An imsi/supi physical layer key protection method without channel estimation

A channel estimation and key protection technology, applied in the transmission system, electrical components, etc., can solve the problems of signal injection and channel manipulation attacks, high overhead, etc., to achieve the reduction of channel manipulation attacks, protection of security, and reduction of computational complexity Effect

Active Publication Date: 2021-05-28
XI AN JIAOTONG UNIV
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the channel estimation algorithm based on the mutual transmission of public pilots by legal parties involves a large number of matrix operations, which makes traditional physical layer key generation also require large overhead in practical applications; and in 2019 IEEE Transactions on Dependable and Secure Computing The published Manipulative Attack against Physical Layer Key Agreement and Countermeasure[J] points out that the openness of the pilot makes the physical layer key generation scheme based on channel estimation vulnerable to signal injection and channel manipulation attacks, allowing attackers to steal legitimate communications Physical layer keys generated by both parties

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An imsi/supi physical layer key protection method without channel estimation
  • An imsi/supi physical layer key protection method without channel estimation
  • An imsi/supi physical layer key protection method without channel estimation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0062] In order to make the purposes, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions of the present invention will be clearly and completely described below with reference to the accompanying drawings. Obviously, the described embodiments are part of the embodiments of the present invention, but not all of them. example. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.

[0063] As a specific embodiment of the present invention, such as figure 2 As shown, an IMSI / SUPI physical layer key protection method without channel estimation includes the following steps:

[0064] The first step, the mobile terminal ( figure 2 After completing the network selection and cell selection, the UE in the figure 2 gNB) sends a random access request and starts the rando...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an IMSI / SUPI physical layer key protection method without channel estimation. The base station analyzes its received signal at the physical layer, and multiplies it by the corresponding sent signal of the random access response to obtain the received signal processed by the base station; The mobile terminal analyzes its own received signal at the physical layer, and multiplies the transmitted signal corresponding to the random access request to obtain the received signal processed by the mobile terminal; the base station samples the received signal processed by the base station, obtains the sampled value, and extracts the sampled signal Quantize the amplitude and phase of the value to generate the initial key bits; the mobile terminal samples the received signal processed by the mobile terminal, obtains the sampled value, and extracts the amplitude and phase quantization of the sampled value to generate the initial key bit. The present invention can prevent the IMSI of the 4G system and the SUPI of the 5G system from being leaked to the attacker through plaintext transmission, resist signal injection and channel manipulation attacks aimed at physical layer key generation, and reduce computational complexity.

Description

technical field [0001] The invention belongs to the technical field of security protection of mobile communication systems, and in particular relates to an IMSI / SUPI physical layer key protection method without channel estimation. Background technique [0002] With the advent of the 5G era, 5G mobile communication systems have put forward higher requirements for security. Aiming at the privacy leakage problem caused by IMSI plaintext transmission in the 4G era, 5G named the mobile user identity as SUPI, and the 5G security standard document 3GPP TS 33.501 first decided to use the public key encryption scheme (ECIES) based on the elliptic curve algorithm as the initial registration process. SUPI protection mechanism: The mobile terminal and the base station use the elliptic curve algorithm to calculate a public key and a private key respectively. The mobile terminal uses the public key to encrypt SUPI into SUCI for transmission. After receiving the SUCI, the base station uses...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/06
Inventor 王慧明鲁知朋冯月华魏璇
Owner XI AN JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products