CN108156102A - The blind authentication method and system of frequency selective fading channels based on smoothing technique - Google Patents
The blind authentication method and system of frequency selective fading channels based on smoothing technique Download PDFInfo
- Publication number
- CN108156102A CN108156102A CN201711336107.3A CN201711336107A CN108156102A CN 108156102 A CN108156102 A CN 108156102A CN 201711336107 A CN201711336107 A CN 201711336107A CN 108156102 A CN108156102 A CN 108156102A
- Authority
- CN
- China
- Prior art keywords
- signal
- authentication
- blind
- pilot
- carrier
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L25/00—Baseband systems
- H04L25/02—Details ; arrangements for supplying electrical power along data transmission lines
- H04L25/03—Shaping networks in transmitter or receiver, e.g. adaptive shaping networks
- H04L25/03006—Arrangements for removing intersymbol interference
- H04L25/03821—Inter-carrier interference cancellation [ICI]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L25/00—Baseband systems
- H04L25/02—Details ; arrangements for supplying electrical power along data transmission lines
- H04L25/0202—Channel estimation
- H04L25/0224—Channel estimation using sounding signals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Power Engineering (AREA)
- Computer Security & Cryptography (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
本发明公开一种基于平滑技术的频率选择性衰落信道的盲认证方法,其包括向具有多个路径的频率选择性衰落信道发射载体信号,载体信号包括认证信号、导频信号和信息信号,认证信号叠加到导频信号;接收载体信号,顺序地对每个路径中的载体信号进行盲已知干扰消除(BKIC)处理得到目标信号,对目标信号进行差分信号处理以获得目标认证信号,BKIC处理利用相邻的码元,通过平滑技术消除导频信号;基于密钥和导频信号获得参考信号,对参考信号进行差分信号处理以获得参考认证信号,并计算目标认证信号和参考认证信号的相关性,得到检验统计量;并且将检验统计量与规定阈值进行比较,从而确定载体信号是否能够通过认证。
The invention discloses a blind authentication method of a frequency selective fading channel based on smoothing technology, which includes transmitting a carrier signal to a frequency selective fading channel with multiple paths, the carrier signal includes an authentication signal, a pilot signal and an information signal, and the authentication The signal is superimposed on the pilot signal; the carrier signal is received, and the carrier signal in each path is sequentially processed by Blind Known Interference Cancellation (BKIC) to obtain the target signal, and the target signal is differentially processed to obtain the target authentication signal, BKIC processing Using adjacent symbols, eliminate the pilot signal through smoothing technology; obtain the reference signal based on the key and pilot signal, perform differential signal processing on the reference signal to obtain the reference authentication signal, and calculate the correlation between the target authentication signal and the reference authentication signal The test statistic is obtained; and the test statistic is compared with a prescribed threshold, so as to determine whether the carrier signal can pass the authentication.
Description
技术领域technical field
本发明涉及无线通信技术领域,具体涉及一种基于平滑技术的频率选择性衰落信道的盲认证方法和系统。The invention relates to the technical field of wireless communication, in particular to a blind authentication method and system of a frequency selective fading channel based on smoothing technology.
背景技术Background technique
当前物理层认证技术主要有三种,第一种认证技术是扩频技术(Auth-SS),基本思想是采用传统的直接序列扩频或者调频技术,由于不同的脉冲采用了不同的频率,因此这种技术实现认证需要牺牲一定的带宽。此外,Auth-SS技术的一个关键的限制是只允许了解扩频技术相关先验知识的用户参与通信。因此这种技术的适用范围比较窄。There are mainly three types of physical layer authentication technologies at present. The first authentication technology is spread spectrum technology (Auth-SS). The basic idea is to use traditional direct sequence spread spectrum or frequency modulation technology. Since different pulses use different frequencies, this This technique needs to sacrifice certain bandwidth for authentication. In addition, a key limitation of Auth-SS technology is that only users with prior knowledge about spread spectrum technology are allowed to participate in the communication. Therefore, the scope of application of this technique is relatively narrow.
第二种是基于时分复用认证技术(Auth-TDM),基本思想是,发射端周期性的交替发送信息信号和认证信号。接收端接收到信号后直接提取期望的认证信息实现信号的认证目的。Auth-TDM是无线通信发展早期提出的认证技术,它的优点是操作简单,发射信号之前不需要对认证信号和信息进行预处理(出于安全考虑可能会进行加密)。认证信号是独立于信息信号发送的,因此需要占用一定的带宽,随着无线信息数量的不断增加,及用户对信息隐私性的进一步提高和敌对方攻击技术的不断增强,这种认证技术的安全性受到极大的挑战,已经无法满足用户的需求。The second type is based on time division multiplexing authentication technology (Auth-TDM), and the basic idea is that the transmitter periodically and alternately sends information signals and authentication signals. After receiving the signal, the receiving end directly extracts the expected authentication information to realize the authentication purpose of the signal. Auth-TDM is an authentication technology proposed in the early stage of wireless communication development. Its advantage is that it is easy to operate and does not need to preprocess authentication signals and information before transmitting signals (encryption may be performed for security reasons). The authentication signal is sent independently of the information signal, so it needs to occupy a certain bandwidth. With the continuous increase of the number of wireless information, the further improvement of the user's information privacy and the continuous enhancement of the enemy's attack technology, the security of this authentication technology Sex has been greatly challenged and has been unable to meet the needs of users.
第三种认证技术是认证叠加技术(Auth-SUP),基本思想是将认证信号叠加在信息信号上(叠加的方式可以任意,由密钥决定),再由发射端同时发射出去,接收端接收到信号之后利用密钥对叠加信号中的认证信号进行提取,达到信号认证的目的。The third authentication technology is the authentication superposition technology (Auth-SUP). The basic idea is to superimpose the authentication signal on the information signal (the method of superposition can be arbitrary, determined by the key), and then the transmitting end transmits it at the same time, and the receiving end receives it. After receiving the signal, use the key to extract the authentication signal in the superimposed signal to achieve the purpose of signal authentication.
