Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A kind of imsi privacy protection method and device based on physical layer key

A privacy protection, physical layer technology, applied in baseband system components, electrical components, security devices, etc., can solve problems such as incompatibility, high computational complexity, overhead and delay, and achieve a fast key generation rate. Effect

Active Publication Date: 2021-05-28
XI AN JIAOTONG UNIV
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the principle of this scheme is based on the public key cryptography system, which has high computational complexity, and the overhead and delay brought to the system are also very large. Be applicable
And because the existing 4G mobile communication system does not have a public key infrastructure (PKI), the solution cannot be compatible with 4G and its previous mobile communication systems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A kind of imsi privacy protection method and device based on physical layer key
  • A kind of imsi privacy protection method and device based on physical layer key
  • A kind of imsi privacy protection method and device based on physical layer key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0071] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions of the present invention will be clearly and completely described below in conjunction with the accompanying drawings. Obviously, the described embodiments are part of the embodiments of the present invention, not all of them. the embodiment. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0072] combine figure 2 and image 3 As shown, the present invention is an IMSI privacy protection device based on a physical layer key, including a mobile terminal security module and a base station security module. Specifically, such as figure 2 As shown, the mobile terminal security module includes:

[0073] The mobile terminal channel feature extraction module is configured...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an IMSI privacy protection method and device based on a physical layer key. The random access process in a mobile communication system is used as an improvement object, and the physical layer key generation process is integrated in it to complete the two functions of the mobile terminal and the base station. Generate a paired physical layer key at the end, and use the physical layer key to realize the protection of IMSI private information. The physical layer key generated based on the channel characteristics of the present invention is only related to the wireless channel itself, and has nothing to do with the specific content of the signal transmitted on the channel. Since the channel characteristics are independent in space, the attacker cannot obtain the legal channel characteristics, and there is no cracking physical key. The possibility of layer keys solves the problem of secure transmission of IMSI private information at the signal level. The physical layer key generation process adopted by the present invention is interspersed in the random access process, only need to add key generation related software modules on the mobile terminal and the base station, without modifying the signaling process stipulated in the 3GPP standard protocol, which is different from the existing Compatible with mobile communication systems.

Description

technical field [0001] The invention belongs to the technical field of security protection of mobile communication systems, and in particular relates to an IMSI privacy protection method and device based on a physical layer key. Background technique [0002] As an epoch-making technology, mobile communication technology has changed people's way of life. With the continuous evolution of mobile communication systems and the continuous expansion of application fields, the services that mobile communication can provide are also continuously diversified. What comes is the requirements for its performance in various aspects, including bandwidth, delay, reliability, security and so on. [0003] In a mobile communication system, a series of behaviors of a mobile user (UE in the figure) accessing a core network for the first time are collectively referred to as an initial registration process. During the initial registration process, the basic signaling interaction process after the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L25/02H04W12/02H04W12/04H04W74/08H04W12/033H04W12/041
CPCH04W74/0833H04W12/02H04W12/04H04L25/0202
Inventor 王慧明鲁知朋冯月华魏璇
Owner XI AN JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products