Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

An Endogenous Secure Communication Method Based on Wireless Channel Characteristics

A secure communication and wireless channel technology, applied in the field of endogenous secure communication based on wireless channel characteristics, can solve problems such as low implementation efficiency, inability to achieve comprehensive protection, and insufficient protection, so as to improve security performance and improve information security processing efficiency , Enhance the effect of defense effect

Active Publication Date: 2021-07-09
SUN YAT SEN UNIV
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] The present invention provides an endogenous security based on wireless channel characteristics in order to overcome the technical defects that the existing secure communication method realized by means of authentication, encryption and transmission has the technical defects that comprehensive protection cannot be realized, the realization efficiency is low, and the protection is not strong enough. communication method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An Endogenous Secure Communication Method Based on Wireless Channel Characteristics
  • An Endogenous Secure Communication Method Based on Wireless Channel Characteristics
  • An Endogenous Secure Communication Method Based on Wireless Channel Characteristics

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0071] Such as figure 1 As shown, an endogenous secure communication method based on wireless channel characteristics includes the following steps:

[0072] S1: Extract the RF fingerprint of the sending device as the identity key K;

[0073] S2: Extract channel features as channel key K z ;

[0074] S3: Based on identity key K and channel key K z Generate the physical layer seed key SeedA of the sending end and the physical layer seed key SeedB of the receiving end;

[0075] S4: According to the generated seed keys SeedA and SeedB, correspondingly generate key streams sA and sB;

[0076] S5: The sending end uses the key stream sA to encrypt the modulated signal at the physical layer and sends it, and the receiving end uses the key stream sB to verify the received signal;

[0077] S6: If the verification is successful, perform physical layer decryption; otherwise, report an error and perform identity authentication again.

[0078] In the specific implementation process, t...

Embodiment 2

[0080] More specifically, on the basis of Example 1, the step S1 specifically includes the following steps:

[0081] S11: Receive signals through the receiver antenna array, and perform channel estimation on the received signals, setting k=1;

[0082] S12: Calculate the autocorrelation matrix R(k) for the channel estimation result of the k-th carrier, and perform rank-increasing processing on the autocorrelation matrix R(k), to obtain the rank-increasing autocorrelation matrix R(k) of the k-th carrier;

[0083] S13: yes Calculate the multipath signal amplitude;

[0084] S14: judge whether k is equal to N, and N is the total number of carriers; if it is equal, proceed to step S15; if not, set k=k+1, and return to step S12;

[0085] S15: Sort the multipath signal amplitudes of each carrier, select a path, obtain a radio frequency fingerprint, and use the radio frequency fingerprint as an identity key K.

[0086] More specifically, such as figure 2 As shown, in the step S2,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An endogenous secure communication method based on wireless channel characteristics provided by the present invention includes: extracting the radio frequency fingerprint of the transmitting device as an identity key; extracting channel characteristics as a channel key; The physical layer seed key of the receiving end and the physical layer seed key of the receiving end; correspondingly generate the key stream sA and sB according to the generated seed key; the sending end uses the key stream sA to encrypt and send the modulated signal at the physical layer, and the receiving end Use the key stream sB to verify the received signal; if the verification is successful, perform physical layer decryption; otherwise, report an error and perform identity authentication again. The endogenous secure communication method provided by the present invention utilizes the uniqueness of radio frequency fingerprints in wireless channel characteristics, realizes endogenous secure communication based on wireless channel randomness, uniqueness, and other inherent attributes, integrates authentication, encryption, and transmission, and enhances This improves the overall defense effect of the channel, improves the security performance, and improves the efficiency of information security processing.

Description

[0001] technology neighborhood [0002] The present invention relates to the field of secure communication technology, and more specifically, relates to an endogenous secure communication method based on wireless channel characteristics. Background technique [0003] Due to the openness of wireless channels, the mobility of node terminals and the dynamic changes of network topology, the existing wireless communication networks face severe security challenges. At present, wireless communication network security services mainly include access control, entity authentication, data source authentication, data integrity, confidentiality, non-repudiation, security response, and security auditing. The issue of wireless communication security is described. [0004] First of all, authentication is generally carried out through security protocols. The actual system realizes authentication between communication parties, distribution of keys and other secrets, confirmation of non-repudiat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/041H04W12/02H04W12/03H04W12/06H04W12/122H04L29/06H04L25/02H04W12/79
CPCH04W12/02H04W12/06H04L63/12H04L63/126H04L25/0224H04W12/03H04W12/041H04W12/122
Inventor 唐燕群赖涛魏玺章黄海风朱祥维王青松王小青李聪端
Owner SUN YAT SEN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products