Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Wireless communication encryption method based on angular momentums

An encryption method and wireless communication technology, which is applied in the field of wireless communication encryption based on angular momentum, can solve problems such as the difficulty of implementing encryption technology, and achieve the effects of improving security, ensuring security, and realizing security

Inactive Publication Date: 2017-06-27
NORTHWESTERN POLYTECHNICAL UNIV +1
View PDF7 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, with the heterogeneity and ubiquity of the network structure of the communication system and the rapid improvement of the processing capacity of the communication terminal, it is becoming more and more difficult to realize the encryption technology used in the upper layer.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Wireless communication encryption method based on angular momentums
  • Wireless communication encryption method based on angular momentums
  • Wireless communication encryption method based on angular momentums

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] Such as figure 1As shown, communication party A (assumed to be Alice) and communication party B (assumed to be Bob) are normal communication users, where Alice is the sender of information transmission, Bob is the receiver of information transmission, and is also the expected user, illegal third party T (eavesdropper) is assumed to be Trude. The expected user, eavesdropper and normal communication user may be any device capable of wireless transmission such as a mobile phone, a sensor, or a person or thing using the device.

[0044] Such as figure 2 As shown, the complete data transmission includes three stages: the password negotiation phase, the password serial number announcement phase (according to the setting method of the encryption packet sorting rules, this phase may or may not be present) and the encrypted data transmission phase. During the encryption negotiation process, Alice and Bob alternately send cipher packets (that is, data packets containing cipher...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a wireless communication encryption method based on angular momentums. According to wireless spin angular momentum and orbital angular momentum channel parameter characteristics, cross-layer password negotiation is realized by utilizing the difference due to the randomness and the independence of the spin angular momentum in different polarization or polarization states, the orbital angular momentum in different characteristic quantum numbers, signal strength indication and the bit error rate, so that an expected user and an eavesdropper receive not exactly same password packets in a password negotiation stage; therefore, the eavesdropper cannot obtain a password among normal communication users; and thus, the purpose of ensuring security data transmission is achieved.

Description

technical field [0001] The invention relates to a wireless communication encryption method based on angular momentum, in particular to a communication encryption technology mainly based on the characteristic difference of wireless orbital angular momentum channel parameters. Background technique [0002] The main difference between the wireless system and the wired system is that it uses electromagnetic waves to radiate and disseminate information in the air. Security threats in the traditional wired system, such as the destruction of network infrastructure, protocol and operating system defects, hacker attacks and virus intrusion, are also threatening. the security of wireless communication systems. In addition, the requirements of open channels and system bandwidth make wireless communication systems have some unique security threats compared with wired networks, and special improvements are needed in wireless interference, illegal eavesdropping, illegal access and spoofin...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/02H04W12/04H04L1/00H04L9/06H04L9/30
CPCH04L1/0061H04L9/0656H04L9/302H04W12/02H04W12/04
Inventor 韩刚禹忠
Owner NORTHWESTERN POLYTECHNICAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products