Unlock instant, AI-driven research and patent intelligence for your innovation.

A method and system for locating legal users and eavesdropping users

A technology for legitimate users and users, applied in the field of communication security, can solve the problems of inability to effectively realize the safe transmission of information and the inability to further estimate the location, so as to achieve the effect of safe transmission

Active Publication Date: 2020-11-20
BEIJING UNIV OF POSTS & TELECOMM
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, most of the existing methods for overcoming pilot attacks can detect the existence of eavesdropping users in the communication environment, but they cannot further estimate the information of the legitimate channel and the eavesdropping channel to realize the positioning of the legitimate user and the eavesdropping user, which is still unable to be effectively realized. Secure Transmission of Information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and system for locating legal users and eavesdropping users
  • A method and system for locating legal users and eavesdropping users
  • A method and system for locating legal users and eavesdropping users

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be described in further detail below in conjunction with specific embodiments and with reference to the accompanying drawings.

[0048] It should be noted that all expressions using "first" and "second" in the embodiments of the present invention are to distinguish two entities with the same name but different parameters or parameters that are not the same, see "first" and "second" It is only for the convenience of expression, and should not be construed as a limitation on the embodiments of the present invention, which will not be described one by one in the subsequent embodiments.

[0049] like figure 1 As shown, it is an eavesdropping channel model composed of a transmitter, a legal user and an eavesdropping user, and the eavesdropping channel model is used to describe a communication environment with security threats. Before information transm...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and a system for positioning a legal user and an eavesdropping user. The method for positioning the legal user and the eavesdropping user comprises the following steps: carrying out pilot frequency training, and determining a first spatial spectrum peak value, a second spatial spectrum peak value, a third spatial spectrum peak value and a fourth spatial spectrum peak value; determining a first incident direction, a second incident direction, a third incident direction and a fourth incident direction as well as spatial distances among a transmitting end, a legaluser and an eavesdropping user according to the four spatial spectrum peak values; and positioning the legal user and the eavesdropping user according to the spatial distances between the four incident directions and the transmitting end, the legal user and the eavesdropping user. The system for positioning the legal user and the eavesdropping user comprises a transmitting end, the legal user andthe eavesdropping user.

Description

technical field [0001] The invention relates to the field of communication security, in particular to a method and system for locating legal users and eavesdropping on users. Background technique [0002] Physical Layer Security (Physical Layer Security, PLA) refers to the use of the reciprocity and randomness of the wireless channel between the sender and receiver, as well as the channel differences between the sender and legitimate users and malicious users to improve the quality of received signals for legitimate users. An important supplement or replacement of traditional complex cryptography methods can effectively increase the transmission rate of legal channels, reduce the information rate of eavesdropping users, and ensure the effective reception of information by legitimate users. [0003] At present, attacks that threaten the security of the physical layer mainly include passive attacks and active attacks. In the process of passive attacks, malicious users do not s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04B17/309
CPCH04B17/309H04L63/1475
Inventor 赵成林李斌许方敏宁丽娜
Owner BEIJING UNIV OF POSTS & TELECOMM