WO2019237475A1 - 一种基于分层二维特征编码的安全多用户导频鉴权方法 - Google Patents
一种基于分层二维特征编码的安全多用户导频鉴权方法 Download PDFInfo
- Publication number
- WO2019237475A1 WO2019237475A1 PCT/CN2018/099050 CN2018099050W WO2019237475A1 WO 2019237475 A1 WO2019237475 A1 WO 2019237475A1 CN 2018099050 W CN2018099050 W CN 2018099050W WO 2019237475 A1 WO2019237475 A1 WO 2019237475A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- pilot
- codeword
- subcarrier
- receiver
- attacker
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B17/00—Monitoring; Testing
- H04B17/30—Monitoring; Testing of propagation channels
- H04B17/391—Modelling the propagation channel
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L25/00—Baseband systems
- H04L25/02—Details ; arrangements for supplying electrical power along data transmission lines
- H04L25/0202—Channel estimation
- H04L25/0224—Channel estimation using sounding signals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L27/00—Modulated-carrier systems
- H04L27/26—Systems using multi-frequency codes
- H04L27/2601—Multicarrier modulation systems
- H04L27/2602—Signal structure
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
Definitions
- the present invention relates to the field of wireless communications, and in particular, to a secure multi-user pilot authentication method based on hierarchical two-dimensional feature coding.
- the security risks brought by the broadcast characteristics of wireless channels are increasing day by day, and harmful signal sources can more efficiently interfere with the communication links of other normal nodes.
- the upper-level password encryption and decryption system can guarantee the security of the wireless communication environment to a certain extent, with the development of computer technology, the upper-level encryption system faces the risk of being deciphered, and harmful signal sources can further obtain information of legitimate users.
- the physical layer security mechanism has attracted widespread attention and research.
- harmful signal sources are more frequent and attacks against OFDM systems.
- attackers can obtain the protocol and architecture parameters of the target system, causing serious, Incalculable communication loss.
- pilot authentication mechanism of the physical layer In OFDM systems, the authentication mechanism for pilots is based on publicly known pilots and is open and deterministic. Therefore, these pilot signals can be learned by the attacker. When the attacker learns the frame synchronization information and pilot information of a legitimate transceiver, he can further launch a pilot awareness attack, during which the attacker synchronizes with a legitimate user Sending specific pilot signals can interfere with the pilot sharing mechanism between legitimate transceiver pairings, further affecting channel estimation, and paralyzing the system's next data transmission service. Moreover, once a pilot-aware attack is successfully implemented, it is difficult for a legitimate transceiver to initiate data recovery. Therefore, the key lies in how to design a secure multi-user pilot authentication mechanism to attenuate the effects of pilot-aware attacks in OFDM systems.
- the purpose of the present invention is to provide a secure multi-user pilot authentication method based on hierarchical two-dimensional feature coding to solve the above problems.
- the present invention adopts the following technical solutions:
- a secure multi-user pilot authentication method based on layered two-dimensional feature coding includes the following steps:
- Step 1 Establish a system model; use random pilot mechanism, multiple uplink transmitters use random pilot for channel estimation, and active attackers adopt a hybrid attack mode.
- the attack modes include: channel training in which some bands interfere with legitimate channels, and full band interference Legal channel training and keeping silent;
- Step 2 By encoding the activation modes of each subcarrier, a code frequency domain is created, and a two-dimensional layered coding criterion is constructed; considering K + 2 OFDM symbol times, energy detection is performed on signals received on any single subcarrier.
- the detection threshold is configured to achieve accurate detection of the number of signals on each subcarrier. If there is a signal, the subcarrier is encoded as 1, otherwise it is 0.
- L s represents the length of the codeword.
- S 2 ⁇ s 2
- Step 3 construct an anti-attack channel training and authentication CTA protocol based on the independence check code ICC; including pilot representation, separation, and identification.
- K uplink transmitters a receiver and a pilot-aware attacker
- K + 1 uplink communication links are generated, which are uplink transmitter ⁇ receiver, pilot Perceive attacker ⁇ receiver.
