WO2024077597A1 - 无线物理层安全通信的方法和通信装置 - Google Patents

无线物理层安全通信的方法和通信装置 Download PDF

Info

Publication number
WO2024077597A1
WO2024077597A1 PCT/CN2022/125368 CN2022125368W WO2024077597A1 WO 2024077597 A1 WO2024077597 A1 WO 2024077597A1 CN 2022125368 W CN2022125368 W CN 2022125368W WO 2024077597 A1 WO2024077597 A1 WO 2024077597A1
Authority
WO
WIPO (PCT)
Prior art keywords
data
error rate
communication
bit error
information
Prior art date
Application number
PCT/CN2022/125368
Other languages
English (en)
French (fr)
Inventor
刘鹏
孙黎
路献辉
黄梦洁
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to PCT/CN2022/125368 priority Critical patent/WO2024077597A1/zh
Publication of WO2024077597A1 publication Critical patent/WO2024077597A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L27/00Modulated-carrier systems

Definitions

  • the embodiments of the present application relate to the field of communications, and more specifically, to a method and a communication device for secure wireless physical layer communications.
  • Secure transmission is the basic guarantee of communication.
  • Traditional secure transmission schemes are all based on keys.
  • Key encryption can be divided into symmetric encryption and asymmetric encryption. Symmetric encryption requires both parties to share keys, while asymmetric encryption requires one party to pass the public key to the other party.
  • the sender uses public key encryption, and the receiver uses private key decryption. Both methods require key maintenance and management. Key maintenance and management require complex protocol support, and protocol vulnerabilities are often easy to be attacked, resulting in key leakage, which poses a certain risk.
  • complex protocols require additional communication overhead and delay, which cannot adapt to the high dynamic characteristics of future communication networks.
  • physical layer secure transmission technology utilizes the physical characteristics of wireless channels and adopts signal processing, coding and modulation technology to achieve keyless secure transmission with relatively low communication overhead.
  • the embodiments of the present application provide a method and a communication device for wireless physical layer secure communication, which can improve the security performance of communication in a keyless transmission scenario.
  • a method for wireless physical layer secure communication is provided.
  • the method can be performed by a first device, which can be a terminal device or a network device, or a chip or circuit in the terminal device or the network device, or a logic module or software that can realize all or part of the functions of the terminal device or the network device, and the present application does not limit this.
  • the method includes: the first device preprocesses the first data based on the bit error rate of the third device, and the preprocessing is used to make the communication between the first device and the second device reach a security level; the first device sends the second data to the second device, and the second data is the data obtained after the first data is preprocessed.
  • the transmitting end preprocesses the data to be sent before sending the data.
  • the preprocessing introduces the bit error rate of the third device, which can make the communication between the first device and the second device reach the security level, thereby improving the communication security.
  • the solution can customize the security level and provide differentiated security services for different legitimate recipients.
  • the Internet of Things (IoT) terminal has limited computing power and low security requirements, and can use the solution of this application to customize a lower security level. Therefore, it has greater flexibility.
  • the first device preprocesses the first data based on the bit error rate of the third device, including: the first device groups the first data based on the bit error rate of the third device; or, the first device groups the first data based on the bit error rate of the third device and generates a first random string.
  • the first data is grouped and processed so that each group of the first data can obtain provable security strength, which helps to improve communication security.
  • the first device groups the first data based on the bit error rate of the third device, including: the first device determines the packet length of the first data according to the bit error rate and the security level; the first device divides the first data in units of packet length.
  • the method further includes: the first device performs an operation on the grouped first data based on the first random string.
  • the transmission security of the first data can be improved by introducing the first random string.
  • the first device operates on the grouped first data based on the first random string, including: the first device obtains a first bit string based on the first random string and the second random string; the first device operates on the grouped first data based on the first bit string.
  • the first bit string when pre-processing and post-processing the first data, the first bit string can be used as an equivalent key, so that each group of the first data can obtain provable security strength, which helps to improve communication security.
  • the length of the first random string is greater than or equal to the packet length, and the length of the second random vector is equal to the length of the first random string.
  • the length of the first random string is greater than or equal to the packet length, it is only necessary to use the physical layer security transmission technology for the first random string, and the solution is simple to implement.
  • the length of the first random string is less than the packet length, and the length of the second random vector is equal to the packet length.
  • the method further includes: the first device sending a second random string to the second device.
  • the packet length is a packet size of channel coding.
  • the packet length is the packet size of the channel coding, which can reduce the complexity of the channel coding and facilitate implementation.
  • the method further includes: the first device sends first information to the second device; or the first device receives first information from the second device; wherein the first information is used to indicate a security level.
  • the sending and receiving ends align the security level through signaling, and the security level can be customized according to needs, which is more flexible.
  • the first information is indication information.
  • the indication information is used to indicate the type of the terminal device, and there is a corresponding relationship between the type of the terminal device and the communication security level.
  • the security level is indicated by the type of the terminal device, so that the security level is more matched with the computing capability of the terminal device, which can reduce the implementation complexity of the terminal.
  • the method further includes: the first device receives second information from the second device; or the first device sends second information to the second device; wherein the second information is used to indicate a bit error rate.
  • the transmitting and receiving ends align the bit error rate through signaling, which facilitates the implementation of pre-processing and post-processing.
  • the second information is indication information.
  • the method further includes: the first device determines a bit error rate.
  • the first device can determine the bit error rate so that the determined bit error rate is more in line with the actual scenario.
  • the communication security in the current environment can be improved.
  • the first device determines a bit error rate, including: the first device determines a controlled area, the second device is located in the controlled area, and the third device is located outside the controlled area; the first device determines an optimal communication position outside the controlled area, and the third device has the best receiving performance at the optimal communication position; the first device determines the bit error rate based on the optimal communication position.
  • the bit error rate is estimated at the best communication position outside the controlled area.
  • the preprocessing result still has reliable safety performance when the condition of the third device is optimal.
  • a method for wireless physical layer secure communication is provided.
  • the method can be performed by a second device, which can be a terminal device or a network device, or a chip or circuit in the terminal device or the network device, or a logic module or software that can realize all or part of the functions of the terminal device or the network device, and the present application does not limit this.
  • the method includes: a second device receives second data from a first device; the second device post-processes the second data to obtain first data, the second data is data obtained after pre-processing the first data based on the bit error rate of a third device, and the pre-processing is used to make the communication between the first device and the second device reach a security level.
  • the transmitting end preprocesses the data to be sent before sending the data.
  • the preprocessing introduces the bit error rate of the third device, which can make the communication between the first device and the second device reach the security level, thereby improving the communication security.
  • the solution can customize the security level and provide differentiated security services for different legitimate recipients.
  • the Internet of Things (IoT) terminal has limited computing power and low security requirements, and can use the solution of this application to customize a lower security level. Therefore, it has greater flexibility.
  • the second device post-processes the second data, including: the second device groups the second data; and the second device processes the grouped second data according to the second random string.
  • the second data includes a first random string
  • the second device processes the second data after grouping according to the second random string, including: the second device obtains a first bit string according to the first random string and the second random string; the second device performs operations on the second data after grouping based on the first bit string.
  • the first bit string when pre-processing and post-processing the first data, the first bit string can be used as an equivalent key, so that each group of the first data can obtain provable security strength, which helps to improve communication security.
  • the method further includes: the second device receives a second random string from the first device.
  • the method further includes: the second device receives first information from the first device; or the second device sends first information to the first device; wherein the first information is used to indicate a security level.
  • the sending and receiving ends align the security level through signaling, and the security level can be customized according to needs, which is more flexible.
  • the first information is indication information.
  • the indication information is used to indicate the type of the terminal device, and there is a corresponding relationship between the type of the terminal device and the communication security level.
  • the security level is indicated by the type of the terminal device, so that the security level is more matched with the computing capability of the terminal device, which can reduce the implementation complexity of the terminal.
  • the method further includes: the second device receives second information from the first device; or the second device sends second information to the first device, wherein the second information is used to indicate a bit error rate.
  • the transmitting and receiving ends align the bit error rate through signaling, which facilitates the implementation of pre-processing and post-processing.
  • the second information is indication information.
  • the method further includes: the second device determines a bit error rate.
  • the second device can also determine the bit error rate, so that the determined bit error rate is more in line with the actual scenario.
  • the communication security in the current environment can be improved.
  • the second device determines the bit error rate, including: the second device determines a controlled area, the second device is located in the controlled area, and the third device is located outside the controlled area; the second device determines the best communication position outside the controlled area, and the third device has the best receiving performance at the best communication position; the second device determines the bit error rate according to the best communication position.
  • the bit error rate is estimated at the best communication position outside the controlled area.
  • the preprocessing result still has reliable safety performance when the condition of the third device is optimal.
  • a communication device is provided.
  • the communication device is a first device, which may be a terminal device or a network device, or a chip or circuit in the terminal device or the network device, or a logic module or software that can realize all or part of the functions of the terminal device or the network device, which is not limited in this application.
  • the first device may include a transceiver unit and a processing unit, the processing unit being used to: pre-process the first data based on the bit error rate of the third device, the pre-processing being used to make the communication between the first device and the second device reach a security level; the transceiver unit being used to send second data to the second device, the second data being data obtained after pre-processing the first data.
  • the processing unit is specifically used to: group the first data based on the bit error rate of the third device; or group the first data based on the bit error rate of the third device and generate a first random string.
  • the processing unit is specifically used to: determine the packet length of the first data according to the bit error rate and the security level; and divide the first data in units of packet length.
  • the processing unit is further used to: perform operations on the grouped first data based on the first random string.
  • the processing unit is specifically used to: obtain a first bit string according to the first random string and the second random string; and perform operations on the grouped first data based on the first bit string.
  • the length of the first random string is greater than or equal to the packet length, and the length of the second random vector is equal to the length of the first random string.
  • the length of the first random string is less than the packet length, and the length of the second random vector is equal to the packet length.
  • the transceiver unit is further used to: send a second random string to the second device.
  • the packet length is a packet size of channel coding.
  • the transceiver unit is further used to: send first information to the second device; or, receive first information from the second device; wherein the first information is used to indicate a security level.
  • the first information is indication information.
  • the indication information is used to indicate the type of the terminal device, and there is a corresponding relationship between the type of the terminal device and the communication security level.
  • the transceiver unit is further used to: receive second information from the second device; or, send second information to the second device; wherein the second information is used to indicate a bit error rate.
  • the second information is indication information.
  • the processing unit is further used to: determine a bit error rate.
  • the processing unit is specifically used to: determine a controlled area, the second device is located in the controlled area, and the third device is located outside the controlled area; determine the best communication position outside the controlled area, the third device has the best receiving performance at the best communication position; determine the bit error rate according to the best communication position.
  • a communication device is provided.
  • the communication device is a second device, which may be a terminal device or a network device, or a chip or circuit in the terminal device or the network device, or a logic module or software that can realize all or part of the functions of the terminal device or the network device, which is not limited in this application.
  • the second device may include a transceiver unit and a processing unit: the transceiver unit is used to: receive second data from the first device; the processing unit is used to: post-process the second data to obtain first data, the second data is data obtained after pre-processing the first data based on the bit error rate of the third device, and the pre-processing is used to make the communication between the first device and the second device reach a security level.
  • the processing unit is specifically used to: group the second data; and process the grouped second data according to the second random string.
  • the second data includes a first random string
  • the processing unit is further used to: obtain a first bit string based on the first random string and the second random string; and perform operations on the grouped second data based on the first bit string.
  • the transceiver unit is further used to: receive a second random string from the first device.
  • the transceiver unit is further used to: receive first information from the first device; or, send first information to the first device; wherein the first information is used to indicate a security level.
  • the first information is indication information.
  • the indication information is used to indicate the type of the terminal device, and there is a corresponding relationship between the type of the terminal device and the communication security level.
  • the transceiver unit is further used to: receive second information from the first device; or send second information to the first device, wherein the second information is used to indicate a bit error rate.
  • the second information is indication information.
  • the processing unit is further used to: determine a bit error rate.
  • the processing unit is specifically used to: determine a controlled area, the second device is located in the controlled area, and the third device is located outside the controlled area; determine the best communication position outside the controlled area, the third device has the best receiving performance at the best communication position; determine the bit error rate according to the best communication position.
  • a communication device comprising a processor, the processor is coupled to a memory, and can be used to execute instructions in the memory to implement the above-mentioned method of executing any aspect of the first to second aspects, and any possible implementation of the first to second aspects.
  • the device also includes a memory, and the memory and the processor may be deployed separately or centrally.
  • the device also includes a communication interface, and the processor is coupled to the communication interface.
  • the communication interface may be a transceiver, or an input/output interface.
  • the communication interface may be an input/output interface, an interface circuit, an output circuit, an input circuit, a pin or a related circuit on the chip or chip system, etc.
  • the processor may also be embodied as a processing circuit or a logic circuit.
  • the transceiver may be a transceiver circuit.
  • the input/output interface may be an input/output circuit.
  • the processor can be one or more chips
  • the input circuit can be an input pin
  • the output circuit can be an output pin
  • the processing circuit can be a transistor, a gate circuit, a trigger, and various logic circuits.
  • the input signal received by the input circuit can be but not limited to being received and input by the receiver, and the signal output by the output circuit can be but not limited to being output to the transmitter and transmitted by the transmitter, and the input circuit and the output circuit can be the same circuit, which is used as an input circuit and an output circuit at different times.
  • the embodiment of the present application does not limit the specific implementation of the processor and various circuits.
  • a communication device which includes a logic circuit and an input/output interface, wherein the logic circuit is used to couple with the input/output interface and transmit data through the input/output interface to execute any aspect of the first to second aspects above, and any possible implementation method of the first to second aspects.
  • a communication system comprising a first device in the third aspect or any possible implementation of the third aspect, and a second device in the fourth aspect or any possible implementation of the fourth aspect.
  • a computer-readable storage medium which stores a computer program (also referred to as code, or instruction).
  • a computer program also referred to as code, or instruction.
  • a computer program product which includes: a computer program (also referred to as code, or instruction), which, when executed, enables a computer to execute any aspect of the first to second aspects above, and a method in any possible implementation of the first to second aspects.
  • a computer program also referred to as code, or instruction
  • FIG. 1 is a schematic diagram of a communication system 100 applicable to a communication method according to an embodiment of the present application.
  • FIG. 2 is a schematic diagram of the structure of the device provided in an embodiment of the present application.
  • FIG. 3 is a schematic diagram of realizing secure transmission at the physical layer using artificial noise.
  • FIG. 4 is a schematic diagram showing the bit error rates of UE#2 and UE#3 caused by artificial noise.
  • FIG. 5 is a flow chart of a method 200 for wireless physical layer secure communication provided in an embodiment of the present application.
  • FIG. 6 is a schematic diagram of the preprocessing process provided in an embodiment of the present application.
  • FIG. 7 is a schematic diagram of the post-processing process provided in an embodiment of the present application.
  • FIG8 is a schematic diagram of the data transmission process of the present application.
  • FIG. 9 shows a schematic diagram of a controlled area.
  • FIG. 10 shows a method 300 for wireless physical layer secure communication provided by the present application.
  • FIG. 11 shows a method 400 for wireless physical layer secure communication provided by the present application.
  • FIG. 12 is a schematic block diagram of a communication device provided in an embodiment of the present application.
  • FIG. 13 shows a communication device 600 provided in an embodiment of the present application.
  • FIG. 14 shows a communication device 700 provided in an embodiment of the present application.
  • GSM Global System of Mobile communication
  • CDMA Code Division Multiple Access
  • WCDMA Wideband Code Division Multiple Access
  • GPRS General Packet Radio Service
  • LTE Long Term Evolution
  • FDR LTE frequency division duplex
  • 5G mobile communication system can be a non-standalone (NSA) or standalone (SA) network.
  • the technical solution provided in the present application can also be applied to machine type communication (MTC), long term evolution-machine (LTE-M), device-to-device (D2D) network, machine-to-machine (M2M) network, Internet of Things (IoT) network or other networks.
  • IoT network can include vehicle networking, for example.
  • vehicle to X, V2X, X can represent anything
  • the V2X can include: vehicle to vehicle (V2V) communication, vehicle to infrastructure (V2I) communication, vehicle to pedestrian (V2P) communication or vehicle to network (V2N) communication, etc.
  • the technical solution provided in this application can also be applied to future communication systems, such as the sixth generation (6th Generation, 6G) mobile communication system, etc. This application does not limit this.
  • the terminal device may also be referred to as user equipment (UE), access terminal, user unit, user station, mobile station, mobile station, remote station, remote terminal, mobile device, user terminal, terminal, wireless communication device, user agent or user device.
  • UE user equipment
  • a terminal device can be a device that provides voice/data connectivity to users, for example, a handheld device with wireless connection function, a vehicle-mounted device, etc.
  • some examples of terminals can be: mobile phones, tablet computers, computers with wireless transceiver functions (such as laptops, PDAs, etc.), mobile Internet devices (mobile internet devices, MIDs), virtual reality (virtual reality, VR) devices, augmented reality (augmented reality, AR) devices, wireless terminals in industrial control (industrial control), wireless terminals in self-driving, wireless terminals in remote medical, wireless terminals in smart grids (smart grids), wireless terminals in transportation safety (transportation safety), wireless terminals in smart cities (smart cities), wireless terminals in smart homes (smart homes), etc.
  • Terminals e.g., home appliances such as televisions, smart boxes, game consoles), cellular phones, cordless phones, session initiation protocol (SIP) phones, wireless local loop (WLL) stations, personal digital assistants (PDAs), handheld devices with wireless communication capabilities, computing devices or other processing devices connected to wireless modems, vehicle-mounted devices, wearable devices, terminal devices in 5G networks, or terminal devices in future public land mobile networks (PLMNs), etc.
  • the terminal device can also be a non-access point station (STA) in a wireless fidelity (WiFi) system.
  • STA non-access point station
  • WiFi wireless fidelity
  • wearable devices can also be called wearable smart devices, which are a general term for the intelligent design and development of wearable devices for daily wear using wearable technology, such as glasses, gloves, watches, clothing and shoes.
  • Wearable devices are portable devices that are worn directly on the body or integrated into the user's clothes or accessories.
  • Wearable devices are not only hardware devices, but also realize powerful functions through software support, data interaction, and cloud interaction.
  • wearable smart devices include full-featured, large-sized, and independent of smartphones to achieve complete or partial functions, such as smart watches or smart glasses, as well as those that only focus on a certain type of application function and need to be used in conjunction with other devices such as smartphones, such as various smart bracelets and smart jewelry for vital sign monitoring.
  • the terminal device can also be a terminal device in the Internet of Things (IoT) system.
  • IoT Internet of Things
  • Its main technical feature is to connect objects to the network through communication technology, thereby realizing an intelligent network of human-machine interconnection and object-to-object interconnection.
  • IoT technology can achieve massive connections, deep coverage, and terminal power saving through narrowband (NB) technology, for example.
  • NB narrowband
  • the terminal device may also be a vehicle or a whole vehicle, which can achieve communication through the Internet of Vehicles, or it may be a component located in the vehicle (for example, placed in the vehicle or installed in the vehicle), that is, a vehicle-mounted terminal device, a vehicle-mounted module or a vehicle-mounted unit (on-board unit, OBU).
  • a vehicle-mounted terminal device for example, placed in the vehicle or installed in the vehicle
  • OBU on-board unit
  • terminal devices can also include sensors such as smart printers, train detectors, and gas stations. Their main functions include collecting data (part of the terminal equipment), receiving control information and downlink data from network devices, and sending electromagnetic waves to transmit uplink data to network devices.
  • sensors such as smart printers, train detectors, and gas stations.
  • Their main functions include collecting data (part of the terminal equipment), receiving control information and downlink data from network devices, and sending electromagnetic waves to transmit uplink data to network devices.
  • the network device can be any device with wireless transceiver function.
  • the device includes but is not limited to: evolved Node B (eNB), radio network controller (RNC), Node B (NB), base station controller (BSC), base transceiver station (BTS), home base station (e.g., home evolved Node B, or home Node B, HNB), baseband unit (BBU), wireless fidelity (Wi-Fi), etc.
  • eNB evolved Node B
  • RNC radio network controller
  • NB Node B
  • BSC base station controller
  • BTS base transceiver station
  • home base station e.g., home evolved Node B, or home Node B, HNB
  • BBU baseband unit
  • Wi-Fi wireless fidelity
  • the access point (AP), wireless relay node, wireless backhaul node, transmission point (TP) or transmission and reception point (TRP) in the system can also be a gNB in a 5G, such as NR, system, or a transmission point (TRP or TP), one or a group of (including multiple antenna panels) antenna panels of a base station in a 5G system, or a network node constituting a gNB or a transmission point, such as a baseband unit (BBU), or a distributed unit (DU), or a base station in a next generation communication 6G system, etc.
  • a 5G such as NR, system
  • TRP or TP transmission point
  • TRP or TP transmission point
  • a network node constituting a gNB or a transmission point such as a baseband unit (BBU), or a distributed unit (DU), or a base station in a next generation communication 6G system, etc.
  • BBU baseband unit
  • DU distributed unit
  • the gNB may include a centralized unit (CU) and a DU.
