Unlock instant, AI-driven research and patent intelligence for your innovation.

A physical layer secure transmission method against any number of eavesdropping antennas

A physical layer security and transmission method technology, applied in the field of physical layer security transmission, can solve problems such as eavesdropping, attack, deterioration, and inability to resist, and achieve the effects of low complexity, low interference, and low power consumption

Active Publication Date: 2021-07-20
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the rapid development of 5G, the Internet of Things and edge computing networks, a large number of new services and applications are constantly emerging; various confidential and sensitive data in wireless networks are increasing massively, and the subsequent information security issues are becoming more and more prominent , security is gradually becoming a prerequisite for various business applications; compared with traditional wired networks, the broadcast and mobile characteristics of wireless mobile channels make the communications of legitimate users in the network vulnerable to eavesdropping and attacks by illegal users. In traditional wireless communication networks, cryptography-based encryption technology is usually used at the network layer and upper layers to ensure system communication security. Massive sensor nodes and edge nodes in the IoT network usually operate with low power consumption under unmanned monitoring, and their computing resources and power efficiency are very limited, which cannot support highly computationally complex encryption and authentication technologies; physical channel-based security technologies are designed to Using the randomness and uniqueness of the physical medium of wireless communication, making full use of the uniqueness and independent characteristics of the wireless transmission channel, combined with signal design, modulation and coding technologies, to improve the reception quality of legitimate channels, while deteriorating and disrupting attackers’ channels and receiving conditions, so that the mutual information between the information intercepted by the eavesdropper and the secret information transmitted by the legitimate two parties is 0, so as to achieve high-intensity unconditional secure transmission without keys
[0003] However, the current physical layer security transmission technology, including multi-antenna beamforming and precoding, artificial noise, cooperative interference and other technologies, cannot directly fight against eavesdroppers with any number of antennas; eavesdroppers only need to increase the number of eavesdropping antennas and Using signal processing techniques such as maximum ratio combined reception (MRC) or optimal interference cancellation combination at the receiving end, the receiving quality (signal-to-noise ratio or signal-to-interference-noise ratio) of the eavesdropper can be improved; A certain proportion of the total sum of the two parties in the communication, the eavesdropper can make the quality of the received signal exceed that of the legitimate receiver, so that the security capacity of the current physical layer security method is reduced to 0, which means that the current physical layer security transmission method is invalid; with 5G With the rapid development of millimeter wave communication, massive MIMO and distributed MIMO, an eavesdropper with abundant antenna resources can always use a large number of antennas for eavesdropping; and considering that in practical applications, it is impossible for both legal communication parties to know what the eavesdropper used. How many antennas are used for eavesdropping, so it is difficult to use more antennas to fight against eavesdroppers; current physical layer security transmission technology cannot resist eavesdroppers with more antennas than the total number of legal communication parties

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A physical layer secure transmission method against any number of eavesdropping antennas
  • A physical layer secure transmission method against any number of eavesdropping antennas
  • A physical layer secure transmission method against any number of eavesdropping antennas

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] In order to have a clearer understanding of the technical features, purposes and effects of the present invention, the specific implementation manners of the present invention will now be described with reference to the accompanying drawings.

[0041] In order to have a deeper understanding of the present invention, the physical level implemented by the method is now described, and those skilled in the art should understand that it does not limit the scope of protection of the present invention.

[0042] The legitimate communication parties Alice and Bob respectively use a protection area to surround themselves, and its radius is R. The radius length R of the protection area must be greater than the irrelevant distance of the channel, so that the eavesdropper Eve cannot enter the protection area for eavesdropping, which means that Eve and Bob are guaranteed The distance between Alice and Bob is greater than R, which ensures that Eve's channel is independent of Alice and ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention proposes a physical layer security transmission method that can resist any number of eavesdropping antennas. Through the precoding processing of this technology, it can resist eavesdroppers with any number of antennas or eavesdroppers with any number of cooperative nodes, and the legal sending and receiving parties There is no need to share any key information, no matter how many antennas the eavesdropper uses to eavesdrop, it can still ensure that the bit error rate of receiving confidential information is 0.5, achieving high-strength physical layer security transmission, and has low power consumption and low complexity. The advantages of low interference, without any additional artificial noise or cooperative interference, can realize the physical layer security communication that can resist the eavesdropper of any number of antennas, and will not increase the additional burden of the network or cause unnecessary interference to other users; the communication in this method During the process, the legitimate communication parties Alice and Bob respectively need a protection area with a radius of R to surround themselves, so that the eavesdropper Eve cannot enter the protection area for eavesdropping, and ensure that the channel of Eve is independent of Alice and Bob.

Description

technical field [0001] The invention relates to the field of information security, in particular to a physical layer security transmission method that can resist any number of eavesdropping antennas. Background technique [0002] With the rapid development of 5G, the Internet of Things and edge computing networks, a large number of new services and applications are constantly emerging; various confidential and sensitive data in wireless networks are increasing massively, and the subsequent information security issues are becoming more and more prominent , security is gradually becoming a prerequisite for various business applications; compared with traditional wired networks, the broadcast and mobile characteristics of wireless mobile channels make the communications of legitimate users in the network vulnerable to eavesdropping and attacks by illegal users. In traditional wireless communication networks, cryptography-based encryption technology is usually used at the networ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04B7/0456H04B7/08
CPCH04B7/0456H04B7/08H04L9/0861Y02D30/70
Inventor 唐杰许爱东文红林致远张宇南蒋屹新
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA