Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Encryption and decryption method for extracting random numbers to disturb sign parameter characteristic values based on physical layer protocol data

A physical layer protocol and physical sign parameter technology, applied in the field of network security, can solve problems such as high security public and private keys, shared key transmission leakage, etc., and achieve the effect of high security, low complexity, and low power consumption

Pending Publication Date: 2020-12-18
CHONGQING UNIV OF POSTS & TELECOMM +2
View PDF8 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In view of this, the object of the present invention is to provide a kind of encryption and decryption method based on the physical layer protocol data extraction random number disturbance to the characteristic value of the sign parameter, to solve the traditional symmetric The security problems caused by the shared key transmission leakage in the encryption algorithm and the highly complex calculation problems caused by the public and private keys in the asymmetric encryption algorithm, using the relatively small amount of calculation in the symmetric encryption algorithm to achieve lightweight security encryption, Guarantee the low-power and secure transmission of data between network nodes

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption and decryption method for extracting random numbers to disturb sign parameter characteristic values based on physical layer protocol data
  • Encryption and decryption method for extracting random numbers to disturb sign parameter characteristic values based on physical layer protocol data
  • Encryption and decryption method for extracting random numbers to disturb sign parameter characteristic values based on physical layer protocol data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] Embodiments of the present invention are described below through specific examples, and those skilled in the art can easily understand other advantages and effects of the present invention from the content disclosed in this specification. The present invention can also be implemented or applied through other different specific implementation modes, and various modifications or changes can be made to the details in this specification based on different viewpoints and applications without departing from the spirit of the present invention. It should be noted that the diagrams provided in the following embodiments are only schematically illustrating the basic concept of the present invention, and the following embodiments and the features in the embodiments can be combined with each other in the case of no conflict.

[0043] The embodiment of the present invention carries out simulation experiment on the computer of 8.0G internal memory, 64-bit operating system, lntel (R) C...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an encryption and decryption method for extracting random numbers to disturb sign parameter characteristic values based on physical layer protocol data, and belongs to the technical field of network security. The method comprises the following steps of: an encryption process: firstly, disturbing by using an initial key and a physical layer protocol data random number to generate the initial key; then, the physical sign parameter characteristic value PQ being used for generating a key stream after being disturbed by a physical layer protocol data random number; and finally, the plaintext stream being encrypted through a key in the key stream to generate an encrypted ciphertext stream. And a decryption process: after receiving the ciphertext flow, the receiving end generates a key parameter by using a physical layer protocol data random number obtained after leader sequence synchronization to disturb the transmitted sign parameter characteristic value to generatea key, and decrypts the ciphertext flow according to the obtained key to obtain a plaintext flow. According to the invention, light-weight security encryption is realized by using a relatively smallamount of computation in a symmetric encryption algorithm, and low-power-consumption security transmission of data between network nodes is ensured.

Description

technical field [0001] The invention belongs to the technical field of network security, and relates to an encryption and decryption method for disturbing the characteristic value of a sign parameter by extracting random numbers based on physical layer protocol data. Background technique [0002] Body Area Network (BAN) plays an important role in the study of changes in vital signs and life support in the fields of medical care, health, rescue, battlefield rescue, etc. It has attracted the attention of a large number of academic and industrial research applications. In the body area network, since the detection nodes mostly use miniature sensor devices to collect and monitor human body sign parameters, as a remote physical front-end wireless sign signal solution, its purpose is to realize long-term ultra-low real-time physical state monitoring, so the simplified hardware and ultra- The implementation of low power consumption has limited node resources, and signal acquisitio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/0435H04L63/16Y02D30/70
Inventor 刘挺赵鸿毅庞宇韩凯宁王骏超肖青刘勇马萃林杨利华赵汝法
Owner CHONGQING UNIV OF POSTS & TELECOMM
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More