Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A physical layer key agreement negotiation method and system based on channel estimation

A channel estimation and consistency technology, applied in baseband systems, channel estimation, baseband system components, etc., can solve problems such as information leakage, inability to bit error detection and correction, and inability to generate symmetric keys, achieving good fault tolerance, The effect of high security and strong implementability

Active Publication Date: 2022-07-26
JINAN UNIVERSITY
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] In the existing negotiation methods, such as BCH error-correcting code or Hamming code, the two parties need to exchange key stream information during information negotiation, which has security problems and easily causes information leakage
In addition, these negotiation methods have a certain error tolerance for key streams of different lengths. If the error tolerance is exceeded, the error detection and error correction of the erroneous bits will not be possible, so that the symmetric key cannot be generated.
To sum up, the existing information negotiation methods have been greatly challenged in terms of security and reliability, and it is necessary to establish a safe and reliable key consensus negotiation method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A physical layer key agreement negotiation method and system based on channel estimation
  • A physical layer key agreement negotiation method and system based on channel estimation
  • A physical layer key agreement negotiation method and system based on channel estimation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0062] like figure 1 As shown, this embodiment provides a physical layer key consistency negotiation method based on channel estimation, the method is used in an Internet of Things communication system, and specifically includes the following steps:

[0063] S1: Channel estimation processing: The channel estimation processing in this embodiment requires both parties in legitimate communication to exchange pilot sequences to complete the channel estimation process;

[0064] In the communication system, legitimate communication users Alice and user Bob have one transmitting antenna and multiple receiving antennas. The data communication adopts the half-duplex communication transmission mode. User Alice sends a pilot symbol to Bob, and Bob receives it after time t1. Bob experiences a transceiving transition time Δt, and then sends a pilot symbol to Alice, and then Alice receives it, and time t2 elapses. At this point, a detection cycle is completed, and t1+△t+t2 is required to...

example 1-1

[0094] Example 1-1 (using quantized bitstream):

[0095] (1) Alice obtains the key bit stream 1 through the quantization stage: '001010001011100011', at this time, Alice performs the hash calculation according to the hash function defined above with the window number 3 as the limit, and stores the calculation result in the array a and Send to Bob, the total length of the bit stream sum=18;

[0096] (2) Suppose Bob obtains the key bit stream through the quantization stage as: '001001000011100011', the calculation method will not be repeated, and the obtained array b is 1, 2, 4, 1, 2, 4, 0, 0, 1, 3, 7, 6, 4, 0, 1, 3;

[0097] (3) At this time, Bob gets the array a and starts a one-to-one comparison, and finds that the first digit of the subscript is the same, then the bit stream header does not need to be adjusted, and continues to compare and finds that the subscript c=3 digit is different, then the Directly perform 0 / 1 correction on the c+2th bit. At this time, the bit strea...

Embodiment 2

[0116]This embodiment provides a physical layer key consistency negotiation system based on channel estimation, including: a channel estimation value acquisition module, a channel coefficient matrix acquisition module, a uniform quantizer, a splicing module, and a consistency negotiation module;

[0117] Users Alice and Bob on both sides of the communication exchange pilot sequences and perform multiple rounds of two-way channel detection, and the channel estimation value obtaining module is used to obtain the channel estimation value;

[0118] Users Alice and Bob both have multiple receiving antennas to form multiple-input multiple-output channels, and the channel coefficient matrix acquisition module is used to obtain the channel coefficient matrix based on the channel estimation value and using the minimum mean square error method;

[0119] In this embodiment, the uniform quantizer is used to uniformly quantize the channel estimation value, and the real part, imaginary part ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a physical layer key consistency negotiation method and system based on channel estimation. The method includes the following steps: users Alice and Bob exchange pilot frequency sequences and perform multiple rounds of bidirectional channel detection to obtain channel estimation values; The channel coefficient matrix is ​​obtained based on the channel estimation value and using the minimum mean square error method; the real part, imaginary part and amplitude of each channel estimation value are uniformly quantized respectively, and finally the quantization results of all channel estimation values ​​are spliced. User Alice and User Bob obtains his own bit stream, and user Bob performs k-grams consistency negotiation on the second bit stream obtained by quantization according to the negotiation information sent by user Alice, and performs error detection and error correction on the erroneous bits; the obtained results are completely consistent The bit stream is used as the symmetric key of users Alice and Bob, the invention solves the problem of low key generation rate, has strong practicability and high key generation rate.

Description

technical field [0001] The present invention relates to the technical field of wireless communication information encryption, in particular to a method and a system for negotiating a physical layer key consistency based on channel estimation. Background technique [0002] With the rapid development of the Internet of Things, the scale of user communication is also increasing. Due to the broadcast propagation characteristics of wireless media, wireless transmission is facing the key threat of leaking information to potential eavesdroppers. The security of the physical layer has received extensive attention by utilizing the inherent wireless channel propagation characteristics to enhance the confidentiality of data. Whether the large-scale channel can carry out secure data communication depends on whether the legitimate communication parties in the physical layer can quickly and accurately generate a consistent symmetric key. [0003] Existing technologies and solutions relat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04W12/041H04W12/0431H04L25/02
CPCH04L9/0875H04L9/0838H04L25/0204H04L25/0228H04W12/0431H04W12/041
Inventor 李琦蔡东洪刘志全耿光刚
Owner JINAN UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products