WO2019113864A1 - 基于平滑技术的频率选择性衰落信道的盲认证方法和系统 - Google Patents
基于平滑技术的频率选择性衰落信道的盲认证方法和系统 Download PDFInfo
- Publication number
- WO2019113864A1 WO2019113864A1 PCT/CN2017/116025 CN2017116025W WO2019113864A1 WO 2019113864 A1 WO2019113864 A1 WO 2019113864A1 CN 2017116025 W CN2017116025 W CN 2017116025W WO 2019113864 A1 WO2019113864 A1 WO 2019113864A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- signal
- authentication
- blind
- pilot
- carrier
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L25/00—Baseband systems
- H04L25/02—Details ; arrangements for supplying electrical power along data transmission lines
- H04L25/03—Shaping networks in transmitter or receiver, e.g. adaptive shaping networks
- H04L25/03006—Arrangements for removing intersymbol interference
- H04L25/03159—Arrangements for removing intersymbol interference operating in the frequency domain
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0875—Generation of secret information including derivation or calculation of cryptographic keys or passwords based on channel impulse response [CIR]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3215—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a plurality of channels
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3228—One-time or temporary data, i.e. information which is sent for every authentication or authorization, e.g. one-time-password, one-time-token or one-time-key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/69—Identity-dependent
- H04W12/79—Radio fingerprint
Definitions
- the present invention relates to the field of wireless communication technologies, and in particular, to a blind authentication method and system for a frequency selective fading channel based on a smoothing technique.
- the first authentication technology is spread spectrum technology (Auth-SS).
- Auth-SS spread spectrum technology
- the basic idea is to use traditional direct sequence spread spectrum or frequency modulation technology. Since different pulses use different frequencies, this is A technology that implements authentication requires a certain amount of bandwidth to be sacrificed.
- Auth-SS technology a key limitation of the Auth-SS technology is that only users who are aware of prior knowledge of the spread spectrum technology are allowed to participate in the communication. Therefore, the scope of application of this technology is relatively narrow.
- the second is based on Time Division Multiplexing (Auth-TDM).
- Auth-TDM Time Division Multiplexing
- the basic idea is that the transmitting end periodically transmits information signals and authentication signals alternately. After receiving the signal, the receiving end directly extracts the desired authentication information to achieve the authentication purpose of the signal.
- Auth-TDM is an authentication technology proposed in the early development of wireless communication. Its advantage is that it is easy to operate. It does not need to pre-process authentication signals and information before transmitting signals (it may be encrypted for security reasons).
- the authentication signal is transmitted independently of the information signal, so it needs to occupy a certain bandwidth. With the continuous increase of the number of wireless information, and the further improvement of the information privacy of the user and the continuous enhancement of the enemy attack technology, the security of the authentication technology is enhanced. Sex is greatly challenged and cannot meet the needs of users.
- the third authentication technology is the authentication overlay technology (Auth-SUP).
- the basic idea is to superimpose the authentication signal on the information signal (the superposition method can be arbitrary, determined by the key), and then transmitted by the transmitting end simultaneously, and the receiving end receives After the signal is used, the authentication signal in the superimposed signal is extracted by using the key to achieve the purpose of signal authentication.
- the Auth-SUP authentication technology needs to process the authentication signal and the information signal before the signal is transmitted, and puts forward certain requirements on the signal processing capability of the transmitting end, which is more complicated than the Auth-TDM technology.
- the authentication signal and the information signal are transmitted simultaneously, so no extra bandwidth is occupied.
- the receiving end since the authentication signal is superimposed on the information signal, the receiving end needs to extract the information after receiving the signal, and the signal processing difficulty is higher than the Auth-TDM technology, but the concealment of the authentication information is higher than that of the Auth-TDM.
- the authentication signal acts as a noise for the extraction of the information signal, the SNR of the receiving end is correspondingly reduced, which adversely affects the extraction of the information signal.
- the existing Auth-TDM and Auth-SUP authentication technologies transmit another pilot signal in addition to the information signal and the authentication signal. This is because both authentication technologies require the receiver to estimate the channel parameters and perform symbol recovery after receiving the signal, and then the authentication signal can be extracted. At this time, the signal processing capability of the receiver is also required. In some specific situations, these signal processing techniques may not be feasible, and the estimation error is easily caused in the channel parameter estimation and symbol recovery process, which will adversely affect the extraction of the final authentication signal.
- Auth-TDM, Auth-SS, and Auth-SUP expose the fact that authentication information is included.
- Auth-SS and Auth-TDM technologies are more likely to cause scenes than conventional signals that do not contain authentication information.
- Other users especially the attention of hostile users, the hostile user analyzes the signal, impersonates or falsifies, and the legitimate receiver will not be able to authenticate the desired signal.
- the cryptacy of Auth-SUP authentication technology is significantly higher than Auth-SS and Auth-TDM.
- this superiority is based on the premise that the computing power of the hostile user has certain limitations. Once the computing power of the hostile user is improved, it is very likely to extract or even destroy the authentication information.
- the present invention has been made in view of the above circumstances, and an object thereof is to provide a statistical characteristic that does not need to occupy an extra signal bandwidth, and the authentication signal does not affect the noise extracted by the information signal in the carrier signal, and does not affect the noise of the receiving end.
- the first aspect of the present invention provides a blind authentication method for a frequency selective fading channel based on a smoothing technique, which is a physical layer authentication method for wireless communication of a wireless communication system having a transmitting end and a receiving end, wherein The method includes: the transmitting end transmitting a carrier signal to a wireless channel, where the carrier signal includes an authentication signal, a pilot signal, and an information signal, the authentication signal is superimposed on the pilot signal, and the wireless channel is configured to have multiple paths a frequency selective fading channel; the receiving end receives the carrier signal, and sequentially performs blind known interference cancellation on the carrier signal in each path of the frequency selective fading channel (Blind Known Interference Cancellation, referred to as BKIC Processing a target signal, performing differential signal processing on the target signal to obtain a target authentication signal, in the BKIC processing, using adjacent symbols, eliminating the pilot signal by a smoothing technique; at the receiving end Calculating a reference authentication signal based on the key and the pilot signal, and calculating the target authentication signal
- the authentication signal is superimposed on the pilot signal.
