Communication method for realizing physical layer key distribution based on random self-interference

A technology of key distribution and communication method, which is applied in the field of communication based on random self-interference to realize physical layer key distribution, which can solve the problems of increased hidden dangers of information leakage, communication interruption delay, and high complexity of communication protocols, so as to increase the difficulty of eavesdropping , Reduce the effect of receiving signal-to-noise ratio

Active Publication Date: 2021-06-29
UNIV OF ELECTRONICS SCI & TECH OF CHINA +1
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since the two parties need to perform at least three interactions on the public channel during the process of establishing the key (including the sending and receiving parties sending pilots to each other, key negotiation, privacy amplification and final consistency confirmation, etc.), the complexity of the communication protocol Higher, the risk of information leakage increases
And because the normal communication process and key distribution cannot be carried out at the same time, resulting in communication interruption or increased delay

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Communication method for realizing physical layer key distribution based on random self-interference
  • Communication method for realizing physical layer key distribution based on random self-interference
  • Communication method for realizing physical layer key distribution based on random self-interference

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] In order to have a clearer understanding of the technical features, purposes and effects of the present invention, the specific implementation manners of the present invention will now be described with reference to the accompanying drawings.

[0025] Such as Figure 1-4 As shown, a communication method for realizing physical layer key distribution based on random self-interference includes the following steps:

[0026] S1: Alice randomly generates a binary key bitstream b k =((b k,1 , b k,2 ,...)), Alice will b k in every M S bits are mapped to the key symbol stream K=(k 1 , k 2 ,...), where k∈K and its parameters satisfy the following relationship. Bob chooses the required number of receiving antennas N B , making

[0027]

[0028] but

[0029] K={0,1,2,...,N k -1},

[0030] S2: According to Alice's one-to-one mapping relationship between the key symbol and Bob's receiving antenna, the relationship is public.

[0031] N B =2, N=1, then K=2, all possib...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a communication method for realizing physical layer key distribution based on random self-interference. The communication method specifically comprises the following steps that: Alice randomly generates key bits, the key bits are mapped into key symbols, and each key symbol corresponds to a vector for activating different receiving antennas of Bob; Alice selects an activation vector corresponding to a current key symbol, and sends m different data modulation symbols to Bob in a corresponding self-interference mode; Bob measures an average signal-to-noise ratio of each antenna to estimate an antenna vector, and obtains a secret key symbol and a secret key ratio through inverse mapping; and the Bob sequentially demodulates at each activated antenna to obtain a data symbol. According to the communication method, physical layer key distribution can be realized in the process of transmitting one path of data stream, so that key sharing cannot cause communication interruption and time delay, meanwhile, the receiving signal-to-noise ratio of an eavesdropper can be reduced, and the eavesdropping difficulty of the eavesdropper is increased.

Description

technical field [0001] The invention belongs to the field of encrypted communication, in particular to a communication method for realizing physical layer key distribution based on random self-interference. Background technique [0002] With the rapid development of 5G IoT and edge computing networks, a large number of new services and applications are emerging. Various confidential and sensitive data in the wireless network are increasing massively, and the subsequent information security issues are becoming more and more prominent, and security is gradually becoming a prerequisite for various business applications. In traditional wireless communication networks, cryptography-based encryption techniques are usually used at the network layer and upper layers to ensure system communication security. To carry out various encrypted authentications, a secure shared key needs to be established between the communication parties. In a large number of new application scenarios of ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/08
CPCH04L63/062H04L9/0819Y02D30/70
Inventor 唐杰许爱东蒋屹新文红王瀚磊张宇南
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products