  • the gNB may also include an active antenna unit (AAU).
  • the CU implements some of the gNB functions, and the DU implements some of the gNB functions.
  • the CU is responsible for processing non-real-time protocols and services, and implements the functions of the radio resource control (RRC) and packet data convergence protocol (PDCP) layers.
  • the DU is responsible for processing physical layer protocols and real-time services, and implements the functions of the radio link control (RLC), medium access control (MAC) and physical (PHY) layers.
  • the AAU implements some physical layer processing functions, RF processing, and related functions of active antennas.
  • the network device may be a device including one or more of a CU node, a DU node, and an AAU node.
  • the CU may be classified as a network device in an access network (radio access network, RAN), or the CU may be classified as a network device in a core network (core network, CN), and this application does not limit this.
  • the network equipment provides services for the cell, and the terminal equipment communicates with the cell through the transmission resources (for example, frequency domain resources, or spectrum resources) allocated by the network equipment.
  • the cell can belong to a macro base station (for example, macro eNB or macro gNB, etc.), or to a base station corresponding to a small cell.
  • the small cells here may include: metro cell, micro cell, pico cell, femto cell, etc. These small cells have the characteristics of small coverage and low transmission power, and are suitable for providing high-speed data transmission services.
  • FIG. 1 is a schematic diagram of a communication system 100 applicable to a communication method according to an embodiment of the present application.
  • the communication system 100 may include at least one network device, such as the network device 110 shown in FIG. 1 ; the communication system 100 may also include at least one terminal device, such as the terminal device 120 shown in FIG. 1 .
  • the network device 110 and the terminal device 120 may communicate via a wireless link.
  • Each communication device, such as the network device 110 or the terminal device 120 may be configured with multiple antennas.
  • the configured multiple antennas may include at least one transmitting antenna for transmitting signals and at least one receiving antenna for receiving signals. Therefore, communication between the communication devices in the communication system and between the network device 110 and the terminal device 120 may be performed via multi-antenna technology.
  • FIG. 1 is only a simplified schematic diagram for ease of understanding, and the communication system may also include other network devices or other terminal devices, which are not shown in FIG. 1 .
  • the communication system 100 shown in Figure 1 is only an example of an application scenario of an embodiment of the present application.
  • the present application can also be applied to communication between any two devices, for example, communication between terminal devices, and communication between network devices.
  • FIG2 is a schematic diagram of the structure of the device provided in an embodiment of the present application.
  • the device may be a terminal device or a network device, and the internal functional modules of the device include a pre-processing/post-processing module, a physical layer (PHY) processing module, an antenna, etc.
  • the pre-processing/post-processing module may be located in any layer above the physical layer, for example, it may be located in the media access control (MAC) layer.
  • MAC media access control
  • the pre-processing/post-processing module may pre-process the data to be transmitted, and for the receiving end, after channel decoding, the pre-processing/post-processing module may post-process the received data.
  • the schematic diagram of the device provided in FIG2 is an example and does not constitute a limitation on the device of the present application.
  • Secure transmission is the basic guarantee of communication.
  • Traditional secure transmission solutions are all based on keys, which are divided into symmetric encryption and asymmetric encryption.
  • Symmetric encryption requires both parties to share keys, while asymmetric encryption requires one party to pass the public key to the other party.
  • the sender uses the public key for encryption, and the receiver uses the private key for decryption.
  • Both methods require key maintenance and management, which require complex protocol support. Protocol vulnerabilities are often easily attacked, resulting in key leakage, which poses certain security risks.
  • complex protocols require additional communication overhead and delay, which cannot adapt to the high dynamic characteristics of future communication networks.
  • control signaling of the physical layer and MAC layer is not encrypted based on keys. For example, some signaling is before key negotiation, so key-based secure communication methods cannot be used.
  • physical layer secure transmission technology uses the physical characteristics of wireless channels and adopts signal processing, coding, modulation and other methods to achieve keyless secure transmission with less communication overhead.
  • physical layer security transmission is a keyless security transmission scheme.
  • Physical layer security transmission is to obtain channel advantages through signal processing at the physical layer, so that the quality of the legal channel is better than that of the illegal channel, thereby enabling the legal parties to communicate secretly without sharing keys.
  • Physical layer security transmission technology for example, can refer to channel coding, artificial noise, precoding and waveform modulation, etc.
  • Physical layer security transmission technology can be summarized as technology that causes illegal receiving ends to produce error platforms.
  • FIG3 is a schematic diagram of using artificial noise to achieve physical layer secure transmission.
  • gNB an example of the first device
  • UE#1 an example of the second device
  • UE#2 an example of the third device
  • UE#3 another example of the third device
  • the channel between gNB and UE#1 is a legal channel
  • the channel between gNB and UE#2 and the channel between gNB and UE#3 are both illegal channels.
  • One way to achieve this is to interfere with UE#2 and UE#3 through artificial noise.
  • Artificial noise is to inject noise signals into the null space of the legal channel through the method of multi-antenna precoding, causing the receiver of the illegal channel (referred to as illegal receivers, for example, UE#2 and UE#3 in FIG3) to generate an error platform, and will not interfere with the receiver of the legal channel (referred to as legal receivers, for example, UE#1 in FIG3). See FIG4 for details.
  • FIG4 is a schematic diagram of the bit error rate of UE#2 and UE#3.
  • the z-axis represents the bit error rate (BER) Pe
  • the X-axis and the Y-axis represent two mutually perpendicular directions on the horizontal plane.
  • the X-axis represents the north-south direction
  • the Y-axis represents the east-west direction.
  • a position on the horizontal plane can be determined by (X, Y).
  • the coordinate origin (0, 0) is the position of the legal receiver UE#1, and the illegal receivers UE#2 and UE#3 can be located at any position except the coordinate origin.
  • the bit error rates of UE#2 and UE#3 reach 0.2, that is, a bit error floor is generated, which can increase the difficulty of decryption.
  • the present application provides a method and a communication device for wireless physical layer secure communication, which can improve the security performance of communication by establishing an association between bit error rate and security level.
  • Fig. 5 is a flow chart of a method for wireless physical layer secure communication provided by an embodiment of the present application.
  • the method 200 shown in Fig. 5 can be applied to the systems or devices shown in Figs. 1 to 3, and the method 200 includes the following steps.
  • S210 The first device preprocesses the first data.
  • the first data is data to be sent, for example, the first data may be MAC layer data.
  • the first data may also be referred to as a message to be sent, which may be control signaling.
  • the preprocessing is based on the bit error rate of the third device, and the preprocessing is used to make the communication between the first device and the second device reach a security level.
  • the bit error rate is the bit error rate of the third device
  • the security level is the security level required for the communication between the first device and the second device.
  • the preprocessing is implemented by a random extractor.
  • the physical layer security transmission technology introduces random entropy on an illegal channel so that the illegal receiving end generates a bit error rate platform.
  • the random extractor can extract and diffuse the random entropy introduced by the physical layer security transmission technology on the illegal channel to obtain an equivalent key with an approximately uniform distribution, which can enable each bit of the first data to obtain a provable security strength.
  • bit error rate of the third device can be understood as the bit error rate generated by the third device's analysis of the physical layer data.
  • the security level of the communication between the first device and the second device can be understood as the computational complexity of the third device brute-forcing the first data.
  • the security level of the communication between the first device and the second device is 128, which means that the number of brute-forcing the third device requires is 2 128 .
  • the first device is a transmitter of the first data
  • the second device is a receiver of the first data
  • the channel between the first device and the second device is a legal channel
  • the second device can also be called a legal receiver or a target receiver of the first data.
  • the channel between the first device and the third device is an illegal channel.
  • the third device is an illegal receiver or a non-target receiver of the first data. It should be understood that the third device can be a real device or a hypothetical device.
  • the first device is network device #1, the second device is terminal device #1, and the third device may be terminal device #2 or network device #2.
  • the first device is terminal device #1, the second device is network device #1, and the third device may be network device #2 or terminal device #2.
  • the first device is terminal device #1, the second device is terminal device #2, and the third device may be terminal device #3.
  • the first device is network device #1, the second device is network device #2, and the third device may be network device #3.
  • the first device may be understood as Alice
  • the second device may be understood as Bob
  • the third device may be understood as Eve.
  • the first device sends second data to the second device, and correspondingly, the second device receives the second data.
  • the second data is data obtained after preprocessing the first data, and the preprocessing can be understood as encrypting the first data. It should be understood that the second data is physical layer data.
  • the first device may send all bits of the second data through a physical layer security transmission technology, or may send part of the bits of the second data through a physical layer security transmission technology, and send the remaining bits of the second data through a traditional physical layer transmission technology.
  • the traditional physical layer transmission technology can be understood as a technology that will not cause an illegal receiving end to generate an error platform.
  • the transmitting end preprocesses the data to be sent before sending the data.
  • This preprocessing not only introduces the bit error rate of the third device, but also enables the communication between the first device and the second device to reach a security level, thereby improving communication security.
  • only the bit error rate is considered, and it is impossible to explain that security can be guaranteed through physical layer security transmission technology.
  • the bit error rate is taken into consideration so that the bit error rate of the third device can reach a certain level, but the bit error rate is not equivalent to security.
  • a bit error rate of 0.3 only means that 30 of 100 bits may be erroneous, but from a security perspective, these 30 bits can be restored to 100 bits.
  • the bit error rate can be improved, for example, the bit error rate can be increased from 0.3 to 0.5.
  • the improved bit error rate can be proved to reach a certain security level.
  • the security level is 128, which means that the number of brute force cracking required by the third device is 2 ⁇ 128, thereby improving communication security.
  • the solution can customize the security level and provide differentiated security services for different legitimate recipients.
  • IoT terminals have limited computing power and low security requirements, and can use the solution of this application to customize a lower security level. Therefore, it has greater flexibility.
  • the method further includes: S230, the second device post-processes the second data to obtain the first data.
  • the second device can obtain the second data, and the second device can further post-process the second data to obtain the first data.
  • the post-processing can be understood as the inverse operation of the pre-processing, that is, decrypting the second data to obtain the first data.
  • the first device preprocesses the first data based on the bit error rate of the third device, including: the first device groups the first data based on the bit error rate of the third device and generates a first random string.
  • the first device groups the first data based on the bit error rate of the third device, including: the first device determines the group length of the first data according to the bit error rate and the security level, and divides the first data in units of the group length.
  • the first device generates a first random string based on the bit error rate of the third device, including: the first device determines the length r of the random string according to the bit error rate and the security level, and generates the first random string with the length r.
  • bit error rate the bit error rate
  • security level the packet length b and random string length r.
  • the values of the random string length r and the packet length b can be given one and then the other can be calculated.
  • the packet length is a packet size of channel coding.
  • the packet size of channel coding can be used as the packet length of the first data.
  • Channel coding also groups the bit stream, and the number of bits in each group after grouping is the packet size of channel coding or the packet length of channel coding.
  • the length r of the random string can be an integer multiple of b, provided that the corresponding relationship among the bit error rate, security level, packet length b and the length r of the random string is satisfied.
  • the first device pre-processes the first data based on the bit error rate of the third device, and also includes: the first device operates on the grouped first data based on the first random string.
  • the first device may obtain a first bit string (k i ) according to the first random string (r i ) and the second random string (S), and perform an operation on the grouped first data (m i ) based on the first bit string (k i ) to obtain third data (c i ).
  • the second random string (S) may be public.
  • the second random string may be a random number known to both parties generated by a synchronization mechanism adopted by the sender and the receiver, and the synchronization mechanism may also be public.
  • the second random string may be determined by the sender and then sent to the receiver in a message.
  • the second random string may also be determined by the receiver and then sent to the sender in a message.
  • the first device obtains the first bit string (k i ) according to the first random string (r i ) and the second random string (S) in the following two cases:
  • Case 1 The length r of the random string is greater than or equal to the packet length b.
  • the length of the second random string (S) can be the same as the length of the first random string ( ri ), and when the first bit string ( ki ) is obtained according to the first random string ( ri ) and the second random string (S), the first b bits of the operation result of the first random string ( ri ) and the second random string (S) can be taken, that is, the first bit string.
  • the length of the first bit string is equal to the packet length b.
  • the length of the second random string (S) may be the same as the packet length b
  • the first bit string (k i ) when the first bit string (k i ) is obtained according to the first random string (r i ) and the second random string (S), the first random string (r i ) may be supplemented first so that the length of the supplemented first random string is the same as the packet length b
  • the supplementation method may be: cascading (br) 0s to the first random string.
  • the operation result of the supplemented first random string and the second random string (S) is the first bit string.
  • the length of the first bit string is equal to the packet length b.
  • the third data is obtained by operating the grouped first data (m i ) based on the first bit string (k i ), and the first bit string is obtained based on the first random string and the second random string, the first bit string can be understood as an equivalent key, and the random entropy can be diffused through the first bit string to improve the bit error rate of the third device.
  • bit error rate of the third device means that the bit error rate of the third device used in preprocessing is a, and when the illegal receiving end decodes the preprocessed second data, the resulting bit error rate will be greater than a.
  • the second data includes a first random string (r i ) and third data.
  • the first random string (r i ) and the third data may be concatenated, and the so-called concatenation operation may be understood as concatenating the first random string and the third data in any order.
  • the bit string obtained by the concatenation operation may be 010110 or 110010.
  • the concatenation order of both parties may be consistent, and may be pre-configured.
  • the second device performs post-processing on the second data, including: the first device groups the second data to obtain a first random string and third data.
  • grouping the second data can be understood as an inverse operation of the cascade operation.
  • the second device knows the order of the cascade, so it can split the second data through grouping to obtain the first random string and the third data.
  • the second device post-processes the second data, further comprising: the second device processes the grouped second data according to the second random string.
  • the second device can also obtain the first bit string (k i ) according to the first random string and the second random string (S). Further, the second device can operate on the third data based on the first bit string (k i ) to obtain the grouped first data. Further, the second device cascades the grouped first data to obtain the first data.
  • the second device determines that the first bit string is also divided into two cases, namely, the case where the length r of the random string is greater than or equal to the packet length b, and the case where the length r of the random string is less than the packet length b.
  • the specific process can refer to the above case 1 and case 2, which will not be repeated here.
  • bit error rate As a first example of this implementation, the corresponding relationship between the bit error rate and the security level is:
  • b represents the packet length
  • r represents the length of the random string
  • p e represents the bit error rate of the third device
  • represents the security level.
  • the value of ⁇ can be 128 or 256.
  • the preprocessing process is as follows:
  • the generation method can be any random number generator.
  • S ⁇ 0,1 ⁇ r that is, S is a random bit string of length r.
  • the post-processing process is as follows:
  • the message M to be sent is an example of the first data
  • ci is an example of the third data
  • ri is an example of the first random string
  • S is an example of the second random string
  • ki is an example of the first bit string
  • the data after ri and ci are concatenated is an example of the second data.
  • bit error rate As a second example of this implementation, the corresponding relationship between the bit error rate and the security level is:
  • the meanings of b, r, p e , and ⁇ are the same as those in formula (1).
  • the packet length can be customized according to the security level and the bit error rate of the third device. It can be seen from formula (2) that there are two cases, the case of r ⁇ b and the case of r ⁇ b.
  • the preprocessing and postprocessing processes of the second example are basically similar to those of the first example.
  • the preprocessing and postprocessing processes of the second example can refer to the first example and will not be repeated here.
  • the preprocessing process is as follows:
  • the generation method can be any random number generator.
  • the post-processing process is as follows:
  • the message M to be sent is an example of the first data
  • ci is an example of the third data
  • the data after ri and ci are concatenated is an example of the second data.
  • the rate loss is small and the code rate is higher, and the physical layer security transmission technology can be used to send the random string ri and the third data ci .
  • the first device pre-processes the first data based on the bit error rate of the third device, including: the first device groups the first data based on the bit error rate of the third device.
  • bit error rate As an example of this implementation, the corresponding relationship between the bit error rate and the security level is:
  • the packet length can be customized according to the security level and the bit error rate of the third device.
  • the specific preprocessing and postprocessing methods can refer to the preprocessing and postprocessing methods corresponding to formulas (1) and (2) above, except that when using formula (3) for preprocessing, the first random string may not be generated, and after preprocessing, only the third data c i may be sent, that is, the first random string r i does not need to be sent, and the third data c i may still use the traditional physical layer transmission technology.
  • FIG6 is a schematic diagram of the preprocessing process provided by an embodiment of the present application.
  • the first data after the first device is grouped is recorded as mi
  • the generated random string r i (an example of the first random string) can obtain a bit string k i (an example of the first bit string) through an extraction operation (H operation in FIG6), and mi is operated by k i , and the obtained data is recorded as c i , that is, physical layer data, and c i and r i can be processed at the physical layer, including but not limited to channel coding, and then sent to the receiving end.
  • FIG7 is a schematic diagram of the post-processing process provided by an embodiment of the present application.
  • the data received by the receiving end is processed by the physical layer to obtain random strings r i and c i , wherein the physical layer processing includes but is not limited to channel decoding, and in addition, the random string r i can obtain the bit string k i through the extraction operation (H operation in FIG7), and the first data mi after grouping can be obtained by operating k i on c i .
  • ki in FIG. 6 and FIG. 7 can be understood as an equivalent key.
  • the random entropy introduced by the physical layer security transmission technology on the illegal channel can be extracted and diffused to obtain an equivalent key ki with an approximately uniform distribution.
  • each bit of the first data can obtain a provable security strength.
  • FIG8 is a flow chart of data transmission of the present application.
  • the first data to be sent is pre-processed, it enters the channel coding process, waveform modulation process, and multiple input multiple output (MIMO) process in sequence, and is sent to the receiving end through the wireless channel.
  • the data received by the receiving end is sequentially processed through the MIMO process, waveform modulation process, and channel coding process, and then is post-processed to obtain the first data to be sent.
  • the bit error rate of the third device is taken into account.
  • the method 200 further includes: the first device sending first information to the second device, or the first device receiving first information from the second device, wherein the first information is used to indicate a security level.
  • the first information may be indication information.
  • the indication information is an index of the security level, and there is a corresponding relationship between the first information and the security level.
  • the indication information is an index of the type of the terminal device, or in other words, the indication information can be used to indicate the type of the terminal device, and there is a corresponding relationship between the type of the terminal device and the communication security level.
  • the type of the terminal device may be a mobile phone, a wearable device, or an IoT terminal, etc.
  • the method 200 further includes: the first device receiving second information from the second device, or the first device sending second information to the second device, wherein the second information is used to indicate a bit error rate.
  • the first information may be indication information.
  • the indication information is an index of the security level, and there is a corresponding relationship between the first information and the security level.
  • the receiver can learn the security level through the first information.
  • the sender may be the first device or the second device.
  • the method 200 further includes: the first device determines a bit error rate.
  • the bit error rate of the third device is related to the physical layer security transmission technology, and there may be a coupling relationship between the two, and both are affected by the receiver model of the third device.
  • One method is to estimate the bit error rate that the physical layer security transmission technology can introduce at the third device end given the physical layer security transmission technology, assuming the receiver model of the third device.
  • Another method is to determine the physical layer security transmission technology given the bit error rate of the third device that is expected to be achieved, assuming the receiver model of the third device.
  • the first device determines a bit error rate, including: the first device determines a controlled area, the second device is located in the controlled area, the third device is located outside the controlled area, the first device determines the best communication position outside the controlled area, the third device has the best reception performance at the best communication position, and the first device determines the bit error rate based on the best communication position.
  • the first device is a network device
  • the second device is a terminal device
  • the third device is a hypothetical eavesdropper.
  • a controlled area (confined region) refers to an area where there is no eavesdropper for a specific legitimate terminal.
  • FIG9 shows a schematic diagram of a controlled area. As shown in FIG9, a legitimate terminal #1 is in a room. Generally, there is no eavesdropper in the room. Therefore, this room can be identified as a controlled area.
  • a controlled area can also be a car, a factory, etc. These areas are closed and controlled, so it can be considered that there is no eavesdropper.
  • the terminal is carried by the user, and it can be considered that there is no eavesdropper within a certain range, such as within 1m.
  • the controlled area can refer to the range centered on the terminal. After the controlled area is determined, it is necessary to determine the optimal point of the eavesdropper, at which point the performance of the eavesdropper will be the best.
  • the determination method can be determined based on physical layer security transmission technology, network topology, and parameters of network equipment.
  • the physical layer security transmission technology uses an artificial noise solution. During the network planning stage, we can roughly estimate the point with the lowest noise energy outside the controlled area after the artificial noise solution is adopted, that is, the point with the highest received signal-to-interference-noise ratio.
  • This point is the best listening point for the listener. After the best listening point is determined, the bit error rate of the listener can be estimated.
  • the bit error rate estimation needs to be combined with the receiver model of the listener. In the security field, it is often assumed that the listener's receiving capability exceeds that of the legitimate terminal. Therefore, in the estimation process, it is generally assumed that the listener uses the optimal receiver algorithm and has sufficient computing power.
  • the bit error rate of the third device can also be determined by the receiving device (i.e., the second device) and sent to the sending device (i.e., the first device).
  • the determination method of the second device can refer to the determination method of the first device, which will not be repeated here.
  • determining the bit error rate of the third device can also be understood as the first device or the second device estimating the bit error rate of the third device.
  • the wireless physical layer secure communication method 200 provided in the present application is described in detail below in conjunction with FIG. 10 and FIG. 11 .