比起早期的Auth-TDM技术,Auth-SUP认证技术在信号发射前需要对认证信号和信息信号进行处理,对发射端的信号处理能力提出了一定的要求,实现起来比Auth-TDM技术要复杂一些,认证信号和信息信号是同时发送的,因此不会占用额外的带宽。此时,由于将认证信号叠加在信息信号中,接收端接收到信号后需要对信息进行提取,信号处理难度要比Auth-TDM技术高,但认证信息的隐蔽性较Auth-TDM高。此外,由于认证信号对于信息信号的提取来说相当于扮演了噪声的作用,使得接收端的SNR相应降低,对信息信号的提取带来不利影响。Compared with the early Auth-TDM technology, the Auth-SUP authentication technology needs to process the authentication signal and the information signal before the signal is transmitted, which puts forward certain requirements on the signal processing capability of the transmitter, and is more complicated to implement than the Auth-TDM technology , the authentication signal and the information signal are sent at the same time, so no additional bandwidth will be occupied. At this time, because the authentication signal is superimposed on the information signal, the receiving end needs to extract the information after receiving the signal. The difficulty of signal processing is higher than that of Auth-TDM technology, but the concealment of authentication information is higher than that of Auth-TDM. In addition, since the authentication signal is equivalent to playing the role of noise for the extraction of the information signal, the SNR of the receiving end is correspondingly reduced, which has an adverse effect on the extraction of the information signal.
现有的Auth-TDM和Auth-SUP认证技术除了发射信息信号和认证信号,还发射了另一个导频信号。这是由于,这两种认证技术都需要接收端接收到信号之后对信道参数进行估计并进行码元恢复,之后才能对认证信号进行提取,此时对接收端的信号处理能力也提出了一定的要求,在一些特定的场合,这些信号处理技术可能并不可行,且在对信道参数估计和码元恢复过程中容易引起估算误差,将对最终认证信号的提取带来不利影响。The existing Auth-TDM and Auth-SUP authentication technologies transmit another pilot signal in addition to information signals and authentication signals. This is because both authentication techniques require the receiving end to estimate the channel parameters and recover the symbols after receiving the signal, and then extract the authentication signal. At this time, certain requirements are placed on the signal processing capability of the receiving end. , in some specific occasions, these signal processing techniques may not be feasible, and it is easy to cause estimation errors in the process of channel parameter estimation and symbol recovery, which will have a negative impact on the extraction of the final authentication signal.
此外,Auth-TDM、Auth-SS和Auth-SUP均把包含认证信息这一事实暴露出来了,其中Auth-SS和Auth-TDM技术相较于不包含认证信息的常规信号,极易引起场景中其他用户尤其是敌对用户的注意,敌对用户对信号进行分析,假冒或者篡改,合法接收端将无法对期望信号进行认证。相对而言,Auth-SUP认证技术的隐蔽性要明显高于Auth-SS和Auth-TDM。然而,这种优越性是基于敌对用户的计算能力具有一定限制的前提下的,一旦敌对用户计算能力提高,也很有可能提取甚至破坏认证信息。In addition, Auth-TDM, Auth-SS, and Auth-SUP all expose the fact that authentication information is included. Compared with conventional signals that do not include authentication information, Auth-SS and Auth-TDM technologies are more likely to cause The attention of other users, especially the hostile users, the hostile users analyze the signal, counterfeit or tamper, and the legitimate receiving end will not be able to authenticate the expected signal. Relatively speaking, the concealment of Auth-SUP authentication technology is obviously higher than Auth-SS and Auth-TDM. However, this superiority is based on the premise that the computing power of the hostile user is limited. Once the computing power of the hostile user increases, it is very likely to extract or even destroy the authentication information.
不得不提的是,现有的Auth-SS技术和Auth-SUP技术频率选择性衰落信道场景下性能衰退得很厉害。而现实是,随着无线通信用户数量的不断增加,通信环境也会愈加复杂,被干扰的可能性越来越大,而随着市区通信用户数的增加及城市的不断发展,单纯的时不变衰落信道或简单的时变衰落信道已经不足以刻画当前的通信环境。尤其因为城市建筑物的阻挡,使得多径衰落成为常态,因此不得不考虑基于频率选择性衰落信道下的无线通信物理层认证技术,来提高无线通信的安全性,满足用户的通信安全性要求。It has to be mentioned that the performance of the existing Auth-SS technology and Auth-SUP technology degrades severely in frequency selective fading channel scenarios. But the reality is that with the increasing number of wireless communication users, the communication environment will become more complex, and the possibility of being interfered will increase. With the increase in the number of urban communication users and the continuous development of cities, simple time Constant fading channels or simply time-varying fading channels are not enough to characterize the current communication environment. Especially because of the blocking of urban buildings, multipath fading has become the norm. Therefore, the physical layer authentication technology of wireless communication based on frequency selective fading channel has to be considered to improve the security of wireless communication and meet the communication security requirements of users.
发明内容Contents of the invention
本发明是有鉴于上述的状况而提出的,其目的在于提供一种不需要占用额外的信号带宽、且认证信号不成为影响载体信号中信息信号提取的噪声,不影响接收端噪声的统计特性的基于平滑技术的频率选择性衰落信道的盲认证方法和系统。The present invention is proposed in view of the above situation, and its purpose is to provide an authentication signal that does not need to occupy additional signal bandwidth, and the authentication signal does not become noise that affects the extraction of information signals in the carrier signal, and does not affect the statistical characteristics of the noise at the receiving end. Blind authentication method and system for frequency selective fading channel based on smoothing technique.