- the BKIC process utilizes adjacent symbols to cancel the pilot signal by a smoothing technique. In this case, the pilot signal can be eliminated without avoiding the estimated channel.
- the carrier signal is transmitted in blocks in the form of data blocks. This makes it easy to operate on the data.
- a signal length of the pilot signal and a signal length of the information signal are equal to a signal length of the carrier signal.
- the reference signal is obtained based on the key and the pilot signal by using a hash matrix.
- the reference signal is processed to obtain a reference authentication signal, and whether the target authentication signal passes the authentication can be determined according to the correlation between the reference authentication signal and the target authentication signal.
- the carrier signal passes the authentication if the test statistic is not less than the predetermined threshold.
- the predetermined threshold is obtained based on a statistical characteristic of the pilot signal and a preset upper limit of a false alarm probability.
- a second aspect of the present invention provides a blind authentication device for a frequency selective fading channel based on a smoothing technique, comprising a processor that executes the computer program of the memory storage to implement the physical layer blindness described in any of the above Authentication method; and memory.
- a third aspect of the invention provides a computer readable storage medium.
- the computer readable storage medium stores at least one instruction that, when executed by a processor, implements the blind authentication method of any of the above aspects.
- a fourth aspect of the present invention provides a blind authentication system for a frequency selective fading channel based on a smoothing technique, comprising a transmitting device that transmits a carrier signal to a wireless channel, the carrier signal including an authentication signal, a pilot signal, and information a signal, the authentication signal is superimposed on the pilot signal, the wireless channel is a frequency selective fading channel having multiple paths;
- the receiving device includes a first processing module, a second processing module, and a determining module, the first The processing module receives the carrier signal, and performs blind-known interference cancellation (BKIC) processing on the carrier signal in each path of the frequency selective fading channel to obtain a target signal, and performs differential signals on the target signal.
- BKIC blind-known interference cancellation
- the transmitting device of the blind authentication system superimposes the authentication signal on the pilot signal. Thereby, it is possible to not occupy additional transmission bandwidth resources.
- the receiving device BKIC processing of the blind authentication system uses adjacent symbols to cancel the pilot signal by a smoothing technique. In this case, the receiving device can cancel the pilot signal without evading the estimated channel.
- the second processing module obtains the reference signal based on the key and the pilot signal by using a hash matrix.
- the reference signal is processed to obtain a reference authentication signal, and whether the target authentication signal passes the authentication can be determined according to the correlation between the reference authentication signal and the target authentication signal.
- the predetermined threshold in the determining module is obtained based on a statistical characteristic of the pilot signal and a preset upper limit of a false alarm probability.
- the authentication of the physical layer of the wireless communication of the present invention does not need to occupy additional signal bandwidth, and the authentication signal does not affect the noise of the received signal, and does not affect the reception.
- the statistical properties of the end noise The blind authentication technology proposed by the present invention processes a frequency selective fading channel, and is more suitable for a complex and variable wireless communication environment in an actual communication scenario.
- the authentication signal is superimposed on the pilot signal in the present invention, if the entire signal of the authentication signal and the pilot superimposed signal is used as a pilot signal for channel estimation, the accuracy of channel estimation can be improved. .
- FIG. 1 is a schematic diagram showing signal transmission of a physical layer blind authentication method according to an embodiment of the present invention.
- FIG. 2 is a flow chart showing a physical layer blind authentication method according to an embodiment of the present invention.
- FIG. 3 is a schematic structural diagram showing a transmitting signal transmitted by a transmitting end of a physical layer blind authentication method according to an embodiment of the present invention.
- BKIC blind-known interference cancellation
- FIG. 5 is a schematic diagram showing a signal processing module at a transmitting end of a physical layer blind authentication system according to an embodiment of the present invention.
- FIG. 6 is a schematic diagram showing a signal processing module at the receiving end of a physical layer blind authentication system according to an embodiment of the present invention.
- FIG. 7 is a schematic structural diagram showing a physical layer blind authentication device according to an embodiment of the present invention.
- the embodiment discloses a blind authentication method, device and system for a frequency selective fading channel based on a smoothing technique, and is a physical layer authentication method, device and system for wireless communication of a wireless communication system having a transmitting end and a receiving end. That is, the embodiment discloses a physical layer blind authentication method, device and system for a wireless communication frequency selective fading channel based on a smoothing technique. It enables more accurate physical layer authentication.
- the details are described below in conjunction with the drawings.
- FIG. 1 is a schematic diagram showing signal transmission of a physical layer blind authentication method according to an embodiment of the present invention.
- the physical layer blind authentication method of the wireless communication frequency selective fading channel based on the smoothing technique is based on a general signal transmission model.
- this signal transmission model there are four users, in which the sender (transmitting end) is a legitimate sender, the transmitting end transmits a signal to the legal receiver, that is, the receiving end, and the other two receivers are respectively listening users in the system. Hostile user. Once the hostile user finds that there may be authentication information in the signal sent by the transmitter, the signal will be analyzed and attempted to extract, destroy, or even tamper with the authentication information.
- the embodiment is not limited thereto, and the transmitting end may be two or more, the legal receiving party may be two or more, and the monitoring user and the enemy user may also be two or more respectively.
- the transmitting end and the receiving end jointly have a key for authentication, so that the receiving end can use the key to extract the authentication information from the signal transmitted by the transmitting end.
- the authentication signal contains authentication information.
- the carrier signal contains an authentication signal, and the conventional signal does not include an authentication signal.
- the listening user knows nothing about the authentication method. Although it can accept and recover the signal sent by the transmitter, it does not analyze the signal in depth and does not affect the authentication process. By analyzing the characteristics of the signal, the hostile user can perceive the existence of the authentication signal and intends to destroy the authentication signal.
