Cooperative vector secure transmission method and system for resisting pilot pollution attack

A pilot pollution and safe transmission technology, applied in the field of information communication, can solve the problems of complex detection scheme algorithm, reduced practicability, poor practicability, etc.

Inactive Publication Date: 2019-06-18
伍仁勇
View PDF3 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, these detection schemes have complex algorithms and poor practicability because of the need to use uplink and downlink bidirectional information transmission, and the problem of safe transmission after detecting pilot pollution attacks has not been effectively solved
Someone proposed a two-way secure transmission scheme to solve the problem of secure transmission during pilot pollution attacks, but the algorithm is complex, the communication efficiency is very low, and the two-way transmission requirements further reduce its practicability
[0005] It can be seen that, on the one hand, the detection of pilot pollution itself faces difficulties and requires prior knowledge of the channel
At present, random pilot schemes are limited to safety theory analysis and lack practicality; pilot pollution detection based on two-way energy detection or minimum description length and other schemes has obstacles in its implementation
Furthermore, these detection methods did not propose an effective secure transmission scheme after detecting pilot pollution attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cooperative vector secure transmission method and system for resisting pilot pollution attack
  • Cooperative vector secure transmission method and system for resisting pilot pollution attack
  • Cooperative vector secure transmission method and system for resisting pilot pollution attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] The communication model of the present invention is as figure 1 shown. Relay is a trusted auxiliary node (for example, the base station relay node deployed by the operator), and together with the legal receiver Bob, the sender Alice, and the attacker Eve, constitutes the sender-assistant node-receiver-attacker eavesdropping model. Without loss of generality, it is assumed that the sender Alice has M antennas, the auxiliary node Relay, the legal receiver Bob, and the attacker Eve all use a single antenna to transmit and receive. Assume that Eve has obtained in advance the reverse pilot sequence that Bob will send to Alice, and can send the same reverse pilot signal strictly synchronously with Bob through signal tracking. Therefore, Alice cannot tell which components of the received superimposed reverse pilot sequence signal come from the legal receiver Bob and which ones come from the attacker Eve. The channel from Alice to Bob is denoted as According to channel reci...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a cooperative vector secure transmission method and system for resisting pilot frequency pollution attacks, which resist the pilot frequency pollution attacks in a mode of cooperative fusion detection of a receiver and a third-party trusted node and realize secure transmission. According to the invention, the device has the following advantages, a pilot frequency sequence and a current channel estimation mode do not need to be changed; the sender does not need to know the priori knowledge of a legal channel and an eavesdropping channel; It is not needed to detect whether pilot frequency pollution exists or not and distinguish a legal receiver from an attacker, a polluted channel and a channel of a credible auxiliary node are directly used for safe transmission scheme design, a random weight coefficient matrix used for precoding does not need to be transmitted to a receiver, and practicability is high.

Description

technical field [0001] The invention relates to the field of information communication, in particular to a vector security transmission method and system against pilot pollution attacks. Background technique [0002] Different from traditional security theories and methods, the basic idea of ​​physical layer security transmission is to make full use of noise and the inherent non-reproducible physical random characteristics of the wireless channel itself, and limit the valid information decoded by illegal users without affecting the normal communication of legitimate users. Number of "bits". According to the traditional information theory security theory, the channel security capacity depends on the channel advantage (must be positive) of the legitimate receiver over the illegal (eavesdropping) user, which is often difficult to satisfy in practical applications. In order to improve the channel advantage of legitimate users, most of the existing research uses technologies suc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L1/00H04B7/0456H04L25/02
CPCH04B7/0456H04L1/00H04L25/02
Inventor 伍仁勇伍清源段伟
Owner 伍仁勇
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products