为此,本发明的第一方面提供了一种基于平滑技术的频率选择性衰落信道的盲认证方法,是具有发射端和接收端的无线通信系统的无线通信的物理层认证方法,其特征在于,包括:所述发射端向无线信道发射载体信号,所述载体信号包括认证信号、导频信号和信息信号,所述认证信号叠加到所述导频信号,所述无线信道是具有多个路径的频率选择性衰落信道;所述接收端接收所述载体信号,顺序地对所述频率选择性衰落信道的每个路径中的所述载体信号进行盲已知干扰消除(Blind Known Interference Cancellation,简称BKIC)处理得到目标信号,对所述目标信号进行差分信号处理以获得目标认证信号,在所述BKIC处理中,利用相邻的码元,通过平滑技术消除所述导频信号;在所述接收端中,基于密钥和所述导频信号获得参考认证信号,并计算所述目标认证信号和所述参考认证信号的相关性,得到检验统计量;并且判断所述检验统计量是否不小于规定阈值,从而确定所述载体信号是否能够通过认证。For this reason, the first aspect of the present invention provides a kind of blind authentication method of frequency selective fading channel based on smoothing technology, is the physical layer authentication method of the wireless communication system of wireless communication system with transmitter and receiver, it is characterized in that, It includes: the transmitting end transmits a carrier signal to a wireless channel, the carrier signal includes an authentication signal, a pilot signal and an information signal, the authentication signal is superimposed on the pilot signal, and the wireless channel has multiple paths A frequency selective fading channel; the receiving end receives the carrier signal, and sequentially performs blind known interference cancellation (Blind Known Interference Cancellation, BKIC for short) on the carrier signal in each path of the frequency selective fading channel ) processing to obtain a target signal, and performing differential signal processing on the target signal to obtain a target authentication signal, in the BKIC process, using adjacent symbols to eliminate the pilot signal through a smoothing technique; at the receiving end In, obtaining a reference authentication signal based on the key and the pilot signal, and calculating the correlation between the target authentication signal and the reference authentication signal to obtain a test statistic; and judging whether the test statistic is not less than a prescribed threshold , so as to determine whether the bearer signal can pass the authentication.
在本发明中,所述认证信号叠加到所述导频信号。由此,可以不影响接收端的信干噪比。所述BKIC处理利用相邻的码元,通过平滑技术消除所述导频信号。在这种情况下,能够在避免估计信道情况下,消除导频信号。In the present invention, the authentication signal is superimposed on the pilot signal. Therefore, the SINR at the receiving end may not be affected. The BKIC process utilizes adjacent symbols to remove the pilot signal through smoothing techniques. In this case, the pilot signal can be eliminated without estimating the channel.
在本发明第一方面所涉及的盲认证方法中,所述载体信号以数据块的形式分块发射。由此,便于对数据进行操作。In the blind authentication method according to the first aspect of the present invention, the carrier signal is transmitted in blocks in the form of data blocks. Thus, it is convenient to operate on the data.
在本发明第一方面所涉及的盲认证方法中,在每块所述载体信号中,所述导频信号的信号长度与所述信息信号的信号长度和等于所述载体信号的信号长度。In the blind authentication method according to the first aspect of the present invention, in each block of the carrier signal, the sum of the signal length of the pilot signal and the signal length of the information signal is equal to the signal length of the carrier signal.
另外,在本发明第一方面所涉及的盲认证方法中,利用哈希矩阵,基于所述密钥和所述导频信号获得所述参考信号。由此,参考信号经过处理得到参考认证信号,可以根据参考认证信号与目标认证信号的相关性,确定目标认证信号是否通过认证。In addition, in the blind authentication method according to the first aspect of the present invention, the reference signal is obtained based on the key and the pilot signal by using a hash matrix. Thus, the reference signal is processed to obtain the reference authentication signal, and it can be determined whether the target authentication signal passes the authentication according to the correlation between the reference authentication signal and the target authentication signal.
在本发明第一方面所涉及的盲认证方法中,若所述检验统计量不小于所述规定阈值,则所述载体信号通过认证。In the blind authentication method according to the first aspect of the present invention, if the test statistic is not less than the prescribed threshold, the bearer signal passes the authentication.
在本发明第一方面所涉及的盲认证方法中,所述规定阈值基于所述导频信号的统计特性以及预设的虚警概率上限得到。In the blind authentication method according to the first aspect of the present invention, the prescribed threshold is obtained based on the statistical characteristics of the pilot signal and a preset upper limit of false alarm probability.
本发明的第二方面提供了一种基于平滑技术的频率选择性衰落信道的盲认证设备,其包括处理器,其执行所述存储器存储的计算机程序以实现上述任一项所述的物理层盲认证方法;以及存储器。The second aspect of the present invention provides a blind authentication device for frequency selective fading channels based on smoothing technology, which includes a processor that executes the computer program stored in the memory to realize the physical layer blind authentication described in any one of the above an authentication method; and a memory.
本发明的第三方面提供了一种计算机可读存储介质。所述计算机可读存储介质存储有至少一个指令,所述至少一个指令被处理器执行时实现上述第一方面任一项所述的盲认证方法。A third aspect of the present invention provides a computer readable storage medium. The computer-readable storage medium stores at least one instruction, and when the at least one instruction is executed by a processor, the blind authentication method described in any one of the above-mentioned first aspects is implemented.
