Multi-user physical layer secure communication method against any number of cooperative eavesdroppers

A technology of physical layer security and communication method, which is applied to secure communication devices and key distribution, can solve problems such as the failure of physical layer security transmission methods, and achieve the effects of low power consumption, low complexity, and low interference

Active Publication Date: 2021-06-11
UNIV OF ELECTRONICS SCI & TECH OF CHINA +1
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] If the total number (density) of cooperative eavesdropping nodes exceeds a certain percentage of the sum of the antennas of both legitimate communication parties, the received signal quality of the eavesdropper can always exceed that of the legitimate receiver, and finally the security capacity of the communication is 0, which means that the physical Layer security transmission method fails; with the rapid development of massive IoT, massive MIMO and distributed MIMO, consider that a resourceful eavesdropper can deploy a large number of cooperative eavesdropping nodes (sensors, bugs, etc.) in the network space for eavesdropping ; and considering that in practical applications, it is impossible for legitimate communication parties to know how many cooperative eavesdropping nodes and their specific locations are deployed by eavesdroppers, so it is difficult to always use more antennas to fight against eavesdroppers
[0006] The current technology cannot fight against the situation when the number of cooperative eavesdropping nodes (or the density of eavesdropping nodes) far exceeds the number of antennas of both legal parties; therefore, this method proposes a multi-user physical layer secure communication method that can resist any number of cooperative eavesdropping nodes. very practical

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-user physical layer secure communication method against any number of cooperative eavesdroppers
  • Multi-user physical layer secure communication method against any number of cooperative eavesdroppers
  • Multi-user physical layer secure communication method against any number of cooperative eavesdroppers

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] In order to understand the technical features, objects, and effects of the present invention, specific embodiments of the present invention will be described with reference to the drawings.

[0046] Such as figure 1 As shown, the legal communication between both sides Alice and BOB1, BOB1, BOBN use a protection area around themselves, R needs to be larger than the discaractive distance of the channel, so that the eavesdropper EVE cannot enter the protection area, which is guaranteed EVE and Alice and BOB1, BOB2, ... BOBN is greater than R, ensuring EVE channels and Alice and BOB1, BOB2, ... Bobn is independent; R's length is determined by the channel propagation environment and the frequency frequency, and the scattering sufficient environment is generally 10 cm. -100cm.

[0047] The legal communication between the other sides Alice and BOB1, BOB2, ... BOBN need to be equipped with more than 2 antennas; considering the downlink, the sum of all BOBs is not more than the sum ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention proposes a multi-user physical layer secure communication method that can resist any number of cooperative eavesdroppers. This method can realize multi-user broadcast communication without the need for any legitimate communication parties to share any keys before communication, so that no matter how many eavesdroppers use Eavesdropping by cooperative nodes can still ensure that the bit error rate of receiving confidential information is 0.5, realizing high-strength physical layer security transmission. Each legal receiver determines to the legal sender the number of receiving antennas it uses and the number of symbol streams it needs to send, where the number of antennas and the number of symbol streams for each legal receiver can be different, and the symbol streams for each legal receiver The number of streams, the number of antennas and the modulation method can be flexibly adjusted, with the advantages of low power consumption, low complexity, low interference, etc., without any additional artificial noise or cooperative interference, to achieve physical layer security against eavesdroppers with any number of antennas Communication without adding extra burden to the network or causing unnecessary interference to other users.

Description

Technical field [0001] The present invention relates to the field of information security, and more particularly to multi-user physical layer security communication methods that can counter any plurality of collaborative eavesdroppers. Background technique [0002] With the rapid development of 5G and Internet of Things, artificial intelligence and edge computing network, a large number of new business and applications continue to emerge, various confidentiality and sensitive data in wireless networks are massive growth, and information security issues coming. More and more prominent, safety is gradually become a prerequisite for a variety of different business applications; compared with traditional wired networks, the broadcast characteristics and mobile features of wireless mobile channels make it easy for communications in the network. Eavesdrop and attack; in the traditional wireless communication network, the network layer and the upper layer are usually used to communicate...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L29/06H04B7/0456
CPCH04B7/0456H04L9/0869H04L63/16Y02D30/70
Inventor 唐杰许爱东文红张宇南蒋屹新
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products