Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

D2D communication physical layer group key generation method based on base station control

A method for generating a communication group and a technology for a communication group, applied in the field of communication, can solve the problems of difficulty in obtaining authentication of the identity security of user equipment in group communication, difficulty in achieving a key generation rate, low key generation rate, etc., so as to improve the key generation efficiency. , the effect of reducing bandwidth and transmission time, high key generation rate

Active Publication Date: 2019-06-18
XIDIAN UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This scheme proposes the practical application method of generating the group key at the physical layer, but the key generation method based on the strength of the received signal has a low key generation rate, especially when the devices participating in the group communication remain static, it is difficult to achieve the required encryption. key generation rate
Using the key generation method based on signal strength, the quantization process is more complicated and the calculation complexity is higher
Without the participation of the base station in the key generation process, the security of the identity of the user equipment participating in the group communication is difficult to be authenticated

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • D2D communication physical layer group key generation method based on base station control
  • D2D communication physical layer group key generation method based on base station control
  • D2D communication physical layer group key generation method based on base station control

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] The present invention will be further described below in conjunction with the accompanying drawings.

[0021] refer to figure 1 , the scenario used in the present invention includes user equipment UE and base station, wherein, the user equipment UE and the base station can communicate directly, and the communication between the user equipment UE includes two types: one is that the user equipment UE communicates with the base station as an intermediary, The second is that the user equipment UE communicates directly under the control of the base station; the base station can authenticate the identity of the user equipment UE, and control the connection process of the D2D communication and the generation process of the group key.

[0022] refer to figure 2 , the implementation steps of the present invention are as follows:

[0023] In step 1, the user equipment UE generates random phase values, and uses these values ​​to generate user sounding signals, which are sent to...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for generating a D2D communication group key based on a physical layer, which mainly solves the security problem of the D2D group communication under the control of a base station. The implementation steps are: 1) The user equipment participating in the group communication first generates a random phase, and generates a user detection signal based on the phase and sends it to the base station; 2) The base station measures the signal-to-noise ratio when using full-power transmission signals, and according to the signal-to-noise ratio Calculate the power allocation coefficient; 3) The base station estimates the phase of the received user sounding signal, generates the base station sounding signal according to the phase estimation value and the power allocation coefficient and sends it to the user equipment; 4) The user equipment interferes with the received base station sounding signal Eliminate and estimate the phase, and combine the random phase generated by 1) to calculate the group key. The invention reduces the interaction with the core network, reduces the load of the core network, can alleviate the signaling congestion caused by large-scale access, and can be used in the non-orthogonal multiple access NOMA communication environment of power multiplexing.

Description

technical field [0001] The invention belongs to the technical field of communication, and further relates to a method for generating an end-to-end D2D physical layer group key, which can be used in a NOMA communication environment of power multiplexing non-orthogonal multiple access. Background technique [0002] As an important way of future mobile communication, D2D communication has attracted more and more attention from the industry and academia, among which group communication is the main application scenario of D2D communication. NOMA is one of the key candidate technologies for 5G, and whether it can realize secure D2D group communication under this modulation mode is one of the determining factors whether it can be formally adopted by the 5G standard. Existing D2D security research mainly focuses on the link layer, and such solutions will cause signaling congestion in the core network during large-scale access. [0003] The paper "Collaborative Group Key Extraction ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/04H04W28/04H04W76/14H04W12/041
CPCH04W12/04H04W28/04H04W76/14H04K2203/16H04K3/228
Inventor 张跃宇杨碧云陈杰李晖王勇陈强杨宁
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products