Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A secure transmission method against active eavesdropping in 5G system

A secure transmission and active technology, applied in security devices, electrical components, wireless communications, etc., can solve the problems of high precision, poor performance, and susceptibility to frequency deviation of channel state information CSI, and achieve the goal of resisting active spoofing attacks Effect

Active Publication Date: 2021-10-15
XI AN JIAOTONG UNIV
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Traditional physical layer security transmission schemes are generally designed for passive eavesdropping. However, when the upper layer key is leaked, eavesdroppers can eavesdrop without being discovered by legitimate users.
In addition, many secure transmission schemes are based on multi-carrier modulation systems. Multi-carrier systems have certain defects: high precision requirements for channel state information (CSI), susceptible to frequency deviation, and high peak-to-average power ratio (Peak to Average Power Ratio). Power Ratio, PAPR)
[0004] However, the existing anti-active eavesdropping physical layer security transmission technology based on orthogonal parameter authentication does not perform well in the power suppression attack scheme with full space coverage.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A secure transmission method against active eavesdropping in 5G system
  • A secure transmission method against active eavesdropping in 5G system
  • A secure transmission method against active eavesdropping in 5G system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] Hereinafter, specific embodiments of the present application will be described in detail with reference to the accompanying drawings. According to these detailed descriptions, those skilled in the art can clearly understand the present application and can implement the present application. Without departing from the principle of the present application, the features in different embodiments can be combined to obtain new implementations, or some features in certain embodiments can be replaced to obtain other preferred implementations.

[0043] refer to Figure 1~4 , the present application provides a secure transmission method against active eavesdropping in a 5G system, the method comprising the following steps:

[0044] Step 1): Initiated by the legal receiving node, the coupled encrypted distribution of security parameters;

[0045] Step 2): Authenticate the coupling characteristic parameters, so that the source node restores the security parameters;

[0046] Step 3):...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application belongs to the technical field of wireless communication, and in particular relates to a secure transmission method against active eavesdropping in a 5G system. An existing anti-active physical layer security transmission technology based on orthogonal parameter authentication does not perform well against power suppression attack schemes with full space coverage. The present application provides a multi-stream MIMO anti-active eavesdropping secure transmission method based on coupling parameter authentication. The method includes the following steps: initiated by a legal receiving node, and encrypting and distributing the coupling of security parameters; authenticating the coupling characteristic parameters, so that the source node recovers the security parameters; and initiating by the source node, encrypting data transmission with security parameters; The recovery of data is completed by the legitimate receiving node. The eavesdropping bit error rate of the coupling encryption scheme used is higher than that of the orthogonal encryption, and the anti-eavesdropping effect is better.

Description

technical field [0001] The present application belongs to the technical field of wireless communication, and in particular relates to a secure transmission method against active eavesdropping in a 5G system. Background technique [0002] Due to the characteristics of open space, time-varying topology, and broadcasting characteristics of wireless communication systems, the communication is easy to be eavesdropped. The traditional cryptography encryption method that relies on computational complexity is facing elimination due to the continuous improvement of computer computing power. The physical layer security communication technology does not depend on computational complexity. At the same time, the computational overhead is small and the delay is short. Advantage. [0003] Traditional physical layer security transmission schemes are generally designed for passive eavesdropping. However, when the upper layer key is leaked, eavesdroppers can eavesdrop without being discovere...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/03H04W12/0431H04W12/041
CPCH04W12/02
Inventor 杜清河申宁欧奕杰
Owner XI AN JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products