Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Physical layer authentication system security detection method

A detection method and authentication system technology, which is applied in the field of security detection of physical layer authentication system, can solve the problems of imperfect performance analysis and research of physical layer identity authentication, difficult performance of physical layer identity authentication technology, etc.

Active Publication Date: 2019-01-08
SHENZHEN UNIV
View PDF8 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, current research on the performance analysis of physical layer authentication is far from perfect
Since these three characteristics are usually discussed separately, it is difficult to systematically analyze the influence of parameters on the final performance in a specific physical layer authentication technology, and to compare the performance of different physical layer authentication technologies fairly under the same channel conditions. Performance also becomes difficult

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Physical layer authentication system security detection method
  • Physical layer authentication system security detection method
  • Physical layer authentication system security detection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] Hereinafter, preferred embodiments of the present invention will be described in detail with reference to the drawings. In the following description, the same reference numerals are given to the same components, and repeated descriptions are omitted. In addition, the drawings are only schematic diagrams, and the ratio of dimensions between components, the shape of components, and the like may be different from the actual ones.

[0025] It should be noted that the terms "first", "second", "third" and "fourth" in the description and claims of the present invention and the above drawings are used to distinguish different objects, rather than using to describe a specific order. Furthermore, the terms "include" and "have", as well as any variations thereof, are intended to cover a non-exclusive inclusion. For example, a process, method, system, product or device comprising a series of steps or units is not limited to the listed steps or units, but optionally also includes ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a physical layer authentication system security detection method which comprises the following steps: transmitting a first carrier signal by a transmitting end, and obtaining asecond carrier signal from the first carrier signal through a channel; receiving the second carrier signal by a hostile terminal, obtaining the first false alarm probability based on the second carrier signal and the first hypothesis test condition, and obtaining the first optimal threshold value when the first false alarm probability is less than or equal to the corresponding upper limit based on the Neyman-Pearson theory to determine the first detection probability; receiving the second carrier signal by the receiving end, obtaining the second false alarm probability based on the second carrier signal and the second hypothesis test condition, and obtianing the second optimal threshold value when the second false alarm probability is less than or equal to the corresponding upper limit respectively based on the Neyman-Pearson theory to determine the second detection probability; And the receiving end obtains a security authentication probability based on the first detection probability and the second detection probability to detect the security of the physical layer authentication system.

Description

technical field [0001] The present disclosure relates to the technical field of wireless communication, in particular to a security detection method of a physical layer authentication system. Background technique [0002] Verifying the authenticity of the transmitter is a basic security requirement. The traditional authentication technology is based on the encryption mechanism and performs identity authentication on the upper layer. Compared with the traditional authentication technology, the physical layer authentication technology has two main advantages: First, the physical layer authentication technology obtains higher information theory security by introducing noise interference to the hostile end. Secondly, physical layer authentication can avoid any operation on the upper layer of the computer to obtain higher efficiency and better compatibility. [0003] The performance evaluation of physical layer authentication technology is mainly based on three characteristics: ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/06H04L29/06
CPCH04L63/16H04W12/06H04W12/122G06F17/18
Inventor 谢宁李卓远
Owner SHENZHEN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products