  • FIG10 shows a method 300 for wireless physical layer secure communication provided by the present application, which is a specific implementation of method 200.
  • the first device is network device #A and the second device is terminal device #A.
  • the method 300 includes the following steps.
  • terminal device #A sends wireless frame #1 to network device #A.
  • the wireless frame #1 carries a first parameter, which can be understood as a parameter of a pre-processing and post-processing module, and the first parameter may include a security level requirement and a bit error rate of a third device.
  • the network device #A can pre-process the data #1 (an example of the first data) to be sent with security requirements.
  • the data #1 is also physical layer data.
  • network device #A may send a security level to terminal device #A, which security level may be lower than the security level requirement of terminal device #A.
  • Network device #A may perform preprocessing based on the sent security level, and terminal device #A may perform post-processing based on the received security level.
  • Terminal device #A receives and demodulates wireless frame #1 and can obtain the first parameter.
  • network device #A sends wireless frame #2, and wireless frame #2 carries a random vector (an example of a second random string).
  • S302 and S301 may be executed simultaneously, that is, the random vector and the first parameter may be carried in the same radio frame.
  • S302 is not executed, the random vector is defined in the protocol, and the transmitting and receiving ends do not need to be synchronized through signaling interaction.
  • network device #A preprocesses data #1 according to the first parameter to obtain data #2 (an example of second data).
  • network device #A sends wireless frame #3 to terminal device #A.
  • Wireless frame #3 is a signal modulated with the pre-processed data #1, that is, wireless frame #3 includes data #2.
  • terminal device #A demodulates wireless frame #3 to obtain data #2.
  • Terminal device #A performs post-processing on data #2 to obtain data #1, and the post-processing is performed according to the first parameter.
  • FIG11 shows a method 400 for wireless physical layer secure communication provided by the present application, which is a specific implementation of method 200.
  • the first device is network device #B and the second device is terminal device #B.
  • the method 400 includes the following steps.
  • network device #B sends wireless frame #1 to terminal device #B.
  • wireless frame #1 carries a first parameter, which can be understood as a parameter of a pre-processing and post-processing module, and the first parameter may include a security level and a bit error rate of a third device.
  • the network device can uniformly configure the data to be sent with security requirements, so that the network device #B can indicate the pre-processing security level to the terminal device #B.
  • Terminal device #B receives and demodulates wireless frame #1 and can obtain the first parameter.
  • network device #B sends wireless frame #2, and wireless frame #2 carries a random vector (an example of a second random string).
  • S402 and S401 may be executed simultaneously, that is, the random vector and the first parameter may be carried in the same radio frame.
  • S402 is not executed, the random vector is defined in the protocol, and the transmitting and receiving ends do not need to be synchronized through signaling interaction.
  • network device #B pre-processes data #3 (an example of first data) according to the first parameter to obtain data #4 (an example of second data).
  • network device #B sends wireless frame #3 to terminal device #B.
  • Wireless frame #3 is a signal modulated with the pre-processed data #3, that is, wireless frame #2 includes data #4.
  • terminal device #B demodulates wireless frame #3 to obtain data #4.
  • Terminal device #B performs post-processing on data #4 to obtain data #3, and the post-processing is performed according to the first parameter.
  • a plurality refers to two or more than two.
  • At least one item refers to one item or multiple items
  • at least two items and “multiple items” refer to two items or more.
  • At least one of the following items” or similar expressions refers to any combination of these items, including any combination of single or plural items.
  • at least one of a, b, or c can be represented by: a, b, c, a-b, a-c, b-c, or a-b-c, where a, b, c can be single or multiple.
  • execution entities illustrated in Figures 5, 10 and 11 are only examples.
  • the execution entity may also be a chip, chip system, or processor that supports the execution entity to implement the method shown in Figures 5, 10 and 11, and this application does not impose any restrictions on this.
  • the methods and operations implemented by the first device can also be implemented by components in the first device (such as a chip or circuit), and the methods and operations implemented by the second device can also be implemented by components in the second device (such as a chip or circuit).
  • each device such as a transmitting end device or a receiving end device, includes a hardware structure and/or software module corresponding to each function in order to realize the above functions.
  • the present application can be implemented in the form of hardware or a combination of hardware and computer software. Whether a function is executed in the form of hardware or computer software driving hardware depends on the specific application and design constraints of the technical solution. Professional and technical personnel can use different methods to implement the described functions for each specific application, but such implementation should not be considered to exceed the scope of the present application.
  • the embodiment of the present application can divide the functional modules of the transmitting end device or the receiving end device according to the above method example.
  • each functional module can be divided corresponding to each function, or two or more functions can be integrated into one processing module.
  • the above integrated module can be implemented in the form of hardware or in the form of software functional modules. It should be noted that the division of modules in the embodiment of the present application is schematic and is only a logical functional division. There may be other division methods in actual implementation. The following is an example of dividing each functional module corresponding to each function.
  • FIG12 is a schematic block diagram of a communication device provided in an embodiment of the present application.
  • the communication device 500 shown in FIG12 includes a transceiver unit 510 and a processing unit 520.
  • the transceiver unit 510 can communicate with the outside, and the processing unit 520 is used for data processing.
  • the transceiver unit 510 can also be called a communication interface or a communication unit.
  • the transceiver unit 510 may include a sending unit and a receiving unit.
  • the sending unit is used to perform the sending operation in the above method embodiment.
  • the receiving unit is used to perform the receiving operation in the above method embodiment.
  • the communication device 500 may include a sending unit but not a receiving unit.
  • the communication device 500 may include a receiving unit but not a sending unit. Specifically, it may depend on whether the above solution executed by the communication device 500 includes a sending action and a receiving action.
  • the communication device 500 may further include a storage unit, which may be used to store instructions and/or data, and the processing unit 520 may read the instructions and/or data in the storage unit.
  • a storage unit which may be used to store instructions and/or data
  • the processing unit 520 may read the instructions and/or data in the storage unit.
  • communication device 500 may be used to perform the actions performed by the first device in the above method embodiment.
  • the communication device 500 may perform the actions performed by the first device in the above method embodiment.
  • the first device may be a terminal device or a network device, or a chip or circuit in the terminal device or the network device, or a logic module or software that can realize all or part of the functions of the terminal device or the network device, which is not limited in this application.
  • the communication device 500 may be a first device, the transceiver unit 510 is used to perform the receiving or sending operations of the first device in the above method embodiment, and the processing unit 520 is used to perform the internal processing operations of the first device in the above method embodiment.
  • the communication device 500 may be a device including the first device.
  • the communication device 500 may be a component configured in the first device, for example, a chip in the first device.
  • the transceiver unit 510 may be an interface circuit, a pin, etc.
  • the interface circuit may include an input circuit and an output circuit
  • the processing unit 520 may include a processing circuit.
  • the processing unit 520 is used to: pre-process the first data based on the bit error rate of the third device, and the pre-processing is used to make the communication between the first device and the second device reach a security level; the transceiver unit 510 is used to send second data to the second device, and the second data is the data obtained after pre-processing the first data.
  • the processing unit 520 is specifically configured to: group the first data based on a bit error rate of the third device; or group the first data based on the bit error rate of the third device and generate a first random string.
  • the processing unit 520 is specifically configured to: determine a packet length of the first data according to a bit error rate and a security level; and divide the first data in units of packet length.
  • the processing unit 520 is further configured to: perform operations on the grouped first data based on the first random string.
  • the processing unit 520 is specifically configured to: obtain a first bit string according to the first random string and the second random string; and perform operations on the grouped first data based on the first bit string.
  • the length of the first random string is greater than or equal to the packet length, and the length of the second random vector is equal to the length of the first random string.
  • the length of the first random string is less than the packet length, and the length of the second random vector is equal to the packet length.
  • the transceiver unit 510 is further configured to send a second random string to the second device.
  • the packet length is a packet size of channel coding.
  • the transceiver unit 510 is further used to: send first information to the second device; or receive first information from the second device; wherein the first information is used to indicate a security level.
  • the first information is indication information.
  • the indication information is used to indicate the type of the terminal device, and there is a corresponding relationship between the type of the terminal device and the communication security level.
  • the transceiver unit 510 is further used to: receive second information from the second device; or send second information to the second device; wherein the second information is used to indicate a bit error rate.
  • the second information is indication information.
  • the processing unit 520 is further configured to: determine a bit error rate.
  • the processing unit 520 is specifically used to: determine a controlled area, the second device is located in the controlled area, and the third device is located outside the controlled area; determine the best communication position outside the controlled area, the third device has the best receiving performance at the best communication position; determine the bit error rate according to the best communication position.
  • the communication device 500 may be used to execute the actions performed by the second device in the above method embodiment.
  • the communication device 500 may perform the actions performed by the second device in the above method embodiment.
  • the second device may be a terminal device or a network device, or a chip or circuit in the terminal device or the network device, or a logic module or software that can realize all or part of the functions of the terminal device or the network device, which is not limited in this application.
  • the communication device 500 may be a second device, the transceiver unit 510 is used to perform the receiving or sending operations of the second device in the above method embodiment, and the processing unit 520 is used to perform the internal processing operations of the second device in the above method embodiment.
  • the communication device 500 may be a device including a second device.
  • the communication device 500 may be a component configured in the second device, for example, a chip in the second device.
  • the transceiver unit 510 may be an interface circuit, a pin, etc.
  • the interface circuit may include an input circuit and an output circuit
  • the processing unit 520 may include a processing circuit.
  • the transceiver unit 510 is used to: receive second data from the first device; the processing unit 520 is used to: post-process the second data to obtain first data, the second data is data obtained after pre-processing the first data based on the bit error rate of the third device, and the pre-processing is used to make the communication between the first device and the second device reach a security level.
  • the processing unit 520 is specifically configured to: divide the second data into groups; and process the divided second data according to the second random string.
  • the second data includes a first random string
  • the processing unit 520 is further used to: obtain a first bit string according to the first random string and the second random string; and perform operations on the grouped second data based on the first bit string.
  • the transceiver unit 510 is further configured to: receive a second random string from the first device.
  • the transceiver unit 510 is further used to: receive first information from the first device; or send first information to the first device; wherein the first information is used to indicate a security level.
  • the first information is indication information.
  • the indication information is used to indicate the type of the terminal device, and there is a corresponding relationship between the type of the terminal device and the communication security level.
  • the transceiver unit 510 is further used to: receive second information from the first device; or send second information to the first device, wherein the second information is used to indicate a bit error rate.
  • the second information is indication information.
  • the processing unit 520 is further configured to: determine a bit error rate.
  • the processing unit 520 is specifically used to: determine a controlled area, the second device is located in the controlled area, and the third device is located outside the controlled area; determine the best communication position outside the controlled area, the third device has the best receiving performance at the best communication position; determine the bit error rate according to the best communication position.
  • the embodiment of the present application further provides a communication device 600.
  • the communication device 600 includes a processor 610, the processor 610 is coupled to a memory 620, the memory 620 is used to store computer programs or instructions or and/or data, and the processor 610 is used to execute the computer programs or instructions and/or data stored in the memory 620, so that the method in the above method embodiment is executed.
  • the communication device 600 includes one or more processors 610.
  • the communication device 600 may further include a memory 620 .
  • the communication device 600 may include one or more memories 620 .
  • the memory 620 may be integrated with the processor 610 or provided separately.
  • the communication device 600 may further include a transceiver 630 and/or a communication interface, and the transceiver 630 and/or the communication interface are used to receive and/or send signals.
  • the processor 610 is used to control the transceiver 630 and/or the communication interface to receive and/or send signals.
  • the device for implementing the receiving function in the transceiver 630 may be regarded as a receiving module, and the device for implementing the sending function in the transceiver 630 may be regarded as a sending module, that is, the transceiver 630 includes a receiver and a transmitter.
  • a transceiver may sometimes be referred to as a transceiver, a transceiver module, or a transceiver circuit, etc.
  • a receiver may sometimes be referred to as a receiver, a receiving module, or a receiving circuit, etc.
  • a transmitter may sometimes be referred to as a transmitter, a transmitter, a transmitting module, or a transmitting circuit, etc.
  • the communication device 600 is used to implement the operation performed by the first device in the above method embodiment.
  • the processor 610 is used to implement the operation performed by the first device in the above method embodiment (for example, the operation of S210)
  • the transceiver 630 is used to implement the receiving or sending operation performed by the first device in the above method embodiment (for example, the operation of S220).
  • the communication device 600 is used to implement the operation performed by the second device in the above method embodiment.
  • the processor 610 is used to implement the operation performed by the second device in the above method embodiment (for example, the operation of S230), and the transceiver 630 is used to implement the receiving or sending operation performed by the second device in the above method embodiment (for example, the operation of S220).
  • the embodiment of the present application further provides a communication device 700 .
  • the communication device 700 includes a logic circuit 710 and an input/output interface 720 .
  • the logic circuit 710 may be a processing circuit in the communication device 700.
  • the logic circuit 710 may be coupled to a storage unit and call instructions in the storage unit so that the communication device 700 can implement the methods and functions of the various embodiments of the present application.
  • the input/output interface 720 may be an input/output circuit in the communication device 700, outputting information processed by the communication device 700, or inputting data or signaling information to be processed into the communication device 700 for processing.
  • the communication device 700 is used to implement the operations performed by the data processing device in each of the above method embodiments.
  • the logic circuit 710 is used to implement the processing-related operations performed by the first device in the above method embodiment, such as S210.
  • the input/output interface 720 is used to implement the sending and/or receiving-related operations performed by the first device in the above method embodiment, such as S220.
  • the operations performed by the logic circuit 710 can be specifically referred to in the above description of the processing unit 520, and the operations performed by the input/output interface 720 can be referred to in the above description of the transceiver unit 510, which will not be repeated here.
  • the communication device 700 is used to implement the operations performed by the data arrangement device in each of the above method embodiments.
  • the logic circuit 710 is used to implement the processing-related operations performed by the second device in the above method embodiment, such as the processing-related operations performed by the second device in the method embodiment, such as S230, and the input/output interface 720 is used to implement the sending and/or receiving-related operations performed by the second device in the above method embodiment, such as S220.
  • the operations performed by the logic circuit 710 can be specifically referred to in the above description of the processing unit 720.
  • the operations performed by the logic circuit 710 can be specifically referred to in the above description of the processing unit 520, and the operations performed by the input/output interface 720 can be specifically referred to in the above description of the transceiver unit 510, which will not be repeated here.
  • the above-mentioned communication device can be one or more chips.
  • the communication device can be a field programmable gate array (FPGA), an application specific integrated circuit (ASIC), a system on chip (SoC), a central processor unit (CPU), a network processor (NP), a digital signal processor (DSP), a microcontroller unit (MCU), a programmable logic device (PLD) or other integrated chips.
  • FPGA field programmable gate array
  • ASIC application specific integrated circuit
  • SoC system on chip
  • CPU central processor unit
  • NP network processor
  • DSP digital signal processor
  • MCU microcontroller unit
  • PLD programmable logic device
  • each step of the above method can be completed by an integrated logic circuit of hardware in a processor or an instruction in the form of software.
  • the steps of the method disclosed in conjunction with the embodiment of the present application can be directly embodied as a hardware processor for execution, or a combination of hardware and software modules in a processor for execution.
  • the software module can be located in a storage medium mature in the art such as a random access memory, a flash memory, a read-only memory, a programmable read-only memory or an electrically erasable programmable memory, a register, etc.
  • the storage medium is located in a memory, and the processor reads the information in the memory and completes the steps of the above method in conjunction with its hardware. To avoid repetition, it is not described in detail here.
  • the processor in the embodiment of the present application can be an integrated circuit chip with signal processing capabilities.
  • each step of the above method embodiment can be completed by an integrated logic circuit of hardware in the processor or an instruction in the form of software.
  • the above processor can be a general-purpose processor, a digital signal processor (DSP), an application-specific integrated circuit (ASIC), a field programmable gate array (FPGA) or other programmable logic devices, discrete gates or transistor logic devices, discrete hardware components.
  • DSP digital signal processor
  • ASIC application-specific integrated circuit
  • FPGA field programmable gate array
  • the methods, steps and logic block diagrams disclosed in the embodiments of the present application can be implemented or executed.
  • the general-purpose processor can be a microprocessor or the processor can also be any conventional processor, etc.
  • the steps of the method disclosed in the embodiment of the present application can be directly embodied as a hardware decoding processor to perform, or the hardware and software modules in the decoding processor can be combined and performed.
  • the software module can be located in a mature storage medium in the field such as a random access memory, a flash memory, a read-only memory, a programmable read-only memory or an electrically erasable programmable memory, a register, etc.
  • the storage medium is located in a memory, and the processor reads the information in the memory and completes the steps of the above method in combination with its hardware.
  • the memory in the embodiments of the present application can be a volatile memory or a non-volatile memory, or can include both volatile and non-volatile memories.
  • the non-volatile memory can be a read-only memory (ROM), a programmable read-only memory (PROM), an erasable programmable read-only memory (EPROM), an electrically erasable programmable read-only memory (EEPROM), or a flash memory.
  • the volatile memory can be a random access memory (RAM), which is used as an external cache.
  • RAM random access memory
  • SRAM static RAM
  • DRAM dynamic RAM
  • SDRAM synchronous DRAM
  • DDR SDRAM double data rate SDRAM
  • ESDRAM enhanced SDRAM
  • SLDRAM synchlink DRAM
  • DR RAM direct rambus RAM
  • the present application also provides a computer-readable medium, which stores a program code, and when the program code is run on a computer, the computer executes the method shown in the method embodiment.
  • the computer program when executed by a computer, the computer can implement the method executed by the first device or the method executed by the second device in the above method embodiment.
  • An embodiment of the present application also provides a computer program product comprising instructions, which, when executed by a computer, enables the computer to implement the method executed by the first device or the method executed by the second device in the above method embodiment.
  • An embodiment of the present application also provides a communication system, including a first device and a second device.
  • the computer program product includes one or more computer instructions.
  • the computer can be a general-purpose computer, a special-purpose computer, a computer network, or other programmable device.
  • the computer instructions can be stored in a computer-readable storage medium, or transmitted from one computer-readable storage medium to another computer-readable storage medium.
  • the computer instructions can be transmitted from a website site, computer, server or data center by wired (e.g., coaxial cable, optical fiber, digital subscriber line (digital subscriber line, DSL)) or wireless (e.g., infrared, wireless, microwave, etc.) mode to another website site, computer, server or data center.
  • the computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device such as a server or data center that includes one or more available media integrated.
  • the available medium may be a magnetic medium (e.g., a floppy disk, a hard disk, a magnetic tape), an optical medium (e.g., a high-density digital video disc (DVD)), or a semiconductor medium (e.g., a solid state drive (SSD)), etc.
  • a magnetic medium e.g., a floppy disk, a hard disk, a magnetic tape
  • an optical medium e.g., a high-density digital video disc (DVD)
  • DVD high-density digital video disc
  • SSD solid state drive
  • the data arrangement device and data processing device in the above-mentioned various device embodiments correspond to the data arrangement device and data processing device in the method embodiment, and the corresponding modules or units perform the corresponding steps.
  • the communication unit transmits the steps of receiving or sending in the method embodiment, and other steps except sending and receiving can be performed by the processing unit (processor).
  • the functions of the specific units can refer to the corresponding method embodiments.
  • the processor can be one or more.
  • a component can be, but is not limited to, a process running on a processor, a processor, an object, an executable file, an execution thread, a program and/or a computer.
  • applications running on a computing device and a computing device can be components.
  • One or more components may reside in a process and/or an execution thread, and a component may be located on a computer and/or distributed between two or more computers.
  • these components may be executed from various computer-readable media having various data structures stored thereon.
  • Components may, for example, communicate through local and/or remote processes according to signals having one or more data packets (e.g., data from two components interacting with another component between a local system, a distributed system and/or a network, such as the Internet interacting with other systems through signals).
  • signals having one or more data packets (e.g., data from two components interacting with another component between a local system, a distributed system and/or a network, such as the Internet interacting with other systems through signals).
  • the disclosed systems, devices and methods can be implemented in other ways.
  • the device embodiments described above are only schematic.
  • the division of the units is only a logical function division. There may be other division methods in actual implementation, such as multiple units or components can be combined or integrated into another system, or some features can be ignored or not executed.
  • Another point is that the mutual coupling or direct coupling or communication connection shown or discussed can be through some interfaces, indirect coupling or communication connection of devices or units, which can be electrical, mechanical or other forms.
  • the units described as separate components may or may not be physically separated, and the components shown as units may or may not be physical units, that is, they may be located in one place or distributed on multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
  • each functional unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit.
  • the functions are implemented in the form of software functional units and sold or used as independent products, they can be stored in a computer-readable storage medium.
  • the technical solution of the present application can be essentially or partly embodied in the form of a software product that contributes to the prior art.
  • the computer software product is stored in a storage medium and includes several instructions for a computer device (which can be a personal computer, server, or network device, etc.) to perform all or part of the steps of the methods described in each embodiment of the present application.
  • the aforementioned storage media include: U disk, mobile hard disk, read-only memory (ROM), random access memory (RAM), disk or optical disk, and other media that can store program codes.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Communication Control (AREA)
  • Detection And Prevention Of Errors In Transmission (AREA)