- the transmitting end in the foregoing signal model may include a base station or a user equipment.
- a base station e.g., an access point
- the base station can refer to a device in an access network that communicates with a wireless terminal over one or more sectors over an air interface.
- the base station can be used to convert the received air frame to the IP packet as a router between the wireless terminal and the rest of the access network, wherein the remainder of the access network can include an Internet Protocol (IP) network.
- IP Internet Protocol
- the base station can also coordinate attribute management of the air interface.
- the base station may be a base station (BTS, Base Transceiver Station) in GSM or CDMA, or may be a base station (NodeB) in WCDMA, or may be an evolved base station in LTE (NodeB or eNB or e-NodeB, evolutional Node B), the embodiment is not limited.
- BTS Base Transceiver Station
- NodeB base station
- NodeB evolved base station in LTE
- LTE NodeB or eNB or e-NodeB, evolutional Node B
- User equipment may include, but is not limited to, a smart phone, a notebook computer, a personal computer (PC), a personal digital assistant (PDA), a mobile internet device (MID), a wearable device (such as a smart watch).
- a smart phone a notebook computer
- PC personal computer
- PDA personal digital assistant
- MID mobile internet device
- wearable device such as a smart watch
- Various types of electronic devices, such as smart bracelets and smart glasses wherein the operating system of the user device may include, but is not limited to, an Android operating system, an IOS operating system, a Symbian operating system, and a BlackBerry operating system.
- the Windows Phone 8 operating system and the like are not limited in this embodiment.
- the transmitting end of the signal model sends a signal to the receiving end through the wireless channel, where the receiving end may include the base station.
- a base station e.g., an access point
- the base station can refer to a device in an access network that communicates with a wireless terminal over one or more sectors over an air interface.
- the base station can be used to convert the received air frame to the IP packet as a router between the wireless terminal and the rest of the access network, wherein the remainder of the access network can include an Internet Protocol (IP) network.
- IP Internet Protocol
- the base station can also coordinate attribute management of the air interface.
- the base station may be a base station (BTS, Base Transceiver Station) in GSM or CDMA, or may be a base station (NodeB) in WCDMA, or may be an evolved base station in LTE (NodeB or eNB or e-NodeB, evolutional Node B), the embodiment is not limited.
- BTS Base Transceiver Station
- NodeB base station
- NodeB evolved base station in LTE
- LTE NodeB or eNB or e-NodeB, evolutional Node B
- the receiving end may further include a user equipment, which may include, but is not limited to, a smart phone, a notebook computer, a personal computer (PC), a personal digital assistant (PDA), a mobile internet device (Mobile Internet Device, MID). ), wearable devices (such as smart watches, smart bracelets, smart glasses) and other electronic devices, wherein the operating system of the user device may include but is not limited to Android operating system, IOS operating system, Symbian (Symbian) operating system The Black Berry (Blackberry) operating system, the Windows Phone 8 operating system, and the like are not limited in this embodiment.
- a user equipment which may include, but is not limited to, a smart phone, a notebook computer, a personal computer (PC), a personal digital assistant (PDA), a mobile internet device (Mobile Internet Device, MID).
- wearable devices such as smart watches, smart bracelets, smart glasses
- the operating system of the user device may include but is not limited to Android operating system, IOS operating system, Symbian (Symbian) operating system
- the embodiment discloses a physical layer blind authentication method for a wireless communication frequency selective fading channel based on a smoothing technique.
- 2 is a flow chart showing a physical layer blind authentication method according to an embodiment of the present invention.
- FIG. 3 is a schematic structural diagram showing a transmitting signal transmitted by a transmitting end of a physical layer blind authentication method according to an embodiment of the present invention.
- the physical layer blind authentication method of the wireless communication frequency selective fading channel based on the smoothing technique is a physical layer authentication method of wireless communication of the wireless communication system having the transmitting end and the receiving end. Based on the signal transmission model described above, as shown in FIG. 2, the transmitting end transmits a carrier signal to the wireless channel.
- the carrier signal includes an authentication signal, a pilot signal, and an information signal.
- the authentication signal is superimposed on the pilot signal.
- the wireless channel is a frequency selective fading channel having a plurality of paths (step S101).
- the carrier signal includes an authentication signal, a pilot signal, and an information signal, and the authentication signal is superimposed on the pilot signal.
- the signal length of the authentication signal is equal to the signal length of the pilot signal.
- the information signal contains information to be transmitted by the user at the transmitting end.
- the carrier signal transmitted by the transmitting end is transmitted in blocks in the form of data blocks.
- Each of the carrier signals includes a pilot portion and an information portion.
- the pilot portion includes an authentication signal and a pilot signal, and the information portion includes an information signal.
- the carrier signal is transmitted in blocks in the form of data blocks, which facilitates operation of the data.
- the signal length of the authentication signal or the pilot signal is the first length
- the signal length of the information signal is the second length
- the length of each carrier signal is the total length.
- the signal length of the authentication signal or pilot signal and the signal length of the information signal are equal to the length of each carrier signal. That is, the sum of the first length and the second length is equal to the total length.
- the authentication signal is obtained by the pilot signal and the key. That is, the pilot signal and the key use the hash matrix to obtain the authentication signal.
- the obtained authentication signal is superimposed on the pilot signal, and the pilot part of each carrier signal is obtained.
- the signal expression of the pilot part is as follows:
- the signal of the pilot portion and the information signal of the information portion are combined to form each carrier signal.
- the transmission channel of the bearer signal is a radio channel and is a frequency selective fading channel.
- the frequency selective fading channel has multiple paths, that is, the frequency selective fading channel is a multipath channel.
- the carrier signal expression after the frequency selective fading channel is as follows:
- the channel response h iL+k of the frequency selective fading channel obeys the 0 mean variance as Complex Gaussian distribution,
- the variance of 0 mean is Gaussian random variable.
