Secure transmission method based on Key assistance

A safe transmission and security technology, applied in the direction of security devices, advanced technology, electrical components, etc., can solve the problems of users without data transmission and waste of secure transmission opportunities

Active Publication Date: 2016-08-31
XI AN JIAOTONG UNIV
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Due to the dynamic arrival of user information and dynamic changes in channel quality, many secure tra

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure transmission method based on Key assistance
  • Secure transmission method based on Key assistance
  • Secure transmission method based on Key assistance

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0068] The present invention will be further described in detail below in conjunction with specific embodiments, which are explanations of the present invention rather than limitations.

[0069] The present invention considers a three-node transmission network, such as figure 1 shown. The legal user Alice wants to transmit information to Bob safely and reliably, and Eve will eavesdrop on Alice's transmitted data. Alice has a data queue and a key queue. Bob also has a key queue, and this key queue is the same as Alice's. When the channel is not secure, Alice uses the Key packet to XOR securely encrypt the information.

[0070] It is assumed that the network experiences independent and smooth Rayleigh fading, that is, the channel state remains unchanged in each frame, and the channel state changes independently between different frames. In addition, each data frame is divided into two time slots, corresponding to the first transmission and retransmission of authorized users ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a secure transmission method based on Key assistance. The method comprises the following steps that: a legal user has a data queue and a Key queue; when a channel is secure and reliable, the legal user transmits a data packet and a key packet respectively at a certain probability; when the channel is reliable but unsecure, the legal user transmits the data packet in a way of encrypting the data packet with the Key packet; and when the channel is reliable and the Key queue is empty or the channel is unreliable, the legal user stops transmission. According to a secure transmission protocol, corresponding delay and energy efficiency can be obtained through a queue analysis method. Under the constraints of the energy efficiency and queue stability, a scheme for minimizing delay of the legal user is constructed, and dual decomposition, primary decomposition and secondary decomposition are adopted for resolving. As proved by a simulation result, the method provided by the invention has the advantages that a secure transmission opportunity can be utilized fully in the absence of an external assistance node; the secure transmission rate is increased; and the transmission delay is reduced.

Description

technical field [0001] The invention belongs to the technical field of wireless communication, and relates to the design of a safe transmission scheme of a wireless communication network, in particular to a key-assisted safe transmission method. Background technique [0002] Due to the broadcast characteristics of the wireless communication network, any user within the transmission range of the communication network can receive information, so the wireless communication network is facing the threat of eavesdropping. The traditional encrypted transmission mechanism is complex and assumes that the eavesdropping end has limited decoding ability, so it is difficult to adapt to the development of wireless communication networks. Physical layer security technology, as an emerging technology, can use the physical characteristics of the channel to transmit securely, and has been extensively studied recently. [0003] Due to the dynamic arrival of user information and the dynamic ch...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/02
CPCH04W12/02Y02D30/70
Inventor 任品毅王大伟王熠晨孙黎杜清河
Owner XI AN JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products