Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Mobile communication method for linear credible token

A mobile communication and trusted technology, which is applied in wireless communication, secure communication devices, and key distribution, can solve problems that affect the security performance of the physical layer and cannot achieve results, and achieve simplified design and implementation difficulty, good secure communication performance, and protection The effect of identity security

Inactive Publication Date: 2019-04-12
WEIDE GUANGDONG INFORMATION TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Then, when the distance between the target user and the eavesdropper is very close, the frequency offset value between adjacent antennas is large, and the cumulative value of the linearly increasing frequency offset may exceed the upper limit of the frequency offset tolerated by the array, thus failing to achieve the expected effect, affecting the performance of physical layer security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile communication method for linear credible token

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] Such as figure 1 as shown, figure 1 It is a schematic structural diagram of a linear trusted token mobile communication method proposed by the present invention.

[0021] 2. Reference figure 1 , a mobile communication method of a linear trusted token proposed by the present invention, comprising the following specific steps:

[0022] S1, setting initialization parameters;

[0023] First, a master key and network public parameters are generated through a PKG; wherein, the master key is kept by the PKG itself; the network public parameters are disclosed to all nodes in the network; The public key and private key of node; And described public key is disclosed to all nodes; Described private key is disclosed to corresponding node; Shared key agreement step: adopt IBE agreement to realize the shared secret between source node and destination node Key and communication sequence number negotiation, wherein said shared key is called key; Routing discovery step: according to...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a mobile communication method for a linear credible token, comprising the following specific steps: S1, setting an initialization parameter; S2, setting an optimal frequency offset between adjacent antennas according to the initialization parameter so as to obtain an antenna transmission frequency vector; S3, according to the optimal frequency offset, calculating actual carrier frequency of each antenna; S4, calculating a channel transmission vector of a target user and an eavesdropper according to the actual carrier frequency, respectively; and S5, according to the channel transmission vectors and the antenna transmission frequency vector, calculating an optimal beam forming vector through a matrix decomposition technology, and calculating the optimal safety rate of the system. The linear credible token provided by the invention is more flexible, and good safety communication performance can be achieved even in a very limited frequency offset range; the identity information security, the position information safety and the routing information safety of nodes in the network can be effectively protected; the system is simplified so that the system can reach atheoretical optimal value of the safety rate.

Description

technical field [0001] The invention relates to the technical field of communication, in particular to a mobile communication method of a linear trusted token. Background technique [0002] Due to its open wireless communication medium, node mobility and self-organizing characteristics, mobile ad hoc network ((MANET) is suitable for emergency occasions and temporary occasions, but it is also vulnerable to various security threats and attacks. Such as passive eavesdropping, data tampering and retransmission, identity forgery and denial of service, etc. Researchers have proposed many corresponding security solutions for the above-mentioned possible attacks. , non-repudiation and other aspects to provide security. [0003] As an effective means to ensure the security of wireless communication, physical layer security technology has gained more and more attention and research. Different from the traditional strategy of ensuring communication security through coding and encrypt...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/08H04W12/02H04W12/04H04B7/06H04B7/08H04W12/0431H04W12/084
CPCH04B7/0617H04B7/086H04L9/0847H04L9/0866H04L63/0421H04L63/20H04W12/02H04W12/04
Inventor 郑聪毅陈龙
Owner WEIDE GUANGDONG INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products