- the fading correlation coefficient a of the frequency selective fading channel is determined by the channel Doppler spread and the transmit bandwidth.
- a small value of a indicates a fast fading
- a large value indicates a slow fading.
- the value of a is available at the receiving end.
- the value of a is in a very small interval, such as a ⁇ [0.9,1].
- the physical layer blind authentication method further includes receiving, by the receiving end, a carrier signal, and sequentially performing blind independent interference cancellation (BKIC) processing on the carrier signal in each path of the frequency selective fading channel to obtain a target signal.
- BKIC blind independent interference cancellation
- pilot signals are cancelled by a smoothing technique using adjacent symbols (step S102).
- the receiving end receives the carrier signal.
- the carrier signal includes a pilot portion and an information portion.
- the physical layer blind authentication method according to the present embodiment mainly processes the pilot portion of the carrier signal at the receiving end.
- the expression of the pilot portion of the carrier signal received at the receiving end is as follows:
- the wireless channel is a frequency selective fading channel.
- a frequency selective fading channel has multiple paths.
- D max is the maximum multipath delay information
- D max are generally known in a broadband wireless communication system.
- OFDM Orthogonal Frequency Division Multiplexing
- the predefined cyclic prefix determines the maximum delay in all paths.
- the following processing for the carrier signal refers to processing for the pilot portion of the carrier signal.
- a blind authentication technique is used on each potential path of the frequency selective fading channel.
- a blind known interference cancellation (BKIC) process can be performed on the carrier signal in the first path of the frequency selective fading channel, and then the same blind known interference cancellation (BKIC) processing method can be similarly used.
- the pilot signals in the carrier signal are sequentially cancelled. That is, blind known interference cancellation (BKIC) processing is performed on the carrier signals in each path of the frequency selective fading channel in sequence.
- step S102 the receiving end receives the carrier signal, and sequentially performs blind-known interference cancellation (BKIC) processing on the carrier signal in each path of the frequency selective fading channel to obtain a target signal.
- BKIC blind-known interference cancellation
- the blind known interference cancellation (BKIC) process uses adjacent symbols to eliminate pilot signals in the carrier signal by smoothing techniques.
- the pilot signal in the carrier signal is eliminated to estimate the channel condition. If the channel response cannot be effectively estimated, the pilot signal in the carrier signal is difficult to eliminate.
- the blind known interference cancellation method can eliminate the pilot signal while avoiding estimating the channel.
- the carrier signal received by the receiving end may or may not include the authentication signal.
- the carrier signal includes the authentication information as a first condition, and the carrier signal does not include the authentication signal as a second condition.
- BKIC blind known interference cancellation
- the method of canceling the pilot signal in the carrier signal is the same on each path of the frequency selective fading channel.
- the carrier signals on each path of the frequency selective fading channel are eliminated by the BKIC processing method.
- the BKIC processing method includes determining an expression of each symbol under different conditions (step S401) and estimating the target signal using the expression of the symbol (step S402).
- step S401 an expression for each symbol under different conditions is determined.
- step S402 the target signal is estimated using the expression of the symbol, and the above expression (4) is expressed as follows:
- ⁇ k in expression (9) is the residual signal generated during the interference cancellation process by the BKIC module
- ⁇ k can be modeled as a Gaussian distribution, and for slow fading, the variance of (a ⁇ 1), ⁇ k Very small, so ⁇ k in y k can be removed, and the estimated h k ⁇ t t k +n k is added to add the estimated h k ⁇ t t k +n k in each path to obtain an estimate without The target signal of the pilot signal.
- step S102 the carrier signal is subjected to BKIC processing to obtain a target signal, and the target signal is subjected to differential signal processing to obtain a target authentication signal.
- the method of differential signal processing is as follows:
- ⁇ k is the residual signal and can be approximated as 0 mean variance Gaussian random variable.
- the physical layer blind authentication method further includes: in the receiving end, obtaining a reference signal based on the key and the pilot signal, performing differential signal processing on the reference signal to obtain a reference authentication signal, and calculating the target authentication signal and the reference authentication.
- the correlation of the signals yields a test statistic (step S103).
- step S103 obtaining the reference signal based on the key and the pilot signal means obtaining the reference signal from the key and the pilot signal using the hash matrix.
- the reference signal is processed to obtain a reference authentication signal, and whether the target authentication signal passes the authentication can be determined according to the correlation between the reference authentication signal and the target authentication signal.
- step S103 differential signal processing is performed on the reference signal to obtain a reference authentication signal, and the correlation between the target authentication signal and the reference authentication signal is calculated to obtain a test statistic, and the next judgment may be performed according to the value of the test statistic.
- the reference signal is subjected to differential signal processing to obtain a reference authentication signal.
- the method of differential signal processing is the same as the differential processing method in the above step S102.
- the carrier signal received by the receiving end may include an authentication signal, and the carrier signal includes the authentication information as a first condition, and the carrier signal does not include the authentication signal as a second condition.
- the carrier signal sequentially performs blind known interference cancellation (BKIC) processing on the carrier signal in each path of the frequency selective fading channel to obtain a target signal, and performs differential signal processing on the target signal to obtain a target authentication signal.
- BKIC blind known interference cancellation
- a reference signal is obtained based on the key and the pilot signal, and the reference signal is processed by a differential (DP) signal to obtain a reference authentication signal.
- DP differential
- the rules for generating the reference signal for the hash matrix, the key, and the pilot signal at the receiving end are the same as the rules for generating the authentication signal for the hash matrix, the key, and the pilot signal at the transmitting end.
- the reference authentication signal can be regarded as the authentication signal in the first condition, and the target authentication signal can be regarded as the carrier signal in the first condition.
- the first condition may be expressed as including the reference authentication signal in the target authentication signal; the second condition may be expressed as not including the reference authentication signal in the target authentication signal.