- the receiver has N T antennas, transmitter and an uplink pilot perception attackers are single antenna.
- each antenna of each uplink occupies N subcarriers simultaneously in each OFDM symbol.
- each communication link samples L paths.
- the channel model is: Represents the impulse response of the channel between the mth uplink transmitter and the ith receiving antenna of the receiver, Represents the power delay spectrum of the first path; Represents the channel impulse response between the pilot-aware attacker and the receiver's i-th receiving antenna, and is independent of Represents the power delay spectrum of the l path.
- the uplink transmitter uses a deterministic pilot
- the attacker will transmit the same pilot signal at the same pilot point position as the legitimate transmitter
- the pilot signal is configured as follows:
- the pilot signal of the mth uplink transmitter on the ith subcarrier is Among them, ⁇ L, m is the pilot transmit power, and ⁇ k, m represents the pilot phase in the k-th OFDM symbol time.
- the pilot signal of the pilot-aware attacker on the i-th subcarrier is Among them, ⁇ A is its pilot transmission power, Represents the pilot phase on the i-th subcarrier of the k-th OFDM symbol time.
- an N ⁇ C binary codebook C [b i, j ] is called a hierarchical two-dimensional feature coding matrix, if and only if, the following two characteristics are satisfied :
- step 2 the decoding criterion: the decoding process is divided into five layers, which are as follows:
- This layer is a formulaic expression of the activation mode of all uplink transmitting node subcarriers
- the subcarrier activation mode used to characterize the i-th uplink transmitter is b i ⁇ C i .
- the subcarrier activation mode is a.
- b S, K , m S, K represents the superposition of independent subcarrier activation modes generated by K nodes; a is the subcarrier activation mode adopted by the attacker, which satisfies:
- b I and m I are the only two codes that the receiver can finally obtain. They will be sent to the next input layer for processing. All possible column vector b S, K constitute a codeword matrix B K, i.e., b S, K B K is a column vector; Similarly, for B K a column vector of any codeword can be uniquely Is decomposed into a set of codewords b i , 1 ⁇ i ⁇ K.
- This layer is for signal feature extraction, which contains two types of signal features, which are signal energy feature and signal independence feature.
- This layer identifies the types of attacks currently encountered from three types of attacks
- a partial-band attack is currently occurring, and the codeword b I is output.
- This layer is to separate and identify the codewords output from the previous layer
- the receiver subtracts 1 from each element of b I , and then decomposes the newly obtained codewords to obtain K user codewords b i , 1 ⁇ i ⁇ K;
- the receiver decomposes the obtained codewords b S and K to obtain the codewords b i of K users, 1 ⁇ i ⁇ K;
- pilot recognition errors occur if and only if the attacker uses the same codeword as an uplink transmitter. At this time, the probability of pilot recognition errors
- the probability of pilot recognition error meets the following conditions:
- the instability of positioning pilot identification is:
- This layer is the codeword corresponding to each node that stores the final decoding.
- the pilot representation stage the uplink transmitter and the attacker select a random pilot phase, and establish a one-to-one mapping of the pilot phase to the codeword according to a codebook that constructs a layered two-dimensional feature coding criterion.
- the codeword is further mapped into the subcarrier activation mode. If the value of the element of the codeword is equal to 1, the pilot signal is transmitted on the subcarrier, otherwise the subcarrier is placed in the idle state; the uplink transmitter and the attacker. Each generates its own subcarrier activation mode and maintains synchronous transmission.
- the superposition of signals on each subcarrier generates interference and is finally acquired by the receiver;
- the pilot separation stage according to the observed subcarrier activation mode, the receiver Perform energy detection on each subcarrier, determine whether a signal exists on each subcarrier, and obtain a binary codeword vector based on the result.
- the receiver identifies the specific attack type and obtains uplink transmission under each attack type. Codewords used by attackers and attackers; pilot recognition phase: by searching for codewords in the codebook, the receiver identifies the separated Codewords, and according to the identified codewords, the pilot signals corresponding to the original nodes are obtained.
