Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Physical layer secure transmission method capable of resisting any number of eavesdropping antennas

A physical layer security and transmission method technology, applied in the field of physical layer security transmission, can solve problems such as eavesdropping and attack, deterioration, and inability to resist, and achieve the effect of low complexity, low power consumption, and low interference

Active Publication Date: 2020-09-29
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the rapid development of 5G, the Internet of Things and edge computing networks, a large number of new services and applications are constantly emerging; various confidential and sensitive data in wireless networks are increasing massively, and the subsequent information security issues are becoming more and more prominent , security is gradually becoming a prerequisite for various business applications; compared with traditional wired networks, the broadcast and mobile characteristics of wireless mobile channels make the communications of legitimate users in the network vulnerable to eavesdropping and attacks by illegal users. In traditional wireless communication networks, cryptography-based encryption technology is usually used at the network layer and upper layers to ensure system communication security. Massive sensor nodes and edge nodes in the IoT network usually operate with low power consumption under unmanned monitoring, and their computing resources and power efficiency are very limited, which cannot support highly computationally complex encryption and authentication technologies; physical channel-based security technologies are designed to Using the randomness and uniqueness of the physical medium of wireless communication, making full use of the uniqueness and independent characteristics of the wireless transmission channel, combined with signal design, modulation and coding technologies, to improve the reception quality of legitimate channels, while deteriorating and disrupting attackers’ channels and receiving conditions, so that the mutual information between the information intercepted by the eavesdropper and the secret information transmitted by the legitimate two parties is 0, so as to achieve high-intensity unconditional secure transmission without keys
[0003] However, the current physical layer security transmission technology, including multi-antenna beamforming and precoding, artificial noise, cooperative interference and other technologies, cannot directly fight against eavesdroppers with any number of antennas; eavesdroppers only need to increase the number of eavesdropping antennas and Using signal processing techniques such as maximum ratio combined reception (MRC) or optimal interference cancellation combination at the receiving end, the receiving quality (signal-to-noise ratio or signal-to-interference-noise ratio) of the eavesdropper can be improved; A certain proportion of the total sum of the two parties in the communication, the eavesdropper can make the quality of the received signal exceed that of the legitimate receiver, so that the security capacity of the current physical layer security method is reduced to 0, which means that the current physical layer security transmission method is invalid; with 5G With the rapid development of millimeter wave communication, massive MIMO and distributed MIMO, an eavesdropper with abundant antenna resources can always use a large number of antennas for eavesdropping; and considering that in practical applications, it is impossible for both legal communication parties to know what the eavesdropper used. How many antennas are used for eavesdropping, so it is difficult to use more antennas to fight against eavesdroppers; current physical layer security transmission technology cannot resist eavesdroppers with more antennas than the total number of legal communication parties

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Physical layer secure transmission method capable of resisting any number of eavesdropping antennas
  • Physical layer secure transmission method capable of resisting any number of eavesdropping antennas
  • Physical layer secure transmission method capable of resisting any number of eavesdropping antennas

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] In order to have a clearer understanding of the technical features, objectives and effects of the present invention, specific embodiments of the present invention will now be described with reference to the accompanying drawings.

[0041] In order to have a deeper understanding of the present invention, the physical aspects realized by the method are now described, and those skilled in the art should understand that it does not limit the scope of protection of the present invention.

[0042] The legal communication parties Alice and Bob each use a protected area to surround themselves with a radius of R. The radius of the protected area R must be greater than the irrelevant distance of the channel, so that the eavesdropper Eve cannot enter the protected area for eavesdropping, which means that Eve and The distance between Alice and Bob is greater than R, which ensures that Eve's channel is independent of Alice and Bob. The length of R is determined by the channel propagation...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a physical layer secure transmission method capable of resisting any number of eavesdropping antennas. According to the invention, precoding processing is carried out to resisteavesdroppers with any number of antennas or eavesdroppers with any number of cooperative nodes; legal receivers and transmitters do not need to share any key information. No matter how many antennasare used by an eavesdropper for eavesdropping, the bit error rate of the received confidential information can be ensured to be 0.5, high-strength physical layer secure transmission is achieved, the advantages of low power consumption, low complexity and low interference are achieved, physical layer secure communication of eavesdroppers of any multi-antenna can be achieved without any additional artificial noise or cooperative interference, and extra burden of a network or redundant interference to other users cannot be increased. In the communication process of the method, Alice and Bob of two legal communication parties need a protection area with the radius of R to surround themselves respectively, so that an eavesdropper Eve cannot enter the protection area to eavesdrop, and it is guaranteed that channels of the Eve are independent of the Alice and the Bob.

Description

Technical field [0001] The present invention relates to the field of information security, in particular to a physical layer security transmission method that can resist any number of eavesdropping antennas. Background technique [0002] With the rapid development of 5G, Internet of Things and edge computing networks, a large number of new services and applications continue to emerge; various confidential and sensitive data in wireless networks are increasing in a massive manner, and the ensuing information security issues become more and more prominent , Security is gradually becoming a prerequisite for various business applications; compared with traditional wired networks, the broadcast and mobile characteristics of wireless mobile channels make the communications of legitimate users in the network vulnerable to eavesdropping and attacks by illegal users. In traditional wireless communication networks, cryptography-based encryption technologies are usually used at the network ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04B7/0456H04B7/08
CPCH04B7/0456H04B7/08H04L9/0861Y02D30/70
Inventor 唐杰许爱东文红林致远张宇南蒋屹新
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products