- the physical layer blind authentication method further includes comparing the test statistic with a predetermined threshold to determine whether the bearer signal can pass the authentication (step S104).
- step S104 if the test statistic is not less than the predetermined threshold, it is determined that the carrier signal passes the authentication; if the test statistic is less than the predetermined threshold, it is determined that the carrier signal has not passed the authentication.
- the carrier signal includes the reference authentication signal, that is, the carrier signal passes the authentication; if the test statistic is less than the specified threshold, the carrier signal does not include the reference authentication signal, ie, the carrier The signal did not pass the certification.
- the predetermined threshold value is obtained by assuming the verification condition, and the first condition and the second condition described above are the first condition H 1 and the second condition H 0 of the hypothesis verification condition, respectively.
- test statistic is as follows:
- the variance of 0 mean is Gaussian random variable
- ⁇ i is 0 mean variance Gaussian random variable.
- the threshold is specified Determined by the false alarm probability ⁇ FA associated with the ( ⁇ i
- H 0 ) is the test statistic obtained under the second condition, that is, the statistical characteristic of the pilot signal.
- the specified threshold can be derived based on the statistical characteristics of the pilot signal and the preset upper limit of the false alarm probability.
- the authentication signal can be used as an additional pilot signal to recover the signal. Thereby, the performance of signal symbol recovery and the estimation performance of the channel response can be improved.
- the authentication signal is superimposed on the pilot signal, thereby avoiding the adverse effect on the extraction of the conventional signal. Thereby, it is avoided to reduce the signal to interference and noise ratio (SINR) of the receiving end.
- SINR signal to interference and noise ratio
- the physical layer blind authentication method of the wireless communication frequency selective fading channel based on the smoothing technique does not need to occupy additional signal bandwidth.
- the authentication signal does not become the noise of the information signal, that is, the authentication signal does not affect the extraction of the information signal.
- the authentication signal does not affect the statistical characteristics of the noise at the receiving end.
- the physical layer blind authentication method processes a frequency selective fading channel having multiple paths, that is, a multipath channel, and is more suitable for a complex and variable wireless communication environment in an actual communication scenario.
- the authentication signal is superimposed on the pilot signal. If the whole of the signal superimposed with the pilot signal and the pilot is used as a pilot signal for channel estimation, the accuracy of channel estimation can be improved.
- FIG. 5 is a schematic diagram showing a signal processing module at a transmitting end of a physical layer blind authentication system according to an embodiment of the present invention.
- 6 is a schematic diagram showing a signal processing module at the receiving end of a physical layer blind authentication system according to an embodiment of the present invention.
- the physical layer blind authentication system includes a transmitting device 20.
- the transmitting device 20 includes a first generating module 201, a second generating module 202, and a synthesizing module 203.
- the first generation module 201 generates an authentication signal. That is, the key and pilot signals are generated by the first generation module 201 to generate an authentication signal.
- the first generation module 201 includes a hash matrix.
- the authentication signal is obtained by using a hash matrix for the key and pilot signals. Wherein, the obtained authentication signal and the pilot signal have the same signal length.
- the second generation module 202 generates a pilot portion of the carrier signal. That is, the authentication signal is loaded onto the pilot signal by the second generation module 202 to generate a pilot portion of the carrier signal.
- the expression of the pilot portion of the carrier signal is Equation (1).
- the length of the pilot portion of the carrier signal is the signal length of the authentication signal or the signal length of the pilot signal.
- the synthesizing module 203 generates a carrier signal. That is, the pilot portion and the information portion of the carrier signal are combined by the synthesis module 203 to generate a carrier signal.
- the information portion of the carrier signal is an information signal.
- the bearer signal is transmitted in blocks of data blocks.
- Each of the carrier signals includes a pilot portion and an information portion.
- the signal length of the authentication signal or pilot signal and the signal length of the information signal are equal to the length of each carrier signal.
- the carrier signal is transmitted in blocks in the form of data blocks to facilitate operation of the data.
- the carrier signal generated by the transmitting device 20 at the transmitting end reaches the receiving device 30 at the receiving end via the wireless channel.
- the wireless channel is a frequency selective fading channel having multiple paths.
- the physical layer blind authentication system further includes a receiving device 30.
- the receiving device 30 includes a first processing module, a second processing module, and a determination module.
- the first processing module includes a blind known interference cancellation (BKIC) module 301.
- the carrier signal passes through a blind known interference cancellation (BKIC) module 301.
- BKIC blind known interference cancellation
- the carrier signals in each path of the frequency selective fading channel are sequentially subjected to blind known interference cancellation (BKIC) processing by the blind known interference cancellation (BKIC) module 301, eliminating pilots in the carrier frequency signal. signal.
- the blind known interference cancellation (BKIC) module 301 employs the BKIC processing method in which the adjacent symbols are used in step S102 to eliminate the pilot signals by the smoothing technique.
- the specific steps are as shown in FIG. 4.
- the BKIC processing includes determining an expression of each symbol under different conditions (step S401) and estimating the target signal using the expression of the symbol (step S402).
- the first processing module further includes a differential (DP) processing module 302.
- the DP processing module 302 applies the differential signal processing method in step S102.
- the DP processing module 302 performs differential signal processing on the target signal to obtain a target authentication signal. Thereby, the influence of h k in the target authentication signal is eliminated, that is, the influence of the channel on the carrier signal is eliminated.
- the expression of the differential signal processing is the formula (10), where ⁇ k is the residual signal, which can be approximated as 0 mean variance. Gaussian random variable.
- the expression of the differential signal processing is the formula (11), wherein A zero-mean complex Gaussian random variable.
- the second processing module further includes a hash matrix processing module 303.
- the pilot signal and the key are obtained by the hash matrix processing module 303 to obtain a reference signal.
- the hash matrix processing module 303 applies the method of producing the reference signal in step S103.
- a hash matrix is included in the hash matrix processing module 303.
- the second processing module further includes a differential (DP) processing module 304.