本发明的第四方面提供了一种基于平滑技术的频率选择性衰落信道的盲认证系统,其包括发射装置,其向无线信道发射载体信号,所述载体信号包括认证信号、导频信号和信息信号,所述认证信号叠加到所述导频信号,所述无线信道是具有多个路径的频率选择性衰落信道;接收装置包括第一处理模块、第二处理模块和判定模块,所述第一处理模块接收所述载体信号,顺序地对所述频率选择性衰落信道的每个路径中的所述载体信号进行盲已知干扰消除(BKIC)处理得到目标信号,对所述目标信号进行差分信号处理以获得目标认证信号,在所述BKIC处理中,利用相邻的码元,通过平滑技术消除所述导频信号;第二处理模块,其基于密钥和所述导频信号获得参考信号,对所述参考信号进行差分信号处理以获得参考认证信号,并计算所述目标认证信号和经过差分信号处理的所述参考认证信号的相关性,得到检验统计量;以及判定模块,其将所述检验统计量与规定阈值进行比较,从而确定所述载体信号是否能够通过认证。The fourth aspect of the present invention provides a blind authentication system for a frequency selective fading channel based on smoothing technology, which includes a transmitting device that transmits a carrier signal to a wireless channel, and the carrier signal includes an authentication signal, a pilot signal and information signal, the authentication signal is superimposed on the pilot signal, and the wireless channel is a frequency selective fading channel with multiple paths; the receiving device includes a first processing module, a second processing module and a determination module, the first The processing module receives the carrier signal, sequentially performs blind known interference cancellation (BKIC) processing on the carrier signal in each path of the frequency selective fading channel to obtain a target signal, and performs differential signal processing on the target signal Processing to obtain a target authentication signal, in the BKIC processing, using adjacent symbols to eliminate the pilot signal through a smoothing technique; a second processing module, which obtains a reference signal based on the key and the pilot signal, Perform differential signal processing on the reference signal to obtain a reference authentication signal, and calculate the correlation between the target authentication signal and the reference authentication signal processed by the differential signal to obtain a test statistic; and a decision module, which compares the The test statistic is compared to a specified threshold to determine whether the bearer signal can be authenticated.
在本发明中,盲认证系统的发射装置将认证信号叠加到导频信号。由此,能够不占用额外发射带宽资源。盲认证系统的接收装置BKIC处理利用相邻的码元,通过平滑技术消除所述导频信号。在这种情况下,接收装置能够在避免估计信道情况下,消除导频信号。In the present invention, the transmitting device of the blind authentication system superimposes the authentication signal on the pilot signal. In this way, additional transmission bandwidth resources can not be occupied. The receiving device BKIC of the blind authentication system uses adjacent symbols to eliminate the pilot signal through smoothing technology. In this case, the receiving device can cancel the pilot signal without estimating the channel.
在本发明第四方面所涉及的盲认证系统中,所述第二处理模块,利用哈希矩阵,基于所述密钥和所述导频信号获得所述参考信号。由此,参考信号经过处理得到参考认证信号,可以根据参考认证信号与目标认证信号的相关性,确定目标认证信号是否通过认证。In the blind authentication system according to the fourth aspect of the present invention, the second processing module obtains the reference signal based on the key and the pilot signal by using a hash matrix. Thus, the reference signal is processed to obtain the reference authentication signal, and it can be determined whether the target authentication signal passes the authentication according to the correlation between the reference authentication signal and the target authentication signal.
在本发明第四方面所涉及的盲认证系统中,所述判定模块中所述规定阈值基于所述导频信号的统计特性以及预设的虚警概率上限得到。In the blind authentication system according to the fourth aspect of the present invention, the predetermined threshold in the determination module is obtained based on the statistical characteristics of the pilot signal and a preset upper limit of false alarm probability.
与现有技术相比,本发明实施方式具备以下有益效果:Compared with the prior art, the embodiment of the present invention has the following beneficial effects:
与现有的Auth-SS、Auth-SUP、Auth-TDM相比,本发明实现无线通信的物理层的认证不需要占用额外的信号带宽,认证信号不成为影响接收信号提取的噪声,不影响接收端噪声的统计特性。本发明提出的盲认证技术处理的是频率选择性衰落信道,更加适应于实际通信场景中复杂多变的无线通信环境。此外,由于本发明中,认证信号是叠加在导频信号中的,如果将认证信号与导频叠加后的信号的整体当成导频信号,用来进行信道估计,还能提高信道估计的准确性。Compared with the existing Auth-SS, Auth-SUP, and Auth-TDM, the authentication of the physical layer of the wireless communication does not need to occupy additional signal bandwidth, and the authentication signal does not become noise that affects the extraction of received signals, and does not affect the reception Statistical properties of end noise. The blind authentication technology proposed by the present invention deals with frequency-selective fading channels, and is more suitable for complex and changeable wireless communication environments in actual communication scenarios. In addition, since in the present invention, the authentication signal is superimposed on the pilot signal, if the whole of the superimposed signal of the authentication signal and the pilot is used as a pilot signal for channel estimation, the accuracy of channel estimation can also be improved .
附图说明Description of drawings
图1是示出了本发明的实施方式所涉及的物理层盲认证方法的信号传输示意图。FIG. 1 is a schematic diagram showing signal transmission of a physical layer blind authentication method according to an embodiment of the present invention.
图2是示出了本发明的实施方式所涉及的物理层盲认证方法流程示意图。Fig. 2 is a schematic flow chart showing a physical layer blind authentication method involved in an embodiment of the present invention.
图3是示出了本发明的实施方式所涉及的物理层盲认证方法发射端发射信号的结构示意图。Fig. 3 is a schematic diagram showing the structure of signals transmitted by the transmitting end of the physical layer blind authentication method involved in the embodiment of the present invention.
图4是示出了本发明的实施方式所涉及的物理层盲认证方法接收端盲已知干扰消除(BKIC)处理流程示意图。Fig. 4 is a schematic diagram showing a blind known interference cancellation (BKIC) processing flow at the receiving end of the physical layer blind authentication method according to the embodiment of the present invention.
图5是示出了本发明的实施方式所涉及的物理层盲认证系统发射端信号处理模块示意图。Fig. 5 is a schematic diagram showing a signal processing module of a transmitting end of the physical layer blind authentication system involved in an embodiment of the present invention.
