WO2019237475A1 - 一种基于分层二维特征编码的安全多用户导频鉴权方法 - Google Patents

一种基于分层二维特征编码的安全多用户导频鉴权方法 Download PDF

Info

Publication number
WO2019237475A1
WO2019237475A1 PCT/CN2018/099050 CN2018099050W WO2019237475A1 WO 2019237475 A1 WO2019237475 A1 WO 2019237475A1 CN 2018099050 W CN2018099050 W CN 2018099050W WO 2019237475 A1 WO2019237475 A1 WO 2019237475A1
Authority
WO
WIPO (PCT)
Prior art keywords
pilot
codeword
subcarrier
receiver
attacker
Prior art date
Application number
PCT/CN2018/099050
Other languages
English (en)
French (fr)
Inventor
任品毅
徐东阳
Original Assignee
西安交通大学
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 西安交通大学 filed Critical 西安交通大学
Publication of WO2019237475A1 publication Critical patent/WO2019237475A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B17/00Monitoring; Testing
    • H04B17/30Monitoring; Testing of propagation channels
    • H04B17/391Modelling the propagation channel
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L25/00Baseband systems
    • H04L25/02Details ; arrangements for supplying electrical power along data transmission lines
    • H04L25/0202Channel estimation
    • H04L25/0224Channel estimation using sounding signals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L27/00Modulated-carrier systems
    • H04L27/26Systems using multi-frequency codes
    • H04L27/2601Multicarrier modulation systems
    • H04L27/2602Signal structure
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities

