Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Continuous encryption physical layer secure transmission method based on polarization code construction

A technology of physical layer security and transmission method, which is applied in the direction of transmission modification based on link quality, security device, transmission system, etc., can solve the problems of unreachable information transmission rate and weak information transmission capability, and achieve improved spectrum utilization, The effect of increasing the transmission rate

Active Publication Date: 2017-09-08
BEIJING INSTITUTE OF TECHNOLOGYGY
View PDF2 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Aiming at the problem of weak information transmission capability in the physical layer security method of polar code coding based on the degradation characteristics of the wiretapping channel, that is, the problem that a high information transmission rate cannot be achieved, the present invention proposes a continuous encryption based on polar code construction. Layer security transmission method, which can ensure the reliability and security of information transmission, and greatly improve the transmission rate of existing solutions and improve resource utilization

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Continuous encryption physical layer secure transmission method based on polarization code construction
  • Continuous encryption physical layer secure transmission method based on polarization code construction
  • Continuous encryption physical layer secure transmission method based on polarization code construction

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The present invention will be further described below in conjunction with the accompanying drawings and specific embodiments.

[0029] figure 1 It is a flow chart of realizing the continuous encryption method. The sending end encrypts the public interval by utilizing the security of data transmission in the safe interval, so that the proportion of polar code information bit sub-channels in all polar sub-channels becomes larger, which can enhance The frequency band utilization rate increases the transmission rate, and the receiving end restores the signal through decoding and demapping.

[0030] The following describes how to apply the present invention in combination with specific implementation steps, how to improve system reliability and increase transmission rate under the premise of ensuring safety by constructing polar codes:

[0031] Step 1: Perform polarization operation on the main channel and the eavesdropping channel to obtain N sub-channels, and divide the N...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a continuous encryption physical layer secure transmission method based on polarization code construction, and belongs to the technical field of security. According to the method provided by the invention, a polarization code construction method is improved by properties of eavesdropping channel model features and channel features that can be used by a polarization code, that is, security information bit data are placed in a polarization subchannel set with a good legal receiver and a poor eavesdropper; information encryption is performed on an unsecure area by using the information transmitted by the subchannel that can realize secure information transmission relative to a main channel after channel polarization, thereby ensuring the secure information transmission of the unsecure area. Compared with the existing secure polarization code transmission method, the spectrum efficiency is improved, and meanwhile the transmission rate is improved.

Description

technical field [0001] The invention relates to a continuous encryption physical layer security transmission method based on polar code construction, which belongs to the field of security technology. Background technique [0002] Due to the broadcast nature of the wireless channel, users within the receiving range of the signal can receive and process the signal, so wireless communication is particularly vulnerable to eavesdropping and simulation attacks. In recent years, with the rapid development of wireless communication systems, more attention has been paid to the confidentiality issues involved in the process of information dissemination, and the use of channel conditions to realize secure transmission of information from the physical layer has become an important part of the physical layer security research process. . In the 1970s, Wyner constructed the "eavesdropping channel" model based on the information theory method, and analyzed the possibility of establishing ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/02H04L1/00H04L5/00
CPCH04L1/0009H04L1/0061H04L5/0046H04W12/02
Inventor 费泽松于含笑孙策贾岱
Owner BEIJING INSTITUTE OF TECHNOLOGYGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products