- the present invention has the following technical effects:
- the invention uses the characteristics of random pilots to weaken the pilot sensing attack as a hybrid attack, and simultaneously uses the independent characteristics of the channel, the energy characteristics of the signals, and the coding diversity gain to identify the pilot signals of multiple uplink transmitters in an interference environment.
- Figure 1 is a system model diagram.
- Figure 2 is a diagram of the proposed protocol framework.
- FIG. 3 is a graph of a code rate change of the obtained codeword.
- FIG. 4 is a graph showing instability changes of pilot identification.
- FIG. 5 is a graph showing the variation of the probability of pilot identification error in the most stable state.
- Figure 1 shows the system model diagram. Considering K uplink transmitters, a receiver and a pilot-aware attacker, a total of K + 1 uplink communication links are generated. Attacker ⁇ receiver.
- the receiver has N T antennas, transmitter and an uplink pilot perception attackers are single antenna.
- each antenna of each uplink occupies N subcarriers simultaneously in each OFDM symbol.
- each communication link samples L paths.
- the channel model is: Represents the impulse response of the channel between the mth uplink transmitter and the ith receiving antenna of the receiver, Represents the power delay spectrum of the first path; Represents the channel impulse response between the pilot-aware attacker and the receiver's i-th receiving antenna, and is independent of Represents the power delay spectrum of the l path.
- the uplink transmitter uses a deterministic pilot
- the attacker will transmit the same pilot signal at the same pilot point position as the legitimate transmitter
- the pilot signal is configured as follows:
- the pilot signal of the mth uplink transmitter on the ith subcarrier is Among them, ⁇ L, m is the pilot transmit power, and ⁇ k, m represents the pilot phase in the k-th OFDM symbol time.
- the pilot signal of the pilot-aware attacker on the i-th subcarrier is Among them, ⁇ A is its pilot transmission power, Represents the pilot phase on the i-th subcarrier of the k-th OFDM symbol time.
- uplink transmitters use random pilots for channel estimation.
- active attackers can adopt a hybrid attack mode: 1. Use random pilots, and channel training on some bands interferes with legitimate channels; , Full-band interference with legal channel training; 3. Keep silent.
- FIG. 1 shows the proposed protocol framework, including the following steps:
- the code frequency domain is established as: (s, b), 1 ⁇ b ⁇ N, where N represents the number of subcarriers occupied.
- N represents the number of subcarriers occupied.
- Step 2 Construct a layered two-dimensional feature coding criterion, which may specifically include a coding criterion and a decoding criterion.
- An N ⁇ C binary codebook C [b i, j ] is called a hierarchical two-dimensional feature coding matrix. If and only if, the following two characteristics are satisfied:
- Row characteristics for any different rows, for example, the i, j rows, Established. among them,
- Start layer The function of this layer is to formulate the activation mode of all uplink transmitting nodes (including uplink transmitters and attackers) subcarriers;
- the subcarrier activation mode used to characterize the i-th uplink transmitter is b i ⁇ C i .
- the subcarrier activation mode is a.
- b S, K , m S, K represents the superposition of independent subcarrier activation modes generated by K nodes.
- a is the subcarrier activation mode adopted by the attacker, which satisfies:
- b I and m I are the only two codes that the receiver can finally obtain. They will be sent to the next input layer for processing. All possible column vectors b S, K form a codeword matrix B K , that is, b S, K is a certain column vector of B K. Similarly, for B K column vector of any one codeword, can be decomposed into a unique set of codewords b i, 1 ⁇ i ⁇ K.
- the role of this layer is to identify the types of attacks currently encountered from three possible types of attacks;
- V) Determine whether b I is a column vector of B K. If not, part of the frequency band attack occurs and the code word b I is output. If yes, continue to the next operation.
- the attack mode obtained by this layer and the corresponding codeword in this mode are output, and the information is transmitted to the next layer.
- the function of this layer is to separate and identify the codewords output from the previous layer.