- the differential (DP) processing module 304 performs differential signal processing on the reference signal to obtain a reference authentication signal.
- the DP processing module 304 applies the differential signal processing method in step S103.
- the second processing module further includes an operation module 305.
- the operation module 305 is configured to calculate a test statistic of the target authentication signal and the reference authentication signal.
- the calculation method used by the operation module 305 is the calculation method in step S103.
- the second processing module further includes a determination module 306.
- the decision module 306 determines whether the target authentication signal passes the authentication by comparing the test statistic with the specified threshold. That is, it is determined whether the carrier signal can pass the authentication.
- the predetermined threshold in the determination module 306 is obtained based on the statistical characteristics of the pilot signal and the preset upper limit of the false alarm probability.
- the calculation method of the prescribed threshold is the threshold calculation method in step S103.
- FIG. 7 is a schematic structural diagram showing a physical layer blind authentication device according to an embodiment of the present invention.
- both the transmitting end and the receiving end include the authentication device 50 as shown in FIG.
- the authentication device 50 includes a processor 501 and a memory 502.
- the processor 501 and the memory 502 are respectively connected to the communication bus.
- the memory 502 may be a high speed RAM memory or a non-volatile memory. It will be understood by those skilled in the art that the structure of the authentication device 50 shown in FIG. 7 does not constitute a limitation of the present invention. It may be a bus-shaped structure or a star-shaped structure, and may also include the same as shown in FIG. 7. More or fewer parts, or some parts, or different parts.
- the processor 501 is a control center of the authentication device, and may be a central processing unit (CPU).
- the processor 501 connects various parts of the entire authentication device by using various interfaces and lines, and is stored or executed in the memory 502 by running or executing.
- the transmitting end transmits a carrier signal to the wireless channel, the carrier signal includes an authentication signal, a pilot signal and an information signal, and the authentication signal is superimposed on the pilot signal, and the wireless channel is a frequency selective fading channel having multiple paths (the authentication device 50 by the transmitting end) carried out).
- the receiving end receives the carrier signal, sequentially performs blind-known interference cancellation (BKIC) processing on the carrier signal in each path of the frequency selective fading channel to obtain a target signal, and performs differential signal processing on the target signal to obtain a target authentication signal.
- BKIC blind-known interference cancellation
- the pilot signal is cancelled by the smoothing technique by using adjacent symbols;
- the reference signal is obtained based on the key and the pilot signal, and the reference signal is subjected to differential signal processing to obtain a reference authentication signal, and is calculated.
- the correlation between the target authentication signal and the reference authentication signal results in a test statistic; and the test statistic is compared to a prescribed threshold to determine whether the bearer signal can pass the authentication (performed by the authentication device 50 at the receiving end).
- the processor 501 of the authentication device 50 at the transmitting end also performs the following operations: the carrier signal is transmitted in blocks in the form of data blocks.
- the processor 501 of the authentication device 50 at the transmitting end further performs the operation of, in each of the carrier signals, the signal length of the pilot signal and the signal length of the information signal and the signal length equal to the carrier signal.
- the processor 501 of the authentication device 50 at the receiving end further performs an operation of obtaining a reference signal based on the key and the pilot signal using the hash matrix.
- the processor 501 of the authentication device 50 at the receiving end further performs the following operation: if the check statistic is not less than a prescribed threshold, the carrier signal passes the authentication.
- the processor 501 of the authentication device 50 at the receiving end further performs the following operations: the predetermined threshold is obtained based on the statistical characteristic of the pilot signal and the preset upper limit of the false alarm probability.
- the disclosed device can be implemented in other manners.
- the device implementations described above are merely illustrative.
- the division of the unit is only a logical function division.
- there may be another division manner for example, multiple units or components may be combined or may be Integrate into another system, or some features can be ignored or not executed.
- the mutual coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection through some interface, device or unit, and may be electrical or otherwise.
- the units described as separate components may or may not be physically separate, and the components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of the embodiment.
- each functional unit in the embodiment of the present invention may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit.
- the above integrated unit can be implemented in the form of hardware or in the form of a software functional unit.
- the integrated unit if implemented in the form of a software functional unit and sold or used as a standalone product, may be stored in a computer readable memory. Based on such understanding, the technical solution of the present invention may contribute to the prior art or all or part of the technical solution may be embodied in the form of a software product stored in a memory. A number of instructions are included to cause a computer device (which may be a personal computer, server or network device, etc.) to perform all or part of the steps of the methods described in various embodiments of the present invention.
- the foregoing memory includes: a U disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic disk, or an optical disk, and the like, which can store program codes.
- the embodiment discloses a computer readable storage medium, and those skilled in the art can understand that all or part of the steps of the various physical layer blind authentication methods of the foregoing embodiments can be completed by instructing related hardware through a program (instruction).