Definitions

  • the present invention relates to the field of wireless communications, and in particular, to a secure multi-user pilot authentication method based on hierarchical two-dimensional feature coding.
  • the security risks brought by the broadcast characteristics of wireless channels are increasing day by day, and harmful signal sources can more efficiently interfere with the communication links of other normal nodes.
  • the upper-level password encryption and decryption system can guarantee the security of the wireless communication environment to a certain extent, with the development of computer technology, the upper-level encryption system faces the risk of being deciphered, and harmful signal sources can further obtain information of legitimate users.
  • the physical layer security mechanism has attracted widespread attention and research.
  • harmful signal sources are more frequent and attacks against OFDM systems.
  • attackers can obtain the protocol and architecture parameters of the target system, causing serious, Incalculable communication loss.
  • pilot authentication mechanism of the physical layer In OFDM systems, the authentication mechanism for pilots is based on publicly known pilots and is open and deterministic. Therefore, these pilot signals can be learned by the attacker. When the attacker learns the frame synchronization information and pilot information of a legitimate transceiver, he can further launch a pilot awareness attack, during which the attacker synchronizes with a legitimate user Sending specific pilot signals can interfere with the pilot sharing mechanism between legitimate transceiver pairings, further affecting channel estimation, and paralyzing the system's next data transmission service. Moreover, once a pilot-aware attack is successfully implemented, it is difficult for a legitimate transceiver to initiate data recovery. Therefore, the key lies in how to design a secure multi-user pilot authentication mechanism to attenuate the effects of pilot-aware attacks in OFDM systems.
  • the purpose of the present invention is to provide a secure multi-user pilot authentication method based on hierarchical two-dimensional feature coding to solve the above problems.
  • the present invention adopts the following technical solutions:
  • a secure multi-user pilot authentication method based on layered two-dimensional feature coding includes the following steps:
  • Step 1 Establish a system model; use random pilot mechanism, multiple uplink transmitters use random pilot for channel estimation, and active attackers adopt a hybrid attack mode.
  • the attack modes include: channel training in which some bands interfere with legitimate channels, and full band interference Legal channel training and keeping silent;
  • Step 2 By encoding the activation modes of each subcarrier, a code frequency domain is created, and a two-dimensional layered coding criterion is constructed; considering K + 2 OFDM symbol times, energy detection is performed on signals received on any single subcarrier.
  • the detection threshold is configured to achieve accurate detection of the number of signals on each subcarrier. If there is a signal, the subcarrier is encoded as 1, otherwise it is 0.
  • L s represents the length of the codeword.
  • S 2 ⁇ s 2
  • Step 3 construct an anti-attack channel training and authentication CTA protocol based on the independence check code ICC; including pilot representation, separation, and identification.
  • K uplink transmitters a receiver and a pilot-aware attacker
  • K + 1 uplink communication links are generated, which are uplink transmitter ⁇ receiver, pilot Perceive attacker ⁇ receiver.
  • the receiver has N T antennas, transmitter and an uplink pilot perception attackers are single antenna.
  • each antenna of each uplink occupies N subcarriers simultaneously in each OFDM symbol.
  • each communication link samples L paths.
  • the channel model is: Represents the impulse response of the channel between the mth uplink transmitter and the ith receiving antenna of the receiver, Represents the power delay spectrum of the first path; Represents the channel impulse response between the pilot-aware attacker and the receiver's i-th receiving antenna, and is independent of Represents the power delay spectrum of the l path.
  • the uplink transmitter uses a deterministic pilot
  • the attacker will transmit the same pilot signal at the same pilot point position as the legitimate transmitter
  • the pilot signal is configured as follows:
  • the pilot signal of the mth uplink transmitter on the ith subcarrier is Among them, ⁇ L, m is the pilot transmit power, and ⁇ k, m represents the pilot phase in the k-th OFDM symbol time.
  • the pilot signal of the pilot-aware attacker on the i-th subcarrier is Among them, ⁇ A is its pilot transmission power, Represents the pilot phase on the i-th subcarrier of the k-th OFDM symbol time.
  • an N ⁇ C binary codebook C [b i, j ] is called a hierarchical two-dimensional feature coding matrix, if and only if, the following two characteristics are satisfied :
  • step 2 the decoding criterion: the decoding process is divided into five layers, which are as follows:
  • This layer is a formulaic expression of the activation mode of all uplink transmitting node subcarriers
  • the subcarrier activation mode used to characterize the i-th uplink transmitter is b i ⁇ C i .
  • the subcarrier activation mode is a.
  • b S, K , m S, K represents the superposition of independent subcarrier activation modes generated by K nodes; a is the subcarrier activation mode adopted by the attacker, which satisfies:
  • b I and m I are the only two codes that the receiver can finally obtain. They will be sent to the next input layer for processing. All possible column vector b S, K constitute a codeword matrix B K, i.e., b S, K B K is a column vector; Similarly, for B K a column vector of any codeword can be uniquely Is decomposed into a set of codewords b i , 1 ⁇ i ⁇ K.
  • This layer is for signal feature extraction, which contains two types of signal features, which are signal energy feature and signal independence feature.
  • This layer identifies the types of attacks currently encountered from three types of attacks
  • a partial-band attack is currently occurring, and the codeword b I is output.
  • This layer is to separate and identify the codewords output from the previous layer
  • the receiver subtracts 1 from each element of b I , and then decomposes the newly obtained codewords to obtain K user codewords b i , 1 ⁇ i ⁇ K;
  • the receiver decomposes the obtained codewords b S and K to obtain the codewords b i of K users, 1 ⁇ i ⁇ K;
  • pilot recognition errors occur if and only if the attacker uses the same codeword as an uplink transmitter. At this time, the probability of pilot recognition errors
  • the probability of pilot recognition error meets the following conditions:
  • the instability of positioning pilot identification is:
  • This layer is the codeword corresponding to each node that stores the final decoding.
  • the pilot representation stage the uplink transmitter and the attacker select a random pilot phase, and establish a one-to-one mapping of the pilot phase to the codeword according to a codebook that constructs a layered two-dimensional feature coding criterion.
  • the codeword is further mapped into the subcarrier activation mode. If the value of the element of the codeword is equal to 1, the pilot signal is transmitted on the subcarrier, otherwise the subcarrier is placed in the idle state; the uplink transmitter and the attacker. Each generates its own subcarrier activation mode and maintains synchronous transmission.