Abstract

本申请实施例提供一种无线物理层安全通信的方法和通信装置,该方法包括:第一装置基于第三装置的误码率对第一数据进行预处理,预处理用于使得第一装置和第二装置之间的通信达到安全等级;第一装置向第二装置发送第二数据,第二数据为对第一数据进行预处理之后得到的数据。通过该方案,发送端在发送数据之前,通过对待发送的数据进行预处理,该预处理引入了第三装置的误码率,能够使得第一装置和第二装置之间的通信达到安全等级,从而能够提高通信安全。

Description

无线物理层安全通信的方法和通信装置 技术领域
本申请实施例涉及通信领域,并且,更具体地,涉及无线物理层安全通信的方法和通信装置。
背景技术
安全传输是通信的基础保障,传统的安全传输方案都是基于密钥的,密钥加密可以分为对称加密和非对称加密。对称加密双方共享密钥,非对称加密需要通信的一方将公钥传递给另一方,发端采用公钥加密,接收方采用私钥解密。无论哪种方法都需要密钥的维护和管理,密钥维护和管理需要复杂的协议支持,而协议的漏洞往往容易被攻击,使得密钥泄露,存在一定的风险。另外复杂的协议需要产生额外的通信开销和时延,无法适配未来通信网络的高动态特性。
相较于传统的安全传输方案,物理层安全传输技术利用无线信道的物理特性,采取信号处理、编码调制技术等手段,能够在较小的通信开销下,实现无密钥的安全传输。
因此,提高物理层安全传输技术的安全性能对无线通信安全至关重要。
发明内容
本申请实施例提供一种无线物理层安全通信的方法和通信装置,能够在无密钥传输场景中,提升通信的安全性能。
第一方面,提供了一种无线物理层安全通信的方法。该方法可以由第一装置执行,第一装置可以是终端设备或网络设备,也可以是终端设备或网络设备中的芯片或电路,也可以是能实现全部或部分终端设备或网络设备功能的逻辑模块或软件,本申请对此不作限定。
该方法包括:第一装置基于第三装置的误码率对第一数据进行预处理,预处理用于使得第一装置和第二装置之间的通信达到安全等级;第一装置向第二装置发送第二数据,第二数据为对第一数据进行预处理之后得到的数据。
基于上述方案,发送端在发送数据之前,通过对待发送的数据进行预处理,该预处理引入了第三装置的误码率,能够使得第一装置和第二装置之间的通信达到安全等级,从而能够提高通信安全。
另一方面,该方案能够定制安全等级,为不同的合法接收者提供差异化安全服务。比如物联网(internet of things,IoT)终端,算力有限,安全要求不高,可以利用本申请的方案定制较低的安全等级。因此,具有更强的灵活性。
结合第一方面,在第一方面的某些实现方式中,第一装置基于第三装置的误码率对第一数据进行预处理,包括:第一装置基于第三装置的误码率对第一数据进行分组;或,第一装置基于第三装置的误码率对第一数据进行分组并生成第一随机串。
基于上述方案,将第一数据进行分组处理,使得第一数据的各个分组都可以获得可证 明的安全强度,有助于提升通信安全。
结合第一方面,在第一方面的某些实现方式中,第一装置基于第三装置的误码率对第一数据进行分组,包括:第一装置根据误码率和安全等级确定第一数据的分组长度;第一装置以分组长度为单位对第一数据进行划分。
结合第一方面,在第一方面的某些实现方式中,该方法还包括:第一装置基于第一随机串对分组后的第一数据进行运算。
基于上述方案,在对第一数据进行预处理时,通过引入第一随机串,能够提升第一数据的传输安全。
结合第一方面,在第一方面的某些实现方式中,第一装置基于第一随机串对分组后的第一数据进行运算,包括:第一装置根据第一随机串和第二随机串获得第一比特串;第一装置基于第一比特串对分组后的第一数据进行运算。
基于上述方案,在对第一数据进行预处理和后处理时,可以以第一比特串作为等效密钥,使得第一数据的各个分组都可以获得可证明的安全强度,有助于提升通信安全。
结合第一方面,在第一方面的某些实现方式中,第一随机串的长度大于或等于分组长度,第二随机向量的长度等于第一随机串的长度。
基于上述方案,由于第一随机串的长度大于或等于分组长度,使得仅需要对第一随机串采用物理层安全传输技术,方案实现简单。
结合第一方面,在第一方面的某些实现方式中,第一随机串的长度小于分组长度,第二随机向量的长度等于分组长度。
基于上述方案,由于第一随机串的长度可以小于分组长度,使得传输速率损失小,码率较高。
结合第一方面,在第一方面的某些实现方式中,该方法还包括:第一装置向第二装置发送第二随机串。
结合第一方面,在第一方面的某些实现方式中,分组长度为信道编码的分组大小。
基于上述方案,分组长度为信道编码的分组大小,能够减小信道编码的复杂度,便于实现。
结合第一方面,在第一方面的某些实现方式中,该方法还包括:第一装置向第二装置发送第一信息;或,第一装置接收来自第二装置的第一信息;其中,第一信息用于指示安全等级。
基于上述方案,收发双端通过信令对齐安全等级,能够根据需求定制安全等级,灵活性更强。
结合第一方面,在第一方面的某些实现方式中,第一信息为指示信息。
结合第一方面,在第一方面的某些实现方式中,该指示信息用于指示终端设备的类型,终端设备的类型和通信安全等级之间具有对应关系。
基于上述方式,通过终端设备的类型指示安全等级,使得安全等级与终端设备的运算能力更匹配,能够减小终端的实现复杂度。
结合第一方面,在第一方面的某些实现方式中,该方法还包括:第一装置接收来自第二装置的第二信息;或,第一装置向第二装置发送第二信息;其中,第二信息用于指示误码率。
基于上述方案,收发双端通过信令对齐误码率,便于预处理和后处理的实现。
结合第一方面,在第一方面的某些实现方式中,该第二信息为指示信息。
结合第一方面,在第一方面的某些实现方式中,该方法还包括:第一装置确定误码率。
基于上述方案,第一装置能够确定误码率,使得确定的误码率更符合实际场景,当根据确定的误码率进行预处理时,能够提升当前环境中的通信安全。
结合第一方面,在第一方面的某些实现方式中,第一装置确定误码率,包括:第一装置确定受控区域,第二装置位于受控区域,第三装置位于受控区域之外;第一装置确定受控区域之外的最佳通信位置,第三装置在最佳通信位置具有最好的接收性能;第一装置根据最佳通信位置确定误码率。
基于上述方案,以受控区域外的最佳通信位置进行误码率估计,当根据确定的误码率进行预处理时,使得预处理的结果在第三装置的条件为最优时,仍然具有可靠的安全性能。
第二方面,提供了一种无线物理层安全通信的方法。该方法可以由第二装置执行,第二装置可以是终端设备或网络设备,也可以是终端设备或网络设备中的芯片或电路,也可以是能实现全部或部分终端设备或网络设备功能的逻辑模块或软件,本申请对此不作限定。
该方法包括:第二装置接收来自第一装置的第二数据;第二装置对第二数据进行后处理,得到第一数据,第二数据为基于第三装置的误码率对第一数据进行预处理之后得到的数据,预处理用于使得第一装置和第二装置之间的通信达到安全等级。
基于上述方案,发送端在发送数据之前,通过对待发送的数据进行预处理,该预处理引入了第三装置的误码率,能够使得第一装置和第二装置之间的通信达到安全等级,从而能够提高通信安全。
另一方面,该方案能够定制安全等级,为不同的合法接收者提供差异化安全服务。比如物联网(internet of things,IoT)终端,算力有限,安全要求不高,可以利用本申请的方案定制较低的安全等级。因此,具有更强的灵活性。
结合第二方面,在第二方面的某些实现方式中,第二装置对第二数据进行后处理,包括:第二装置对第二数据进行分组划分;第二装置根据第二随机串对分组划分后的第二数据进行处理。
结合第二方面,在第二方面的某些实现方式中,第二数据包括第一随机串,第二装置根据第二随机串对分组划分后的第二数据进行处理,包括:第二装置根据第一随机串和第二随机串获得第一比特串;第二装置基于第一比特串对分组划分后的第二数据进行运算。
基于上述方案,在对第一数据进行预处理和后处理时,可以以第一比特串作为等效密钥,使得第一数据的各个分组都可以获得可证明的安全强度,有助于提升通信安全。
结合第二方面,在第二方面的某些实现方式中,该方法还包括:第二装置接收来自第一装置的第二随机串。
结合第二方面,在第二方面的某些实现方式中,该方法还包括:第二装置接收来自第一装置的第一信息;或,第二装置向第一装置发送第一信息;其中,第一信息用于指示安全等级。
基于上述方案,收发双端通过信令对齐安全等级,能够根据需求定制安全等级,灵活性更强。
结合第二方面,在第二方面的某些实现方式中,该第一信息为指示信息。
结合第二方面,在第二方面的某些实现方式中,该指示信息用于指示终端设备的类型,终端设备的类型和通信安全等级之间具有对应关系。
基于上述方式,通过终端设备的类型指示安全等级,使得安全等级与终端设备的运算能力更匹配,能够减小终端的实现复杂度。
结合第二方面,在第二方面的某些实现方式中,该方法还包括:第二装置接收来自第一装置的第二信息;或,第二装置向第一装置发送第二信息,其中,第二信息用于指示误码率。
基于上述方案,收发双端通过信令对齐误码率,便于预处理和后处理的实现。
结合第二方面,在第二方面的某些实现方式中,第二信息为指示信息。
结合第二方面,在第二方面的某些实现方式中,该方法还包括:第二装置确定误码率。
基于上述方案,第二装置也能够确定误码率,使得确定的误码率更符合实际场景,当根据确定的误码率进行预处理时,能够提升当前环境中的通信安全。
结合第二方面,在第二方面的某些实现方式中,第二装置确定误码率,包括:第二装置确定受控区域,第二装置位于受控区域,第三装置位于受控区域之外;第二装置确定受控区域之外的最佳通信位置,第三装置在最佳通信位置具有最好的接收性能;第二装置根据最佳通信位置确定误码率。
基于上述方案,以受控区域外的最佳通信位置进行误码率估计,当根据确定的误码率进行预处理时,使得预处理的结果在第三装置的条件为最优时,仍然具有可靠的安全性能。
第三方面,提供了一种通信装置。该通信装置是第一装置,第一装置可以是终端设备或网络设备,也可以是终端设备或网络设备中的芯片或电路,也可以是能实现全部或部分终端设备或网络设备功能的逻辑模块或软件,本申请对此不作限定。
第一装置可以包括收发单元和处理单元,该处理单元用于:基于第三装置的误码率对第一数据进行预处理,预处理用于使得第一装置和第二装置之间的通信达到安全等级;该收发单元用于向第二装置发送第二数据,第二数据为对第一数据进行预处理之后得到的数据。
结合第三方面,在第三方面的某些实现方式中,处理单元具体用于:基于第三装置的误码率对第一数据进行分组;或,基于第三装置的误码率对第一数据进行分组并生成第一随机串。
结合第三方面,在第三方面的某些实现方式中,处理单元具体用于:根据误码率和安全等级确定第一数据的分组长度;以分组长度为单位对第一数据进行划分。
结合第三方面,在第三方面的某些实现方式中,处理单元还用于:基于第一随机串对分组后的第一数据进行运算。
结合第三方面,在第三方面的某些实现方式中,处理单元具体用于:根据第一随机串和第二随机串获得第一比特串;基于第一比特串对分组后的第一数据进行运算。
结合第三方面,在第三方面的某些实现方式中,第一随机串的长度大于或等于分组长度,第二随机向量的长度等于第一随机串的长度。
结合第三方面,在第三方面的某些实现方式中,第一随机串的长度小于分组长度,第二随机向量的长度等于分组长度。
结合第三方面,在第三方面的某些实现方式中,收发单元还用于:向第二装置发送第 二随机串。
结合第三方面,在第三方面的某些实现方式中,分组长度为信道编码的分组大小。
结合第三方面,在第三方面的某些实现方式中,收发单元还用于:向第二装置发送第一信息;或,接收来自第二装置的第一信息;其中,第一信息用于指示安全等级。
结合第三方面,在第三方面的某些实现方式中,第一信息为指示信息。
结合第三方面,在第三方面的某些实现方式中,该指示信息用于指示终端设备的类型,终端设备的类型和通信安全等级之间具有对应关系。
结合第三方面,在第三方面的某些实现方式中,收发单元还用于:接收来自第二装置的第二信息;或,向第二装置发送第二信息;其中,第二信息用于指示误码率。
结合第三方面,在第三方面的某些实现方式中,该第二信息为指示信息。
结合第三方面,在第三方面的某些实现方式中,处理单元还用于:确定误码率。
结合第三方面,在第三方面的某些实现方式中,处理单元具体用于:确定受控区域,第二装置位于受控区域,第三装置位于受控区域之外;确定受控区域之外的最佳通信位置,第三装置在最佳通信位置具有最好的接收性能;根据最佳通信位置确定误码率。
第四方面,提供了一种通信装置。该通信装置是第二装置,第二装置可以是终端设备或网络设备,也可以是终端设备或网络设备中的芯片或电路,也可以是能实现全部或部分终端设备或网络设备功能的逻辑模块或软件,本申请对此不作限定。
第二装置可以包括收发单元和处理单元:该收发单元用于:接收来自第一装置的第二数据;该处理单元用于:对第二数据进行后处理,得到第一数据,第二数据为基于第三装置的误码率对第一数据进行预处理之后得到的数据,预处理用于使得第一装置和第二装置之间的通信达到安全等级。
结合第四方面,在第四方面的某些实现方式中,处理单元具体用于:对第二数据进行分组划分;根据第二随机串对分组划分后的第二数据进行处理。
结合第四方面,在第四方面的某些实现方式中,第二数据包括第一随机串,处理单元还用于:根据第一随机串和第二随机串获得第一比特串;基于第一比特串对分组划分后的第二数据进行运算。
结合第四方面,在第四方面的某些实现方式中,收发单元还用于:接收来自第一装置的第二随机串。
结合第四方面,在第四方面的某些实现方式中,收发单元还用于:接收来自第一装置的第一信息;或,向第一装置发送第一信息;其中,第一信息用于指示安全等级。
结合第四方面,在第四方面的某些实现方式中,该第一信息为指示信息。
结合第四方面,在第四方面的某些实现方式中,该指示信息用于指示终端设备的类型,终端设备的类型和通信安全等级之间具有对应关系。
结合第四方面,在第四方面的某些实现方式中,收发单元还用于:接收来自第一装置的第二信息;或,向第一装置发送第二信息,其中,第二信息用于指示误码率。
结合第四方面,在第四方面的某些实现方式中,第二信息为指示信息。
结合第四方面,在第四方面的某些实现方式中,处理单元还用于:确定误码率。
结合第四方面,在第四方面的某些实现方式中,处理单元具体用于:确定受控区域,第二装置位于受控区域,第三装置位于受控区域之外;确定受控区域之外的最佳通信位置, 第三装置在最佳通信位置具有最好的接收性能;根据最佳通信位置确定误码率。
第五方面,提供一种通信装置,该装置包括处理器,该处理器与存储器耦合,可用于执行存储器中的指令,以实现上述以执行上述第一方面至第二方面中的任一方面,以及第一方面至第二方面中任一种可能实现方式中的方法。可选地,该装置还包括存储器,该存储器与处理器可能是分离部署的,也可能是集中部署的。可选地,该装置还包括通信接口,处理器与通信接口耦合。在一种实现方式中,该通信接口可以是收发器,或,输入/输出接口。
当该装置为芯片时,该通信接口可以是该芯片或芯片系统上的输入/输出接口、接口电路、输出电路、输入电路、管脚或相关电路等。该处理器也可以体现为处理电路或逻辑电路。
可选地,该收发器可以为收发电路。可选地,所述输入/输出接口可以为输入/输出电路。
在具体实现过程中,上述处理器可以为一个或多个芯片,输入电路可以为输入管脚,输出电路可以为输出管脚,处理电路可以为晶体管、门电路、触发器和各种逻辑电路等。输入电路所接收的输入的信号可以是但不限于接收器接收并输入的,输出电路所输出的信号可以是但不限于输出给发射器并由发射器发射的,且输入电路和输出电路可以是同一电路,该电路在不同的时刻分别用作输入电路和输出电路。本申请实施例对处理器及各种电路的具体实现方式不做限定。
第六方面,提供一种通信装置,该装置包括逻辑电路和输入/输出接口,该逻辑电路用于与输入/输出接口耦合,通过该输入/输出接口传输数据,以执行上述第一方面至第二方面中的任一方面,以及第一方面至第二方面中任一种可能实现方式中的方法。
第七方面,提供一种通信系统,该系统包括上述第三方面或第三方面中的任一种可能的实现方式中的第一装置,以及第四方面或第四方面中的任一种可能的实现方式中的第二装置。
第八方面,提供了一种计算机可读存储介质,该计算机可读存储介质存储有计算机程序(也可以称为代码,或指令)当其在计算机上运行时,使得计算机执行上述第一方面至第二方面中的任一方面,以及第一方面至第二方面中任一种可能实现方式中的方法。
第九方面,提供了一种计算机程序产品,该计算机程序产品包括:计算机程序(也可以称为代码,或指令),当该计算机程序被运行时,使得计算机执行上述第一方面至第二方面中的任一方面,以及第一方面至第二方面中任一种可能实现方式中的方法。
上述第三方面至第九方面带来的有益效果可以参考第一方面至第二方面中有益效果的描述,此处不再赘述。
附图说明
图1是适用于本申请实施例的通信方法的通信系统100的示意图。
图2是本申请实施例提供的装置的结构示意图。
图3是利用人工噪声实现物理层安全传输的示意图。
图4是通过人工噪声造成UE#2和UE#3的误码率的一种示意图。
图5是本申请实施例提供的一种无线物理层安全通信的方法200的流程交互图
图6是本申请实施例提供的预处理的过程的示意图。
图7是本申请实施例提供的后处理的过程的示意图。
图8是本申请的数据传输的流程示意图。
图9示出了受控区域的一种示意图。
图10示出了本申请提供的一种无线物理层安全通信的方法300。
图11示出了本申请提供的一种无线物理层安全通信的方法400。
图12是本申请实施例提供的通信装置的示意性框图。
图13示出了本申请实施例提供的一种通信装置600。
图14示出了本申请实施例提供的一种通信装置700。
具体实施方式
下面将结合附图,对本申请中的技术方案进行描述。
本申请实施例的技术方案可以应用于各种通信系统,例如:全球移动通讯(Global System of Mobile communication,GSM)系统、码分多址(Code Division Multiple Access,CDMA)系统、宽带码分多址(Wideband Code Division Multiple Access,WCDMA)系统、通用分组无线业务(General Packet Radio Service,GPRS)、长期演进(Long Term Evolution,LTE)系统、LTE频分双工(frequency division duplex,FDD)系统、LTE时分双工(time division duplex,TDD)、通用移动通信系统(universal mobile telecommunication system,UMTS)、全球互联微波接入(worldwide interoperability for microwave access,WiMAX)通信系统、第五代(5th Generation,5G)移动通信系统或新空口(new radio,NR)、无线局域网(wireless local area network,WLAN)系统、无线保真(wireless fidelity,WiFi)系统。其中,5G移动通信系统可以是非独立组网(non-standalone,NSA)或独立组网(standalone,SA)。
