
CN108206795B (zh) 基于置信传递的频率选择性衰落信道的盲认证方法和系统
WO2019061516A1 (zh) 隐蔽的无线通信物理层斜率认证方法和装置
CN108173791B (zh) 基于平滑技术的时变衰落信道的物理层盲认证方法及系统
WO2019113864A1 (zh) 基于平滑技术的频率选择性衰落信道的盲认证方法和系统
CN110324830B (zh) 基于时分复用物理层认证标签的非正交多址认证系统
CN109600746B (zh) 协同无线通信系统中机会中继选择方案的性能分析方法
CN110381511B (zh) 基于共享物理层认证标签的非正交多址认证系统
US20200015083A1 (en) Robust Physical Layer Slope Authentication Method in Wireless Communications and Apparatus
CN108156102B (zh) 基于平滑技术的频率选择性衰落信道的盲认证方法和系统
CN108199991B (zh) 基于置信传递的时变衰落信道的物理层盲认证方法和系统
CN110392371B (zh) 基于时分复用认证标签的非正交多址认证系统的优化方法
CN110312255B (zh) 基于叠加认证标签的非正交多址认证系统的参数优化方法
WO2019113866A1 (zh) 基于平滑技术的时变衰落信道的物理层盲认证方法及系统
WO2019113863A1 (zh) 基于置信传递的频率选择性衰落信道的盲认证方法和系统
WO2019113865A1 (zh) 基于置信传递的时变衰落信道的物理层盲认证方法和系统
CN109982326B (zh) 一种基于大尺度衰落特征的物理层安全认证方法
CN109600742B (zh) 隐蔽的无线通信物理层斜率认证方法和装置
CN108966211B (zh) 安全的无线通信物理层斜率认证方法和装置
CN108934012B (zh) 基于最优隐蔽性协议的物理层认证方法及系统
WO2019205179A1 (zh) 基于最优隐蔽性协议的物理层认证方法及系统
Nain et al. A cyclic prefix based secure side-channel (CP-SSC) over OFDM for LTE D2D sidelink communication

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17934760

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 25.09.2020)

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 25.09.2020)

122 Ep: pct application non-entry in european phase

Ref document number: 17934760

Country of ref document: EP

Kind code of ref document: A1