Method for generating physical layer cooperation key when channels in wireless relay network have correlation

A wireless relay network and key generation technology, applied in wireless communication, electrical components, security devices, etc., can solve the problem of not considering the correlation between eavesdroppers and relays, etc.

Active Publication Date: 2020-10-16
CHONGQING UNIV OF POSTS & TELECOMM
View PDF10 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] There have been many studies on a typical 4-node system (legal communication parties Alice and Bob, a relay node Relay, and an eavesdropper Eve), but most models do not consider that the distance between the eavesdropper and the relay is very close to lead to eavesdropping on the channel. Correlation with legal channels, which is very common in actual application scenarios

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for generating physical layer cooperation key when channels in wireless relay network have correlation
  • Method for generating physical layer cooperation key when channels in wireless relay network have correlation
  • Method for generating physical layer cooperation key when channels in wireless relay network have correlation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] The relevant eavesdropping channel model considered by the present invention is as figure 1 As shown, the two legal user nodes and each relay node are single-antenna, the distance between Alice and Bob is far away or blocked by obstacles and there is no direct link, so it is necessary to pass through n relay nodes Relay 1(R 1 ), Relay 2(R 2 ),..., Relay n(R n ) to generate keys, but each relay has a radius of D i There is a bug Eve i(E i ), where i=1, 2,...,n, the relay cannot determine the location of the bug but can be sure that the bug must exist. All legal nodes except bugs are limited by half-duplex, they can only receive and send information at different times. The eavesdropper is always in a quiet state, that is, it only receives information without active attack, and the distance between the eavesdropper and the relay is close enough that the eavesdropping channel generated between the legitimate user and each eavesdropper will affect the information betwee...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for generating a physical layer cooperation key when channels in a wireless relay network have correlation. The method is applied to a quasi-static channel multi-relaydouble-hop system model, and aims at the condition that an eavesdropping channel and a legal channel have correlation, a new cooperative key generation method is constructed, the method comprises twoparts of channel estimation and key negotiation, and the reachable rate of the finally generated key is improved on the premise of ensuring the security by extracting related information between a channel estimation value of an eavesdropping channel and a channel estimation value of a legal channel.

Description

technical field [0001] The invention relates to the security field of the Internet of Things, in particular to a method for generating a physical layer cooperative key when channels in a wireless relay network are correlated. Background technique [0002] In recent years, driven by big data and 5G technology, the Internet of Things has gradually entered the field of vision of ordinary people, and the term "Internet of Everything" does not sound difficult to realize. However, the security problem of the Internet of Things has become a bottleneck restricting its development. One of the important security threats is that the Internet of Things generally uses wireless signals as the transmission medium, and the information is exposed in the air, which is vulnerable to malicious eavesdropping. [0003] At present, the research on the secure communication of the Internet of Things still uses the high-level encryption system of the traditional wireless network, but the number of no...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/04
CPCY02D30/70
Inventor 徐鹏胡冬阳牛文颀雷宏江
Owner CHONGQING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products