Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for constructing WTC-I (Wiretap Channel-I) based on BI-AWGN channel without channel state information

A channel state information, WTC-I technology, applied in wireless communications, security devices, digital transmission systems, etc., can solve the problems of increasing the complexity of system implementation, large resource consumption, and channel consumption of large resources, etc., to achieve the realization of power consumption. and security, low resource consumption, and small transmission delay

Active Publication Date: 2019-04-26
HENAN UNIV OF SCI & TECH
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there are still two deficiencies in this scheme: first, the legitimate sender needs to use a noisy public channel to send information, so it is necessary to reduce the information transmission rate and combine strong error-correcting codes and other technical means to make The public channel is completely reliable, which additionally increases the complexity of the system implementation; secondly, the weak error correction capability of the hard-decision decoding algorithm leads to low reliability of the main channel, so that the effect of expanding the quality advantage of the established channel is not obvious , it will also cause the maximum safe transmission rate upper limit of the subsequent safe and reliable encoding to be not high
However, there are still some deficiencies in this scheme: first, its public bit-log likelihood ratio extraction method involves a large number of exponential and logarithmic operations, and resources (such as implementation complexity, storage space, energy consumption and time delay) etc.) consumes a lot
Second, it uses the sum-product algorithm or the maximum a posteriori probability algorithm for iterative decoding, and the sum-product algorithm or the maximum a posteriori probability algorithm also involves a large number of exponential and logarithmic operations in each iteration process, and the resource consumption is also large
to σ 1 and σ 2 The inaccurate estimation of will cause a sharp deterioration in the subsequent soft-decision decoding performance, which will lead to a serious shortage of the quality of the main channel, that is, the lack of robustness to the channel state information, and the accurate estimation of the channel also consumes a large amount of resources.
These three deficiencies make this scheme unsuitable for systems with limited energy supply and computing power and high requirements for transmission delay.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for constructing WTC-I (Wiretap Channel-I) based on BI-AWGN channel without channel state information
  • Method for constructing WTC-I (Wiretap Channel-I) based on BI-AWGN channel without channel state information
  • Method for constructing WTC-I (Wiretap Channel-I) based on BI-AWGN channel without channel state information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0038] see figure 1 with 2 , figure 1 is a schematic diagram of the physical layer unconditional security transmission model proposed by Wyner, figure 2 is the schematic diagram of Φ(x) when x>0.

[0039] A method for constructing a WTC-I based on a BI-AWGN channel without channel state information includes steps 1 to 6.

[0040] Step 1. The legal sender and the legal receiver are connected through bidirectional communication through the BI-AW...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for constructing WTC-I (Wiretap Channel-I) based on a BI-AWGN channel without channel state information. The method comprises the following steps: step 1, carrying outbidirectional communication connection between a legal sender and a legal receiver, and carrying out one-way communication connection between an illegal eavesdropper and the legal sender or the legalreceiver; step 2, generating a feedback check sequence and broadcasting the feedback check sequence by the legal receiver, receiving a feedback check sequence set subjected to noise interference by the legal sender and the illegal eavesdropper; step 3, generating a sending sequence set and broadcasting and sending the sending sequence set by the legal sender, and receiving the sending sequence setby the legal receiver and the illegal eavesdropper; step 4, respectively processing the sending sequence set by the legal receiver and the illegal eavesdropper to obtain a detection sequence; step 5,respectively obtaining a bit log likelihood ratio by the legal receiver and the illegal eavesdropper; and step 6, decoding by the legal receiver and the illegal eavesdropper based on the bit log likelihood ratio by using a soft decision algorithm. The method for constructing the WTC-I based on the BI-AWGN channel without the channel state information provided by the invention has simple implementation, low resource consumption and small transmission delay.

Description

technical field [0001] The invention relates to the technical field of wireless communication security, in particular to a method for constructing a WTC-I based on a BI-AWGN channel without channel state information. Background technique [0002] With the rapid development of information technology, the dependence of private information and commercial information transmission on wireless communication network is obviously increasing, and the attention of the security issues of the communication system itself is also increasing rapidly. Based on the 7-layer protocol of Open System Interconnection, the information security mechanism of the traditional communication system is established on the network layer and the layers above. Its core technology is the key encryption mechanism. The transmission link of the physical layer information security has not attracted enough attention. However, due to the openness and versatility of the electromagnetic signal transmission environme...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/02H04L29/06H04L12/24
CPCH04L41/145H04L63/30H04W12/02
Inventor 张高远韩瑽琤师聪雨王斐谢萍吴红海冀保峰邢玲王喜月张萌常莉莉
Owner HENAN UNIV OF SCI & TECH