A low-complexity and low-latency secure transmission method

A technology of secure transmission and low complexity, applied in the field of secure transmission with low complexity and low delay, and can solve problems such as path loss without considering spatial location distribution

Active Publication Date: 2020-12-08
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Most physical feature security research does not consider the spatial location distribution and large-scale path loss of each node in the wireless network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A low-complexity and low-latency secure transmission method
  • A low-complexity and low-latency secure transmission method
  • A low-complexity and low-latency secure transmission method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] The technical solution of the present invention will be further described in detail below in conjunction with the accompanying drawings, but the protection scope of the present invention is not limited to the following description.

[0055] The present invention relies on the statistical channel information of the main channel and the eavesdropping channel, utilizes the static parameter transmission scheme, and the edge computing device performs offline design and optimization of the transmission parameters. The scheme is simple in design and low in complexity, and can reduce communication delay. For example, the security transmission requirements under industrial communication control, especially the terminal real-time control security transmission scenario in the edge computing scenario, this method is easy to provide specific physical characteristic parameters because the edge side is close to the terminal; it provides equipment support for the realization of this meth...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a low-complexity and low-delay secure transmission method. In an edge computing system, in order to improve the confidentiality of data transmission, edge computing devices need to perform signal security encoding before signal transmission. The invention adopts Wyner security For the coding scheme, the edge computing device designs and optimizes the codeword parameters offline, and the designed coding parameters depend on the statistical channel information of legal communication links and illegal communication links. During the entire secure transmission process of edge computing, the codeword rate parameter remains unchanged. In an energy-constrained edge computing network, the edge computing device Alice provides services for the confidential service terminal Bob and the public service terminal PR at the same time, and the public signal and the secret signal cooperate with each other to maximize the power on the basis of satisfying the public service quality. Secure Throughput for Edge Computing Systems. The invention has simple design and low computational complexity, and is suitable for communication scenarios such as multimedia video data transmission.

Description

technical field [0001] The invention belongs to the technical field of communication, in particular to a low-complexity and low-delay secure transmission method. Background technique [0002] The security mechanism based on cryptography technology in the hundreds of billions of device connection scenarios leads to a sharp increase in the complexity of key distribution and management, which makes the requirements for high-speed transmission, low latency and high security difficult under the classic cryptography-based security system. ensure. At the same time, cheap wireless sensor nodes with ultra-high connection density are usually powered by batteries with limited storage capacity. Terminal battery life has become a bottleneck restricting the development of future communication services, and it is impossible to support high-security classical security mechanisms at the cost of complex calculations. . [0003] As a security protection supplementary strategy of the classica...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/00H04W12/12H04W24/02H04W24/06H04W72/04H04W72/08H04W12/122
CPCH04W24/02H04W24/06H04W72/0473H04W12/03H04W12/122H04W72/542Y02D30/70
Inventor 宋欢欢文红王朕
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products