  • the superposition of signals on each subcarrier generates interference and is finally acquired by the receiver;
  • the pilot separation stage according to the observed subcarrier activation mode, the receiver Perform energy detection on each subcarrier, determine whether a signal exists on each subcarrier, and obtain a binary codeword vector based on the result.
  • the receiver identifies the specific attack type and obtains uplink transmission under each attack type. Codewords used by attackers and attackers; pilot recognition phase: by searching for codewords in the codebook, the receiver identifies the separated Codewords, and according to the identified codewords, the pilot signals corresponding to the original nodes are obtained.
  • the present invention has the following technical effects:
  • the invention uses the characteristics of random pilots to weaken the pilot sensing attack as a hybrid attack, and simultaneously uses the independent characteristics of the channel, the energy characteristics of the signals, and the coding diversity gain to identify the pilot signals of multiple uplink transmitters in an interference environment.
  • Figure 1 is a system model diagram.
  • Figure 2 is a diagram of the proposed protocol framework.
  • FIG. 3 is a graph of a code rate change of the obtained codeword.
  • FIG. 4 is a graph showing instability changes of pilot identification.
  • FIG. 5 is a graph showing the variation of the probability of pilot identification error in the most stable state.
  • Figure 1 shows the system model diagram. Considering K uplink transmitters, a receiver and a pilot-aware attacker, a total of K + 1 uplink communication links are generated. Attacker ⁇ receiver.
  • the receiver has N T antennas, transmitter and an uplink pilot perception attackers are single antenna.
  • each antenna of each uplink occupies N subcarriers simultaneously in each OFDM symbol.
  • each communication link samples L paths.
  • the channel model is: Represents the impulse response of the channel between the mth uplink transmitter and the ith receiving antenna of the receiver, Represents the power delay spectrum of the first path; Represents the channel impulse response between the pilot-aware attacker and the receiver's i-th receiving antenna, and is independent of Represents the power delay spectrum of the l path.
  • the uplink transmitter uses a deterministic pilot
  • the attacker will transmit the same pilot signal at the same pilot point position as the legitimate transmitter
  • the pilot signal is configured as follows:
  • the pilot signal of the mth uplink transmitter on the ith subcarrier is Among them, ⁇ L, m is the pilot transmit power, and ⁇ k, m represents the pilot phase in the k-th OFDM symbol time.
  • the pilot signal of the pilot-aware attacker on the i-th subcarrier is Among them, ⁇ A is its pilot transmission power, Represents the pilot phase on the i-th subcarrier of the k-th OFDM symbol time.
  • uplink transmitters use random pilots for channel estimation.
  • active attackers can adopt a hybrid attack mode: 1. Use random pilots, and channel training on some bands interferes with legitimate channels; , Full-band interference with legal channel training; 3. Keep silent.
  • FIG. 1 shows the proposed protocol framework, including the following steps:
  • the code frequency domain is established as: (s, b), 1 ⁇ b ⁇ N, where N represents the number of subcarriers occupied.
  • N represents the number of subcarriers occupied.
  • Step 2 Construct a layered two-dimensional feature coding criterion, which may specifically include a coding criterion and a decoding criterion.
  • An N ⁇ C binary codebook C [b i, j ] is called a hierarchical two-dimensional feature coding matrix. If and only if, the following two characteristics are satisfied:
  • Row characteristics for any different rows, for example, the i, j rows, Established. among them,
  • Start layer The function of this layer is to formulate the activation mode of all uplink transmitting nodes (including uplink transmitters and attackers) subcarriers;
  • the subcarrier activation mode used to characterize the i-th uplink transmitter is b i ⁇ C i .
  • the subcarrier activation mode is a.
  • b S, K , m S, K represents the superposition of independent subcarrier activation modes generated by K nodes.
  • a is the subcarrier activation mode adopted by the attacker, which satisfies:
  • b I and m I are the only two codes that the receiver can finally obtain. They will be sent to the next input layer for processing. All possible column vectors b S, K form a codeword matrix B K , that is, b S, K is a certain column vector of B K. Similarly, for B K column vector of any one codeword, can be decomposed into a unique set of codewords b i, 1 ⁇ i ⁇ K.
  • the role of this layer is to identify the types of attacks currently encountered from three possible types of attacks;
  • V) Determine whether b I is a column vector of B K. If not, part of the frequency band attack occurs and the code word b I is output. If yes, continue to the next operation.
  • the attack mode obtained by this layer and the corresponding codeword in this mode are output, and the information is transmitted to the next layer.
  • the function of this layer is to separate and identify the codewords output from the previous layer.
  • the receiver subtracts 1 from each element of b I , and then decomposes the newly obtained codeword to obtain codewords b i for K users, 1 ⁇ i ⁇ K.
  • the receiver decomposes the obtained codeword b S, K , and can obtain the codewords b i of K users, 1 ⁇ i ⁇ K.
  • the pilot recognition error probability satisfies the following conditions:
  • the instability of positioning pilot identification is:
  • the function of this layer is to store the final decoded codeword corresponding to each node.
  • Step 3 As shown in Figure 2, the pilot representation phase: the uplink transmitter and the attacker select a random pilot phase, and according to the codebook of Step 2, a one-to-one mapping of pilot phase to codeword is established. In this mapping principle Next, the codeword is further mapped to the subcarrier activation mode. The specific principle is that if the value of the element of the codeword is equal to 1, the pilot signal is transmitted on the subcarrier, otherwise the subcarrier is placed in the idle state. Both the uplink transmitter and the attacker generate their own subcarrier activation modes and maintain synchronous transmission. Via the wireless environment, the superposition of the signals on each subcarrier causes interference and is finally acquired by the receiver.
  • Pilot separation stage According to the observed subcarrier activation mode, the receiver performs energy detection in Step 1 on each subcarrier to determine whether a signal exists on each subcarrier. Based on the result, a binary codeword vector is obtained. For the decoding criterion of Step 2, the receiver can: 1 identify the specific attack type; 2 obtain the codeword used by the uplink transmitter and the attacker under each attack type. Pilot identification stage: The receiver identifies the separated codewords by searching for the codewords in the codebook, and obtains the original pilot signals corresponding to the original nodes based on the identified codewords.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • Power Engineering (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