- the receiver subtracts 1 from each element of b I , and then decomposes the newly obtained codeword to obtain codewords b i for K users, 1 ⁇ i ⁇ K.
- the receiver decomposes the obtained codeword b S, K , and can obtain the codewords b i of K users, 1 ⁇ i ⁇ K.
- the pilot recognition error probability satisfies the following conditions:
- the instability of positioning pilot identification is:
- the function of this layer is to store the final decoded codeword corresponding to each node.
- Step 3 As shown in Figure 2, the pilot representation phase: the uplink transmitter and the attacker select a random pilot phase, and according to the codebook of Step 2, a one-to-one mapping of pilot phase to codeword is established. In this mapping principle Next, the codeword is further mapped to the subcarrier activation mode. The specific principle is that if the value of the element of the codeword is equal to 1, the pilot signal is transmitted on the subcarrier, otherwise the subcarrier is placed in the idle state. Both the uplink transmitter and the attacker generate their own subcarrier activation modes and maintain synchronous transmission. Via the wireless environment, the superposition of the signals on each subcarrier causes interference and is finally acquired by the receiver.
- Pilot separation stage According to the observed subcarrier activation mode, the receiver performs energy detection in Step 1 on each subcarrier to determine whether a signal exists on each subcarrier. Based on the result, a binary codeword vector is obtained. For the decoding criterion of Step 2, the receiver can: 1 identify the specific attack type; 2 obtain the codeword used by the uplink transmitter and the attacker under each attack type. Pilot identification stage: The receiver identifies the separated codewords by searching for the codewords in the codebook, and obtains the original pilot signals corresponding to the original nodes based on the identified codewords.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Electromagnetism (AREA)
- Power Engineering (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
Claims (5)
- 一种基于分层二维特征编码的安全多用户导频鉴权方法,其特征在于,包括以下步骤:步骤1,建立系统模型;采用随机导频机制,多个上行发射机采用随机导频进行信道估计,主动攻击者采取混合攻击模式,混合攻击模式包括:部分频带干扰合法信道的信道训练、全频带干扰合法信道训练和保持静默;步骤2,通过对各个子载波激活模式的编码,创建了码频域,构建分层二维编码准则;考虑K+2个OFDM符号时间,K表示用户个数;对任意单个子载波上收到的信号进行能量检测,通过配置检测阈值,实现每个子载波上精准的信号个数检测,若存在信号,则该子载波被编码为1,反之则为0;根据得到的二进制编码,得到二元码字向量集合为:S 1={s 1=[s 1,m]|s 1,m∈{0,1},1≤m≤L s},其中,s 1,m表示第m个二元码字单元;L s表示码字的长度,同理,得到M+1元码字向量集合S 2={s 2|s 2,m∈{0,...,M},1≤m≤L s},s 2,m表示第m个M+1元码字单元;构建分层二维特征编码准则,具体包括编码准则和解码准则;步骤3,构建基于独立性校验编码ICC的反攻击信道训练鉴权CTA协议;包括导频的表示,分离和识别。