本申请提供的技术方案还可以应用于机器类通信(machine type communication,MTC)、机器间通信长期演进技术(long term evolution-machine,LTE-M)、设备到设备(device-to device,D2D)网络、机器到机器(machine to machine,M2M)网络、物联网(internet of things,IoT)网络或者其他网络。其中,IoT网络例如可以包括车联网。其中,车联网系统中的通信方式统称为车到其他设备(vehicle to X,V2X,X可以代表任何事物),例如,该V2X可以包括:车辆到车辆(vehicle to vehicle,V2V)通信,车辆与基础设施(vehicle to infrastructure,V2I)通信、车辆与行人之间的通信(vehicle to pedestrian,V2P)或车辆与网络(vehicle to network,V2N)通信等。
本申请提供的技术方案还可以应用于未来的通信系统,如第六代(6th Generation,6G)移动通信系统等。本申请对此不作限定。
在本申请实施例中,终端设备也可以称为用户设备(user equipment,UE)、接入终端、用户单元、用户站、移动站、移动台、远方站、远程终端、移动设备、用户终端、终端、无线通信设备、用户代理或用户装置。
终端设备可以是一种向用户提供语音/数据连通性的设备,例如,具有无线连接功能的手持式设备、车载设备等。目前,一些终端的举例可以为:手机(mobile phone)、平板电脑(pad)、带无线收发功能的电脑(如笔记本电脑、掌上电脑等)、移动互联网设备(mobile  internet device,MID)、虚拟现实(virtual reality,VR)设备、增强现实(augmented reality,AR)设备、工业控制(industrial control)中的无线终端、无人驾驶(self driving)中的无线终端、远程医疗(remote medical)中的无线终端、智能电网(smart grid)中的无线终端、运输安全(transportation safety)中的无线终端、智慧城市(smart city)中的无线终端、智慧家庭(smart home)中的无线终端(例如,电视机等家电、智慧盒子、游戏机)、蜂窝电话、无绳电话、会话启动协议(session initiation protocol,SIP)电话、无线本地环路(wireless local loop,WLL)站、个人数字助理(personal digital assistant,PDA)、具有无线通信功能的手持设备、计算设备或连接到无线调制解调器的其它处理设备、车载设备、可穿戴设备,5G网络中的终端设备或者未来演进的公用陆地移动通信网络(public land mobile network,PLMN)中的终端设备等。终端设备还可以是无线保真(wireless fidelity,WiFi)系统中的非接入点的站点(station,STA)。
其中,可穿戴设备也可以称为穿戴式智能设备,是应用穿戴式技术对日常穿戴进行智能化设计、开发出可以穿戴的设备的总称,如眼镜、手套、手表、服饰及鞋等。可穿戴设备即直接穿在身上,或是整合到用户的衣服或配件的一种便携式设备。可穿戴设备不仅仅是一种硬件设备,更是通过软件支持以及数据交互、云端交互来实现强大的功能。广义穿戴式智能设备包括功能全、尺寸大、可不依赖智能手机实现完整或者部分的功能,例如:智能手表或智能眼镜等,以及只专注于某一类应用功能,需要和其它设备如智能手机配合使用,如各类进行体征监测的智能手环、智能首饰等。
此外,终端设备还可以是物联网(Internet of things,IoT)系统中的终端设备。IoT是未来信息技术发展的重要组成部分,其主要技术特点是将物品通过通信技术与网络连接,从而实现人机互连,物物互连的智能化网络。IoT技术可以通过例如窄带(narrow band,NB)技术,做到海量连接,深度覆盖,终端省电。
在本申请实施例中,该终端设备还可以是车辆或整车,通过车联网可以实现通信,也可以是位于车辆内(例如放置在车辆内或安装在车辆内)的部件,即车载终端设备、车载模块或者车载单元(on-board unit,OBU)。
此外,终端设备还可以包括智能打印机、火车探测器、加油站等传感器,主要功能包括收集数据(部分终端设备)、接收网络设备的控制信息与下行数据,并发送电磁波,向网络设备传输上行数据。
本申请实施例中,网络设备可以是任意一种具有无线收发功能的设备。该设备包括但不限于:演进型节点B(evolved Node B,eNB)、无线网络控制器(radio network controller,RNC)、节点B(Node B,NB)、基站控制器(base station controller,BSC)、基站收发台(base transceiver station,BTS)、家庭基站(例如,home evolved NodeB,或home Node B,HNB)、基带单元(baseband unit,BBU),无线保真(wireless fidelity,WiFi)系统中的接入点(access point,AP)、无线中继节点、无线回传节点、传输点(transmission point,TP)或者发送接收点(transmission and reception point,TRP)等,还可以为5G,如,NR,系统中的gNB,或,传输点(TRP或TP),5G系统中的基站的一个或一组(包括多个天线面板)天线面板,或者,还可以为构成gNB或传输点的网络节点,如基带单元(BBU),或,分布式单元(distributed unit,DU),或者下一代通信6G系统中的基站等。
在一些部署中,gNB可以包括集中式单元(centralized unit,CU)和DU。gNB还可 以包括有源天线单元(active antenna unit,AAU)。CU实现gNB的部分功能,DU实现gNB的部分功能。比如,CU负责处理非实时协议和服务,实现无线资源控制(radio resource control,RRC),分组数据汇聚层协议(packet data convergence protocol,PDCP)层的功能。DU负责处理物理层协议和实时服务,实现无线链路控制(radio link control,RLC)层、媒体接入控制(medium access control,MAC)层和物理(physical,PHY)层的功能。AAU实现部分物理层处理功能、射频处理及有源天线的相关功能。由于RRC层的信息最终会变成PHY层的信息,或者,由PHY层的信息转变而来,因而,在这种架构下,高层信令,如RRC层信令,也可以认为是由DU发送的,或者,由DU和CU发送的。可以理解的是,网络设备可以为包括CU节点、DU节点、AAU节点中一项或多项的设备。此外,可以将CU划分为接入网(radio access network,RAN)中的网络设备,也可以将CU划分为核心网(core network,CN)中的网络设备,本申请对此不做限定。
网络设备为小区提供服务,终端设备通过网络设备分配的传输资源(例如,频域资源,或者说,频谱资源)与小区进行通信,该小区可以属于宏基站(例如,宏eNB或宏gNB等),也可以属于小小区(small cell)对应的基站,这里的小小区可以包括:城市小区(metro cell)、微小区(micro cell)、微微小区(pico cell)、毫微微小区(femto cell)等,这些小小区具有覆盖范围小、发射功率低的特点,适用于提供高速率的数据传输服务。
图1是适用于本申请实施例的通信方法的通信系统100的示意图。如图1所示,该通信系统100可以包括至少一个网络设备,例如图1所示的网络设备110;该通信系统100还可以包括至少一个终端设备,例如图1所示的终端设备120。网络设备110与终端设备120可通过无线链路通信。各通信设备,如网络设备110或终端设备120,均可以配置多个天线。对于该通信系统中的每一个通信设备而言,所配置的多个天线可以包括至少一个用于发送信号的发送天线和至少一个用于接收信号的接收天线。因此,该通信系统中的各通信设备之间,网络设备110与终端设备120之间,可通过多天线技术通信。
应理解,图1仅为便于理解而示例的简化示意图,该通信系统中还可以包括其他网络设备或者还可以包括其他终端设备,图1中未予以画出。
还应理解,图1所示的通信系统100仅为本申请实施例的应用场景的一种示例,本申请还可以适用于任意两个设备之间的通信,例如,适用于终端设备与终端设备的通信,也可以适用于网络设备与网络设备之间的通信。
图2是本申请实施例提供的装置的结构示意图。其中,该装置可以是终端设备,也可以是网络设备,该装置的内部功能模块包括预处理/后处理模块、物理层(physical layer,PHY)处理模块、天线等。其中,预处理/后处理模块可以位于物理层之上的任一层中,例如,可以位于媒体接入控制(media access control,MAC)层。对于发送端,在信道编码之前,预处理/后处理模块可以对待发送数据进行预处理,对于接收端,在信道译码之后,预处理/后处理模块可以对接收到的数据进行后处理。可以理解,图2提供的装置的示意图为一种示例,不构成对本申请装置的限定。关于预处理和后处理的具体过程详见方法200。
安全传输是通信的基础保障,传统的安全传输方案都是基于密钥的,分为对称加密和非对称加密。对称加密双方共享密钥,非对称加密需要通信的一方将公钥传递给另一方,发端采用公钥加密,接收方采用私钥解密。无论哪种方法都需要密钥的维护和管理,密钥维护和管理需要复杂的协议支持,而协议的漏洞往往容易被攻击,使得密钥泄露,存在一 定的安全风险。另外复杂的协议需要产生额外的通信开销和时延,无法适配未来通信网络的高动态特性。
在当前无线通信协议中,物理层和MAC层的控制信令是没有基于密钥加密的,例如,有些信令是在密钥协商之前,因此无法采用基于密钥的安全通信手段。相较于传统的安全传输方案,物理层安全传输技术利用无线信道的物理特性,采取信号处理、编码、调制等手段,能够在较小的通信开销下,实现无密钥的安全传输。
具体来说,物理层安全传输是一种无密钥的安全传输方案。物理层安全传输是在物理层通过信号处理方式获得信道优势,使得合法信道的质量优于非法信道,进而实现合法双方在不用共享密钥的情况下秘密通信。物理层安全传输技术,例如,可以是指信道编码、人工噪声、预编码和波形调制等,物理层安全传输技术可以概括为使得非法接收端产生误码平台的技术。
图3是利用人工噪声实现物理层安全传输的一种示意图。如图3所示,gNB(第一装置的一例)需要实现与UE#1(第二装置的一例)之间的安全通信,使得UE#2(第三装置的一例)和UE#3(第三装置的又一例)均无法获得gNB与UE#1之间传输的信息,因此,gNB与UE#1之间的信道为合法信道,gNB与UE#2之间的信道和gNB与UE#3之间的信道均为非法信道。一种实现的方式是,通过人工噪声对UE#2和UE#3进行干扰。人工噪声是通过多天线预编码的方法,在合法信道的零空间注入噪声信号,导致非法信道的接收者(简称为非法接收者,例如,图3中的UE#2和UE#3)产生误码平台,且不会对合法信道的接收者(简称为合法接收者,例如,图3中的UE#1)产生干扰。具体见图4。
图4是UE#2和UE#3的误码率的一种示意图。如图4所示,z轴表示误码率(bit error rate,BER)P e,X轴和Y轴表示水平面上两个互相垂直的方向,例如,X轴表示南北方向,Y轴表示东西方向,通过(X,Y)可以确定水平面上的一个位置,坐标原点(0,0)为合法接收者UE#1的位置,非法接收者UE#2和UE#3可以位于除了坐标原点以外的任意位置。由图4可以看出,在坐标原点以外的巨大多数位置,UE#2和UE#3的误码率均达到0.2,即产生了误码平台(floor),这能够增大破译难度。
然而,仅基于上述物理层安全传输技术,非法接收者的误码平台的提升空间有限,使得通信的安全性无法保证。因此,提高物理层安全传输技术的安全性能对无线通信安全至关重要。
有鉴于此,本申请提供一种无线物理层安全通信的方法和通信装置,该方案通过建立误码率和安全等级的关联,能够提高通信的安全性能。
图5是本申请实施例提供的一种无线物理层安全通信的方法的流程交互图。图5所示的方法200可以适用于图1至图3所示的系统或装置,该方法200包括以下步骤。
S210,第一装置对第一数据进行预处理。
其中,第一数据为待发送的数据,例如,第一数据可以是MAC层数据。第一数据也可以称为待发送消息,其可以是控制信令。
其中,该预处理基于第三装置的误码率,且该预处理用于使得第一装置和第二装置之间的通信达到安全等级。或者说,误码率和安全等级之间存在对应关系,第一装置能够基于该对应关系进行预处理,该误码率为第三装置的误码率,该安全等级为第一装置和第二装置之间的通信所需要的达到的安全等级。或者说,预处理通过随机提取器实现。应理解, 物理层安全传输技术通过在非法信道上引入随机熵,使得非法接收端产生误码率平台。随机提取器可以提取并扩散物理层安全传输技术在非法信道上引入的随机熵,得到近似均匀分布的等效密钥,该等效密钥可以使得第一数据的各个比特都获得可证明的安全强度。
具体地,第三装置的误码率可以理解为第三装置对物理层数据的解析产生的误码率。
具体地,第一装置和第二装置之间的通信达的安全等级,可以理解为第三装置暴力破解获得第一数据所产生的计算复杂度。例如,第一装置和第二装置之间的通信的安全等级为128,表示第三装置暴力破解需要的次数是2 128
第一装置为第一数据的发送端,第二装置为第一数据的接收端,第一装置和第二装置之间的信道为合法信道,第二装置也可以称为第一数据的合法接收端或目标接收端。第一装置和第三装置之间的信道为非法信道,换言之,第三装置为第一数据的非法接收端或非目标接收端。应理解,第三装置可以是真实存在的设备,也可以是假设的设备。
可选地,在一种实施场景中,第一装置为网络设备#1,第二装置为终端设备#1,第三装置可以为终端设备#2或网络设备#2。在又一种实施场景中,第一装置为终端设备#1,第二装置为网络设备#1,第三装置可以为网络设备#2或终端设备#2。在又一种实施场景中,第一装置为终端设备#1,第二装置为终端设备#2,第三装置可以为终端设备#3。在又一种实施场景中,第一装置为网络设备#1,第二装置为网络设备#2,第三装置可以为网络设备#3。以上实施场景仅为示例,并不构成本申请的限定。
在安全通信领域,第一装置可以理解为Alice,第二装置可以理解为Bob,第三装置可以理解为Eve。
S220,第一装置向第二装置发送第二数据,相应地,第二装置接收第二数据。
其中,第二数据为对第一数据进行预处理之后得到的数据,预处理可以理解为对第一数据进行加密。应理解,第二数据为物理层数据。
可选地,第一装置可以通过物理层安全传输技术发送第二数据的全部比特,也可以通过物理层安全传输技术发送第二数据的部分比特,并通过传统物理层传输技术发送第二数据的剩余比特。其中,传统物理层传输技术,可以理解为不会使得非法接收端产生误码平台的技术。
基于上述方案,发送端在发送数据之前,通过对待发送的数据进行预处理,该预处理不仅引入了第三装置的误码率,还能够使得第一装置和第二装置之间的通信达到安全等级,从而能够提高通信安全。对比而言,在现有技术中,仅考虑误码率,无法说明通过物理层安全传输技术可以保证安全性。
具体地,在现有的物理层安全传输技术中,考虑了误码率,使得第三装置的误码率可以达到一定水平,但是误码率并不等同于安全性,比如误码率为0.3,仅仅表示100个比特可能有30个是错误的,但是从安全性角度,这30个比特是有可能恢复出100个比特的。在本申请中,通过预处理,一方面可以提升误码率,比如,可以将误码率从0.3提高为0.5。另一方面提升后的误码率可以被证明达到一定的安全等级,比如,安全等级是128,表示第三装置暴力破解需要的次数是2^128,从而能够提升通信安全。
另一方面,该方案能够定制安全等级,为不同的合法接收者提供差异化安全服务。比如IoT终端,算力有限,安全要求不高,可以利用本申请的方案定制较低的安全等级。因此,具有更强的灵活性。
可选地,该方法还包括:S230,第二装置对第二数据进行后处理,得到第一数据。
具体地,第二装置在进行调制解调、信道译码等物理层安全传输技术后,可以获得第二数据,第二装置可以进一步对第二数据进行后处理,得到第一数据。
其中,后处理可以理解为预处理的逆运算,即对第二数据进行解密,获得第一数据。
作为S210的一种实现方式,第一装置基于第三装置的误码率对第一数据进行预处理,包括:第一装置基于第三装置的误码率对第一数据进行分组并生成第一随机串。
其中,第一装置基于第三装置的误码率对第一数据进行分组,包括:第一装置根据误码率和安全等级确定第一数据的分组长度,并以分组长度为单位对第一数据进行划分。第一装置基于第三装置的误码率生成第一随机串,包括:第一装置根据误码率和安全等级确定随机串的长度r,并以长度r生成第一随机串。
具体地,误码率、安全等级、分组长度b和随机串的长度r之间具有对应关系,确定误码率和安全等级后,随机串的长度r和分组长度b的取值可以给定一个然后计算另一个。
可选地,分组长度为信道编码的分组大小。换言之,第一装置在对第一数据进行分组时,可以以信道编码的分组大小作为第一数据的分组长度。其中,信道编码也是将比特流进行分组处理,分组后每个分组的比特数就是信道编码的分组大小或者信道编码的分组长度。
可选地,确定误码率、安全等级和分组长度b之后,在满足误码率、安全等级、分组长度b和随机串的长度r之间的对应关系的前提下,随机串的长度r的取值可以为b的整数倍。
可选地,在该实现方式中,第一装置基于第三装置的误码率对第一数据进行预处理,还包括:第一装置基于第一随机串对分组后的第一数据进行运算。
具体地,第一装置可以根据第一随机串(r i)和第二随机串(S)获得第一比特串(k i),并基于第一比特串(k i)对分组后的第一数据(m i)进行运算,得到第三数据(c i)。