一种基于分层二维特征编码的安全多用户导频鉴权方法,每一个合法用户(LU)指定的原有导频信号现在被随机化、编码为子载波激活模式(SAP),这些被编码的SAP,尽管会被恶意信号掩盖并且在无线环境中彼此重叠、互相干扰,却仍然可以被分离、识别、可靠地解码为码字并且最终转化为对应的导频信号,从而保证SMPA。本发明构建了用于SMPA的五层分层解码(HD)模型以演示特征编码和解码的原理。提出了可靠性约束收缩(RBC)理论来缩小约束区间,这个操作是通过针对H2DF的码本分区技术来完成的。通过优化子码本的个数,使得上限和下限IEP边界收缩并重合。本发明通过H2DF编码理论的支持,能够在在SMPA方面的表现出良好的稳定性。

Description

一种基于分层二维特征编码的安全多用户导频鉴权方法 技术领域
本发明涉及到无线通信领域,特别涉及一种基于分层二维特征编码的安全多用户导频鉴权方法。
背景技术
随着无线通信技术日益发展,无线信道的广播特性带来的安全风险与日俱增,有害信号源可以更加高效的干扰其他正常节点的通信链路。尽管上层的密码加密解密体制可以在一定程度上保证无线通信环境的安全性,但是随着计算机技术的发展,上层的加密体制面临被破译的风险,有害信号源可以进一步获取合法用户的信息。针对此现象,物理层安全机制引起了广泛的关注和研究。当前,鉴于很多商用和军用的无线通信系统都是基于OFDM技术,有害信号源更加频繁而且针对OFDM系统的攻击,进一步地,攻击者可以获取目标系统的协议和架构参数,对其造成严重的、无法估量的通信损失。
研究物理层的导频鉴权机制。在OFDM系统中,导频的鉴权机制是建立在公共已知导频的基础上,是公开的、确定性的。因此,这些导频信号可被攻击者获知,当攻击者获悉合法收发机的帧同步信息和导频信息后,可进一步发动导频感知攻击,期间,该攻击者通过与某一合法用户同步地发送特定的导频信号,就可以干扰合法收发机配对之间的导频共享机制,进一步影响信道估计,瘫痪系统的下一步数据传输服务。而且,导频感知攻击一旦成功实施后,合法收发机很难再启动数据恢复。因此,关键在于如何设计安全的多用户导频鉴权机制来削弱OFDM系统中的导频感知攻击的影响。
发明内容
本发明的目的在于提供一种基于分层二维特征编码的安全多用户导频鉴权方法,以解决上述问题。
为实现上述目的,本发明采用以下技术方案:
一种基于分层二维特征编码的安全多用户导频鉴权方法,包括以下步骤:
步骤1,建立系统模型;采用随机导频机制,多个上行发射机采用随机导频进行信道估计,主动攻击者采取混合攻击模式,攻击模式包括:部分频带干扰合法信道的信道训练、全频带干扰合法信道训练和保持静默;
步骤2,通过对各个子载波激活模式的编码,创建了码频域,构建分层二维编码准则;考虑K+2个OFDM符号时间,对任意单个子载波上收到的信号进行能量检测,通过配置检测阈值,实现每个子载波上精准的信号个数检测,若存在信号,则该子载波被编码为1,反之则为0;根据得到的二进制编码,得到二元码字向量集合为:S 1={s 1=[s 1,m]|s 1,m∈{0,1},1≤m≤L s},其中,s 1,m表示第m个二元码字单元。L s表示码字的长度,同理,得到M+1元码字向量集合S 2={s 2|s 2,m∈{0,...,M},1≤m≤L s},s 2,m表示第m个M+1元码字单元
建立码频域为:(s,b),
Figure PCTCN2018099050-appb-000001
1≤b≤N,其中b表示码字s对应频域的位置,N表示占用的子载波个数;在这个码频域上,得到N×C的二元码本C=[b i,j],b i,j=0,or,1,码本中第i个码字定义为c i=[b 1,i … b N,i] T
构建分层二维特征编码准则,具体包括编码准则和解码准则;
步骤3,构建基于独立性校验编码ICC的反攻击信道训练鉴权CTA协议;包括导频的表示,分离和识别。
进一步的,步骤1的系统模型中,考虑K个上行发射机,一个接收机和一个导频感知攻击者,共产生K+1个上行通信链路,分别为上行发射机→接收机,导频感知攻击者→接收机。接收机拥有N T根天线,上行发射机和导频感知攻击者均为单天线。频域上,每条上行链路的每根天线在每个OFDM符号内都同时占用N个子载波.时域上,每个通信链路均采样L条路径,信道模型为:
Figure PCTCN2018099050-appb-000002
代表第m个上行发射机与接收机的第i根接收天线之间的信道冲激响应,
Figure PCTCN2018099050-appb-000003
代表第l条路径的功率时延谱;
Figure PCTCN2018099050-appb-000004
代表导频感知攻击者与接收机的第i根接收天线之间的信道冲激响应,并独立于
Figure PCTCN2018099050-appb-000005
Figure PCTCN2018099050-appb-000006
代表第l条路径的功率时延 谱。若上行发射机采用确定性导频,当导频感知攻击发生时,攻击者会在与合法发射机相同的导频点位置,发射相同的导频信号,导频信号配置为:在第k个OFDM符号期间,第m个上行发射机在第i个子载波上的的导频信号为
Figure PCTCN2018099050-appb-000007
其中,ρ L,m为其导频发射功率,φ k,m表示第k个OFDM符号时间内的导频相位;导频感知攻击者在第i个子载波上的的导频信号为
Figure PCTCN2018099050-appb-000008
其中,ρ A为其导频发射功率,
Figure PCTCN2018099050-appb-000009
表示第k个OFDM符号时间第i个子载波上的导频相位。
进一步的,步骤2中,编码准则:一个N×C的二元码本C=[b i,j]被称之为分层二维特征编码矩阵,当且仅当,如下两个特性得到满足:
1.列特性:对于任意两个向量的集合
Figure PCTCN2018099050-appb-000010
存在第i行i∈{1,2,...,B},使得
Figure PCTCN2018099050-appb-000011
成立,L为可人为设置的变量,C为码本的大小,B为码字的长度;
2.行特性:对于任意不相同行,第i,j行,
Figure PCTCN2018099050-appb-000012
成立;其中,
Figure PCTCN2018099050-appb-000013
Figure PCTCN2018099050-appb-000014
Figure PCTCN2018099050-appb-000015
表示第j个上行发射机至接收机第i根天线之间的信道频率响应,
Figure PCTCN2018099050-appb-000016
表示导频感知攻击者与接收机第i根接收天线之间的信道频率响应,
Figure PCTCN2018099050-appb-000017
表示第i个子载波上信号的个数,w i表示第i个子载波上接收机端的热噪声。
进一步的,步骤2中,解码准则:解码流程分为五层,分别为如下:
开始层:本层是对所有上行发射节点子载波的激活模式进行公式化表述;
首先,将C均匀的划分为K个子码本,表示为C i,1≤i≤K,其次,表征第i个上行发射机采用的子载波激活模式为b i∈C i,攻击者采用的子载波激活模式为a,那么,对于此K+1个 节点产生的信号产生的叠加现象,将其刻画为:
b 1∨…∨b K=b S,K,b S,K∨a=b I
并且
m 1+…+m K=m S,K,m S,K+a=m I
其中,b S,K,m S,K代表K个节点产生的独立的子载波激活模式的相互叠加;a是攻击者采用的子载波激活模式,满足:
Figure PCTCN2018099050-appb-000018
b I,m I则是接收机最终唯一能获得的两种编码,他们将会被送入到接下来的输入层进行处理。所有可能的列向量b S,K组成了一个码字矩阵B K,也即,b S,K是B K的某一列向量;同理,对于B K中任何一个列向量码字,都可唯一的分解为一组码字b i,1≤i≤K。