- 根据权利要求1所述的一种基于分层二维特征编码的安全多用户导频鉴权方法,其特征在于,步骤1的系统模型中,考虑K个上行发射机,一个接收机和一个导频感知攻击者,共产生K+1个上行通信链路,分别为上行发射机→接收机,导频感知攻击者→接收机;接收机拥有N T根天线,上行发射机和导频感知攻击者均为单天线;频域上,每条上行链路的每根天线在每个OFDM符号内都同时占用N个子载波;时域上,每个通信链路均采样L条路径,信道模型为: 代表第m个上行发射机与接收机的第i根接收天线之间的信道冲激响应, 代表第l条路径的功率时延谱; 代表导频感知攻击者与接收机 的第i根接收天线之间的信道冲激响应,并独立于 代表第l条路径的功率时延谱;若上行发射机采用确定性导频,当导频感知攻击发生时,攻击者会在与合法发射机相同的导频点位置,发射相同的导频信号,导频信号配置为:在第k个OFDM符号期间,第m个上行发射机在第i个子载波上的的导频信号为 其中,ρ L,m为其导频发射功率,φ k,m表示第k个OFDM符号时间内的导频相位;导频感知攻击者在第i个子载波上的的导频信号为 其中,ρ A为其导频发射功率, 表示第k个OFDM符号时间第i个子载波上的导频相位。
- 根据权利要求1所述的一种基于分层二维特征编码的安全多用户导频鉴权方法,其特征在于,步骤2中,编码准则:一个N×C的二元码本C=[b i,j]被称之为分层二维特征编码矩阵,当且仅当,如下两个特性得到满足:
- 根据权利要求1所述的一种基于分层二维特征编码的安全多用户导频鉴权方法,其特征在于,步骤2中,解码准则:解码流程分为五层,分别为如下:1)开始层:本层是对所有上行发射节点子载波的激活模式进行公式化表述;首先,将C均匀的划分为K个子码本,表示为C i,1≤i≤K,其次,表征第i个上行发射机采用的子载波激活模式为b i∈C i,攻击者采用的子载波激活模式为a,那么,对于此K+1个节点产生的信号产生的叠加现象,将其刻画为:b 1∨…∨b K=b S,K,b S,K∨a=b I并且m 1+…+m K=m S,K,m S,K+a=m I其中,b S,K,m S,K代表K个节点产生的独立的子载波激活模式的相互叠加;a是攻击者采用的子载波激活模式,满足:b I,m I则是接收机最终唯一能获得的两种编码,他们将会被送入到接下来的输入层进行处理;所有可能的列向量b S,K组成了一个码字矩阵B K,也即,b S,K是B K的某一列向量;同理,对于B K中任何一个列向量码字,都能唯一的分解为一组码字b i,1≤i≤K;2)输入层;本层是进行信号特征提取,共包含两种信号特征,分别为信号能量特征和信号独立性特征;信号独立性特征的提取可通过相邻子载波上信号的内积产生,经过遍历N个子载波,获得一个二维的差分编码矩阵D=[d j∈[1,N]],其中,d j=[d 1,j … d N,j];经过特征提取,信号的能量特征和独立性特征全部包含在了变量b I,m I,D中,这些变量将传递至下一层进行数据处理;3)隐藏层;本层是从三种攻击类型中识别出当前所遇到的攻击类型;具体流程分为:I)判断b I,D中所有元素是否为1,若成立,则表明全频带攻击发生,输出码字b I;否则,执行下一步操作;II)判断b I是否是B K的某一列向量,若否,部分频带攻击发生,输出码字b I,若是,则继续执行下一步操作III)若存在m I=m S,K则知道攻击者当前保持静默状态,输出码字b S,K,否则,判决当前发生部分频带攻击,输出码字b I;通过以上步骤,本层输出得到的攻击模式和该种模式下对应的码字,并将信息传送至下一层;4)监督层;本层是对上一层输出的码字进行码字的分离和识别;I:全频带攻击发生时,接收机对b I的每一个元素减1,然后对新得到的码字进行分解,得到K个用户的码字b i,1≤i≤K;II:检测到攻击者静默时,接收机对得到的码字b S,K进行分解,得到K个用户的码字b i,1≤i≤K;导频识别错误概率满足如下条件:定位导频识别的不稳定性为:S R=log 10(P upper/P Iower)IV:可靠性约束收缩RBC理论:基于导频识别的不稳定性,继续将码本划分,每一个子码本C i,1≤i≤K被均等的划分为B个子码本,减少攻击者的码字a与上行发射机的码字落入同一码本的概率,之后的导频识别错误概率满足如下条件:经过计算,表示为:其中,k=2,3是一个常数因子;5)输出层;本层是存储最终解码的对应各个节点的码字。
- 根据权利要求1所述的一种基于分层二维特征编码的安全多用户导频鉴权方法,其特征在于,步骤3中,导频表示阶段:上行发射机和攻击者选择随机导频相位,根据构建分层二维特征编码准则的码本,建立导频相位到码字的一对一映射,在该映射原理下,码字进一步映射为子载波激活模式,码字的元素数值等于1,则导频信号该子载波上发送,否则该子载波被置于空闲状态;上行发射机和攻击者都产生各自的子载波激活模式,并且保持同步传输,经由无线环境,各个子载波上信号的叠加产生干扰,最终被接收机获取;导频分离阶段:根据观察到的子载波激活模式,接收机对各个子载波进行能量检测,判断每一个子载波上是否存在信号,根据结果,得到一个二元码字向量,借助于解码准则,接收机识别具体的攻击类型,得到每个攻击类型下上行发射机和攻击者使用的码字;导频识别阶段:通过搜索码本中的码字,接收机识别分离出的码字,并根据识别出来的码字,得到原始的各个节点对应的导频信号。
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810614391.4A CN108881217B (zh) | 2018-06-14 | 2018-06-14 | 一种基于分层二维特征编码的安全多用户导频鉴权方法 |
CN201810614391.4 | 2018-06-14 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2019237475A1 true WO2019237475A1 (zh) | 2019-12-19 |
Family
