Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Physical layer secure transmission method and system based on decomposition and distributed modulation

A technology of physical layer security and transmission method, which is applied in the field of wireless communication, can solve problems such as consumption, interference with eavesdroppers, and decline in spectrum efficiency at legitimate receivers, and achieve the effect of enriching spatial features and ensuring confidentiality

Active Publication Date: 2020-11-24
ZHENGZHOU UNIVERSITY OF LIGHT INDUSTRY
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] To sum up, the problem existing in the existing technology is: the existing physical layer security method is at the transmitting end, for example, the transmitter constructs artificial noise, which requires additional transmission power to interfere with the eavesdropper’s channel, and even requires special equipment to Send artificial noise, and the artificial noise sent may also cause interference to other users within the communication range
For example, technology-based wireless network anti-eavesdropping method based on interference alignment, through the transmitter to send artificial noise to interfere with the eavesdropper, in a system with limited total transmission power, it will cause the transmission power of the desired signal to decrease, resulting in the spectral efficiency of the legal receiver. decline
Technology 2 is based on divide-and-conquer cooperative interference, using signals sent by other legal communication nodes within the communication range of the source and destination to interfere with eavesdroppers, requiring the deployment of multiple legal communication nodes, thus consuming more transmission power

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Physical layer secure transmission method and system based on decomposition and distributed modulation
  • Physical layer secure transmission method and system based on decomposition and distributed modulation
  • Physical layer secure transmission method and system based on decomposition and distributed modulation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] In order to make the objectives, technical solutions, and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, but not to limit the present invention.

[0034] The present invention solves the difficulty and significance of the above-mentioned prior art problems: the difficulty lies in how to fully excavate and utilize the random characteristics of the wireless channel; how to realize secure communication without losing the power of the desired signal transmission. The significance is: no need for additional equipment and transmission power, no need to construct and generate artificial noise at the transmitting end, such as the transmitter, and will not cause interference to other users in the communication range; two distributed signals carry the expected data after deco...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a physical layer secure transmission method and a system based on decomposition and distributed modulation. The controller decomposes the high-order modulation into a pluralityof quadrature phase shift keying modulations, and each quadrature phase shift keying modulation is further decomposed into two mutually orthogonal binary phase shift keying modulations; expected datainformation to be sent is represented by two binary phase shift keying signals and is sent by two transmitters respectively, channel state information is shared between the transmitters, and the transmitters preprocess the sent signals respectively and then send the preprocessed sent signals to a target receiver; and the target receiver receives a mixed signal of the two binary phase shift keyingsignals, and expected data information is recovered after filtering. According to the invention, decomposition, distributed modulation and sending are carried out on high-order modulation, and each distributed signal does not carry complete expected data information of the target receiver, so that secret transmission of data is realized, an eavesdropper is effectively prevented from acquiring theexpected data information, and secret transmission of the expected data information is realized.

Description

Technical field [0001] The invention belongs to the field of wireless communication technology, and in particular relates to a physical layer safe transmission method and system based on decomposition and distributed modulation. Background technique [0002] With the rapid development of wireless communication technology, information security has become an important issue. Due to the natural openness and broadcasting nature of wireless transmission, wireless communication systems face more serious security threats than traditional wired communication systems. Eavesdroppers may illegally eavesdrop on users' sensitive information through wireless channels. Physical layer security plays a fundamental role in improving the confidentiality of information. The basic principles of physical layer security can be divided into two types: first, the realization of encryption based on wireless channel characteristics; second, the realization of reliable transmission based on confidentiality ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L27/20H04L29/06
CPCH04L27/206H04L63/16
Inventor 张超钦李钊陈杰王兆博何春雨徐珂
Owner ZHENGZHOU UNIVERSITY OF LIGHT INDUSTRY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products