输入层;
本层是进行信号特征提取,共包含两种信号特征,分别为信号能量特征和信号独立性特征;
信号独立性特征的提取可通过相邻子载波上信号的内积产生,经过遍历N个子载波,获得一个二维的差分编码矩阵D=[d j∈[1,N]],其中,d j=[d 1,j … d N,j];
经过特征提取,信号的能量特征和独立性特征全部包含在了变量b I,m I,D中,这些变量将传递至下一层进行数据处理;
隐藏层;
本层是从三种攻击类型中识别出当前所遇到的攻击类型;
具体流程可分为:
判断b I,D中所有元素是否为1,若成立,则表明全频带攻击发生,输出码字b I
否则,执行下一步操作;
判断b I是否是B K的某一列向量,若否,部分频带攻击发生,输出码字b I,若是,
则继续执行下一步操作
若存在m I=m S,K则可知道攻击者当前保持静默状态,输出码字b S,K,否则,判决
当前发生部分频带攻击,输出码字b I
通过以上步骤,本层输出得到的攻击模式和该种模式下对应的码字,并将信息传送至下一层;
监督层;
本层是对上一层输出的码字进行码字的分离和识别;
I:全频带攻击发生时,接收机对b I的每一个元素减1,然后对新得到的码字进行分解,得到K个用户的码字b i,1≤i≤K;
II:检测到攻击者静默时,接收机对得到的码字b S, K进行分解,得到K个用户的码字b i,1≤i≤K;
III:检测到部分频带攻击发生时,接收机抽取bI元素中满足
Figure PCTCN2018099050-appb-000019
的元素的集合
Figure PCTCN2018099050-appb-000020
以每个元素为参考点,执行差分编码,接收机可以得到码字集合
Figure PCTCN2018099050-appb-000021
进一步需要执行:
如果存在码字
Figure PCTCN2018099050-appb-000022
满足
Figure PCTCN2018099050-appb-000023
则该码字必满足d i=a,将其从b I中剔除,接收机得到b i,1≤i≤K;
如果不存在码字
Figure PCTCN2018099050-appb-000024
满足
Figure PCTCN2018099050-appb-000025
则判断b I是否等于b S,K,若是,则分解得到b i,1≤i≤K,反之,判定识别发生错误,输出b i,1≤i≤K+1,必存在b i,b j,i≠j位于同一码本;
当所有码字均可精准识别时,导频识别错误发生当且仅当,攻击者采用和某一个上行发射机相同的码字,此时,导频识别错误概率
Figure PCTCN2018099050-appb-000026
当存在b i,b j,i≠j位于同一码本,此时,导频识别错误概率
Figure PCTCN2018099050-appb-000027
导频识别错误概率满足如下条件:
Figure PCTCN2018099050-appb-000028
定位导频识别的不稳定性为:
S R=log 10(P upper/P Iower)
IV:可靠性约束收缩RBC理论:基于导频识别的不稳定性,继续将码本划分,每一个子码本C i,1≤i≤K被均等的划分为B个子码本,减少攻击者的码字a与上行发射机的码字落入同一码本的概率,之后的导频识别错误概率满足如下条件:
Figure PCTCN2018099050-appb-000029
因此,随着B的增加,导频识别错误概率的上下界逐渐趋于一个稳定的值,经证明,当
Figure PCTCN2018099050-appb-000030
时,S R=0,导频识别最稳定,识别错误概率为:
Figure PCTCN2018099050-appb-000031
经过计算,可表示为:
Figure PCTCN2018099050-appb-000032
其中,k=2,3是一个常数因子。
输出层;
本层是存储最终解码的对应各个节点的码字。
进一步的,步骤3中,导频表示阶段:上行发射机和攻击者选择随机导频相位,根据构建分层二维特征编码准则的码本,建立导频相位到码字的一对一映射,在该映射原理下,码字进一步映射为子载波激活模式,码字的元素数值等于1,则导频信号该子载波上发送,否则该子载波被置于空闲状态;上行发射机和攻击者都产生各自的子载波激活模式,并且保持同步传输,经由无线环境,各个子载波上信号的叠加产生干扰,最终被接收机获取;导频分离阶段:根据观察到的子载波激活模式,接收机对各个子载波进行能量检测,判断每一个子载波上是否存在信号,根据结果,得到一个二元码字向量,借助于解码准则,接收机识别具体的攻击类型,得到每个攻击类型下上行发射机和攻击者使用的码字;导频识别阶段:通过搜索码本中的码字,接收机识别分离出的码字,并根据识别出来的码字,得到原始的各个节点对应的导频信号。
与现有技术相比,本发明有以下技术效果:
本发明利用随机导频的特性来弱化导频感知攻击为混合攻击,同时利用信道的独立特性、信号的能量特性和编码分集增益来识别干扰环境下多个上行发射机的导频信号。
附图说明
图1是系统模型图。
图2是所提协议框架图。
图3是所得码字的码率变化曲线图。
图4是导频识别的不稳定性变化曲线图。
图5是最稳定状态导频识别错误概率变化的曲线图。
具体实施方式
以下结合附图对本发明进一步说明:
图1给出的系统模型图,考虑K个上行发射机,一个接收机和一个导频感知攻击者,共产生K+1个上行通信链路,分别为上行发射机→接收机,导频感知攻击者→接收机。接收机拥有N T根天线,上行发射机和导频感知攻击者均为单天线。频域上,每条上行链路的每根天线在每个OFDM符号内都同时占用N个子载波.时域上,每个通信链路均采样L条路径,信道模型为:
Figure PCTCN2018099050-appb-000033
代表第m个上行发射机与接收机的第i根接收天线之间的信道冲激响应,
Figure PCTCN2018099050-appb-000034
代表第l条路径的功率时延谱;
Figure PCTCN2018099050-appb-000035
代表导频感知攻击者与接收机的第i根接收天线之间的信道冲激响应,并独立于
Figure PCTCN2018099050-appb-000036
Figure PCTCN2018099050-appb-000037
代表第l条路径的功率时延谱。若上行发射机采用确定性导频,当导频感知攻击发生时,攻击者会在与合法发射机相同的导频点位置,发射相同的导频信号,导频信号配置为:在第k个OFDM符号期间,第m个上行发射机在第i个子载波上的的导频信号为
Figure PCTCN2018099050-appb-000038
其中,ρ L,m为其导频发射功率,φ k,m表示第k个OFDM符号时间内的导频相位;导频感知攻击者在第i个子载波上的的导频信号为
Figure PCTCN2018099050-appb-000039
其中,ρ A为其导频发射功率,
Figure PCTCN2018099050-appb-000040
表示第k个OFDM符号时间第i个子载波上的导频相位。为了防止导频污染,上行发射机采用随机导频进行信道估计,此时,主动攻击者可采取混合攻击模式:1.采用随机导频,部分频带干扰合法信道的信道训练;2采用随机导频,全频带干扰合法信道训练;3.保持静默。
图2给出了所提协议框架图,包括如下步骤:
Step 1:考虑K+2个OFDM符号时间,对任意单个子载波上收到的信号进行能量检测,通过配置检测阈值,实现每个子载波上精准的信号个数检测,若存在信号,则该子载波被编码为1,反之则为0。根据得到的二进制编码,得到二元码字向量集合为:S 1={s 1=[s 1,m]|s 1,m∈{0,1},1≤m≤L s},其中,s 1,m表示第m个二元码字单元。L s表示码字的长度,同理,得到M+1元码字向量集合S 2={s 2|s 2,m∈{0,...,M},1≤m≤L s},s 2,m表示第m个M+1元码字单元。