其中,第二随机串(S)可以是公开的。第二随机串可以是收发双方采用某种同步机制产生的双方已知的随机数,同步机制也可以是公开的。例如,第二随机串可以由发送端确定,然后在消息中发送给接收端。也可以由接收端确定,然后在消息中发送给发送端。
具体地,第一装置根据第一随机串(r i)和第二随机串(S)获得第一比特串(k i)可以分为以下两种情况:
情况1:随机串的长度r大于或等于分组长度b。
在这种情况中,第二随机串(S)的长度可以与第一随机串(r i)的长度相同,且在根据第一随机串(r i)和第二随机串(S)获得第一比特串(k i)时,可以对第一随机串(r i)和第二随机串(S)的运算结果取前b个比特,即为第一比特串。换言之,第一比特串的长度等于分组长度b。
情况2:随机串的长度r小于分组长度b。
在这种情况中,第二随机串(S)的长度可以与分组长度b相同,且在根据第一随机串(r i)和第二随机串(S)获得第一比特串(k i)时,可以先补充第一随机串(r i),使得补充后的第一随机串的长度与分组长度b相同,补充的方式可以是:对第一随机串级联(b-r)个0。补充后的第一随机串和第二随机串(S)的运算结果即为即为第一比特串。换 言之,第一比特串的长度等于分组长度b。
通过这种方式,由于第三数据是基于第一比特串(k i)对分组后的第一数据(m i)进行运算得到的,而第一比特串根据第一随机串和第二随机串获得,如此,第一比特串可以理解为等效密钥,通过第一比特串能够扩散随机熵,提升第三装置的误码率。
应理解,所谓提升第三装置的误码率,指的是,在预处理时使用的第三装置的误码率为a,非法接收端解码预处理后的第二数据时,产生的误码率将大于a。
可选地,在该实现方式中,第二数据包括第一随机串(r i)和第三数据。
具体地,可以对第一随机串(r i)和第三数据进行级联操作,所谓级联操作,可以理解为将第一随机串和第三数据按照任意顺序串联起来。例如,第一随机串为r=010,第三数据为c=110,级联操作得到的比特串可以是010110,也可以是110010,级联的顺序双方保持一致即可,可以采用预配置的形式。
作为S230的一种实现方式,第二装置对第二数据进行后处理,包括:第一装置对第二数据进行分组划分,获得第一随机串和第三数据。
具体地,对第二数据进行分组划分可以理解为级联操作的逆操作,第二装置已知级联的顺序,因此通过分组划分能够拆分第二数据,获得第一随机串和第三数据。
可选地,在该实现方式中,第二装置对第二数据进行后处理,还包括:第二装置根据第二随机串对分组划分后的第二数据进行处理。
具体地,由于第二数据包括第一随机串,且第二装置已知第二随机串,因此,第二装置也可以根据第一随机串和第二随机串(S)获得第一比特串(k i)。进一步,第二装置可以基于第一比特串(k i)对第三数据进行运算,得到分组后的第一数据。在进一步,第二装置对分组后的第一数据进行级联,可得到第一数据。
其中,根据随机串的长度r与分组长度b的大小关系,第二装置确定第一比特串也分为两种情况,即随机串的长度r大于或等于分组长度b的情况,以及随机串的长度r小于分组长度b的情况,具体过程可参考上述情况1和情况2,在此不赘述。
下面举例对预处理和后处理的过程进行详细说明。
作为该实现方式的第一示例,误码率和安全等级之间的对应关系为:
Figure PCTCN2022125368-appb-000001
其中,b表示分组长度,r表示随机串的长度,p e表示第三装置的误码率,λ表示安全等级,例如,λ的取值可以为128或256等。
根据式(1),可以通过安全等级,第三装置的误码率定制化分组长度。由式(1)可以看出,r>b,比如r=1000,p e=0.2,b的最大值为67。
具体地,预处理的过程如下:
1.输入待发送消息M∈{0,1} l,待发送消息M的长度为l,将其按照消息分组长度b划分,得到
Figure PCTCN2022125368-appb-000002
个消息分组,记为m i,i为整数,i的取值为1,2,……,q。
2.生成q个随机比特串,记为r i,r i∈{0,1} r,长度为r,生成方法可以是任意随机数发生器。
3.提取操作H:k i=(S⊙r i)| b,其中,⊙表示在有限域GF(2 r)上的乘法,| b表示取比特串的前b个比特。S∈{0,1} r,即S为长度为r的随机比特串。
4.计算
Figure PCTCN2022125368-appb-000003
其中,
Figure PCTCN2022125368-appb-000004
表示异或运算。
5.级联操作:r 1||c 1||…||r q||c q,“||”表示级联操作,顺序不做要求,收发双方规定好即可。预处理输出级联的比特串。
相应地,后处理的过程具体如下:
1.经过纠错码,分组划分得到r i和c i,并已知S。
2.提取器操作:
Figure PCTCN2022125368-appb-000005
3.计算
Figure PCTCN2022125368-appb-000006
其中,
Figure PCTCN2022125368-appb-000007
表示异或运算。
4.得到消息M=m 1||m 2||…||m q
在该示例中,待发送消息M为第一数据的一例,c i为第三数据的一例,r i为第一随机串的一例,S为第二随机串的一例,k i为第一比特串的一例,r i和c i级联后的数据为第二数据的一例。在发送级第二数据时,由于随机串的长度r大于分组长度b,因此实现简单,可以采用物理层安全传输技术发送随机串r i,对第三数据c i可以仍采用传统物理层传输技术。
作为该实现方式的第二示例,误码率和安全等级之间的对应关系为:
Figure PCTCN2022125368-appb-000008
其中,b、r、p e、λ的含义与式(1)相同。根据式(2)可以通过安全等级、第三装置的误码率定制化分组长度。由式(2)可以看出,存在两种情况,r≥b的情况和r<b的情况。
其中,对于r≥b的情况,第二示例和第一示例的预处理、后处理过程基本类似,第二示例的预处理、后处理过程等都可以参考第一示例,在此不赘述。
下面对第二示例中,r<b的情况作出说明。
具体地,预处理的过程如下:
1.输入待发送消息M∈{0,1} l,待发送消息M的长度为l,将其按照消息分组长度b划分,得到
Figure PCTCN2022125368-appb-000009
个消息分组,记为m i,i为整数,i的取值为1,2,……,q。
2.生成q个随机比特串,记为r i∈{0,1} r,长度为r,生成方法可以是任意随机数发生器。
3.提取操作H:k i=S⊙(r i||0 b-r),其中⊙表示在有限域GF(2 r)上的乘法。S∈{0,1} b,即S为b长的随机比特串,||0 b-r表示串联(b-r)个0。
4.计算
Figure PCTCN2022125368-appb-000010
其中,
Figure PCTCN2022125368-appb-000011
表示异或运算。
5.级联操作:r 1|| 1||…|| q|| q,“||”表示级联操作,顺序不做要求,双方规定好即可。预处理输出级联的比特串。
相应地,后处理的过程具体如下:
1.经过纠错码,分组划分得到r i和c i,并已知S。
2.提取器操作:k i=S⊙(r i||0 b-r)。
3.计算
Figure PCTCN2022125368-appb-000012
其中,
Figure PCTCN2022125368-appb-000013
表示异或运算。
4.得到消息M=m 1||m 2||…||m q
在该示例中,待发送消息M为第一数据的一例,c i为第三数据的一例,r i和c i级联后的数据为第二数据的一例。此外,在r<b的情况中,在发送级第二数据时,由于随机串的长度r小于分组长度b,使得速率损失较小,码率更高,可以采用物理层安全传输技术发送随机串r i和第三数据c i
作为S210的一种实现方式,第一装置基于第三装置的误码率对第一数据进行预处理,包括:第一装置基于第三装置的误码率对第一数据进行分组。
作为该实现方式的一个示例,误码率和安全等级之间的对应关系为:
Figure PCTCN2022125368-appb-000014
其中,b、p e、λ的含义与式(1)相同。根据式(3),可以通过安全等级、第三装置的误码率定制化分组长度。具体的预处理和后处理方式可以参考上文公式(1)和公式(2)对应的预处理和后处理方式,不同之处在于,使用公式(3)进行预处理时,可以不生成第一随机串,预处理之后,也可以只发送第三数据c i,即不需要发送第一随机串r i,且第三数据c i可以仍采用传统物理层传输技术。
下面结合图6至图7对预处理和后处理的过程进行说明。
图6是本申请实施例提供的预处理的过程的示意图。如图6所示,第一装置分组后的第一数据记为m i,生成的随机串r i(第一随机串的一例)通过提取操作(图6中的H操作)可以得到比特串k i(第一比特串的一例),通过k i对m i进行运算,得到的数据记为c i,即物理层数据,可以将c i和r i进行物理层处理,包括但不限于信道编码等,然后发送至接收端。
图7是本申请实施例提供的后处理的过程的示意图。如图7所示,接收端接收的数据经过物理层处理得到随机串r i和c i,其中,物理层处理包括但不限于信道译码,此外,随机串r i通过提取操作(图7中的H操作)可以得到比特串k i,通过k i对c i进行运算,可以得到分组后的第一数据m i
应理解,图6和图7中的k i可以理解为等效密钥,通过随机串r i,可以提取并扩散物理层安全传输技术在非法信道上引入的随机熵,得到近似均匀分布的等效密钥k i,通过该等效密钥k i对分组后的第一数据进行预处理,可以使得第一数据的各个比特都获得可证明的安全强度。
图8是本申请的数据传输的流程示意图。如图8所示,待发送的第一数据经过预处理后依次进入信道编码流程、波形调制流程、多输入多输出(multiple input multiple output,MIMO)流程后,经过无线信道发送至接收端,接收端接收到的数据依次经过MIMO流程、波形调制流程、信道编码流程后,经过后处理,可以得到待发送的第一数据。其中,在预处理的过程中,考虑了第三装置的误码率。
可选地,在上述任一种实现方式中,该方法200还包括:第一装置向第二装置发送第一信息,或,第一装置接收来自第二装置的第一信息,其中,第一信息用于指示安全等级。
具体地,第一信息可以为指示信息。作为一个示例,指示信息为安全等级的索引,第一信息和安全等级之间具有对应关系。作为又一例示例,指示信息为终端设备的类型的索引,或者说,该指示信息可以用于指示终端设备的类型,终端设备的类型和通信安全等级 之间具有对应关系。其中,终端设备的类型,可以是手机、可穿戴设备、或IoT终端等。发送端发送第一信息后,通过第一信息,接收端可以获知安全等级,发送端可以是第一装置,也可以是第二装置。
可选地,在上述任一种实现方式中,该方法200还包括:第一装置接收来自第二装置的第二信息,或,第一装置向第二装置发送的第二信息,其中,第二信息用于指示误码率。
具体地,第一信息可以为指示信息。作为一个示例,指示信息为安全等级的索引,第一信息和安全等级之间具有对应关系,发送端发送第一信息后,通过第一信息,接收端可以获知安全等级,发送端可以是第一装置,也可以是第二装置。
可选地,在上述任一种实现方式中,该方法200还包括:第一装置确定误码率。
其中,第三装置的误码率和物理层安全传输技术相关,二者之间可以存在耦合的关系,并且都受到第三装置的接收机模型的影响。一种方法是给定物理层安全传输技术,假定第三装置的接收机模型,估算该物理层安全传输技术能够在第三装置端引入的误码率。另一种方法是给定希望达到的第三装置的误码率,假定第三装置的接收机模型,确定物理层安全传输技术。
作为示例,第一装置确定误码率,包括:第一装置确定受控区域,第二装置位于受控区域,第三装置位于受控区域之外,第一装置确定受控区域之外的最佳通信位置,第三装置在最佳通信位置具有最好的接收性能,第一装置根据最佳通信位置确定误码率。
具体地,第一装置为网络设备,第二装置为终端设备,第三装置为假设的侦听者为例,受控区域(confined region)是指对于特定合法终端没有侦听者的区域。例如,图9示出了受控区域的一种示意图,如图9所示,合法终端#1在某个房间内,一般房间内没有侦听者,因此,这个房间可认定为受控区域。又如,受控区域也可以是汽车、工厂等,这些区域封闭管控,因此可以认为没有侦听者。又如,终端携带在用户身上,可以认为在某些范围内没有侦听者,比如1m以内,受控区域可以是指以终端为中心的范围。受控区域确定之后,需要确定侦听者的最优点,在这个点侦听者的性能就会是最好的。确定方法可以是根据物理层安全传输技术、网络拓扑和网络设备的参数等确定。比如,物理层安全传输技术采用的是人工噪声方案,在网规阶段,可以粗略的估计采用人工噪声方案之后,在受控区域之外噪声能量最低的点,也就是接收信干噪比最高的点,这个点就是侦听者的最佳侦听点。最佳侦听点确定后,就可以估计侦听者的误码率。误码率的估计需要结合侦听者的接收机模型。在安全领域,往往假定侦听者的接收能力超过合法终端,因此在估算过程中一般假定侦听者采用最优的接收机算法并具有足够的计算能力。
应理解,上文以第一装置确定第三装置的误码率为例,本申请并不限于此,第三装置的误码率也可以由接收端设备(即第二装置)确定,并发送给发送端设备(即第一装置),第二装置的确定方式可以参考第一装置的确定方式,在此不赘述。
还应理解,在实际应用中,获得第三装置的真实误码率难度极大,因此,确定第三装置的误码率,也可以理解为第一装置或第二装置对第三装置的误码率进行估计。
下面结合图10和图11对本申请提供的无线物理层安全通信的方法200进行具体说明。
图10示出了本申请提供的一种无线物理层安全通信的方法300,该方法300为方法200的一种具体实现。在方法300中,以第一装置为网络设备#A,第二装置为终端设备#A 为例。如图10所示,该方法300包括以下步骤。
S301,终端设备#A向网络设备#A发送无线帧#1。
其中,无线帧#1携带第一参数,第一参数可以理解为预处理和后处理模块的参数,第一参数可包括安全等级要求、第三装置的误码率。根据第一参数,网络设备#A可以对待发送的、具有安全要求的数据#1(第一数据的一例)进行预处理。可选地,数据#1也是物理层数据。
可选地,若网络设备#A不能满足终端设备#A的安全等级要求,网络设备#A可以向终端设备#A发送安全等级,该安全等级可以低于终端设备#A的安全等级要求。网络设备#A可以根据发送的安全等级进行预处理,终端设备#A可以根据接收的安全等级进行后处理。
终端设备#A接收并解调无线帧#1,可以获得第一参数。
S302,网络设备#A发送无线帧#2,无线帧#2携带随机向量(第二随机串的一例)。
S302和S301可以同时执行,即随机向量和第一参数可以携带于同一无线帧。
可选地,S302不执行,随机向量在协议中定义,收发双端无需通过信令交互同步。
S303,网络设备#A根据第一参数预处理数据#1,得到数据#2(第二数据的一例)。
S304,网络设备#A向终端设备#A发送无线帧#3。
无线帧#3是对预处理过的数据#1进行调制的信号,即无线帧#3包括数据#2。
S305,终端设备#A解调无线帧#3,可以获得数据#2。终端设备#A对数据#2进行后处理,得到数据#1,后处理根据第一参数执行。
图11示出了本申请提供的一种无线物理层安全通信的方法400,该方法400为方法200的一种具体实现,在方法400中,以第一装置为网络设备#B,第二装置为终端设备#B为例。如图11所示,该方法400包括以下步骤。
S401,网络设备#B向终端设备#B发送无线帧#1。
其中,无线帧#1携带第一参数,第一参数可以理解为预处理和后处理模块的参数,第一参数可包括安全等级、第三装置的误码率。应理解,与方法300不同的是,网络设备可以对待发送的、具有安全要求的数据进行统一配置,从而网络设备#B可以向终端设备#B指示预处理的安全等级。
终端设备#B接收并解调无线帧#1,可以获得第一参数。
S402,网络设备#B发送无线帧#2,无线帧#2携带随机向量(第二随机串的一例)。
S402和S401可以同时执行,即随机向量和第一参数可以携带于同一无线帧。
可选地,S402不执行,随机向量在协议中定义,收发双端无需通过信令交互同步。
S403,网络设备#B根据第一参数预处理数据#3(第一数据的一例),得到数据#4(第二数据的一例)。
S404,网络设备#B向终端设备#B发送无线帧#3。
无线帧#3是对预处理过的数据#3进行调制的信号,即无线帧#2包括数据#4。
S405,终端设备#B解调无线帧#3,可以获得数据#4。终端设备#B对数据#4进行后处理,得到数据#3,后处理根据第一参数执行。
上述流程图中虚线步骤为可选地步骤,且各步骤的先后顺序依照方法的内在逻辑确定,上述流程图中所示的序号仅为示例,不对本申请步骤的先后顺序造成限制。
应理解,本申请实施例提供的方法可以单独使用,也可以结合使用,本申请对此不做限制。本申请实施例提供的各种实施方式可以单独使用,也可以结合使用,本申请对此不做限制。本申请实施例提供的各种示例可以单独使用,也可以结合使用,本申请对此不做限制。
还应理解,本申请中术语“和/或”,仅仅是一种描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况,其中A,B可以是单数或者复数。另外,本文中字符“/”,一般表示前后关联对象是一种“或”的关系,但也可能表示的是一种“和/或”的关系,具体可参考前后文进行理解。
本申请实施例中,若无特殊说明,多个指两个或两个以上。
本申请实施例中,“至少一项(个)“是指一项(个)或者多项(个),“至少两项(个)“以及“多项(个)”是指两项(个)或两项(个)以上。“以下至少一项(个)”或其类似表达,是指的这些项中的任意组合,包括单项(个)或复数项(个)的任意组合。例如,a,b,或c中的至少一项(个),可以表示:a,b,c,a-b,a-c,b-c,或a-b-c,其中a,b,c可以是单个,也可以是多个。
需注意的是,图5、图10、图11中示意的执行主体仅为示例,该执行主体也可以是支持该执行主体实现图5、图10、图11所示方法的芯片、芯片系统、或处理器,本申请对此不作限制。
上文结合附图描述了本申请实施例的方法实施例,下面描述本申请实施例的装置实施例。可以理解,方法实施例的描述与装置实施例的描述可以相互对应,因此,未描述的部分可以参见前面方法实施例。
可以理解的是,上述各个方法实施例中,由第一装置实现的方法和操作,也可以由第一装置中的部件(例如芯片或者电路)实现,由第二装置实现的方法和操作,也可以由第二装置中的部件(例如芯片或者电路)实现。
