Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for channel estimation and identification against pilot spoofing attack based on independent component analysis in OFDM (Orthogonal Frequency Division Multiplexing) system

An independent component analysis and channel estimation technology, which is applied in the field of anti-pilot spoofing attack channel estimation and identification based on independent component analysis, can solve the problem that it is difficult for legal transceivers to obtain accurate channel state information of legal links

Active Publication Date: 2016-11-23
XI AN JIAOTONG UNIV
View PDF4 Cites 23 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Moreover, once the pilot spoofing attack is successfully implemented, it is difficult for the legitimate transceiver to obtain accurate channel state information of the legal link

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for channel estimation and identification against pilot spoofing attack based on independent component analysis in OFDM (Orthogonal Frequency Division Multiplexing) system
  • Method for channel estimation and identification against pilot spoofing attack based on independent component analysis in OFDM (Orthogonal Frequency Division Multiplexing) system
  • Method for channel estimation and identification against pilot spoofing attack based on independent component analysis in OFDM (Orthogonal Frequency Division Multiplexing) system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] The present invention will be further described in detail below in conjunction with specific embodiments, which are explanations of the present invention rather than limitations.

[0041] In the method of the present invention, when the system model is set up, a pair of legal transceivers and an active eavesdropper are considered, and two uplink communication links are respectively 1. uplink transmitterreceiver, defined as legal channel 2. Active eavesdropper → receiver is defined as the attack channel. The receiver has N T The root antenna, the uplink transmitter and the active eavesdropper are all single antennas, such as figure 1 As shown, each antenna of each uplink simultaneously occupies N subcarriers in each OFDM symbol. The channel coefficients on each subcarrier obey the independent and identical distribution with a mean value of 0 and a variance of 1, and the noise on each subcarrier obeys an independent and identically distributed Gaussian white noise with...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for channel estimation and identification against a pilot spoofing attack based on independent component analysis in an OFDM (Orthogonal Frequency Division Multiplexing) system. The method utilizes the characteristics of the random pilot to weaken the pilot spoofing attack to a pilot interference attack, and meanwhile, a legal channel between an uplink legal transmitter and a receiver under the pilot interference environment is estimated and identified according to the independent features of the channel. The method only need to spend time resources of three OFDM symbols and a certain number of frequency band resources and is immune to the pilot interference power of an active eavesdropper. The uplink legal transmitter disrupts the intentional pilot attack of the active eavesdropper through transmitting the uplink random pilot, and meanwhile, the receiver extracts legal channel information from a received contaminated signal through utilizing the mutual independence between the legal channel and an attack channel, so that the channel estimation accuracy of the legal channel is improved, and thus a problem of low channel estimation accuracy caused by the pilot spoofing attack is solved.

Description

technical field [0001] The invention belongs to the field of wireless communication, and relates to a channel estimation and identification mechanism against pilot spoofing attacks in an OFDM system, in particular to an anti-pilot spoofing attack channel estimation and identification method based on independent component analysis in an OFDM system. Background technique [0002] With the rapid development of wireless communication technology, security risks are gradually threatening and restricting the application and development of wireless communication technology. The broadcast characteristics of wireless channels can make harmful signal sources eavesdrop on the confidential and private information of other nodes or harm and interfere with the communication links of other normal nodes. At present, the upper-layer password encryption and decryption system can guarantee the security of the wireless communication environment to a certain extent, but with the development of co...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L25/02H04L27/26
CPCH04L25/024H04L27/2601
Inventor 任品毅徐东阳王熠晨杜清河孙黎
Owner XI AN JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products