图6是示出了本发明的实施方式所涉及的物理层盲认证系统接收端信号处理模块示意图。FIG. 6 is a schematic diagram showing a signal processing module at a receiving end of a physical layer blind authentication system according to an embodiment of the present invention.
图7是示出了本发明的实施方式所涉及的一种物理层盲认证设备的结构示意图。Fig. 7 is a schematic structural diagram showing a physical layer blind authentication device involved in an embodiment of the present invention.
具体实施方式Detailed ways
以下,参考附图,详细地说明本发明的优选实施方式。在下面的说明中,对于相同的部件赋予相同的符号,省略重复的说明。另外,附图只是示意性的图,部件相互之间的尺寸的比例或者部件的形状等可以与实际的不同。Hereinafter, preferred embodiments of the present invention will be described in detail with reference to the drawings. In the following description, the same reference numerals are given to the same components, and repeated descriptions are omitted. In addition, the drawings are only schematic diagrams, and the ratio of dimensions between components, the shape of components, and the like may be different from the actual ones.
需要说明的是,本发明的说明书和权利要求书及上述附图中的术语“第一”、“第二”、“第三”和“第四”等是用于区别不同对象,而不是用于描述特定顺序。此外,术语“包括”和“具有”以及它们任何变形,意图在于覆盖不排他的包含。例如包含了一系列步骤或单元的过程、方法、系统、产品或设备没有限定于已列出的步骤或单元,而是可选地还包括没有列出的步骤或单元,或可选地还包括对于这些过程、方法、产品或设备固有的其它步骤或单元。It should be noted that the terms "first", "second", "third" and "fourth" in the description and claims of the present invention and the above drawings are used to distinguish different objects, rather than using to describe a specific order. Furthermore, the terms "include" and "have", as well as any variations thereof, are intended to cover a non-exclusive inclusion. For example, a process, method, system, product or device comprising a series of steps or units is not limited to the listed steps or units, but optionally also includes unlisted steps or units, or optionally further includes For other steps or units inherent in these processes, methods, products or apparatuses.
本实施方式公开了一种基于平滑技术的频率选择性衰落信道的盲认证方法、设备和系统,是具有发射端和接收端的无线通信系统的无线通信的物理层认证方法、设备和系统。也即本实施方式公开了一种基于平滑技术的无线通信频率选择性衰落信道的物理层盲认证方法、设备和系统。其能够更加准确地对进行物理层认证。以下结合附图进行详细描述。This embodiment discloses a blind authentication method, device and system of a frequency selective fading channel based on smoothing technology, and is a physical layer authentication method, device and system of a wireless communication system with a transmitting end and a receiving end. That is, this embodiment discloses a physical layer blind authentication method, device and system for wireless communication frequency selective fading channels based on smoothing technology. It enables more accurate physical layer authentication. A detailed description is given below in conjunction with the accompanying drawings.
图1是示出了本发明的实施方式所涉及的物理层盲认证方法的信号传输示意图。FIG. 1 is a schematic diagram showing signal transmission of a physical layer blind authentication method according to an embodiment of the present invention.
在本实施方式中,如图1所示,基于平滑技术的无线通信频率选择性衰落信道的物理层盲认证方法基于一个通用的信号传输模型。在这个信号传输模型中,共包含4个用户,其中发送方(发射端)是合法发送方,发射端发射信号给合法接收方,即接收端,另外两个接收方分别为系统中监听用户和敌对用户。敌对用户一旦发现发射端发出的信号中可能有认证信息,将对该信号进行分析并试图提取、破坏、甚至篡改认证信息。但本实施方式不限于此,发射端可以是两个或两个以上,合法接收方可以是两个或两个以上,监听用户和敌对用户也可以分别是两个或两个以上。In this embodiment, as shown in FIG. 1 , the physical layer blind authentication method for wireless communication frequency selective fading channels based on smoothing technology is based on a general signal transmission model. In this signal transmission model, a total of 4 users are included, among which the sender (transmitter) is the legal sender, the transmitter sends signals to the legal receiver, that is, the receiver, and the other two receivers are the monitoring user and the receiver in the system respectively. hostile user. Once hostile users find that there may be authentication information in the signal sent by the transmitter, they will analyze the signal and try to extract, destroy, or even tamper with the authentication information. However, this embodiment is not limited thereto. There may be two or more transmitters, two or more legal receivers, and two or more listening users and hostile users.
在本实施方式中,假设发射端和接收端共同拥有用于认证的密钥,使得接收端可以利用该密钥从发射端发射的信号中提取认证信息。认证信号包含有认证信息。在本实施方式中,载体信号包含认证信号,常规信号不包含认证信号。监听用户对于认证方法一无所知,尽管可以接受并恢复发射端发送的信号,但是不会对信号进行深入的分析,不影响认证过程。敌对用户通过分析信号的特点可以察觉到认证信号的存在,并意图破坏认证信号。In this embodiment, it is assumed that the transmitting end and the receiving end share a key for authentication, so that the receiving end can use the key to extract authentication information from the signal transmitted by the transmitting end. The authentication signal contains authentication information. In this embodiment, the bearer signal includes the authentication signal, and the normal signal does not include the authentication signal. The monitoring user knows nothing about the authentication method. Although the signal sent by the transmitter can be accepted and restored, it will not conduct in-depth analysis of the signal and will not affect the authentication process. The hostile user can perceive the existence of the authentication signal by analyzing the characteristics of the signal, and intends to destroy the authentication signal.