进一步地,建立码频域为:(s,b),
Figure PCTCN2018099050-appb-000041
1≤b≤N,其中N表示占用的子载波个数。最后得到一个N×C的二元码本C=[b i,j],码本中第i个码字定义为 c i=[b 1,i … b N,i] T
Step 2:构建分层二维特征编码准则,具体可包括编码准则和解码准则。
编码准则:一个N×C的二元码本C=[b i,j]被称之为分层二维特征编码矩阵,当且仅当,如下两个特性得到满足:
1.列特性:对于任意两个向量的集合
Figure PCTCN2018099050-appb-000042
存在第i行i∈{1,2,...,B},使得
Figure PCTCN2018099050-appb-000043
成立,L为可人为设置的变量,C为码本的大小,B为码字的长度。
2.行特性:对于任意不相同行,例如,第i,j行,
Figure PCTCN2018099050-appb-000044
成立。其中,
Figure PCTCN2018099050-appb-000045
Figure PCTCN2018099050-appb-000046
Figure PCTCN2018099050-appb-000047
表示第j个上行发射机至接收机第i根天线之间的信道频率响应,
Figure PCTCN2018099050-appb-000048
表示导频感知攻击者与接收机第i根接收天线之间的信道频率响应,
Figure PCTCN2018099050-appb-000049
表示第i个子载波上信号的个数,w i表示第i个子载波上接收机端的热噪声。
解码准则:具体的解码流程可分为五层,分别为如下:
6)开始层:本层的功能是对所有上行发射节点(包括上行发射机和攻击者)子载波的激活模式进行公式化表述;
首先,将C均匀的划分为K个子码本,表示为C i,1≤i≤K,其次,表征第i个上行发射机采用的子载波激活模式为b i∈C i,攻击者采用的子载波激活模式为a,那么,对于此K+1个节点产生的信号产生的叠加现象,将其刻画为:
b 1∨…∨b K=b S,K,b S,K∨a=b I
并且
m 1+…+m K=m S,K,m S,K+a=m I
其中,b S,K,m S,K代表K个节点产生的独立的子载波激活模式的相互叠加。a是攻击者采用的 子载波激活模式,满足:
Figure PCTCN2018099050-appb-000050
b I,m I则是接收机最终唯一能获得的两种编码,他们将会被送入到接下来的输入层进行处理。所有可能的列向量b S,K组成了一个码字矩阵B K,也即,b S,K是B K的某一列向量。同理,对于B K中任何一个列向量码字,都可唯一的分解为一组码字b i,1≤i≤K。
7)输入层;
本层的作用是进行信号特征提取,共包含两种信号特征,分别为信号能量特征和信号独立性特征。信号能量特征的提取可详见Step 1所述;信号独立性特征的提取可通过相邻子载波上信号的内积产生,具体操作可详见Step 2的列特性,经过遍历N个子载波,可以获得一个二维的差分编码矩阵D=[d j∈[1,N]],其中,d j=[d 1,j … d N,j]。
经过特征提取,信号的能量特征和独立性特征全部包含在了变量b I,m I,D中,这些变量将传递至下一层进行数据处理;
8)隐藏层;
本层的作用是从三种可能的攻击类型中识别出当前所遇到的攻击类型;
具体流程可分为:
IV)判断b I,D中所有元素是否为1,若成立,则表明全频带攻击发生,输出码字b I。否则,执行下一步操作;
V)判断b I是否是B K的某一列向量,若否,部分频带攻击发生,输出码字b I,若是,则继续执行下一步操作
VI)若存在m I=m S,K则可知道攻击者当前保持静默状态,输出码字b S,K,否则,判决当前发生部分频带攻击,输出码字b I
通过以上步骤,本层输出得到的攻击模式和该种模式下对应的码字,并将信息传送至下一层。
9)监督层;
本层的功能是对上一层输出的码字进行码字的分离和识别。
I:全频带攻击发生时,接收机对b I的每一个元素减1,然后对新得到的码字进行分解,可得到K个用户的码字b i,1≤i≤K。
II:检测到攻击者静默时,接收机对得到的码字b S,K进行分解,可得到K个用户的码字b i,1≤i≤K。
III:检测到部分频带攻击发生时,接收机抽取b I元素中满足
Figure PCTCN2018099050-appb-000051
的元素的集合
Figure PCTCN2018099050-appb-000052
以每个元素为参考点,执行差分编码,具体操作详见Step 1,这样,接收机可以得到码字集合
Figure PCTCN2018099050-appb-000053
进一步需要执行:
3)如果存在码字
Figure PCTCN2018099050-appb-000054
满足
Figure PCTCN2018099050-appb-000055
则该码字必满足d i=a,将其从b I中剔除,接收机得到b i,1≤i≤K。
4)如果不存在码字
Figure PCTCN2018099050-appb-000056
满足
Figure PCTCN2018099050-appb-000057
则判断b I是否等于b S,K,若是,则分解得到b i,1≤i≤K,反之,判定识别发生错误,输出b i,1≤i≤K+1,必存在b i,b j,i≠j位于同一码本,由于码字的随机性,错误发生是不稳定的,考虑两种性能边界,分别对应于两种案例
案例1.所有码字均可精准识别,此时,导频识别错误发生当且仅当,攻击者采用和某一个上行发射机相同的码字,此时,导频识别错误概率
Figure PCTCN2018099050-appb-000058
案例2.存在b i,b j,i≠j位于同一码本,此时,导频识别错误概率
Figure PCTCN2018099050-appb-000059
因此,导频识别错误概率满足如下条件:
Figure PCTCN2018099050-appb-000060
定位导频识别的不稳定性为:
S R=log 10(P upper/P Iower)
IV:可靠性约束收缩(RBC)理论:基于导频识别的不稳定性,继续将码本划分,每一个子码本C i,1≤i≤K被均等的划分为B个子码本,减少攻击者的码字a与上行发射机的码字落入同一码本的概率,之后的导频识别错误概率满足如下条件:
Figure PCTCN2018099050-appb-000061
因此,随着B的增加,导频识别错误概率的上下界逐渐趋于一个稳定的值,经证明,当
Figure PCTCN2018099050-appb-000062
时,S R=0,导频识别最稳定,识别错误概率为:
Figure PCTCN2018099050-appb-000063
经过计算,可表示为:
Figure PCTCN2018099050-appb-000064
其中,k=2,3是一个常数因子。
10)输出层;
本层的功能是,存储最终解码的对应各个节点的码字。
Step 3:如图2所示,导频表示阶段:上行发射机和攻击者选择随机导频相位,根据Step 2的码本,建立导频相位到码字的一对一映射,在该映射原理下,码字进一步映射为子载波激活模式,具体原理是,如果码字的元素数值等于1,则导频信号该子载波上发送,否则该子载波被置于空闲状态。上行发射机和攻击者都产生各自的子载波激活模式,并且保持同步传输,经由无线环境,各个子载波上信号的叠加产生干扰,最终被接收机获取。导频分离阶段:根据观察到的子载波激活模式,接收机对各个子载波进行Step1采用的能量检测,判断每一个子载波上是否存在信号,根据结果,得到一个二元码字向量,借助于Step2的解码准则,接收机可:1识别具体的攻击类型;2得到每个攻击类型下上行发射机和攻击者使用的码字。导频识别阶段:通过搜索码本中的码字,接收机识别分离出的码字,并根据识别出来的码字,得到原始的各个节点对应的导频信号。

