Physical layer authentication method based on multi-carrier transmission

An authentication method and a technology of the physical layer, applied in the transmission system, digital transmission system, and multiple use of transmission paths, etc., can solve the problems of key leakage of cryptographic security mechanism and hidden dangers of wireless communication system security, and achieve enhanced security, The effect of good authentication performance

Active Publication Date: 2014-11-26
青岛联众芯云科技有限公司
View PDF3 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The authentication based on the physical layer is generally implemented by password security mechanism and security protocol, and the password security mechanism has the risk of key leakage, a...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Physical layer authentication method based on multi-carrier transmission
  • Physical layer authentication method based on multi-carrier transmission
  • Physical layer authentication method based on multi-carrier transmission

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] The invention will be described in further detail below in conjunction with the accompanying drawings.

[0046] Such as figure 2 As shown, the present invention is based on multi-carrier transmission, regards the channel as a group of M parallel fading sub-channels, and uses the reciprocity and randomness of sub-channel phase responses to perform authentication on the physical layer. The implementation steps of the present invention include: Alice sends an incentive signal to Bob, and after Bob receives the incentive signal, sends a signal encapsulated with a shared key to Alice, and Alice will verify the signal according to the received signal and the shared key Is it from Bob. The specific steps are as follows:

[0047] Step 1: Alice sends an incentive signal to Bob

[0048] Alice at frequency f 1 , f 2 ,...,f M send an equiphase modulated sine wave to Bob In the absence of noise, the signal received by Bob is r B ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a physical layer authentication method based on multi-carrier transmission. According to the method, based on the multi-carrier transmission, channels are regarded as a set of M fading sub-channels, and the reciprocity and randomness of phase responses of the sub-channels are used for performing on identity authentication on both parties of communication. The method includes the implementation steps that Alice transmits an excitation signal to Bob, the phase difference of the multi-carrier channels is measured after Bob receives the excitation signal, then Bob transmits a signal where a shared secrete key is packaged to Alice, and Alice authenticates whether the signal is from Bob or not according to the received signal and the shared secrete key. According to the authentication process of the method, the characteristics of the phase responses of the channels are used, and kinds of spoofing attacks such as the interference attack, the replay attach, impersonation attack are effectively resisted.

Description

technical field [0001] The invention relates to a physical layer security authentication method based on multi-carrier transmission, which belongs to the technical field of wireless communication. Background technique [0002] With the rapid development of wireless communication and the growth of services based on mobile terminals, the security of wireless networks has attracted much attention. Since the openness of the wireless communication link provides some new ways for illegal users to attack, the communication system has great security risks, and it is easy for illegal users to steal useful information. Traditional information security communication is mainly related to encryption technology based on cryptography. Since the length of the key is limited, and with the rapid development of computer technology, the computing power of the computer is rapidly increasing. For this encryption method, it is possible to use Guessing, experimenting and performing a large number ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/00H04L5/00H04W80/02
Inventor 吴晓富杨震张丹颜俊
Owner 青岛联众芯云科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products