在本实施方式中,上述的信号模型中的发射端可以包括基站或用户设备。基站(例如接入点)可以是指接入网中在空中接口上通过一个或多个扇区与无线终端通信的设备。基站可用于将收到的空中帧与IP分组进行相互转换,作为无线终端与接入网的其余部分之间的路由器,其中,接入网的其余部分可包括网际协议(IP)网络。基站还可以协调对空中接口的属性管理。例如,基站可以是GSM或CDMA中的基站(BTS,Base Transceiver Station),也可以是WCDMA中的基站(NodeB),还可以是LTE中的演进型基站(NodeB或eNB或e-NodeB,evolutional Node B),本实施方式不做限定。In this embodiment, the transmitting end in the above signal model may include a base station or a user equipment. A base station (eg, an access point) may refer to a device in an access network that communicates with wireless terminals through one or more sectors over an air interface. The base station can be used to convert received over-the-air frames to and from IP packets, acting as a router between the wireless terminal and the rest of the access network, which can include an Internet Protocol (IP) network. The base station may also coordinate attribute management for the air interface. For example, the base station may be a base station (BTS, Base Transceiver Station) in GSM or CDMA, or a base station (NodeB) in WCDMA, or an evolved base station (NodeB or eNB or e-NodeB, evolutional NodeB) in LTE. B), this embodiment is not limited.
用户设备可以包括但不限于智能手机、笔记本电脑、个人计算机(PersonalComputer,PC)、个人数字助理(Personal Digital Assistant,PDA)、移动互联网设备(Mobile Internet Device,MID)、穿戴设备(如智能手表、智能手环、智能眼镜)等各类电子设备,其中,该用户设备的操作系统可包括但不限于Android操作系统、IOS操作系统、Symbian(塞班)操作系统、Black Berry(黑莓)操作系统、Windows Phone8操作系统等等,本实施方式不做限定。User equipment may include but not limited to smartphones, notebook computers, personal computers (PersonalComputer, PC), personal digital assistants (Personal Digital Assistant, PDA), mobile Internet devices (Mobile Internet Device, MID), wearable devices (such as smart watches, Smart bracelets, smart glasses) and other electronic devices, wherein the operating system of the user device may include but not limited to Android operating system, IOS operating system, Symbian (Symbian) operating system, Black Berry (Blackberry) operating system, The Windows Phone8 operating system and the like are not limited in this embodiment.
在本实施方式中,上述的信号模型中的发射端发送信号经过无线信道到达接收端,其中,接收端可以包括基站。基站(例如接入点)可以是指接入网中在空中接口上通过一个或多个扇区与无线终端通信的设备。基站可用于将收到的空中帧与IP分组进行相互转换,作为无线终端与接入网的其余部分之间的路由器,其中,接入网的其余部分可包括网际协议(IP)网络。基站还可以协调对空中接口的属性管理。例如,基站可以是GSM或CDMA中的基站(BTS,Base Transceiver Station),也可以是WCDMA中的基站(NodeB),还可以是LTE中的演进型基站(NodeB或eNB或e-NodeB,evolutional Node B),本实施方式不做限定。In this embodiment, in the above signal model, the transmitting end sends a signal to the receiving end through a wireless channel, where the receiving end may include a base station. A base station (eg, an access point) may refer to a device in an access network that communicates with wireless terminals through one or more sectors over an air interface. The base station can be used to convert received over-the-air frames to and from IP packets, acting as a router between the wireless terminal and the rest of the access network, which can include an Internet Protocol (IP) network. The base station may also coordinate attribute management for the air interface. For example, the base station may be a base station (BTS, Base Transceiver Station) in GSM or CDMA, or a base station (NodeB) in WCDMA, or an evolved base station (NodeB or eNB or e-NodeB, evolutional NodeB) in LTE. B), this embodiment is not limited.
接收端还可以包括用户设备,用户设备可以包括但不限于智能手机、笔记本电脑、个人计算机(Personal Computer,PC)、个人数字助理(Personal Digital Assistant,PDA)、移动互联网设备(Mobile Internet Device,MID)、穿戴设备(如智能手表、智能手环、智能眼镜)等各类电子设备,其中,该用户设备的操作系统可包括但不限于Android操作系统、IOS操作系统、Symbian(塞班)操作系统、Black Berry(黑莓)操作系统、Windows Phone8操作系统等等,本实施方式不做限定。The receiving end can also include user equipment, which can include but not limited to smartphones, notebook computers, personal computers (Personal Computer, PC), personal digital assistants (Personal Digital Assistant, PDA), mobile Internet devices (Mobile Internet Device, MID ), wearable devices (such as smart watches, smart bracelets, smart glasses) and other electronic devices, where the operating system of the user device may include but not limited to Android operating system, IOS operating system, Symbian (Symbian) operating system , Black Berry (Blackberry) operating system, Windows Phone8 operating system, etc., this embodiment is not limited.
本实施方式公开一种基于平滑技术的无线通信频率选择性衰落信道的物理层盲认证方法。图2是示出了本发明的实施方式所涉及的物理层盲认证方法流程示意图。图3是示出了本发明的实施方式所涉及的物理层盲认证方法发射端发射信号的结构示意图。This embodiment discloses a physical layer blind authentication method of a wireless communication frequency selective fading channel based on a smoothing technology. Fig. 2 is a schematic flow chart showing a physical layer blind authentication method involved in an embodiment of the present invention. Fig. 3 is a schematic diagram showing the structure of signals transmitted by the transmitting end of the physical layer blind authentication method involved in the embodiment of the present invention.
在本实施方式中,基于平滑技术的无线通信频率选择性衰落信道的物理层盲认证方法是具有发射端和接收端的无线通信系统的无线通信的物理层认证方法。基于上述的信号传输模型,如图2所示,发射端向无线信道发射载体信号。载体信号包括认证信号、导频信号和信息信号。认证信号叠加到导频信号。无线信道是具有多个路径的频率选择性衰落信道(步骤S101)。In this embodiment, the physical layer blind authentication method of wireless communication frequency selective fading channel based on smoothing technology is a physical layer authentication method of wireless communication system with a transmitting end and a receiving end. Based on the above signal transmission model, as shown in FIG. 2 , the transmitting end transmits the carrier signal to the wireless channel. Bearer signals include authentication signals, pilot signals and information signals. The authentication signal is superimposed on the pilot signal. The wireless channel is a frequency selective fading channel with multiple paths (step S101).
