Secure multi-user pilot authentication method based on hierarchical two-dimensional feature coding

A two-dimensional feature, multi-user technology, applied in the baseband system, multi-frequency code system, baseband system components, etc., can solve the problems of interference pilot sharing mechanism, affecting channel estimation, and difficult data recovery of legitimate transceivers.

Active Publication Date: 2018-11-23
XI AN JIAOTONG UNIV
View PDF9 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, these pilot signals can be known by the attacker. After the attacker learns the frame synchronization information and pilot information of the legitimate transceiver, he can further launch a pilot awareness attack. During this period, the attacker synchronizes with a legitimate user Sending a specific pilo...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure multi-user pilot authentication method based on hierarchical two-dimensional feature coding
  • Secure multi-user pilot authentication method based on hierarchical two-dimensional feature coding
  • Secure multi-user pilot authentication method based on hierarchical two-dimensional feature coding

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0067] The present invention is further described below in conjunction with accompanying drawing:

[0068] figure 1 Given the system model diagram, considering K uplink transmitters, a receiver and a pilot-aware attacker, a total of K+1 uplink communication links are generated, which are uplink transmitter→receiver, and pilot-aware attacker → Receiver. The receiver has N T The root antenna, the uplink transmitter and the pilot-aware attacker are all single-antenna. In the frequency domain, each antenna of each uplink occupies N subcarriers in each OFDM symbol. In the time domain, each communication link samples L paths, and the channel model is: Represents the channel impulse response between the mth uplink transmitter and the ith receiving antenna of the receiver, Represents the power delay spectrum of the lth path; represents the channel impulse response between the pilot-aware attacker and the i-th receiving antenna of the receiver, and is independent of Represe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A secure multi-user pilot authentication method based on hierarchical two-dimensional feature coding is provided. Original pilot signals specified by each legitimate user (LU) are now randomized and coded into subcarrier activation modes (SAPs). Although these coded SAPs are covered by malicious signals and overlap and interfere with each other in a wireless environment, the coded SAPs can still be separated, identified and reliably decoded into codewords and ultimately converted into corresponding pilot signals, thereby ensuring SMPA. A five-layer hierarchical decoding (HD) model for SMPA isconstructed to demonstrate the principles of feature coding and decoding. A reliability constrained contraction (RBC) theory is proposed to narrow the constraint interval, which is completed by a codebook partitioning technology for H2DF. By optimizing the number of sub-codebooks, the upper and lower IEP boundaries shrink and coincide. Supported by the H2DF coding theory, the method can show goodstability in terms of SMPA.

Description

technical field [0001] The invention relates to the field of wireless communication, in particular to a secure multi-user pilot authentication method based on layered two-dimensional feature coding. Background technique [0002] With the development of wireless communication technology, the security risks brought by the broadcast characteristics of wireless channels are increasing day by day, and harmful signal sources can interfere with the communication links of other normal nodes more efficiently. Although the upper-layer password encryption and decryption system can guarantee the security of the wireless communication environment to a certain extent, with the development of computer technology, the upper-layer encryption system faces the risk of being deciphered, and harmful signal sources can further obtain legitimate user information. In response to this phenomenon, the physical layer security mechanism has attracted extensive attention and research. At present, in vi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L27/26H04L25/02H04B17/391
CPCH04B17/391H04L25/0224H04L27/2602H04L63/08H04L63/1441
Inventor 任品毅徐东阳
Owner XI AN JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products