Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Physical layer security algorithm combining subcarrier grouping and exclusive-OR operation

A physical layer security, subcarrier technology, applied in security devices, shaping networks in transmitters/receivers, baseband systems, etc., can solve problems such as unfavorable security, algorithm parameter leakage, difficulty in guaranteeing, etc., to enhance information security. Ease of performance, computational processing, and the effect of increasing complexity

Pending Publication Date: 2020-02-28
STATE GRID HENAN ELECTRIC POWER ELECTRIC POWER SCI RES INST +1
View PDF2 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In actual communication transmission, due to the existence of noise interference, channel estimation errors will inevitably occur. For the security schemes that use channel characteristics, most schemes do not consider the performance of schemes in non-ideal channel estimation environments.
[0005] The analysis found that the existing security coding algorithm research has the following deficiencies: 1) The existing security algorithm needs to obtain the real-time channel state information of the eavesdropper during the algorithm coding and encryption process, and considers the optimal allocation of multi-carrier resources from the perspective of information theory. It is difficult to obtain the channel state information of the eavesdropper in actual communication transmission; 2) Most of the existing physical layer security transmission algorithms require that the channel condition of the legitimate receiver is better than that of the eavesdropping channel, but in actual wireless communication transmission, it is difficult to guarantee this requirement; 3) Most of the eavesdroppers are passive eavesdroppers, and the eavesdroppers who actively eavesdrop are not considered
However, since the algorithm parameters may be leaked, adjusting the parameters will also improve the performance of the eavesdropper, which is not conducive to security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Physical layer security algorithm combining subcarrier grouping and exclusive-OR operation
  • Physical layer security algorithm combining subcarrier grouping and exclusive-OR operation
  • Physical layer security algorithm combining subcarrier grouping and exclusive-OR operation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0026] A physical layer security algorithm combining subcarrier grouping and XOR operation, which is suitable for multi-carrier communication networks combined with OFDM systems. OFDM systems use K subcarriers for transmission, such as figure 1 Shown is a block diagram of the OFDM system embedded in the security encoding and decoding module provided by this embodiment. A physical layer security algorithm of joint subcarrier grouping and XOR operation provided by this embodiment includes the following steps:

[0027] S1. Channel estimation. Before information transmission, the legal receiver first sends the pilot sequence uplink, the sender estimates the uplink main channel, and then the sender sends the pilot sequence downlink, and the legal receiver estimates the downlink main channel, using channel reciprocity , assuming that the uplink main channel and the downlink main channel have the same information, and their frequency channel quality coefficient vectors are all H b , ...

Embodiment 2

[0045]Since the reception situation at the eavesdropping end cannot be fully known, it is difficult to accurately calculate the confidentiality capacity of the system. The security performance of the algorithm is obtained by analyzing the bit error rate of the legal receiver and the eavesdropper. In this embodiment, the channel modeling in the OFDM system is a multipath channel model, each path adopts a Rayleigh fading channel model independent of each other, the noise model is additive white Gaussian noise, and the modulation methods used are BPSK modulation and QPSK modulation. The number K of carriers is 64, and the length of the cyclic prefix is ​​16. It is assumed that time synchronization has been completed and ISI has been completely eliminated. Through the MATLAB simulation platform, simulate the OFDM symbols sent by the sender under different SNR conditions, conduct 1e5 independent experiments respectively, and count the bit error rate (BER, Bit Error Rate) of the leg...

Embodiment 3

[0049] This embodiment considers an FDD system, assuming that the simulated environment is that the legitimate receiver feeds back the subcarrier sorting result to the sender, and an eavesdropper can eavesdrop on the complete sorting result. Such as image 3 Shown is a comparison of the BER performance of the scheme with and without the XOR operation. Therefore, an eavesdropper can correctly perform the subcarrier ordering decoding process during demodulation. It can be seen that since the eavesdropper obtains the sorting sequence, the performance of the eavesdropper without XOR operation is almost the same as that of the legitimate receiver. However, the scheme of adding XOR operation only loses a small amount of BER performance to the legal receiver, and the BER performance will decrease obviously to the eavesdropper. This is because from the perspective of the main channel, we let the better subcarriers transmit the original bits, and the poorer subcarriers transmit the X...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of wireless communication physical layer security, particularly relates to a physical layer security algorithm combining subcarrier grouping and exclusive-OR operation, and is suitable for a multicarrier communication network combining OFDM technical characteristics. InanOFDM system, only the channel characteristics of two legal communication parties are utilized; the subcarriers isreorderedaccording to the channel quality difference among the subcarriers of the legal user; original bit data symbols are transmitted on the subcarriers with better channel quality; exclusive-OR processing is performed on the bit information symbols transmitted by the subcarriers with poor channel quality and the bit information symbols transmitted by the subcarriers with good channel quality, and then the processed symbols is transmitted; therefore, a legal user can correctly receive and recover the data information of each subcarrier according to the transmission protocol, an eavesdropper cannot correctly recover the data information of each subcarrier, the confidentiality requirement of a physical layer is met, the channel state information of the eavesdropper does not need to be obtained by the algorithm, and the channel quality of the legal user does not need to be superior to that of an eavesdropping channel.

Description

technical field [0001] The invention belongs to the technical field of wireless communication physical layer security, and in particular relates to a physical layer security algorithm combining subcarrier grouping and XOR operation, which is suitable for multi-carrier communication networks combined with OFDM technical characteristics. Background technique [0002] With the development of information technology, 5G has become the focus of attention in the field of mobile communications at home and abroad. OFDM technology has become one of the key physical layer technologies in LTE and LTE-Advanced systems due to its technical advantages such as high spectrum utilization rate and strong anti-multipath fading ability, and will be more widely used in 5G systems. Due to the broadcasting and openness of wireless channel transmission, the uncertainty of user distribution, and the complexity of network structure, the problem of data security transmission in 5G mobile communication ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/02H04L25/03
CPCH04W12/02H04L25/03006
Inventor 李鸣岩吕卓郭志民杨文李暖暖蔡军飞张铮张伟
Owner STATE GRID HENAN ELECTRIC POWER ELECTRIC POWER SCI RES INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products