- the program (instruction) may be stored in a computer readable memory (storage medium), and the memory may include: a flash drive, a read only memory (English: Read-Only Memory, abbreviation: ROM), a random access device (English: Random) Access Memory, referred to as: RAM), disk or CD.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Power Engineering (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
Claims (11)
- 一种基于平滑技术的频率选择性衰落信道的盲认证方法,是具有发射端和接收端的无线通信系统的无线通信的物理层认证方法,其特征在于,包括:所述发射端向无线信道发射载体信号,所述载体信号包括认证信号、导频信号和信息信号,所述认证信号叠加到所述导频信号,所述无线信道是具有多个路径的频率选择性衰落信道;所述接收端接收所述载体信号,顺序地对所述频率选择性衰落信道的每个路径中的所述载体信号进行盲已知干扰消除(BKIC)处理得到目标信号,对所述目标信号进行差分信号处理以获得目标认证信号,在所述BKIC处理中,利用相邻的码元,通过平滑技术消除所述导频信号;在所述接收端中,基于密钥和所述导频信号获得参考信号,对所述参考信号进行差分信号处理以获得参考认证信号,并计算所述目标认证信号和所述参考认证信号的相关性,得到检验统计量;并且将所述检验统计量与规定阈值进行比较,从而确定所述载体信号是否能够通过认证。
- 根据权利要求1所述的盲认证方法,其特征在于:所述载体信号以数据块的形式分块发射。
- 根据权利要求2所述的盲认证方法,其特征在于:在每块所述载体信号中,所述导频信号的信号长度与所述信息信号的信号长度和等于所述载体信号的信号长度。
- 根据权利要求1所述的盲认证方法,其特征在于,利用哈希矩阵,基于所述密钥和所述导频信号获得所述参考信号。
- 根据权利要求1所述的盲认证方法,其特征在于,若所述检验统计量不小于所述规定阈值,则所述载体信号通过认 证。
- 根据权利要求1所述的盲认证方法,其特征在于,所述规定阈值基于所述导频信号的统计特性以及预设的虚警概率上限得到。
- 一种基于平滑技术的频率选择性衰落信道的盲认证设备,其特征在于,包括:处理器,其执行所述存储器存储的计算机程序以实现如权利要求1至6任一项所述的盲认证方法;以及存储器。
- 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质存储有至少一个指令,所述至少一个指令被处理器执行时实现如权利要求1至6任一项所述的盲认证方法。
- 一种基于平滑技术的频率选择性衰落信道的盲认证系统,其特征在于,发射装置,其向无线信道发射载体信号,所述载体信号包括认证信号、导频信号和信息信号,所述认证信号叠加到所述导频信号,所述无线信道是具有多个路径的频率选择性衰落信道;以及接收装置,其包括:第一处理模块,其接收所述载体信号,顺序地对所述频率选择性衰落信道的每个路径中的所述载体信号进行盲已知干扰消除(BKIC)处理得到目标信号,对所述目标信号进行差分信号处理以获得目标认证信号,在所述BKIC处理中,利用相邻的码元,通过平滑技术消除所述导频信号;第二处理模块,其基于密钥和所述导频信号获得参考信号,对所述参考信号进行差分信号处理以获得参考认证信号,并计算所述目标认证信号和经过差分信号处理的所述参考认证信号的相关性,得到检验统计量;以及判定模块,其将所述检验统计量与规定阈值进行比较,从而确定所述载体信号是否能够通过 认证。
- 根据权利要求9所述的认证系统,其特征在于,所述第二处理模块利用哈希矩阵基于所述密钥和所述导频信号获得所述参考信号。
- 根据权利要求9所述的盲认证系统,其特征在于,在所述判定模块中,所述规定阈值基于所述导频信号的统计特性和预设的虚警概率上限得到。
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US16/772,749 US11412378B2 (en) | 2017-12-13 | 2017-12-13 | Smoothing technology-based blind authentication method and system for frequency selective fading channel |
PCT/CN2017/116025 WO2019113864A1 (zh) | 2017-12-13 | 2017-12-13 | 基于平滑技术的频率选择性衰落信道的盲认证方法和系统 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2017/116025 WO2019113864A1 (zh) | 2017-12-13 | 2017-12-13 | 基于平滑技术的频率选择性衰落信道的盲认证方法和系统 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2019113864A1 true WO2019113864A1 (zh) | 2019-06-20 |
Family
ID=66819860
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2017/116025 WO2019113864A1 (zh) | 2017-12-13 | 2017-12-13 | 基于平滑技术的频率选择性衰落信道的盲认证方法和系统 |
Country Status (2)
Country | Link |
---|---|
US (1) | US11412378B2 (zh) |
WO (1) | WO2019113864A1 (zh) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US12035134B2 (en) * | 2018-06-19 | 2024-07-09 | University Of Notre Dame Du Lac | Security for wireless communications |
WO2022234454A1 (en) * | 2021-05-03 | 2022-11-10 | Lenovo (Singapore) Pte. Ltd. | Key establishment using wireless channel information |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105635125A (zh) * | 2015-12-25 | 2016-06-01 | 电子科技大学 | 基于射频指纹和信道信息的物理层联合认证方法 |
US9538040B2 (en) * | 2011-12-16 | 2017-01-03 | University Of Maryland, College Park | Active sensing for dynamic spectrum access |
CN107196920A (zh) * | 2017-04-28 | 2017-09-22 | 中国人民解放军信息工程大学 | 一种面向无线通信系统的密钥产生分配方法 |
Family Cites Families (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7079480B2 (en) * | 2000-10-28 | 2006-07-18 | Agee Brian G | Enhancing security and efficiency of wireless communications through structural embedding |
US7313167B2 (en) * | 2002-09-30 | 2007-12-25 | Telefonaktiebolaget Lm Ericsson (Publ) | Signal-to-noise ratio estimation of CDMA signals |
US7415043B2 (en) * | 2004-01-13 | 2008-08-19 | Interdigital Technology Corporation | Code division multiple access (CDMA) method and apparatus for protecting and authenticating wirelessly transmitted digital information |
KR100978876B1 (ko) * | 2005-12-20 | 2010-08-31 | 인터디지탈 테크날러지 코포레이션 | 결합 랜덤성으로부터 비밀키를 발생하는 방법 및 시스템 |
US20100246825A1 (en) * | 2007-09-07 | 2010-09-30 | University Of Maryland | Wireless communication method and system for transmission authentication at the physical layer |
US9117235B2 (en) * | 2008-01-25 | 2015-08-25 | The Trustees Of Columbia University In The City Of New York | Belief propagation for generalized matching |
US9161214B2 (en) * | 2010-03-05 | 2015-10-13 | University Of Maryland | Wireless communication method and system for transmission authentication at the physical layer |