在步骤S101中,如图3所示,载体信号包括认证信号、导频信号和信息信号,认证信号叠加到导频信号上。认证信号的信号长度等于导频信号的信号长度。由此,认证信号叠加到导频信号可以避免占用额外的信号带宽。In step S101 , as shown in FIG. 3 , the carrier signal includes an authentication signal, a pilot signal and an information signal, and the authentication signal is superimposed on the pilot signal. The signal length of the authentication signal is equal to the signal length of the pilot signal. Therefore, superimposing the authentication signal on the pilot signal can avoid occupying additional signal bandwidth.
在本实施方式中,信息信号包含发射端用户所要传递的信息。发射端发送的载体信号是以数据块的形式分块发射的。每块载体信号包括导频部分和信息部分。导频部分包括认证信号和导频信号,信息部分包括信息信号。另外,载体信号以数据块的形式分块发射,有利于对数据进行操作。In this embodiment, the information signal includes the information to be delivered by the user at the transmitting end. The carrier signal sent by the transmitter is transmitted in blocks in the form of data blocks. Each block of carrier signals includes a pilot part and an information part. The pilot part includes authentication signals and pilot signals, and the information part includes information signals. In addition, the carrier signal is transmitted in blocks in the form of data blocks, which facilitates operations on the data.
在本实施方式中,认证信号或导频信号的信号长度是第一长度,信息信号的信号长度是第二长度,每块载体信号的长度是总长度。认证信号或导频信号的信号长度与信息信号的信号长度和等于每块载体信号的长度。即第一长度与第二长度的和等于总长度。In this embodiment, the signal length of the authentication signal or the pilot signal is the first length, the signal length of the information signal is the second length, and the length of each carrier signal is the total length. The sum of the signal length of the authentication signal or the pilot signal and the signal length of the information signal is equal to the length of each carrier signal. That is, the sum of the first length and the second length is equal to the total length.
在本实施方式中,认证信号是通过导频信号和密钥得到的。也即导频信号和密钥利用哈希矩阵得到了认证信号。将得到的认证信号叠加到导频信号上,得到了每块载体信号的导频部分,导频部分的信号表达式是如下:In this embodiment, the authentication signal is obtained through a pilot signal and a key. That is, the pilot signal and the key use the hash matrix to obtain the authentication signal. The obtained authentication signal is superimposed on the pilot signal, and the pilot part of each carrier signal is obtained. The signal expression of the pilot part is as follows:
mi=ρspi+ρtti (1)m i =ρ s p i +ρ t t i (1)
上述导频部分的信号表达式(1)中,和为导频信息和认证信号的功率分配因子。假设认证信号和导频信号是相互独立的,则有 In the signal expression (1) of the above-mentioned pilot part, and Power allocation factors for pilot information and authentication signals. Assuming that the authentication signal and the pilot signal are independent of each other, then we have
在本实施方式中,将导频部分的信号和信息部分的信息信号组合在一起,构成了每块载体信号。In this embodiment, the signal of the pilot part and the information signal of the information part are combined to form each carrier signal.
另外,在本实施方式中,载体信号的传输信道是无线信道,并且是频率选择性衰落信道。频率选择性衰落信道具有多个路径,即频率选择性衰落信道是多路径信道。经过频率选择性衰落信道后载体信号表达式是如下:In addition, in this embodiment, the transmission channel of the bearer signal is a wireless channel, and is a frequency selective fading channel. A frequency selective fading channel has multiple paths, ie a frequency selective fading channel is a multipath channel. The carrier signal expression after frequency selective fading channel is as follows:
yiL+k=hiL+kxiL+k+niL+k (2)y iL+k = h iL+k x iL+k +n iL+k (2)
在本实施方式中,频率选择性衰落信道的信道响应hiL+k,服从0均值方差为的复高斯分布,为接收端的噪声,服从0均值方差为的高斯随机变量。In this embodiment, the channel response h iL+k of the frequency selective fading channel obeys the zero mean variance as The complex Gaussian distribution of , is the noise at the receiving end, and obeys the zero mean variance as Gaussian random variable of .
在本实施方式中,在信道响应中,为动态噪声,且一般情况下,频率选择性衰落信道的衰落相关系数a,由信道多普勒扩展和发射带宽所决定。特别地,a值较小时表示快衰落,a值较大时表示慢衰落。在许多类型的场景中,a的值在接收端是可以获取的。而在实际无线系统场景中,a的取值范围在一个非常小的区间内,如a∈[0.9,1]。In this embodiment, in the channel response, is dynamic noise, and In general, the fading correlation coefficient a of a frequency selective fading channel is determined by the channel Doppler spread and the transmission bandwidth. In particular, a small value of a indicates fast fading, and a large value of a indicates slow fading. In many types of scenarios, the value of a is available at the receiving end. In the actual wireless system scenario, the value range of a is in a very small interval, such as a ∈ [0.9, 1].
在本实施方式中,物理层盲认证方法还包括接收端接收载体信号,顺序地对频率选择性衰落信道的每个路径中的载体信号进行盲已知干扰消除(BKIC)处理得到目标信号。在BKIC处理中,利用相邻的码元,通过平滑技术消除导频信号(步骤S102)。In this embodiment, the physical layer blind authentication method further includes receiving the carrier signal at the receiving end, and sequentially performing blind known interference cancellation (BKIC) processing on the carrier signal in each path of the frequency selective fading channel to obtain the target signal. In BKIC processing, adjacent symbols are used to remove pilot signals by smoothing technology (step S102).
