Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Blind Authentication Method and System for Frequency Selective Fading Channel Based on Confidence Transfer

A technology of frequency selectivity and authentication method, applied in baseband systems, transmission systems, digital transmission systems, etc., can solve problems such as interference, extraction, and destruction of authentication information, and achieve the effect of improving accuracy

Active Publication Date: 2020-07-21
SHENZHEN UNIV
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this superiority is based on the premise that the computing power of the hostile user is limited. Once the computing power of the hostile user increases, it is very likely to extract or even destroy the authentication information
[0008] It must be mentioned that the performance of the existing Auth-SS technology and Auth-SUP technology degrades severely in the frequency selective fading channel scenario
But the reality is that with the increasing number of wireless communication users, the communication environment will become more complex, and the possibility of being interfered will increase. With the increase in the number of urban communication users and the continuous development of cities, simple time Constant fading channel or simple time-varying fading channel scenarios are not enough to describe the current communication environment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Blind Authentication Method and System for Frequency Selective Fading Channel Based on Confidence Transfer
  • Blind Authentication Method and System for Frequency Selective Fading Channel Based on Confidence Transfer
  • Blind Authentication Method and System for Frequency Selective Fading Channel Based on Confidence Transfer

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] Hereinafter, preferred embodiments of the present invention will be described in detail with reference to the drawings. In the following description, the same reference numerals are given to the same components, and repeated descriptions are omitted. In addition, the drawings are only schematic diagrams, and the ratio of dimensions between components, the shape of components, and the like may be different from the actual ones.

[0033] It should be noted that the terms "first", "second", "third" and "fourth" in the description and claims of the present invention and the above drawings are used to distinguish different objects, rather than using to describe a specific order. Furthermore, the terms "include" and "have", as well as any variations thereof, are intended to cover a non-exclusive inclusion. For example, a process, method, system, product or device comprising a series of steps or units is not limited to the listed steps or units, but optionally also includes ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a blind authentication method for a frequency selective fading channel based on belief transfer. The method includes transmitting a carrier signal to the frequency selective fading channel having multiple paths, wherein the carrier signal comprises an authentication signal, a pilot signal and an information signal and the authentication signal is superimposed on the pilot signal; receiving the carrier signals, causing the carrier signal in each path to be sequentially subjected to blind known interference cancellation (BKIC) processing to obtain a target signal, causingthe target signal to be subjected to differential signal processing to obtain a target authentication signal, performing the BKIC processing by using a prior probability density function of the target signal and a Tanner graph, and eliminating the pilot signal through a belief transfer technology; obtaining a reference signal based on a key and the pilot signal, performing differential signal processing on the reference signal to obtain a reference authentication signal, calculating the correlation between the target authentication signal and the reference authentication signal, and obtaininga test statistic amount; and comparing the test statistic amount with a prescribed threshold to determine whether the carrier signal can pass the authentication.

Description

technical field [0001] The invention relates to the technical field of wireless communication, in particular to a blind authentication method and system of a frequency selective fading channel based on confidence transfer. Background technique [0002] There are mainly three types of physical layer authentication technologies at present. The first authentication technology is spread spectrum technology (Auth-SS). The basic idea is to use traditional direct sequence spread spectrum or frequency modulation technology. Since different pulses use different frequencies, this This technique needs to sacrifice certain bandwidth for authentication. In addition, a key limitation of Auth-SS technology is that only users with prior knowledge about spread spectrum technology are allowed to participate in the communication. Therefore, the scope of application of this technique is relatively narrow. [0003] The second type is based on time division multiplexing authentication technolog...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L25/02
CPCH04L25/0222H04L25/0226H04L25/0238
Inventor 谢宁张莉
Owner SHENZHEN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products