ID=64338938
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2018/099050 WO2019237475A1 (zh) | 2018-06-14 | 2018-08-06 | 一种基于分层二维特征编码的安全多用户导频鉴权方法 |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN108881217B (zh) |
WO (1) | WO2019237475A1 (zh) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112769858B (zh) * | 2021-01-22 | 2022-05-20 | 西安交通大学 | 一种无线通信中基于量子学习的安全非随机叠加编码方法 |
CN113727301B (zh) * | 2021-08-05 | 2023-07-11 | 西安交通大学 | 面向v2n低时延通信服务的哈希安全接入方法及系统 |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102752080A (zh) * | 2012-07-03 | 2012-10-24 | 西安交通大学 | 一种基于物理层的防窃听编码方法 |
CN105978612A (zh) * | 2016-06-07 | 2016-09-28 | 重庆邮电大学 | 大规模mimo系统中结合导频污染消除的双层预编码设计方法 |
CN106161297A (zh) * | 2016-06-22 | 2016-11-23 | 西安交通大学 | Ofdm系统中基于独立分量分析的抗导频欺骗攻击信道估计和识别方法 |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101035106B (zh) * | 2007-04-02 | 2010-06-23 | 重庆邮电大学 | 利用前导符号和非均匀导频进行联合信道估计的方法 |
US8749248B2 (en) * | 2011-04-06 | 2014-06-10 | ConSonics, Inc. | Shielding flaw detection and measurement in quadrature amplitude modulated cable telecommunications environment |
CN103475602B (zh) * | 2013-09-16 | 2017-01-25 | 东南大学 | 一种考虑同频干扰的mimo‑ofdm信道估计方法 |
CN104702390B (zh) * | 2015-02-04 | 2017-09-29 | 南京邮电大学 | 分布式压缩感知信道估计中的导频分配方法 |
CN105306168B (zh) * | 2015-09-18 | 2017-04-26 | 西安交通大学 | 一种基于喷泉编码的保障无线数据安全传输方法 |
CN105577359B (zh) * | 2016-03-18 | 2018-09-25 | 杭州电子科技大学 | 一种基于混沌序列导频映射的oofdm加密系统 |
CN106130935B (zh) * | 2016-06-30 | 2019-04-12 | 西安交通大学 | 一种基于随机bpsk序列辅助的自适应抗导频欺骗攻击信道估计方法 |
CN107360568B (zh) * | 2017-08-24 | 2020-06-19 | 西安交通大学 | 利用喷泉码实现对称加密保障无线数据安全传输的方法 |
-
2018
- 2018-06-14 CN CN201810614391.4A patent/CN108881217B/zh not_active Expired - Fee Related
- 2018-08-06 WO PCT/CN2018/099050 patent/WO2019237475A1/zh active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102752080A (zh) * | 2012-07-03 | 2012-10-24 | 西安交通大学 | 一种基于物理层的防窃听编码方法 |
CN105978612A (zh) * | 2016-06-07 | 2016-09-28 | 重庆邮电大学 | 大规模mimo系统中结合导频污染消除的双层预编码设计方法 |
CN106161297A (zh) * | 2016-06-22 | 2016-11-23 | 西安交通大学 | Ofdm系统中基于独立分量分析的抗导频欺骗攻击信道估计和识别方法 |
Non-Patent Citations (2)
Title |
---|
XU, DONGYANG: "Code-Frequency Block Group Coding for Anti-Spoofing Pilot Authentication in Multi-Antenna OFDM Systems", IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 1 February 2018 (2018-02-01), XP011681939 * |
XU: "ICA-SBDC: A Channel Estimation and Identification Mechanism for MISO-OFDM Systems under Pilot Spoofing Attack", IEEE ICC 2017 COMMUNICATION AND INFORMATION SYSTEMS SECURITY SYMPOSIUM, 25 May 2017 (2017-05-25), XP033132696, DOI: 10.1109/ICC.2017.7996861 * |
Also Published As
