Check patentability & draft patents in minutes with Patsnap Eureka AI!

A wireless communication physical layer authentication method

A wireless communication and authentication method technology, applied in the field of wireless transmission, can solve the problems of large influence of transmission signals, complex calculation, and insufficient use of wireless channel characteristics, and achieve the effect of improving authentication efficiency

Active Publication Date: 2020-12-29
NANJING UNIV OF POSTS & TELECOMM
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method needs to coordinate the energy between the tag and the signal, which has a great influence on the transmission signal itself, the calculation is complicated, and the characteristics of the wireless channel are not fully utilized.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A wireless communication physical layer authentication method
  • A wireless communication physical layer authentication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] Objects, advantages and features of the present invention will be illustrated and explained by the following non-limiting description of preferred embodiments. These embodiments are only typical examples of applying the technical solutions of the present invention, and all technical solutions formed by adopting equivalent replacements or equivalent transformations fall within the protection scope of the present invention.

[0027] When doing the performance simulation of the identity authentication mechanism, the authentication performance that the mechanism proposed in the present invention can achieve under different SNRs is mainly considered. The accuracy of identity authentication is mainly represented by error rate, which cannot be proved in theory, but can only be statistically estimated through a large number of identity authentication test data. Taking an OFDM (Orthogonal Frequency Division Multiplexing) system with single transmission and single reception as an...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a wireless communication physical layer authentication method, which includes the following steps: S1: data acquisition step; the receiving end performs channel estimation on the signal from the sending end to obtain multipath delay information, and the sending end belongs to a legal user or an illegal user The user and the receiving end belong to the authenticating party, and perform identity authentication; S2: SVM authentication model step; S3: multipath delay feature training step; S4: multipath delay feature detection step. The invention adopts the support vector machine to carry out good tracking and learning on the constantly changing channel multipath time delay characteristics, and judges and detects the newly estimated multipath time delay information. Utilizing the channel multipath delay characteristics, the SVM model is used to classify and learn the multipath delay characteristics of users, which improves the authentication efficiency in the wireless communication environment.

Description

technical field [0001] The invention relates to a safety authentication method in the field of wireless transmission, in particular to a wireless communication physical layer authentication method. Background technique [0002] The wireless communication system has the characteristics of open broadcasting, which makes it vulnerable to eavesdropping and imitation attacks. As a commonly used security method, identity authentication is used to judge the legitimacy of user identities, which can effectively prevent unauthorized users from accessing and accessing. In recent years, physical layer authentication technology has gradually become a research hotspot and has been widely used in wireless communication network security. A search of prior art documents reveals that an identity tag can be superimposed on the sent signal and transmitted together, and authenticated through the tag. This method needs to coordinate the energy between the tag and the signal, which has a great i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06G06K9/62
CPCH04L63/08H04L63/0807H04L63/16G06F18/2411
Inventor 侯晓赟李冬冬郑泽良赵水静吴欢桐
Owner NANJING UNIV OF POSTS & TELECOMM
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More