Low-complexity and low-time-delay secure transmission method

A secure transmission, low-complexity technology, applied in the field of low-complexity and low-latency secure transmission, can solve problems such as path loss without considering spatial location distribution

Active Publication Date: 2020-06-05
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Most physical feature security research does not consider the spatial ...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Low-complexity and low-time-delay secure transmission method
  • Low-complexity and low-time-delay secure transmission method
  • Low-complexity and low-time-delay secure transmission method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] The technical solution of the present invention will be further described in detail below in conjunction with the accompanying drawings, but the protection scope of the present invention is not limited to the following description.

[0055] The present invention relies on the statistical channel information of the main channel and the eavesdropping channel, utilizes the static parameter transmission scheme, and the edge computing device performs offline design and optimization of the transmission parameters. The scheme is simple in design and low in complexity, and can reduce communication delay. For example, the security transmission requirements under industrial communication control, especially the terminal real-time control security transmission scenario in the edge computing scenario, this method is easy to provide specific physical characteristic parameters because the edge side is close to the terminal; it provides equipment support for the realization of this meth...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a low-complexity and low-time-delay secure transmission method. In an edge computing system, edge computing equipment needs to carry out signal security coding before signal transmission to improve confidentiality of data transmission, a Wyner security coding scheme is adopted, the edge computing equipment carries out offline design optimization on a codeword parameter, andthe designed coding parameters depend on statistical channel information of legal communication links and illegal communication links. In the whole edge computing secure transmission process, the codeword rate parameter is kept unchanged. In an energy-limited edge computing network, edge computing equipment Alice provides services for a secret service terminal Bob and a public service terminal PRat the same time, power cooperation is carried out between a public signal and a secret signal, and the security throughput of the edge computing system is maximized on the basis that the public service quality is met. The method is simple in design, low in calculation complexity and suitable for communication scenes such as multimedia video data transmission.

Description

technical field [0001] The invention belongs to the technical field of communication, in particular to a low-complexity and low-delay secure transmission method. Background technique [0002] The security mechanism based on cryptography technology in the hundreds of billions of device connection scenarios leads to a sharp increase in the complexity of key distribution and management, which makes the requirements for high-speed transmission, low latency and high security difficult under the classic cryptography-based security system. ensure. At the same time, cheap wireless sensor nodes with ultra-high connection density are usually powered by batteries with limited storage capacity. Terminal battery life has become a bottleneck restricting the development of future communication services, and it is impossible to support high-security classical security mechanisms at the cost of complex calculations. . [0003] As a security protection supplementary strategy of the classica...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/00H04W12/12H04W24/02H04W24/06H04W72/04H04W72/08H04W12/122
CPCH04W24/02H04W24/06H04W72/0473H04W12/03H04W12/122H04W72/542Y02D30/70
Inventor 宋欢欢文红王朕
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products