Physical layer secret communication method based on modulation symbol phase rotation

A modulation symbol, phase rotation technology, applied in the field of wireless communication and information security, can solve the problems of reduced information transmission security, low key entropy, etc.

Active Publication Date: 2017-09-19
ZHEJIANG POLICE COLLEGE
View PDF3 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this type of method is not suitable for all communication occasions. For example, when the channel of a legal user is a static channel or a quasi-static channel, the key entropy for generating the key is too low, and the security of information transmission is also greatly reduced.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Physical layer secret communication method based on modulation symbol phase rotation
  • Physical layer secret communication method based on modulation symbol phase rotation
  • Physical layer secret communication method based on modulation symbol phase rotation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] The present invention will be specifically described below in conjunction with the accompanying drawings.

[0057] refer to Figure 1 to Figure 6 , a physical layer secure communication method based on modulation symbol phase rotation, including an encryption process and a decryption process of the physical layer;

[0058] The encryption process of the physical layer includes the following steps:

[0059] 1-1: Use the Tent mapping equation to generate a set of uniformly distributed chaotic sequences, and the number of seeds of the chaotic sequence is determined by the channel coefficient and the negotiation mechanism. A group of chaotic sequences are interleaved by an interleaver to generate P groups of chaotic sequences.

[0060] 1-2: Use the P sets of chaotic sequences obtained in step 1-1 to generate P sets of rotation phases, which are used to change the phase of 4QAM symbols, and each 4QAM symbol corresponds to a rotation phase.

[0061] 1-3: The bit information...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A physical layer secret communication method based on modulation symbol phase rotation is provided; a rectangular MQAM symbol is formed by stacking P mutually independent 4QAM symbols; the P 4QAM symbols phases are rotated in random, thus safely transmitting data between users; the method comprises the following steps: legal users use channel state information, and use a channel reciprocity theorem and a negotiation mechanism to determine the seed number of a chaotic sequencer used for generating a random number; the method periodically updates the seed number, resets the chaotic sequencer so as to generate a new chaotic sequence, and uses an interleaver to process the generated chaotic sequence set, thus obtaining approximately independent P groups of uniform distributed random sequences. The channel reciprocity and negotiation mechanism can ensure the dual-party phase rotation consistency, and the channel randomness can ensure a wiretapper cannot obtain a random rotation phase consistent with a sending terminal. The method allows legal users to safely transmit data under static state or quasi-state channel environments with high safety.

Description

technical field [0001] The invention relates to the technical field of wireless communication and information security, in particular to a physical layer security communication method based on modulation symbol phase rotation. Background technique [0002] Physical layer security, as a theoretically proven secure communication solution, has attracted extensive attention from researchers in recent years. The mainstream physical layer security technologies can be divided into two categories according to whether keys are used or not. [0003] In the keyless physical layer security technology, the secrecy capacity is defined as the difference between the channel capacity of the legitimate channel (the channel between legitimate users) and the channel capacity of the wiretapping channel (the channel between the sender and illegal users). When the confidentiality capacity is greater than 0, the transmission between legitimate users can be absolutely secure; when the confidentialit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/00H04L27/20
CPCH04L9/001H04L27/2003H04L63/16
Inventor 王亢周国民李国军董齐芬
Owner ZHEJIANG POLICE COLLEGE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products