Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A physical layer security transmission method based on subcarrier sorting and xor operation in ofdm system

A technology of physical layer security and transmission method, applied in the field of physical layer security transmission, can solve the problems of difficulty in obtaining eavesdropper channel state information, without considering the situation of active eavesdroppers, and difficulty in guaranteeing

Active Publication Date: 2020-08-18
湖南智焜能源科技有限公司
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The analysis found that the existing research on secure coding algorithms has the following deficiencies: 1) Most of the physical layer security coding requires that the channel condition of the legitimate receiver is higher than that of the eavesdropping channel, but in actual wireless communication transmission, it is difficult to guarantee this requirement; 2) The implementation of the security algorithm needs to obtain the real-time channel state information of the eavesdropper, and optimize the allocation of multi-carrier resources from the perspective of information theory, but it is difficult to obtain the channel state information of the eavesdropper in practice; 3) Most eavesdroppers are passive eavesdroppers, without considering The eavesdropper case of active eavesdropping

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A physical layer security transmission method based on subcarrier sorting and xor operation in ofdm system
  • A physical layer security transmission method based on subcarrier sorting and xor operation in ofdm system
  • A physical layer security transmission method based on subcarrier sorting and xor operation in ofdm system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0076] The present invention designs a physical layer security transmission algorithm based on subcarrier sorting and XOR operation for a wireless transmission system in which the three-node physical layer security model adopts OFDM modulation technology. Considering a TDD system, the uplink and downlink channels are different. Before information transmission, the sending end and the legal user send training sequences to each other in time intervals, and the two ends perform channel estimation respectively to obtain main channel information.

[0077] In the information transmission stage, the sending end will encrypt the sending information according to the main channel characteristics obtained through channel estimation. The specific method is to sort the subcarriers according to the channel quality of each subcarrier, and divide the subcarriers into two parts, the subcarriers with better channel quality in the first half and the subcarriers with poorer channel quality in the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an OFDM system physical layer safe transmission method based on subcarrier sorting and XOR operation. The method includes sorting subcarriers according to channel quality fromhighest to lowest by using known channel state information, dividing the subcarriers into two parts including a first half with comparatively good channel quality and a second half with comparativelypoor channel quality, processing original sending data bit symbols according to a corresponding relation, sending original signals and signals subjected to XOR operation separately, and performing joint receiving and decoding and restoring original data symbols by a receiving terminal. Simulation results show that the scheme achieves good anti-interception effect, achieves good security transmission requirements, and improves system bit error rate performance through power allocation and has certain stability and practicability.

Description

technical field [0001] The invention belongs to the technical field of wireless communication physical layer security, in particular to a physical layer security transmission method, which is applicable to various communication networks. Background technique [0002] The essence of physical layer security is to use the differences in channel characteristics of each user and the uncertainty of noise interference to encrypt sent information, making it difficult for eavesdroppers to obtain the amount of information sent. Compared with traditional security methods encrypted at the application layer, physical layer security The algorithm can encrypt the transmitted information through modulation at the physical layer to ensure the complete security of the information. Physical layer security is usually divided into two implementation methods: one is the interference transmission method, the transmission end uses the channel characteristics between the legal receiving end and inte...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04W12/02H04W52/24H04W52/26H04W52/34H04L25/02H04L27/26H04L27/32H04B17/391
CPCH04B17/391H04L25/0224H04L27/2627H04L27/2649H04L27/2697H04L27/32H04L63/0428H04L63/16H04W12/02H04W52/241H04W52/267H04W52/346
Inventor 张国梅李鸣岩李国兵吕刚明
Owner 湖南智焜能源科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products