Check patentability & draft patents in minutes with Patsnap Eureka AI!

Wireless communication physical layer authentication method

A technology of wireless communication and authentication method, applied in the field of wireless transmission, can solve the problems of large influence of transmission signal, complicated calculation, and insufficient use of wireless channel characteristics, etc., to achieve the effect of improving authentication efficiency

Active Publication Date: 2018-10-30
NANJING UNIV OF POSTS & TELECOMM
View PDF8 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method needs to coordinate the energy between the tag and the signal, which has a great influence on the transmission signal itself, the calculation is complicated, and the characteristics of the wireless channel are not fully utilized.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Wireless communication physical layer authentication method
  • Wireless communication physical layer authentication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] Objects, advantages and features of the present invention will be illustrated and explained by the following non-limiting description of preferred embodiments. These embodiments are only typical examples of applying the technical solutions of the present invention, and all technical solutions formed by adopting equivalent replacements or equivalent transformations fall within the protection scope of the present invention.

[0027] When doing the performance simulation of the identity authentication mechanism, the authentication performance that the mechanism proposed in the present invention can achieve under different SNRs is mainly considered. The accuracy of identity authentication is mainly represented by error rate, which cannot be proved in theory, but can only be statistically estimated through a large number of identity authentication test data. Taking an OFDM (Orthogonal Frequency Division Multiplexing) system with single transmission and single reception as an...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a wireless communication physical layer authentication method. The method comprises the following steps of S1, data acquisition, wherein channel estimation is carried out on signals from a sending end through a receiving end to obtain multi-path time delay information, the sending end belongs to a legal user or an illegal user, and the receiving end belongs to an authentication party and performs identity authentication on the authentication party; S2, SVM authentication model obtaining; S3, multi-path time delay feature training; S4, multi-path time delay feature detection. By using a support vector machine, good tracking learning can be carried out on continuously changing channel multi-path time delay features, and newly estimated multi-path time delay information is judged and detected. By using the channel multi-path time delay features and an SVM model, classified learning is carried out on the multi-path time delay features of users, and therefore the authentication efficiency in the wireless communication environment is improved.

Description

technical field [0001] The invention relates to a safety authentication method in the field of wireless transmission, in particular to a wireless communication physical layer authentication method. Background technique [0002] The wireless communication system has the characteristics of open broadcasting, which makes it vulnerable to eavesdropping and imitation attacks. As a commonly used security method, identity authentication is used to judge the legitimacy of user identities, which can effectively prevent unauthorized users from accessing and accessing. In recent years, physical layer authentication technology has gradually become a research hotspot and has been widely used in wireless communication network security. A search of prior art documents reveals that an identity tag can be superimposed on the sent signal and transmitted together, and authenticated through the tag. This method needs to coordinate the energy between the tag and the signal, which has a great i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06K9/62
CPCH04L63/08H04L63/0807H04L63/16G06F18/2411
Inventor 侯晓赟李冬冬郑泽良赵水静吴欢桐
Owner NANJING UNIV OF POSTS & TELECOMM
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More