Unlock instant, AI-driven research and patent intelligence for your innovation.

A training and authentication method for ofdm channel based on independence check coding

A channel training and independence technology, applied in the field of OFDM channel training and authentication based on independence check coding, can solve the problem that it is difficult for legal transceivers to obtain accurate channel state information of legal links, and achieve high-precision channel estimation Effect

Active Publication Date: 2020-10-27
XI AN JIAOTONG UNIV
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Moreover, once the pilot-aware attack is successfully implemented, it is difficult for the legitimate transceiver to obtain accurate channel state information of the legitimate link

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A training and authentication method for ofdm channel based on independence check coding
  • A training and authentication method for ofdm channel based on independence check coding
  • A training and authentication method for ofdm channel based on independence check coding

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The present invention is further described below in conjunction with accompanying drawing:

[0031] figure 1 In the given system model diagram, consider a pair of legitimate transceivers and a pilot-aware attacker, and two uplink communication links, respectively uplink transmitterreceiver, pilot-aware attacker→receiver. The receiver has N T The root antenna, the uplink transmitter and the pilot-aware attacker are all single-antenna. In the frequency domain, each antenna of each uplink occupies N subcarriers in each OFDM symbol. In the time domain, each communication link samples L paths, and the channel model is: Represents the channel impulse response between the uplink transmitter and the i-th receiving antenna of the receiver, Represents the power delay spectrum of the lth path; represents the channel impulse response between the pilot-aware attacker and the i-th receiving antenna of the receiver, and is independent of Represents the power delay spectrum o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An OFDM channel training authentication method based on independent check coding. The method is used for preventing interference, zeroing and cheating risks suffered by pilot frequencies. The pilot frequencies are randomized, are inserted into subcarriers and are coded to correspond to subcarrier activation patterns (SAPs). Although the coded SAPs are masked by malicious signals, the coded SAPs may be identified and decoded into original pilot frequency signals and are further used for high-precision channel impulse response (CIR) estimation, thereby successfully solving the problem of channel estimation in a pilot frequency attack environment. In the present invention, subcarrier coding and channel estimation are combined, and high-security and high-stability wireless channel training authentication is implemented in an attack environment by means of bit rate optimization and channel estimation.

Description

technical field [0001] The invention relates to the field of wireless communication, in particular to an OFDM channel training authentication method based on independence check coding. Background technique [0002] The current wireless communication technology is facing serious security risks. This risk originates from the broadcast characteristics of wireless channels. It is specifically manifested as harmful signal sources that interfere with the communication links of other normal nodes. Although the upper-layer password encryption and decryption system can guarantee the security of the wireless communication environment to a certain extent, with the development of computer technology, the upper-layer encryption system faces the risk of being deciphered, and the information of legitimate users is completely exposed to hostile targets. Based on this, the physical layer security mechanism has attracted extensive attention and research. Given that the OFDM system is the curr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L27/26
CPCH04L25/0224H04L27/2602H04L63/1441H04B17/391
Inventor 任品毅徐东阳王熠晨
Owner XI AN JIAOTONG UNIV