Method and device for detecting pilot attack, electronic equipment and storage medium

A technology of pilot signal and legal user, applied in the field of communication, can solve the problem of not considering the situation of sending pilot signal, the result of pilot attack is not accurate enough, etc.

Active Publication Date: 2018-08-17
BEIJING UNIV OF POSTS & TELECOMM
View PDF3 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, this method of detecting pilot attacks does not take into account the fact that malicious users se

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for detecting pilot attack, electronic equipment and storage medium
  • Method and device for detecting pilot attack, electronic equipment and storage medium
  • Method and device for detecting pilot attack, electronic equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0064] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0065] The physical layer security model is composed of a transmitter, a legal user and an eavesdropping user. Since the transmitting end does not know the existence of the eavesdropping user, the estimated channel at this time is inaccurate, which will lead to information leakage to the eavesdropping user during the transmission of confidential information, causing security risks. We call this attack a pilot attack. At present, there are several methods to ov...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Embodiments of the present invention provide a method and a device for detecting a pilot attack, electronic equipment and a storage medium. The method for detecting the pilot attack is applied to a legal user side and comprises the following steps of sending a first pilot signal to a transmitting end in an uplink stage of pilot training in order to make the transmitting end obtain each first peakvalue corresponding to a spatial spectrum function of each first pilot signal sent by each user side; receiving each first peak value sent by the transmitting end in a downlink stage of pilot trainingand each second pilot signal transmitted by the transmitting end and other user sides in order to obtain a spatial spectrum function of each second pilot signal about a scanning angle of the legal user side; obtaining each second peak value corresponding to the spatial spectrum function; and determining the first peak value corresponding to a minimum difference as a spatial spectrum of the legaluser side, determining the second peak value corresponding to the minimum difference as a spatial spectrum of the transmitting end, and determining the remaining peak values as the spatial spectrums of the malicious user sides respectively. According to the embodiments of the invention, a purpose of identifying the malicious user side is achieved.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to a method, device, electronic equipment and storage medium for detecting pilot attack. Background technique [0002] Due to the openness of wireless transmission, other users within the effective transmission range can interfere or eavesdrop on wireless signals, so information security is an important topic in the field of wireless communication. In recent years, physical layer security has gained widespread attention. Physical layer security mainly uses the characteristics of physical layer (such as uniqueness and reciprocity of channels) to ensure the safe transmission of information. [0003] The physical layer security model proposed by Wyner is composed of a transmitter, a legal user and an eavesdropping user. Normally, before information transmission, the legal user transmits a pilot signal to the transmitter, and the transmitter estimates the channel with th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/12H04L25/02H04W12/121
CPCH04L25/0228H04W12/12
Inventor 李斌宁丽娜赵成林许方敏
Owner BEIJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products