A Physical Layer Security Transmission Method Based on Noise Distribution

A physical layer security and transmission method technology, applied in the field of physical layer security transmission based on noise distribution, can solve problems such as interference, affecting normal communication, eavesdropper interference, etc., achieve safe and reliable distribution, deteriorate receiving performance, and improve confidentiality performance Effect

Active Publication Date: 2021-11-19
XI AN JIAOTONG UNIV
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, the research on artificial noise is mainly realized by transmitting artificial noise through the null space of the main channel, but it is difficult to ensure that the transmitter can accurately obtain the channel state information in the actual system. Interference affects normal communication
Some studies use the sending node and the destination node to cooperate to send artificial noise signals to interfere with potential untrusted relay nodes, but such studies have not fully considered the eavesdropper's eavesdropping ability. The direction of the eavesdropping antenna is aimed at the legitimate user. At this time, the artificial noise signal may not be able to effectively interfere with the eavesdropper

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Physical Layer Security Transmission Method Based on Noise Distribution
  • A Physical Layer Security Transmission Method Based on Noise Distribution
  • A Physical Layer Security Transmission Method Based on Noise Distribution

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] see figure 1 , the present invention provides a physical layer secure transmission system model based on noise distribution, including a secure collaboration node (Secure Collaboration Node, SCN), a legal information sender Alice, a legal receiver Bob and a passive The eavesdropper Eve, in which all users are configured as a single antenna for signal transmission and reception. After receiving the communication request, the SCN sends artificial noise signals to the legitimate information senders Alice and Bob. Alice uses the artificial noise signal to interfere with her confidential data information and sends it to Bob. The passive eavesdropper Eve monitors the communication information of the legitimate users.

[0054] All wireless channels in the system model, including legitimate channels and eavesdropping channels, are modeled as quasi-static fading Rayleigh channels, that is, the channel is constant in each transmission stage, and the channel changes independently ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a physical layer security transmission method based on noise distribution. By introducing a safety cooperation node SCN to distribute artificial noise signals to legal users, the safety cooperation node SCN combines the local secret key with the random secret key of the legal user and uses Hash The mapping method generates random interference noise signals, and simultaneously sends interference noise signals and artificial noise signals for confidential information transmission to legitimate users. Legitimate users can eliminate the influence of interference noise to obtain artificial noise signals required for safe transmission, and finally legal senders The artificial noise signal is superimposed on the transmitted confidential signal and sent to the legitimate receiving end. The invention ensures that the eavesdropper cannot eliminate the noise interference, thereby causing the eavesdropper to generate a bit error platform, thereby ensuring the safe transmission of the wireless system.

Description

technical field [0001] The invention belongs to the technical field of wireless communication, and in particular relates to a physical layer security transmission method based on noise distribution. Background technique [0002] Traditional wireless encryption methods mainly rely on upper-layer digital encryption algorithms, such as symmetric encryption algorithms AES, DES, etc., which can achieve fast and effective security encryption, but such algorithms have problems such as encryption key management and distribution difficulties. Digital key encryption algorithms are based on computational complexity theory to ensure the security of information transmission, and this security is based on the assumption of an ideal physical layer, that is, the physical layer can perform error-free transmission. [0003] With the advent of the era of big data, malicious eavesdroppers can also easily have powerful cluster computing capabilities. At this time, traditional key encryption meth...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/03H04W12/041H04W12/0431H04L29/06
CPCH04L63/0428H04L63/16
Inventor 杜清河任汉珣黄黎伟
Owner XI AN JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products