Physical layer secure transmission method for resisting information eavesdropping of eavesdropping node

A physical layer security and eavesdropping node technology, applied in the field of physical layer security, can solve the problems of eavesdropping node interference, security cannot be guaranteed, etc.

Inactive Publication Date: 2016-07-20
XI AN JIAOTONG UNIV
View PDF5 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Most of the existing research on physical layer security technology for space modulation technology uses artificial noise generated at the source node to interfere with the eavesdropping node, because this artificial noise is in the null space of the channel between the bit and the source node and the destination node, so, The artificial noise will not interfere with the destination node, but it will interfere with the eavesdropping node. However, when the channel between the source node and the destination node is a full-rank matrix, there is no null space between them. Therefore, this The security of such schemes cannot be guaranteed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Physical layer secure transmission method for resisting information eavesdropping of eavesdropping node
  • Physical layer secure transmission method for resisting information eavesdropping of eavesdropping node
  • Physical layer secure transmission method for resisting information eavesdropping of eavesdropping node

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The present invention is described in further detail below in conjunction with accompanying drawing:

[0036] refer to figure 1 , the physical layer secure transmission method against eavesdropping nodes stealing information described in the present invention comprises the following steps:

[0037] 1) Before the information transmission starts, both the source node and the destination node send the training sequence sequentially, so that the source node and the destination node can estimate the equivalent channel information h from the source node to the destination node n,k , where n∈{1,...,N r}, k ∈ {1,...,N t}, N t The number of antennas set for the source node, N r is the number of antennas of the destination node;

[0038] 2) The source node encodes the data to be sent, obtains the symbol to be sent and the serial number of the antenna that sends the symbol to be sent, then adds artificial noise to the symbol to be sent, and then sends the symbol to be sent af...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a physical layer secure transmission method for resisting information eavesdropping of an eavesdropping node. The physical layer secure transmission method comprises the steps that: 1) a source node and a target node sequentially send a training sequence before the beginning of information transmission, so that the source node and the target node estimate equivalent channel information h<n, k> from the source node to the target node, wherein n is contained in {1, ... , Nr}, k is contained in {1, ... , Nt}, Nt is antenna number set by the source node, and Nr is antenna number set by the target node; 2) the source node encodes to-be-transmitted data, obtains a to-be-transmitted symbol and an antenna serial number for transmitting the to-be-transmitted symbol, then adds artificial noise into the to-be-transmitted symbol, and transmits the to-be-transmitted symbol added with the artificial noise to the target node through a selected antenna; 3) and the target node receives the symbol transmitted by the source node, decodes the symbol transmitted by the source node by means of a maximum likelihood decoder, and completes physical layer secure transmission of information. The physical layer secure transmission method can achieve physical layer secure transmission of the information.

Description

technical field [0001] The invention belongs to the technical field of physical layer security of a wireless multiple-input multiple-output system, and relates to a physical-layer secure transmission method for resisting information theft by eavesdropping nodes. Background technique [0002] MIMO technology can provide higher system capacity and reliability, and is an important research topic in the field of wireless communication. Spatial modulation is a newly proposed multi-antenna transmission technology in recent years. This technology introduces a spatial dimension in the process of information bit modulation, thereby changing the number of active antennas according to the input information. On the basis of inheriting all the advantages of space modulation, orthogonal space modulation improves the spectrum efficiency of the whole system. Because the inter-antenna interference of spatial modulation is low and the signal processing at the receiving end is relatively simp...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04B7/06H04B7/04H04L29/06
CPCH04B7/0413H04B7/0608H04L63/16
Inventor 高贞贞黄智捷孙黎任品毅
Owner XI AN JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products