Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for detecting eavesdropper in wireless communication system

A wireless communication system and eavesdropper technology, applied in wireless communication, radio transmission system, interference to communication and other directions, can solve the problems of inability to take, do not know, the target user does not know the transmission, etc., to achieve the effect of small extra overhead

Active Publication Date: 2014-08-20
淮北盛大知识产权运营有限公司
View PDF4 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The problem is, the target user only sees that the target user uses C IU = 15Mbit / s, but don't know C ED =10Mbit / s
Therefore, the target user is unaware that the transmission is insecure and cannot take any countermeasures

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for detecting eavesdropper in wireless communication system
  • Method for detecting eavesdropper in wireless communication system
  • Method for detecting eavesdropper in wireless communication system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The present invention provides a simple yet powerful solution to eavesdropper attacks. It should be noted that there is little discussion in the prior art on this topic so far. In fact, even the problem itself solved by the present invention has not been observed in massive MIMO systems, which also means that no prior art solutions exist.

[0026] For a deeper understanding of the present invention, the following background is provided. It is assumed that a wireless system using massive MIMO operates in time division duplex (TDD) mode, and training symbols are sent from users, since there are too many antennas at the transmitter such as a BS to send orthogonal training symbols from users. At this point, one relies on channel reciprocity and assumes downlink channel = uplink channel (possibly compensating for BS hardware).

[0027] Suppose the channel vector from IU to BS is where β IU is a scalar measuring the shadowing attenuation of the IU, h IU is a 1 x M vecto...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method for detecting an eavesdropper in a wireless communication system, the method can determine whether the active eavesdropper carries out interference or not in transmission of a wireless channel from an emitter to a receiver; the method comprises the following steps: the emitter estimates a first effective channel gain of the wireless channel of the receiver; the receivers estimates a second effective channel gain of the wireless channel of the receiver; the first and second effective channel gains are compared to determine whether the active eavesdropper carries out interference or not in the transmission. Furthermore, the invention also relates to a method of the receiver and a receiver device.

Description

technical field [0001] The present invention relates to wireless communication technology, in particular to a method and a receiver device for determining whether an active eavesdropper interferes in transmission between a transmitter and a receiver in a wireless communication system. Background technique [0002] In traditional cryptographic systems, each user is assigned a secret key, and then, for example, a base station (BS) sends encrypted messages to mobile users, so that only users with the correct key can decrypt and restore the original message. This system can be made secure, but creates key distribution problems. This distribution is expensive and unreliable. If an eavesdropper somehow manages to steal a user's key, communications to that user are completely unprotected. In modern society, and in simulated warfare, the main strategy for breaking cryptosystems is to steal the key, since there cannot be any "mathematical protection" against B stealing A's key. Fu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/12H04W24/10H04B17/00H04W12/121H04W12/122
CPCH04K1/00H04K3/222H04L25/0228H04B7/0617H04B7/0413H04L25/0204H04K3/822H04K3/22H04K3/224H04K3/65H04K2203/16H04K2203/36
Inventor 鲁塞克·弗雷德里克
Owner 淮北盛大知识产权运营有限公司