Unlock instant, AI-driven research and patent intelligence for your innovation.

A kind of anti-active eavesdropping physical layer security transmission method of industrial internet of things

A technology of physical layer security and industrial Internet of things, applied in the field of anti-active eavesdropping physical layer security transmission of industrial Internet of things, can solve problems such as poor effect, and achieve the effect of resisting active deception attacks

Active Publication Date: 2021-10-15
陕西锐远物通智能科技有限公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Based on the traditional physical layer security transmission scheme only for passive eavesdropping, once the eavesdropper obtains the key, the eavesdropper can eavesdrop without being discovered by legitimate users; The application provides a physical layer secure transmission method against active eavesdropping in the Industrial Internet of Things

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A kind of anti-active eavesdropping physical layer security transmission method of industrial internet of things
  • A kind of anti-active eavesdropping physical layer security transmission method of industrial internet of things
  • A kind of anti-active eavesdropping physical layer security transmission method of industrial internet of things

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0063] An anti-active eavesdropping physical layer security technology based on orthogonal characteristic parameter authentication is applicable to the OFDM-QPSK system, and OFDM uses K subcarriers. System model such as figure 1 As shown, there are three nodes: the source node Alice, the legitimate receiving node Bob, and the eavesdropping node Eve, which are abbreviated as A, B, and E respectively in the following. There is a two-way wireless connection between Alice and Bob, and there is also a two-way wireless connection between Alice and Eve; and the distance between Bob and Eve is far away, there is no direct path, and they cannot listen to the signals sent by each other. The two-way transmission between any pair of nodes adopts time-division duplex mode. The transmission from Alice to Bob within a time slot is divided into two phases. The length of the first stage is T 1 , the length of the second stage is T 2 , satisfying T=T 1 +T 2 .

[0064] Assuming that the p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application belongs to the technical field of wireless communication, and in particular relates to an anti-active eavesdropping physical layer secure transmission method of the Industrial Internet of Things. The traditional physical layer security transmission scheme is only for passive eavesdropping. Once the eavesdropper obtains the key, the eavesdropper can eavesdrop without being discovered by legitimate users; and it is not effective in dealing with active eavesdropping attacks. This application provides an anti-active eavesdropping physical layer security transmission method of the Industrial Internet of Things, including: initiated by a legal receiving node, orthogonal encryption and distribution of security parameters; authentication of orthogonal characteristic parameters, so that the source node restores security parameters; Initiated by the source node, the security parameter is encrypted for data transmission; the legitimate receiving node completes the recovery of the data. Ensure that eavesdroppers cannot obtain data information through passive eavesdropping and active deception.

Description

technical field [0001] The present application belongs to the technical field of wireless communication, and in particular relates to an anti-active eavesdropping physical layer secure transmission method of the Industrial Internet of Things. Background technique [0002] Due to the characteristics of open space, time-varying topology, and broadcasting characteristics of wireless communication systems, the communication is easy to be eavesdropped. The traditional cryptography encryption method that relies on computational complexity is facing elimination due to the continuous improvement of computer computing power. The physical layer security communication technology does not depend on computational complexity. At the same time, the computational overhead is small and the delay is short. Advantage. [0003] Someone proposed a physical layer authentication system for OFDM pilot signals based on independent check codes, and resisted spoofing attacks through interactive proto...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/06
CPCH04L9/0618H04L63/0428H04L63/1441H04L63/16
Inventor 杜清河申宁欧奕杰
Owner 陕西锐远物通智能科技有限公司