Claims (5)

  1. 一种基于分层二维特征编码的安全多用户导频鉴权方法,其特征在于,包括以下步骤:
    步骤1,建立系统模型;采用随机导频机制,多个上行发射机采用随机导频进行信道估计,主动攻击者采取混合攻击模式,混合攻击模式包括:部分频带干扰合法信道的信道训练、全频带干扰合法信道训练和保持静默;
    步骤2,通过对各个子载波激活模式的编码,创建了码频域,构建分层二维编码准则;考虑K+2个OFDM符号时间,K表示用户个数;对任意单个子载波上收到的信号进行能量检测,通过配置检测阈值,实现每个子载波上精准的信号个数检测,若存在信号,则该子载波被编码为1,反之则为0;根据得到的二进制编码,得到二元码字向量集合为:S 1={s 1=[s 1,m]|s 1,m∈{0,1},1≤m≤L s},其中,s 1,m表示第m个二元码字单元;L s表示码字的长度,同理,得到M+1元码字向量集合S 2={s 2|s 2,m∈{0,...,M},1≤m≤L s},s 2,m表示第m个M+1元码字单元;
    建立码频域为:
    Figure PCTCN2018099050-appb-100001
    其中b表示码字s对应频域的位置,其中N表示占用的子载波个数;得到N×C的二元码本C=[c i,j],码本中第i个码字定义为c i=[c 1,i … c N,i] T
    构建分层二维特征编码准则,具体包括编码准则和解码准则;
    步骤3,构建基于独立性校验编码ICC的反攻击信道训练鉴权CTA协议;包括导频的表示,分离和识别。
  2. 根据权利要求1所述的一种基于分层二维特征编码的安全多用户导频鉴权方法,其特征在于,步骤1的系统模型中,考虑K个上行发射机,一个接收机和一个导频感知攻击者,共产生K+1个上行通信链路,分别为上行发射机→接收机,导频感知攻击者→接收机;接收机拥有N T根天线,上行发射机和导频感知攻击者均为单天线;频域上,每条上行链路的每根天线在每个OFDM符号内都同时占用N个子载波;时域上,每个通信链路均采样L条路径,信道模型为:
    Figure PCTCN2018099050-appb-100002
    代表第m个上行发射机与接收机的第i根接收天线之间的信道冲激响应,
    Figure PCTCN2018099050-appb-100003
    代表第l条路径的功率时延谱;
    Figure PCTCN2018099050-appb-100004
    代表导频感知攻击者与接收机 的第i根接收天线之间的信道冲激响应,并独立于
    Figure PCTCN2018099050-appb-100005
    代表第l条路径的功率时延谱;若上行发射机采用确定性导频,当导频感知攻击发生时,攻击者会在与合法发射机相同的导频点位置,发射相同的导频信号,导频信号配置为:在第k个OFDM符号期间,第m个上行发射机在第i个子载波上的的导频信号为
    Figure PCTCN2018099050-appb-100006
    其中,ρ L,m为其导频发射功率,φ k,m表示第k个OFDM符号时间内的导频相位;导频感知攻击者在第i个子载波上的的导频信号为
    Figure PCTCN2018099050-appb-100007
    其中,ρ A为其导频发射功率,
    Figure PCTCN2018099050-appb-100008
    表示第k个OFDM符号时间第i个子载波上的导频相位。
  3. 根据权利要求1所述的一种基于分层二维特征编码的安全多用户导频鉴权方法,其特征在于,步骤2中,编码准则:一个N×C的二元码本C=[b i,j]被称之为分层二维特征编码矩阵,当且仅当,如下两个特性得到满足:
    1)列特性:对于任意两个向量的集合
    Figure PCTCN2018099050-appb-100009
    存在第i行i∈{1,2,...,B},使得
    Figure PCTCN2018099050-appb-100010
    成立,L为人为设置的变量,C为码本的大小,B为码字的长度;
    2)行特性:对于任意不相同行,第i,j行,
    Figure PCTCN2018099050-appb-100011
    成立;其中,d i,j=f(I i,j),
    Figure PCTCN2018099050-appb-100012
    r=0.5,
    Figure PCTCN2018099050-appb-100013
    Figure PCTCN2018099050-appb-100014
    表示第j个上行发射机至接收机第i根天线之间的信道频率响应,
    Figure PCTCN2018099050-appb-100015
    表示导频感知攻击者与接收机第i根接收天线之间的信道频率响应,
    Figure PCTCN2018099050-appb-100016
    表示第i个子载波上信号的个数,w i表示第i个子载波上接收机端的热噪声。
  4. 根据权利要求1所述的一种基于分层二维特征编码的安全多用户导频鉴权方法,其特征在于,步骤2中,解码准则:解码流程分为五层,分别为如下:
    1)开始层:本层是对所有上行发射节点子载波的激活模式进行公式化表述;
    首先,将C均匀的划分为K个子码本,表示为C i,1≤i≤K,其次,表征第i个上行发射机采用的子载波激活模式为b i∈C i,攻击者采用的子载波激活模式为a,那么,对于此K+1个节点产生的信号产生的叠加现象,将其刻画为:
    b 1∨…∨b K=b S,K,b S,K∨a=b I
    并且
    m 1+…+m K=m S,K,m S,K+a=m I
    其中,b S,K,m S,K代表K个节点产生的独立的子载波激活模式的相互叠加;a是攻击者采用的子载波激活模式,满足:
    Figure PCTCN2018099050-appb-100017
    b I,m I则是接收机最终唯一能获得的两种编码,他们将会被送入到接下来的输入层进行处理;所有可能的列向量b S,K组成了一个码字矩阵B K,也即,b S,K是B K的某一列向量;同理,对于B K中任何一个列向量码字,都能唯一的分解为一组码字b i,1≤i≤K;
    2)输入层;
    本层是进行信号特征提取,共包含两种信号特征,分别为信号能量特征和信号独立性特征;信号独立性特征的提取可通过相邻子载波上信号的内积产生,经过遍历N个子载波,获得一个二维的差分编码矩阵D=[d j∈[1,N]],其中,d j=[d 1,j … d N,j];
    经过特征提取,信号的能量特征和独立性特征全部包含在了变量b I,m I,D中,这些变量将传递至下一层进行数据处理;
    3)隐藏层;
    本层是从三种攻击类型中识别出当前所遇到的攻击类型;
    具体流程分为:
    I)判断b I,D中所有元素是否为1,若成立,则表明全频带攻击发生,输出码字b I;否则,执行下一步操作;
    II)判断b I是否是B K的某一列向量,若否,部分频带攻击发生,输出码字b I,若是,则继续执行下一步操作
    III)若存在m I=m S,K则知道攻击者当前保持静默状态,输出码字b S,K,否则,判决当前发生部分频带攻击,输出码字b I
    通过以上步骤,本层输出得到的攻击模式和该种模式下对应的码字,并将信息传送至下一层;
    4)监督层;
    本层是对上一层输出的码字进行码字的分离和识别;
    I:全频带攻击发生时,接收机对b I的每一个元素减1,然后对新得到的码字进行分解,得到K个用户的码字b i,1≤i≤K;
    II:检测到攻击者静默时,接收机对得到的码字b S,K进行分解,得到K个用户的码字b i,1≤i≤K;
    III:检测到部分频带攻击发生时,接收机抽取b I元素中满足
    Figure PCTCN2018099050-appb-100018
    的元素的集合
    Figure PCTCN2018099050-appb-100019
    以每个元素为参考点,执行差分编码,接收机得到码字集合
    Figure PCTCN2018099050-appb-100020
    进一步需要执行:
    1)如果存在码字
    Figure PCTCN2018099050-appb-100021
    满足
    Figure PCTCN2018099050-appb-100022
    则该码字必满足d i=a,将其从b I中剔除,接收机得到b i,1≤i≤K;
    2)如果不存在码字
    Figure PCTCN2018099050-appb-100023
    满足
    Figure PCTCN2018099050-appb-100024
    则判断b I是否等于b S,K,若是,则分解得到b i,1≤i≤K,反之,判定识别发生错误,输出b i,1≤i≤K+1,必存在b i,b j,i≠j位于同一码本;
    当所有码字均能精准识别时,导频识别错误发生当且仅当,攻击者采用和某一个上行发射机相同的码字,此时,导频识别错误概率
    Figure PCTCN2018099050-appb-100025
    当存在b i,b j,i≠j位于同一码本,此时,导频识别错误概率
    Figure PCTCN2018099050-appb-100026
    导频识别错误概率满足如下条件:
    Figure PCTCN2018099050-appb-100027
    定位导频识别的不稳定性为:
    S R=log 10(P upper/P Iower)
    IV:可靠性约束收缩RBC理论:基于导频识别的不稳定性,继续将码本划分,每一个子码本C i,1≤i≤K被均等的划分为B个子码本,减少攻击者的码字a与上行发射机的码字落入同一码本的概率,之后的导频识别错误概率满足如下条件:
    Figure PCTCN2018099050-appb-100028
    因此,随着B的增加,导频识别错误概率的上下界逐渐趋于一个稳定的值,经证明,当
    Figure PCTCN2018099050-appb-100029
    时,S R=0,导频识别最稳定,识别错误概率为:
    Figure PCTCN2018099050-appb-100030
    经过计算,表示为:
    Figure PCTCN2018099050-appb-100031
    其中,k=2,3是一个常数因子;
    5)输出层;
    本层是存储最终解码的对应各个节点的码字。
  5. 根据权利要求1所述的一种基于分层二维特征编码的安全多用户导频鉴权方法,其特征在于,步骤3中,导频表示阶段:上行发射机和攻击者选择随机导频相位,根据构建分层二维特征编码准则的码本,建立导频相位到码字的一对一映射,在该映射原理下,码字进一步映射为子载波激活模式,码字的元素数值等于1,则导频信号该子载波上发送,否则该子载波被置于空闲状态;上行发射机和攻击者都产生各自的子载波激活模式,并且保持同步传输,经由无线环境,各个子载波上信号的叠加产生干扰,最终被接收机获取;导频分离阶段:根据观察到的子载波激活模式,接收机对各个子载波进行能量检测,判断每一个子载波上是否存在信号,根据结果,得到一个二元码字向量,借助于解码准则,接收机识别具体的攻击类型,得到每个攻击类型下上行发射机和攻击者使用的码字;导频识别阶段:通过搜索码本中的码字,接收机识别分离出的码字,并根据识别出来的码字,得到原始的各个节点对应的导频信号。
PCT/CN2018/099050 2018-06-14 2018-08-06 一种基于分层二维特征编码的安全多用户导频鉴权方法 WO2019237475A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201810614391.4A CN108881217B (zh) 2018-06-14 2018-06-14 一种基于分层二维特征编码的安全多用户导频鉴权方法
CN201810614391.4 2018-06-14

