Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Privacy Enhancement Method for Mobile Communication Sessions Based on Physical Layer Security

A technology for physical layer security and mobile communication, which is applied in the field of enhancing the privacy of mobile communication sessions. It can solve the problems of leakage of sensitive information such as user identity identification and easy leakage of user identity information in plaintext transmission, and achieve the effect of enhancing security.

Active Publication Date: 2016-12-28
THE PLA INFORMATION ENG UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

from figure 1 It can be concluded that during the process from the UE requesting access to the authentication negotiation, the terminal needs to submit sensitive information such as the identity IMSI to the network to complete the authentication process, which leads to the risk of leaking sensitive information such as the user identity in the system
Authentication and key agreement (AKA) in the process of UE accessing the network is the basis of LTE system security, but the sensitive information exposed before the key agreement is still not well resolved, so the clear text transmission of user identity information is easy to leak Therefore, it is urgent to study the corresponding encryption mechanism and formulate corresponding security measures.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Privacy Enhancement Method for Mobile Communication Sessions Based on Physical Layer Security
  • Privacy Enhancement Method for Mobile Communication Sessions Based on Physical Layer Security
  • Privacy Enhancement Method for Mobile Communication Sessions Based on Physical Layer Security

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0035] Embodiment one: if figure 2 As shown, a method for enhancing the privacy of a mobile communication session based on physical layer security comprises the following steps:

[0036] Step 100: the terminal sends an initial access request, and the base station allocates a dedicated key negotiation channel for the terminal;

[0037] Step 200: the base station and the terminal respectively extract the channel characteristics of the private key negotiation channel, and use the channel characteristics to generate a consensus key;

[0038] Step 300: the base station allocates a dedicated traffic channel for the terminal, and releases the aforementioned dedicated key negotiation channel;

[0039] Step 400: The terminal and the base station use the key generated in step B to encrypt the communication session on the dedicated traffic channel;

[0040] Step 500: The terminal and the base station regularly measure and extract the channel characteristics of the dedicated traffic ch...

Embodiment 2

[0053] Embodiment 2: On the basis of Embodiment 1, the above method for enhancing the privacy of mobile communication sessions based on physical layer security, wherein in step C, the base station bases the available channel resources in the network, the support capabilities of the terminal, and the required interaction information The rate request allocates an applicable dedicated service channel for the terminal to meet the large amount of subsequent interactive information; after receiving the dedicated service channel allocation instruction, the terminal releases the dedicated key negotiation channel and enables the dedicated service channel.

[0054] In step D, the terminal and the base station encrypt the information with a light-weight encryption method, and select an appropriate codec and rate matching for the encrypted information, and interact on the dedicated traffic channel enabled in step C.

[0055] Further, in step D, it is assumed that the plaintext signal to be...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method for enhancing the privacy of a mobile communication session based on physical layer security, comprising the following steps: a terminal sends an initial access request, a base station allocates a dedicated key negotiation channel for the terminal; the base station and the terminal respectively extract channel characteristics of the channel, And use the channel characteristics to generate a consistent key; the base station allocates a dedicated service channel for the terminal, and releases the dedicated key negotiation channel; the terminal and the base station use the generated key to encrypt the communication session on the dedicated service channel; regularly measure and extract The channel characteristics of the dedicated traffic channel, and use the channel characteristics to update the key. By adopting the above method, the present invention binds encryption and wireless channels at the signal level, establishes a physically isolated secure communication channel from the beginning of communication, and prevents the leakage of sensitive information such as user identification in existing mobile communication, thus effectively solving the problem of mobile communication. The problem of insecure transmission of sensitive information in the process.

Description

technical field [0001] The invention relates to a method for enhancing the privacy of mobile communication sessions based on physical layer security. Background technique [0002] In the general mobile communication system, the encryption mechanism is used to ensure the security of user communication. However, the premise of the encryption mechanism is that the network obtains the corresponding encryption key according to the received user identity information, which makes the process from terminal access to authentication negotiation Encryption protections cannot be enabled during this process. Taking the LTE system signaling process as an example, the basic signaling interaction process between UE, eNodeB and MME is as follows: figure 1 shown. from figure 1 It can be concluded that during the process from the UE requesting access to the authentication negotiation, the terminal needs to submit sensitive information such as the identity IMSI to the network to complete the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/02H04W12/04
Inventor 金梁黄开枝彭建华康小磊郭淑明赵华汤红波罗文宇钟州季新生俞定玖刘彩霞宋华伟郭素霞
Owner THE PLA INFORMATION ENG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products