上述主要从各个装置之间交互的角度对本申请实施例提供的方案进行了介绍。可以理解的是,各个装置,例如发射端设备或者接收端设备,为了实现上述功能,其包含了执行各个功能相应的硬件结构和/或软件模块。本领域技术人员应该可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,本申请能够以硬件或硬件和计算机软件的结合形式来实现。某个功能究竟以硬件还是计算机软件驱动硬件的方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。
本申请实施例可以根据上述方法示例对发射端设备或者接收端设备进行功能模块的划分,例如,可以对应各个功能划分各个功能模块,也可以将两个或两个以上的功能集成在一个处理模块中。上述集成的模块既可以采用硬件的形式实现,也可以采用软件功能模块的形式实现。需要说明的是,本申请实施例中对模块的划分是示意性的,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式。下面以采用对应各个功能划分各个功能模块为例进行说明。
图12是本申请实施例提供的通信装置的示意性框图。图12所示的通信装置500包括收发单元510和处理单元520。收发单元510可以与外部进行通信,处理单元520用于进 行数据处理。收发单元510还可以称为通信接口或通信单元。
可选的,收发单元510可以包括发送单元和接收单元。发送单元用于执行上述方法实施例中的发送操作。接收单元用于执行上述方法实施例中的接收操作。
需要说明的是,通信装置500可以包括发送单元,而不包括接收单元。或者,通信装置500可以包括接收单元,而不包括发送单元。具体可以视通信装置500执行的上述方案中是否包括发送动作和接收动作。
可选地,该通信装置500还可以包括存储单元,该存储单元可以用于存储指令或者和/或数据,处理单元520可以读取存储单元中的指令或者和/或数据。
在一种设计中,通信装置500可以用于执行上文方法实施例中第一装置所执行的动作。
可选地,该通信装置500可以执行上文方法实施例中第一装置所执行的动作。第一装置可以是终端设备或网络设备,也可以是终端设备或网络设备中的芯片或电路,也可以是能实现全部或部分终端设备或网络设备功能的逻辑模块或软件,本申请对此不作限定。
可选地,该通信装置500可以为第一装置,收发单元510用于执行上文方法实施例中第一装置的接收或发送的操作,处理单元520用于执行上文方法实施例中第一装置内部处理的操作。
可选地,该通信装置500可以为包括第一装置的设备。或者,该通信装置500可以为配置在第一装置中的部件,例如,第一装置中的芯片。这种情况下,收发单元510可以为接口电路、管脚等。具体地,接口电路可以包括输入电路和输出电路,处理单元520可以包括处理电路。
一种可能的实现方式中,该处理单元520用于:基于第三装置的误码率对第一数据进行预处理,预处理用于使得第一装置和第二装置之间的通信达到安全等级;该收发单元510用于向第二装置发送第二数据,第二数据为对第一数据进行预处理之后得到的数据。
一种可能的实现方式中,处理单元520具体用于:基于第三装置的误码率对第一数据进行分组;或,基于第三装置的误码率对第一数据进行分组并生成第一随机串。
一种可能的实现方式中,处理单元520具体用于:根据误码率和安全等级确定第一数据的分组长度;以分组长度为单位对第一数据进行划分。
一种可能的实现方式中,处理单元520还用于:基于第一随机串对分组后的第一数据进行运算。
一种可能的实现方式中,处理单元520具体用于:根据第一随机串和第二随机串获得第一比特串;基于第一比特串对分组后的第一数据进行运算。
一种可能的实现方式中,第一随机串的长度大于或等于分组长度,第二随机向量的长度等于第一随机串的长度。
一种可能的实现方式中,第一随机串的长度小于分组长度,第二随机向量的长度等于分组长度。
一种可能的实现方式中,收发单元510还用于:向第二装置发送第二随机串。
一种可能的实现方式中,分组长度为信道编码的分组大小。
一种可能的实现方式中,收发单元510还用于:向第二装置发送第一信息;或,接收来自第二装置的第一信息;其中,第一信息用于指示安全等级。
一种可能的实现方式中,第一信息为指示信息。
一种可能的实现方式中,该指示信息用于指示终端设备的类型,终端设备的类型和通信安全等级之间具有对应关系。
一种可能的实现方式中,收发单元510还用于:接收来自第二装置的第二信息;或,向第二装置发送第二信息;其中,第二信息用于指示误码率。
一种可能的实现方式中,该第二信息为指示信息。
一种可能的实现方式中,处理单元520还用于:确定误码率。
一种可能的实现方式中,处理单元520具体用于:确定受控区域,第二装置位于受控区域,第三装置位于受控区域之外;确定受控区域之外的最佳通信位置,第三装置在最佳通信位置具有最好的接收性能;根据最佳通信位置确定误码率。
在一种设计中,通信装置500可以用于执行上文方法实施例中第二装置所执行的动作。
可选地,该通信装置500可以执行上文方法实施例中第二装置所执行的动作。第二装置可以是终端设备或网络设备,也可以是终端设备或网络设备中的芯片或电路,也可以是能实现全部或部分终端设备或网络设备功能的逻辑模块或软件,本申请对此不作限定。
可选地,该通信装置500可以为第二装置,收发单元510用于执行上文方法实施例中第二装置的接收或发送的操作,处理单元520用于执行上文方法实施例中第二装置内部处理的操作。
可选地,该通信装置500可以为包括第二装置的设备。或者,该通信装置500可以为配置在第二装置中的部件,例如,第二装置中的芯片。这种情况下,收发单元510可以为接口电路、管脚等。具体地,接口电路可以包括输入电路和输出电路,处理单元520可以包括处理电路。
一种可能的实现方式中,该收发单元510用于:接收来自第一装置的第二数据;该处理单元520用于:对第二数据进行后处理,得到第一数据,第二数据为基于第三装置的误码率对第一数据进行预处理之后得到的数据,预处理用于使得第一装置和第二装置之间的通信达到安全等级。
一种可能的实现方式中,处理单元520具体用于:对第二数据进行分组划分;根据第二随机串对分组划分后的第二数据进行处理。
一种可能的实现方式中,第二数据包括第一随机串,处理单元520还用于:根据第一随机串和第二随机串获得第一比特串;基于第一比特串对分组划分后的第二数据进行运算。
一种可能的实现方式中,收发单元510还用于:接收来自第一装置的第二随机串。
一种可能的实现方式中,收发单元510还用于:接收来自第一装置的第一信息;或,向第一装置发送第一信息;其中,第一信息用于指示安全等级。
一种可能的实现方式中,该第一信息为指示信息。
一种可能的实现方式中,该指示信息用于指示终端设备的类型,终端设备的类型和通信安全等级之间具有对应关系。
一种可能的实现方式中,收发单元510还用于:接收来自第一装置的第二信息;或,向第一装置发送第二信息,其中,第二信息用于指示误码率。
一种可能的实现方式中,第二信息为指示信息。
一种可能的实现方式中,处理单元520还用于:确定误码率。
一种可能的实现方式中,处理单元520具体用于:确定受控区域,第二装置位于受控 区域,第三装置位于受控区域之外;确定受控区域之外的最佳通信位置,第三装置在最佳通信位置具有最好的接收性能;根据最佳通信位置确定误码率。
如图13所示,本申请实施例还提供一种通信装置600。该通信装置600包括处理器610,处理器610与存储器620耦合,存储器620用于存储计算机程序或指令或者和/或数据,处理器610用于执行存储器620存储的计算机程序或指令和/或者数据,使得上文方法实施例中的方法被执行。
可选地,该通信装置600包括的处理器610为一个或多个。
可选地,如图13所示,该通信装置600还可以包括存储器620。
可选地,该通信装置600包括的存储器620可以为一个或多个。
可选地,该存储器620可以与该处理器610集成在一起,或者分离设置。
可选地,如图13所示,该通信装置600还可以包括收发器630和/或通信接口,收发器630和/或通信接口用于信号的接收和/或发送。例如,处理器610用于控制收发器630和/或通信接口进行信号的接收和/或发送。
可选地,可以将收发器630中用于实现接收功能的器件视为接收模块,将收发器630中用于实现发送功能的器件视为发送模块,即收发器630包括接收器和发送器。收发器有时也可以称为收发机、收发模块、或收发电路等。接收器有时也可以称为接收机、接收模块、或接收电路等。发送器有时也可以称为发射机、发射器、发射模块或者发射电路等。
作为一种方案,该通信装置600用于实现上文方法实施例中由第一装置执行的操作。例如,处理器610用于实现上文方法实施例中由第一装置内部执行的操作(例如S210的操作),收发器630用于实现上文方法实施例中由第一装置执行的接收或发送的操作(例如S220的操作)。
作为另一种方案,该通信装置600用于实现上文方法实施例中由第二装置执行的操作。例如,处理器610用于实现上文方法实施例中由第二装置内部执行的操作(例如S230的操作),收发器630用于实现上文方法实施例中由第二装置执行的接收或发送的操作(例如S220的操作)。
如图14,本申请实施例还提供了一种通信装置700。该通信装置700包括逻辑电路710以及输入/输出接口(input/output interface)720。
其中,逻辑电路710可以为通信装置700中的处理电路。逻辑电路710可以耦合连接存储单元,调用存储单元中的指令,使得通信装置700可以实现本申请各实施例的方法和功能。输入/输出接口720,可以为通信装置700中的输入输出电路,将通信装置700处理好的信息输出,或将待处理的数据或信令信息输入通信装置700进行处理。
作为一种方案,该通信装置700用于实现上文各个方法实施例中由数据处理装置执行的操作。
例如,逻辑电路710用于实现上文方法实施例中由第一装置执行的处理相关的操作,如,S210。输入/输出接口720用于实现上文方法实施例中由第一装置执行的发送和/或接收相关的操作,如S220。逻辑电路710执行的操作具体可以参见上文对处理单元520的说明,输入/输出接口720执行的操作可以参见上文对收发单元510的说明,这里不再赘述。
作为另一种方案,该通信装置700用于实现上文各个方法实施例中由数据编排装置执行的操作。
例如,逻辑电路710用于实现上文方法实施例中由第二装置执行的处理相关的操作,如,方法实施例中的第二装置执行的处理相关的操作,如S230,输入/输出接口720用于实现上文方法实施例中由第二装置执行的发送和/或接收相关的操作,如S220。逻辑电路710执行的操作具体可以参见上文对处理单元720的说明。逻辑电路710执行的操作具体可以参见上文对处理单元520的说明,输入/输出接口720执行的操作可以参见上文对收发单元510的说明,这里不再赘述。
应理解,上述通信装置可以是一个或多个芯片。例如,该通信装置可以是现场可编程门阵列(field programmable gate array,FPGA),可以是专用集成芯片(application specific integrated circuit,ASIC),还可以是系统芯片(system on chip,SoC),还可以是中央处理器(central processor unit,CPU),还可以是网络处理器(network processor,NP),还可以是数字信号处理电路(digital signal processor,DSP),还可以是微控制器(micro controller unit,MCU),还可以是可编程控制器(programmable logic device,PLD)或其他集成芯片。
在实现过程中,上述方法的各步骤可以通过处理器中的硬件的集成逻辑电路或者软件形式的指令完成。结合本申请实施例所公开的方法的步骤可以直接体现为硬件处理器执行完成,或者用处理器中的硬件及软件模块组合执行完成。软件模块可以位于随机存储器,闪存、只读存储器,可编程只读存储器或者电可擦写可编程存储器、寄存器等本领域成熟的存储介质中。该存储介质位于存储器,处理器读取存储器中的信息,结合其硬件完成上述方法的步骤。为避免重复,这里不再详细描述。
应注意,本申请实施例中的处理器可以是一种集成电路芯片,具有信号的处理能力。在实现过程中,上述方法实施例的各步骤可以通过处理器中的硬件的集成逻辑电路或者软件形式的指令完成。上述的处理器可以是通用处理器、数字信号处理器(DSP)、专用集成电路(ASIC)、现场可编程门阵列(FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件。可以实现或者执行本申请实施例中的公开的各方法、步骤及逻辑框图。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。结合本申请实施例所公开的方法的步骤可以直接体现为硬件译码处理器执行完成,或者用译码处理器中的硬件及软件模块组合执行完成。软件模块可以位于随机存储器,闪存、只读存储器,可编程只读存储器或者电可擦写可编程存储器、寄存器等本领域成熟的存储介质中。该存储介质位于存储器,处理器读取存储器中的信息,结合其硬件完成上述方法的步骤。
可以理解,本申请实施例中的存储器可以是易失性存储器或非易失性存储器,或可包括易失性和非易失性存储器两者。其中,非易失性存储器可以是只读存储器(read-only memory,ROM)、可编程只读存储器(programmable ROM,PROM)、可擦除可编程只读存储器(erasable PROM,EPROM)、电可擦除可编程只读存储器(electrically EPROM,EEPROM)或闪存。易失性存储器可以是随机存取存储器(random access memory,RAM),其用作外部高速缓存。通过示例性但不是限制性说明,许多形式的RAM可用,例如静态随机存取存储器(static RAM,SRAM)、动态随机存取存储器(dynamic RAM,DRAM)、 同步动态随机存取存储器(synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(double data rate SDRAM,DDR SDRAM)、增强型同步动态随机存取存储器(enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(synchlink DRAM,SLDRAM)和直接内存总线随机存取存储器(direct rambus RAM,DR RAM)。应注意,本文描述的系统和方法的存储器旨在包括但不限于这些和任意其它适合类型的存储器。
根据本申请实施例提供的方法,本申请还提供一种计算机可读介质,该计算机可读介质存储有程序代码,当该程序代码在计算机上运行时,使得该计算机执行方法实施例所示的方法。例如,该计算机程序被计算机执行时,使得该计算机可以实现上述方法实施例中由第一装置执行的方法,或由第二装置执行的方法。
本申请实施例还提供一种包含指令的计算机程序产品,该指令被计算机执行时使得该计算机实现上述方法实施例中由第一装置执行的方法,或由第二装置执行的方法。
本申请实施例还提供一种通信系统,包括第一装置和第二装置。
上述提供的任一种通信装置中相关内容的解释及有益效果均可参考上文提供的对应的方法实施例,此处不再赘述。
在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。所述计算机程序产品包括一个或多个计算机指令。在计算机上加载和执行所述计算机指令时,全部或部分地产生按照本申请实施例所述的流程或功能。所述计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。所述计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,所述计算机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴电缆、光纤、数字用户线(digital subscriber line,DSL))或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机能够存取的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质(例如,软盘、硬盘、磁带)、光介质(例如,高密度数字视频光盘(digital video disc,DVD))、或者半导体介质(例如,固态硬盘(solid state drive,SSD))等。
上述各个装置实施例中的数据编排装置,数据处理装置与方法实施例中的数据编排装置,数据处理装置对应,由相应的模块或单元执行相应的步骤,例如通信单元(收发器)执行方法实施例中接收或发送的步骤,除发送、接收外的其它步骤可以由处理单元(处理器)执行。具体单元的功能可以参考相应的方法实施例。其中,处理器可以为一个或多个。
在本说明书中使用的术语“部件”、“模块”、“系统”等用于表示计算机相关的实体、硬件、固件、硬件和软件的组合、软件、或执行中的软件。例如,部件可以是但不限于,在处理器上运行的进程、处理器、对象、可执行文件、执行线程、程序和/或计算机。通过图示,在计算设备上运行的应用和计算设备都可以是部件。一个或多个部件可驻留在进程和/或执行线程中,部件可位于一个计算机上和/或分布在两个或更多个计算机之间。此外,这些部件可从在上面存储有各种数据结构的各种计算机可读介质执行。部件可例如根据具有一个或多个数据分组(例如来自与本地系统、分布式系统和/或网络间的另一部件交互的二个部件的数据,例如通过信号与其它系统交互的互联网)的信号通过本地和/或远 程进程来通信。
本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。
在本申请所提供的几个实施例中,应该理解到,所揭露的系统、装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。
所述功能如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(read-only memory,ROM)、随机存取存储器(random access memory,RAM)、磁碟或者光盘等各种可以存储程序代码的介质。
以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应以所述权利要求的保护范围为准。