Publications (1)

Publication Number Publication Date
WO2019237475A1 true WO2019237475A1 (zh) 2019-12-19

Family

ID=64338938

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/099050 WO2019237475A1 (zh) 2018-06-14 2018-08-06 一种基于分层二维特征编码的安全多用户导频鉴权方法

Country Status (2)

Country Link
CN (1) CN108881217B (zh)
WO (1) WO2019237475A1 (zh)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112769858B (zh) * 2021-01-22 2022-05-20 西安交通大学 一种无线通信中基于量子学习的安全非随机叠加编码方法
CN113727301B (zh) * 2021-08-05 2023-07-11 西安交通大学 面向v2n低时延通信服务的哈希安全接入方法及系统

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102752080A (zh) * 2012-07-03 2012-10-24 西安交通大学 一种基于物理层的防窃听编码方法
CN105978612A (zh) * 2016-06-07 2016-09-28 重庆邮电大学 大规模mimo系统中结合导频污染消除的双层预编码设计方法
CN106161297A (zh) * 2016-06-22 2016-11-23 西安交通大学 Ofdm系统中基于独立分量分析的抗导频欺骗攻击信道估计和识别方法

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101035106B (zh) * 2007-04-02 2010-06-23 重庆邮电大学 利用前导符号和非均匀导频进行联合信道估计的方法
US8749248B2 (en) * 2011-04-06 2014-06-10 ConSonics, Inc. Shielding flaw detection and measurement in quadrature amplitude modulated cable telecommunications environment
CN103475602B (zh) * 2013-09-16 2017-01-25 东南大学 一种考虑同频干扰的mimo‑ofdm信道估计方法
CN104702390B (zh) * 2015-02-04 2017-09-29 南京邮电大学 分布式压缩感知信道估计中的导频分配方法
CN105306168B (zh) * 2015-09-18 2017-04-26 西安交通大学 一种基于喷泉编码的保障无线数据安全传输方法
CN105577359B (zh) * 2016-03-18 2018-09-25 杭州电子科技大学 一种基于混沌序列导频映射的oofdm加密系统
CN106130935B (zh) * 2016-06-30 2019-04-12 西安交通大学 一种基于随机bpsk序列辅助的自适应抗导频欺骗攻击信道估计方法
CN107360568B (zh) * 2017-08-24 2020-06-19 西安交通大学 利用喷泉码实现对称加密保障无线数据安全传输的方法

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102752080A (zh) * 2012-07-03 2012-10-24 西安交通大学 一种基于物理层的防窃听编码方法
CN105978612A (zh) * 2016-06-07 2016-09-28 重庆邮电大学 大规模mimo系统中结合导频污染消除的双层预编码设计方法
CN106161297A (zh) * 2016-06-22 2016-11-23 西安交通大学 Ofdm系统中基于独立分量分析的抗导频欺骗攻击信道估计和识别方法

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
XU, DONGYANG: "Code-Frequency Block Group Coding for Anti-Spoofing Pilot Authentication in Multi-Antenna OFDM Systems", IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 1 February 2018 (2018-02-01), XP011681939 *
XU: "ICA-SBDC: A Channel Estimation and Identification Mechanism for MISO-OFDM Systems under Pilot Spoofing Attack", IEEE ICC 2017 COMMUNICATION AND INFORMATION SYSTEMS SECURITY SYMPOSIUM, 25 May 2017 (2017-05-25), XP033132696, DOI: 10.1109/ICC.2017.7996861 *

Also Published As

Publication number Publication date
CN108881217B (zh) 2020-10-27
CN108881217A (zh) 2018-11-23

Similar Documents

Publication Publication Date Title
Jiang A note on chaotic secure communication systems
Xu et al. Code-frequency block group coding for anti-spoofing pilot authentication in multi-antenna OFDM systems
Wang et al. A deep learning-based intelligent receiver for improving the reliability of the MIMO wireless communication system
WO2019237475A1 (zh) 一种基于分层二维特征编码的安全多用户导频鉴权方法
CN111065096A (zh) 针对无线通信的物理层加密传输系统及其方法
WO2019237476A1 (zh) 一种基于独立性校验编码的ofdm信道训练鉴权方法
CN112383380A (zh) 基于非正交多址接入技术的隐蔽车辆通信方法
Xu et al. Quantum learning based nonrandom superimposed coding for secure wireless access in 5G URLLC
CN112468258B (zh) 一种全双工端到端自动编码器通信系统及其对抗窃听方法
CN105813081A (zh) 选择增强认知中继网络安全性能的中继节点的方法
Zhang et al. Digital communication by active-passive-decomposition synchronization in hyperchaotic systems
Baird et al. Jam-resistant communication without shared secrets through the use of concurrent codes
Li et al. Secure semantic communication model for black-box attack challenge under metaverse
JP2006512860A5 (zh)
CN101964693B (zh) 一种利用无线信道干扰进行数据传输的方法
CN112769858B (zh) 一种无线通信中基于量子学习的安全非随机叠加编码方法
CN113727301B (zh) 面向v2n低时延通信服务的哈希安全接入方法及系统
Rong et al. Semantic Entropy Can Simultaneously Benefit Transmission Efficiency and Channel Security of Wireless Semantic Communications
Jiang et al. Equalization Network‐Aided SCMA Codec Scheme with Deep Learning
Fengler et al. Coded Orthogonal Modulation for the Multi-Antenna Multiple-Access Channel
Shekhawat et al. Sensing Performance Analysis Using Choatic Signal-Based SCMA Codebook for Secure Cognitive Communication System in 5G
Kasban et al. Immunity of Signals Transmission Using Secured Unequal Error Protection Scheme with Various Packet Format
Ezzeddine et al. Achievable rates for queue-based timing stegocodes
KR20200064504A (ko) 물리 계층 보안 및 저 지연 통신을 위한 송신과 수신 방법 및 그 장치
Obadha et al. Generalized antenna sequence spatial modulation (GASSM): a novel framework for enhanced PHY layer security and energy efficiency

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18922894

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 18922894

Country of ref document: EP

Kind code of ref document: A1

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205 DATED 30/06/2021)

122 Ep: pct application non-entry in european phase

Ref document number: 18922894

Country of ref document: EP

Kind code of ref document: A1