FR2976760A1 (fr) * | 2011-06-17 | 2012-12-21 | France Telecom | Procede de traitement d’un paquet de donnees a l’emission, procede de traitement d’un paquet de donnees a la reception, dispositifs et equipements noeuds associes |
US8971435B2 (en) * | 2011-07-25 | 2015-03-03 | Blackberry Limited | Multi-user communication using sparse space codes |
KR101209908B1 (ko) * | 2011-08-04 | 2012-12-11 | 광주과학기술원 | 희소 신호 전송 방법 및 장치, 그리고 희소 신호 복구 방법 및 장치 |
US9713019B2 (en) * | 2011-08-17 | 2017-07-18 | CBF Networks, Inc. | Self organizing backhaul radio |
US8931053B2 (en) * | 2011-12-29 | 2015-01-06 | The University Of Western Ontario | Method and apparatus for wireless security enhancement using multiple attributes monitoring, continuous and interleaved authentication, and system adaptation |
CN103475680B (zh) * | 2012-06-07 | 2018-12-11 | 南京中兴新软件有限责任公司 | 一种物联网能力集成方法与系统 |
US9935951B2 (en) * | 2012-07-18 | 2018-04-03 | TapLink, Inc. | Remote blind hashing |
US9673920B2 (en) * | 2012-12-18 | 2017-06-06 | Department 13, LLC | Intrusion detection and radio fingerprint tracking |
US9088447B1 (en) * | 2014-03-21 | 2015-07-21 | Mitsubishi Electric Research Laboratories, Inc. | Non-coherent transmission and equalization in doubly-selective MIMO channels |
US10491261B1 (en) * | 2014-11-06 | 2019-11-26 | Abdullah A. Al-Eidan | Multi carrier frequency modulation spread spectrum communication system |
US20170085396A1 (en) * | 2015-09-22 | 2017-03-23 | Qualcomm Incorporated | Dynamic smoothing based on channel flatness detection |
US10536315B2 (en) * | 2016-03-30 | 2020-01-14 | Idac Holdings, Inc. | Methods and procedures to improve physical layer efficiency using unique word (UW) discrete fourier transform spread orthogonal frequency division multiplexing (DFT-S-OFDM) |
US10129709B1 (en) * | 2016-07-14 | 2018-11-13 | Mbit Wireless, Inc. | Method and apparatus for fading profile detection |
US12111895B2 (en) * | 2020-07-09 | 2024-10-08 | Veracity, Inc. | Group-based authentication technique |
-
2017
- 2017-12-13 US US16/772,749 patent/US11412378B2/en active Active
- 2017-12-13 WO PCT/CN2017/116025 patent/WO2019113864A1/zh active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9538040B2 (en) * | 2011-12-16 | 2017-01-03 | University Of Maryland, College Park | Active sensing for dynamic spectrum access |
CN105635125A (zh) * | 2015-12-25 | 2016-06-01 | 电子科技大学 | 基于射频指纹和信道信息的物理层联合认证方法 |
CN107196920A (zh) * | 2017-04-28 | 2017-09-22 | 中国人民解放军信息工程大学 | 一种面向无线通信系统的密钥产生分配方法 |
Non-Patent Citations (1)
Title |
---|
JI, . XINSHENG ET AL.: "Physical Layer Authentication Scheme Based on Hash Method", JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, vol. 38, no. 11, 30 November 2016 (2016-11-30), XP033109576 * |
Also Published As
Publication number | Publication date |
---|---|
US20200322796A1 (en) | 2020-10-08 |
US11412378B2 (en) | 2022-08-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR20200005477A (ko) | 초광대역 보안 레인징 | |
US20220116212A1 (en) | Process for monovalent one-to-one extraction of keys from the propagation channel | |
CN110381510B (zh) | 基于叠加物理层认证标签的非正交多址认证系统 | |
US11082841B2 (en) | Secure physical layer slope authentication method in wireless communications and apparatus | |
CN108206795B (zh) | 基于置信传递的频率选择性衰落信道的盲认证方法和系统 | |
WO2019061516A1 (zh) | 隐蔽的无线通信物理层斜率认证方法和装置 | |
CN108173791B (zh) | 基于平滑技术的时变衰落信道的物理层盲认证方法及系统 | |
WO2019113864A1 (zh) | 基于平滑技术的频率选择性衰落信道的盲认证方法和系统 | |
CN110324830B (zh) | 基于时分复用物理层认证标签的非正交多址认证系统 | |
CN109600746B (zh) | 协同无线通信系统中机会中继选择方案的性能分析方法 | |
CN110381511B (zh) | 基于共享物理层认证标签的非正交多址认证系统 | |
US20200015083A1 (en) | Robust Physical Layer Slope Authentication Method in Wireless Communications and Apparatus | |
CN108156102B (zh) | 基于平滑技术的频率选择性衰落信道的盲认证方法和系统 | |
CN108199991B (zh) | 基于置信传递的时变衰落信道的物理层盲认证方法和系统 | |
CN110392371B (zh) | 基于时分复用认证标签的非正交多址认证系统的优化方法 | |
CN110312255B (zh) | 基于叠加认证标签的非正交多址认证系统的参数优化方法 | |
WO2019113866A1 (zh) | 基于平滑技术的时变衰落信道的物理层盲认证方法及系统 | |
WO2019113863A1 (zh) | 基于置信传递的频率选择性衰落信道的盲认证方法和系统 | |
WO2019113865A1 (zh) | 基于置信传递的时变衰落信道的物理层盲认证方法和系统 | |
CN109982326B (zh) | 一种基于大尺度衰落特征的物理层安全认证方法 | |
CN109600742B (zh) | 隐蔽的无线通信物理层斜率认证方法和装置 | |
CN108966211B (zh) | 安全的无线通信物理层斜率认证方法和装置 | |
CN108934012B (zh) | 基于最优隐蔽性协议的物理层认证方法及系统 | |
WO2019205179A1 (zh) | 基于最优隐蔽性协议的物理层认证方法及系统 | |
Nain et al. | A cyclic prefix based secure side-channel (CP-SSC) over OFDM for LTE D2D sidelink communication |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 17934760 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 25.09.2020) |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 25.09.2020) |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 17934760 Country of ref document: EP Kind code of ref document: A1 |