Physical layer key distribution method based on random beams and edge calculation

A technology of key distribution and edge computing, which is applied to key distribution, can solve the problems that key distribution cannot be carried out at the same time, the complexity of communication protocols is high, and the hidden danger of information leakage is increased, so as to avoid the hidden danger of information leakage, improve security, The effect of increasing the hidden danger of information leakage

Active Publication Date: 2020-10-16
ELECTRIC POWER RESEARCH INSTITUTE, CHINA SOUTHERN POWER GRID CO LTD +1
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since the two parties need to perform at least three interactions on the public channel during the process of establishing the key (including the sending and receiving parties sending pilots to each other, key negotiation, privacy amplification and final consistency confirmation, etc.), the complexity of the communication protocol Higher, the risk of information leakage increases
And because the normal communication process and key distribution cannot be carried out at the same time, resulting in communication interruption or increased delay

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Physical layer key distribution method based on random beams and edge calculation
  • Physical layer key distribution method based on random beams and edge calculation
  • Physical layer key distribution method based on random beams and edge calculation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] The technical solution of the present invention will be further described in detail below in conjunction with the accompanying drawings, but the protection scope of the present invention is not limited to the following description.

[0041] Such as figure 1 As shown, a physical layer key distribution method based on random beam and edge computing includes the following steps:

[0042] S1. Set the protection area:

[0043] Suppose the edge device Alice and the legitimate terminal Bob need to share the key, and Eve is the eavesdropper;

[0044] The edge device Alice and the legitimate terminal Bob respectively surround themselves with a protection area with a radius of R. The protection area is the area where the eavesdropper Eve is prohibited from entering, so that the eavesdropper Eve cannot enter the protection area to eavesdrop. , the fence is realized, and it can also be a forbidden area on manual duty; that is, the distance between Eve and Alice is guaranteed to b...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a physical layer key distribution method based on random beams and edge calculation. The method comprises the following steps of S1, setting a protection area, S2, conducting channel estimation: enabling Bob to send a channel estimation sequence to Alice, enabling Alice to estimate uplink channel information according to the received information, and transposing the uplinkchannel information to obtain downlink channel information, S3, generating random beams: enabling Alice to generate random beams according to the downlink channel information, S4, processing and sending a key symbol: enabling Alice to send a key symbol s(n) to Bob, S5, receiving signals: enabling Bob and Eve to receive signals sent by Alice, S6, conducting key estimation: enabling Bob to estimatethe key symbol under the condition of neglecting a white noise vector nA to obtain estimated key information, and S7, when n is equal to 1, 2,... L, repeatedly executing the steps S3 to S6 until the Bob obtains the key with L symbol lengths. The distribution of the physical layer key can be realized through two times of communication interaction, and the time delay and complexity caused by key sharing are reduced.

Description

technical field [0001] The present invention relates to key sharing, in particular to a physical layer key distribution method based on random beams and edge computing. Background technique [0002] With the rapid development of 5G Internet of Things and edge computing networks, various confidential and sensitive data in the network are increasing massively, and the ensuing information security issues are becoming more and more prominent, and security is gradually becoming an important aspect of edge computing. Preconditions for different business applications. Edge computing nodes, as small data centers and micro-cloud centers, are managed and controlled reasonably. In traditional wireless networks, cryptography-based encryption techniques are usually used at the network layer and upper layers to ensure system communication security. To carry out various encrypted authentications, a secure shared key needs to be established between the communication parties. However, in ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08
CPCH04L9/0819Y02D30/70
Inventor 许爱东蒋屹新唐杰文红张宇南
Owner ELECTRIC POWER RESEARCH INSTITUTE, CHINA SOUTHERN POWER GRID CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products