Publication number | Publication date |
---|---|
CN108881217B (zh) | 2020-10-27 |
CN108881217A (zh) | 2018-11-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Jiang | A note on chaotic secure communication systems | |
Xu et al. | Code-frequency block group coding for anti-spoofing pilot authentication in multi-antenna OFDM systems | |
Wang et al. | A deep learning-based intelligent receiver for improving the reliability of the MIMO wireless communication system | |
WO2019237475A1 (zh) | 一种基于分层二维特征编码的安全多用户导频鉴权方法 | |
CN111065096A (zh) | 针对无线通信的物理层加密传输系统及其方法 | |
WO2019237476A1 (zh) | 一种基于独立性校验编码的ofdm信道训练鉴权方法 | |
CN112383380A (zh) | 基于非正交多址接入技术的隐蔽车辆通信方法 | |
Xu et al. | Quantum learning based nonrandom superimposed coding for secure wireless access in 5G URLLC | |
CN112468258B (zh) | 一种全双工端到端自动编码器通信系统及其对抗窃听方法 | |
CN105813081A (zh) | 选择增强认知中继网络安全性能的中继节点的方法 | |
Zhang et al. | Digital communication by active-passive-decomposition synchronization in hyperchaotic systems | |
Baird et al. | Jam-resistant communication without shared secrets through the use of concurrent codes | |
Li et al. | Secure semantic communication model for black-box attack challenge under metaverse | |
JP2006512860A5 (zh) | ||
CN101964693B (zh) | 一种利用无线信道干扰进行数据传输的方法 | |
CN112769858B (zh) | 一种无线通信中基于量子学习的安全非随机叠加编码方法 | |
CN113727301B (zh) | 面向v2n低时延通信服务的哈希安全接入方法及系统 | |
Rong et al. | Semantic Entropy Can Simultaneously Benefit Transmission Efficiency and Channel Security of Wireless Semantic Communications | |
Jiang et al. | Equalization Network‐Aided SCMA Codec Scheme with Deep Learning | |
Fengler et al. | Coded Orthogonal Modulation for the Multi-Antenna Multiple-Access Channel | |
Shekhawat et al. | Sensing Performance Analysis Using Choatic Signal-Based SCMA Codebook for Secure Cognitive Communication System in 5G | |
Kasban et al. | Immunity of Signals Transmission Using Secured Unequal Error Protection Scheme with Various Packet Format | |
Ezzeddine et al. | Achievable rates for queue-based timing stegocodes | |
KR20200064504A (ko) | 물리 계층 보안 및 저 지연 통신을 위한 송신과 수신 방법 및 그 장치 | |
Obadha et al. | Generalized antenna sequence spatial modulation (GASSM): a novel framework for enhanced PHY layer security and energy efficiency |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 18922894 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 18922894 Country of ref document: EP Kind code of ref document: A1 |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205 DATED 30/06/2021) |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 18922894 Country of ref document: EP Kind code of ref document: A1 |