Claims (29)

  1. 一种无线物理层安全通信的方法,其特征在于,包括:
    第一装置基于第三装置的误码率对第一数据进行预处理,所述预处理用于使得所述第一装置和第二装置之间的通信达到安全等级;
    所述第一装置向第二装置发送第二数据,所述第二数据为对所述第一数据进行所述预处理之后得到的数据。
  2. 根据权利要求1所述的方法,其特征在于,所述第一装置基于第三装置的误码率对第一数据进行预处理,包括:
    所述第一装置基于第三装置的误码率对所述第一数据进行分组;或,
    所述第一装置基于第三装置的误码率对所述第一数据进行分组并生成第一随机串。
  3. 根据权利要求2所述的方法,其特征在于,所述第一装置基于第三装置的误码率对所述第一数据进行分组,包括:
    所述第一装置根据所述误码率和所述安全等级确定所述第一数据的分组长度;
    所述第一装置以所述分组长度为单位对所述第一数据进行划分。
  4. 根据权利要求3所述的方法,其特征在于,所述方法还包括:
    所述第一装置基于所述第一随机串对分组后的所述第一数据进行运算。
  5. 根据权利要求4所述的方法,其特征在于,所述第一装置基于所述第一随机串对分组后的所述第一数据进行运算,包括:
    所述第一装置根据所述第一随机串和第二随机串获得第一比特串;
    所述第一装置基于第一比特串对分组后的所述第一数据进行运算。
  6. 根据权利要求5所述的方法,其特征在于,所述第一随机串的长度大于或等于所述分组长度,所述第二随机向量的长度等于所述第一随机串的长度。
  7. 根据权利要求5所述的方法,其特征在于,所述第一随机串的长度小于所述分组长度,所述第二随机向量的长度等于所述分组长度。
  8. 根据权利要求5至7中任一项所述的方法,其特征在于,所述方法还包括:
    所述第一装置向所述第二装置发送所述第二随机串。
  9. 根据权利要求3至8中任一项所述的方法,其特征在于,所述分组长度为信道编码的分组大小。
  10. 根据权利要求1至9中任一项所述的方法,其特征在于,所述方法还包括:
    所述第一装置向所述第二装置发送第一信息;或,
    所述第一装置接收来自所述第二装置的第一信息;
    其中,所述第一信息用于指示所述安全等级。
  11. 根据权利要求10所述的方法,其特征在于,所述第一信息为指示信息,所述指示信息用于指示终端设备的类型,所述终端设备的类型和所述通信安全等级之间具有对应关系。
  12. 根据权利要求1至11中任一项所述的方法,其特征在于,所述方法还包括:
    所述第一装置接收来自所述第二装置的第二信息;或,
    所述第一装置向所述第二装置发送第二信息;
    其中,所述第二信息用于指示所述误码率。
  13. 根据权利要求1至12中任一项所述的方法,其特征在于,所述方法还包括:
    所述第一装置确定所述误码率。
  14. 根据权利要求13所述的方法,其特征在于,所述第一装置确定所述误码率,包括:
    所述第一装置确定受控区域,所述第二装置位于所述受控区域,所述第三装置位于所述受控区域之外;
    所述第一装置确定所述受控区域之外的最佳通信位置,所述第三装置在所述最佳通信位置具有最好的接收性能;
    所述第一装置根据所述最佳通信位置确定所述误码率。
  15. 一种无线物理层安全通信的方法,其特征在于,包括:
    第二装置接收来自第一装置的第二数据;
    所述第二装置对所述第二数据进行后处理,得到第一数据,所述第二数据为基于第三装置的误码率对所述第一数据进行预处理之后得到的数据,所述预处理用于使得所述第一装置和第二装置之间的通信达到安全等级。
  16. 根据权利要求15所述的方法,其特征在于,所述第二装置对所述第二数据进行后处理,包括:
    所述第二装置对所述第二数据进行分组划分;
    所述第二装置根据第二随机串对分组划分后的所述第二数据进行处理。
  17. 根据权利要求16所述的方法,其特征在于,所述第二数据包括第一随机串,所述第二装置根据第二随机串对分组划分后的所述第二数据进行处理,包括:
    所述第二装置根据所述第一随机串和所述第二随机串获得第一比特串;
    所述第二装置基于第一比特串对分组划分后的所述第二数据进行运算。
  18. 根据权利要求16或17所述的方法,其特征在于,所述方法还包括:
    所述第二装置接收来自所述第一装置的所述第二随机串。
  19. 根据权利要求15至18中任一项所述的方法,其特征在于,所述方法还包括:
    所述第二装置接收来自所述第一装置的第一信息;或,
    所述第二装置向所述第一装置发送第一信息;
    其中,所述第一信息用于指示所述安全等级。
  20. 根据权利要求19所述的方法,其特征在于,所述第一信息为指示信息,所述指示信息用于指示终端设备的类型,所述终端设备的类型和所述通信安全等级之间具有对应关系。
  21. 根据权利要求15至20中任一项所述的方法,其特征在于,所述方法还包括:
    所述第二装置接收来自所述第一装置的第二信息;或,
    所述第二装置向所述第一装置发送第二信息;
    其中,所述第二信息用于指示所述误码率。
  22. 根据权利要求15至21中任一项所述的方法,其特征在于,所述方法还包括:
    所述第二装置确定所述误码率。
  23. 根据权利要求22所述的方法,其特征在于,所述第二装置确定所述误码率,包括:
    所述第二装置确定受控区域,所述第二装置位于所述受控区域,所述第三装置位于所述受控区域之外;
    所述第二装置确定所述受控区域之外的最佳通信位置,所述第三装置在所述最佳通信位置具有最好的接收性能;
    所述第二装置根据所述最佳通信位置确定所述误码率。
  24. 一种通信装置,其特征在于,所述装置包括用于执行如权利要求1至14中任一项所述方法的步骤的单元,或所述装置包括用于执行如权利要求15至23中任一项所述方法的步骤的单元。
  25. 一种通信装置,其特征在于,所述装置包括处理器,所述处理器与存储器耦合,所述存储器存储有指令,所述指令被所述处理器运行时,使得所述处理器执行如权利要求1至14中任一项所述的方法,或执行如权利要求15至23中任一项所述的方法。
  26. 一种通信装置,其特征在于,所述装置包括逻辑电路,所述逻辑电路用于与输入/输出接口耦合,通过所述输入/输出接口传输数据,以执行如权利要求1至14中任一项所述的方法,或执行如权利要求15至23中任一项所述的方法。
  27. 一种通信系统,其特征在于,所述系统包括第一装置和第三装置,所述第一装置用于执行如权利要求1至14中任一项所述的方法,所述第三装置用于执行如权利要求15至23中任一项所述的方法。
  28. 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质用于存储计算机程序,当所述计算机程序在计算机上运行时,使得所述计算机执行如权利要求1至14中任一项所述的方法,或执行如权利要求15至23中任一项所述的方法。
  29. 一种计算机程序产品,其特征在于,所述计算机程序产品包括:计算机程序代码,当所述计算机程序代码被运行时,实现如权利要求1至14中任一项所述的方法,或执行如权利要求15至23中任一项所述的方法。
PCT/CN2022/125368 2022-10-14 2022-10-14 无线物理层安全通信的方法和通信装置 WO2024077597A1 (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/CN2022/125368 WO2024077597A1 (zh) 2022-10-14 2022-10-14 无线物理层安全通信的方法和通信装置

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2022/125368 WO2024077597A1 (zh) 2022-10-14 2022-10-14 无线物理层安全通信的方法和通信装置

Publications (1)

Publication Number Publication Date
WO2024077597A1 true WO2024077597A1 (zh) 2024-04-18

Family

ID=90668508

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/125368 WO2024077597A1 (zh) 2022-10-14 2022-10-14 无线物理层安全通信的方法和通信装置

Country Status (1)

Country Link
WO (1) WO2024077597A1 (zh)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140171856A1 (en) * 2012-08-08 2014-06-19 Georgia Tech Research Corporation Applications for Physical-Layer Security
US20160043832A1 (en) * 2014-08-10 2016-02-11 Lg Electronics Inc. Secure communication method and system based on bit error probability
CN106100710A (zh) * 2016-06-08 2016-11-09 中国电子科技集团公司第五十四研究所 一种基于干扰对齐技术的无条件物理层安全协作传输方法
CN108494463A (zh) * 2017-12-29 2018-09-04 西安电子科技大学 基于星座旋转的准正交空时分组码的物理层安全传输方法
CN111726221A (zh) * 2020-01-06 2020-09-29 电子科技大学 可对抗任意窃听天线数量的物理层安全传输方法
CN114553274A (zh) * 2022-01-27 2022-05-27 北京理工大学 基于对抗学习的安全自预编码机优化方法

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140171856A1 (en) * 2012-08-08 2014-06-19 Georgia Tech Research Corporation Applications for Physical-Layer Security
US20160043832A1 (en) * 2014-08-10 2016-02-11 Lg Electronics Inc. Secure communication method and system based on bit error probability
CN106100710A (zh) * 2016-06-08 2016-11-09 中国电子科技集团公司第五十四研究所 一种基于干扰对齐技术的无条件物理层安全协作传输方法
CN108494463A (zh) * 2017-12-29 2018-09-04 西安电子科技大学 基于星座旋转的准正交空时分组码的物理层安全传输方法
CN111726221A (zh) * 2020-01-06 2020-09-29 电子科技大学 可对抗任意窃听天线数量的物理层安全传输方法
CN114553274A (zh) * 2022-01-27 2022-05-27 北京理工大学 基于对抗学习的安全自预编码机优化方法

Similar Documents

Publication Publication Date Title
KR101770708B1 (ko) Nfc를 통한 보안 고속 링크 유지를 위한 시스템들 및 방법들
TWI745415B (zh) 基於擴展認證協定(eap)程序的執行來推導蜂巢網路的安全金鑰的技術
CN113411308A (zh) 用于5g技术的认证机制
CN107251591A (zh) 用于安全的设备到设备发现和通信的系统、方法和设备
CN108347778A (zh) 通信方法及装置
JP7127689B2 (ja) コアネットワーク装置、通信端末、及び通信方法
US20120327851A1 (en) Method and apparatus for tunneled direct link setup (tdls) for establishing basic service set
WO2021160091A1 (zh) 一种用于组切换的方法和装置
WO2020211778A1 (zh) 小区切换方法以及装置
US20200068517A1 (en) Signal Transmission Method and Apparatus
WO2021042362A1 (zh) 一种无线通信资源分配的方法和装置以及通信设备
JP2023514705A (ja) Tx波形歪みを受信機に伝達するための方法
WO2024077597A1 (zh) 无线物理层安全通信的方法和通信装置
WO2022012256A1 (zh) 通信的方法及通信装置
WO2021072602A1 (zh) 链路失败检测的方法和装置
WO2024092829A1 (zh) 一种通信方法及装置
WO2024092838A1 (zh) 一种数据传输方法及装置
WO2021013317A1 (en) Apparatus, method and computer program for wireless key generation
WO2024066738A1 (zh) 一种通信的方法和装置
CN111465007A (zh) 一种认证方法、装置和系统
WO2023280085A1 (zh) 频带范围上报的方法和通信装置
WO2024060149A1 (zh) 密钥验证方法、密钥获取方法及设备
WO2022253298A1 (zh) 传输系统消息的方法和装置
WO2024093906A1 (zh) 一种上行发送功率确定的方法和装置
WO2022082494A1 (zh) 无线通信方法、发送端和接收端

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22961785

Country of ref document: EP

Kind code of ref document: A1