在本实施方式中,接收端接收载体信号。载体信号中包含导频部分和信息部分。本实施方式所涉及的物理层盲认证方法在接收端主要是针对载体信号的导频部分进行处理。接收端接收的载体信号的导频部分的表达式是如下:In this embodiment, the receiving end receives the bearer signal. The carrier signal contains a pilot part and an information part. The physical layer blind authentication method involved in this embodiment mainly processes the pilot part of the carrier signal at the receiving end. The expression of the pilot part of the carrier signal received by the receiving end is as follows:
在本实施方式中,无线信道是频率选择性衰落信道。频率选择性衰落信道具有多个路径。其中,Dmax为多径中最大的延时信息,通常在宽带无线通信系统中Dmax都是已知的。例如,在正交频分复用(OFDM)系统中,预定义的循环前缀决定了所有路径中最大的延时。In this embodiment, the radio channel is a frequency selective fading channel. A frequency selective fading channel has multiple paths. Wherein, D max is the maximum delay information in multipath, and D max is usually known in broadband wireless communication systems. For example, in an Orthogonal Frequency Division Multiplexing (OFDM) system, a predefined cyclic prefix determines the maximum delay among all paths.
在本实施方式中,下述针对载体信号的处理指的是针对载体信号的导频部分的处理。In this embodiment, the following processing on the carrier signal refers to processing on the pilot part of the carrier signal.
在本实施方式中,对频率选择性衰落信道的每个潜在的路径上使用盲认证技术。具体而言,首先,可以对频率选择性衰落信道的第一路径中的载体信号进行盲已知干扰消除(BKIC)处理,然后,类似的可以用相同的盲已知干扰消除(BKIC)处理方法除去频率选择性衰落信道的第二路径中的载体信号中的导频信号,重复Dmax+1次上述的盲已知干扰消除(BKIC)处理过程,使得频率选择性衰落信道的每个路径中的载体信号中的导频信号被顺序地消除。也即顺序地对频率选择性衰落信道的每个路径中的载体信号进行盲已知干扰消除(BKIC)处理。In this embodiment, a blind authentication technique is used on each potential path of the frequency selective fading channel. Specifically, first, the carrier signal in the first path of the frequency-selective fading channel can be subjected to blind known interference cancellation (BKIC) processing, and then, similarly, the same blind known interference cancellation (BKIC) processing method can be used Remove the pilot signal in the carrier signal in the second path of the frequency-selective fading channel, repeat the above-mentioned blind known interference cancellation (BKIC) process Dmax +1 times, so that in each path of the frequency-selective fading channel The pilot signals in the carrier signal are sequentially eliminated. That is, blind known interference cancellation (BKIC) processing is performed sequentially on the carrier signal in each path of the frequency selective fading channel.
步骤S102中,接收端接收载体信号,顺序地对频率选择性衰落信道的每个路径中的载体信号进行盲已知干扰消除(BKIC)处理得到目标信号。其中,盲已知干扰消除(BKIC)处理是利用相邻的码元,通过平滑技术消除载体信号中的导频信号。通常将载体信号中的导频信号消除需要估计信道情况,若信道响应不能进行有效估计,载体信号中的导频信号很难消除。盲已知干扰消除方法可以在避免估计信道情况下,消除导频信号。In step S102, the receiving end receives the carrier signal, and sequentially performs blind known interference cancellation (BKIC) processing on the carrier signal in each path of the frequency selective fading channel to obtain the target signal. Among them, the blind known interference cancellation (BKIC) process uses adjacent symbols to eliminate the pilot signal in the carrier signal through smoothing technology. Generally, channel conditions need to be estimated to eliminate the pilot signal in the carrier signal. If the channel response cannot be effectively estimated, it is difficult to eliminate the pilot signal in the carrier signal. The blind known interference cancellation method can eliminate the pilot signal without estimating the channel.
在本实施方式中,接收端接收到的载体信号可能包含认证信号,也可能不包含认证信号。设载体信号包含认证信息为第一条件,设载体信号不包含认证信号为第二条件。In this implementation manner, the bearer signal received by the receiving end may or may not contain the authentication signal. It is assumed that the bearer signal contains authentication information as the first condition, and the bearer signal does not contain the authentication signal as the second condition.
图4是示出了本发明的实施方式所涉及的物理层盲认证方法接收端盲已知干扰消除(BKIC)处理流程示意图。Fig. 4 is a schematic diagram showing a blind known interference cancellation (BKIC) processing flow at the receiving end of the physical layer blind authentication method according to the embodiment of the present invention.
在本实施方式中,如图4所示,在频率选择性衰落信道的每个路径上,消除载体信号中导频信号的方法一样。具体而言,频率选择性衰落信道的每个路径上的载体信号都是通过BKIC处理方法消除导频信号的。BKIC处理方法包括确定不同条件下每个码元的表达式(步骤S401)和利用码元的表达式,估算目标信号(步骤S402)。In this embodiment, as shown in FIG. 4 , the method of eliminating the pilot signal in the carrier signal is the same on each path of the frequency selective fading channel. Specifically, the carrier signal on each path of the frequency selective fading channel is processed by BKIC to eliminate the pilot signal. The BKIC processing method includes determining the expression of each symbol under different conditions (step S401) and using the expression of the symbol to estimate the target signal (step S402).
在步骤S401中,确定不同条件下每个码元的表达式。In step S401, the expression of each symbol under different conditions is determined.
其中,在第一条件下,每个码元的表达式如下:Among them, under the first condition, the expression of each symbol is as follows:
k∈{1,2,…,L1-1}k ∈ {1, 2, ..., L 1 -1}
在第二条件下,每个码元的表达式如下:Under the second condition, the expression of each symbol is as follows:
从上述的公式中可以看出,相邻的码元间存在相关噪声,表达式(4)中的相关噪声不能用普通的噪声白化技术来校正,需要通过步骤S402来消除相关噪声,估算出hkρttk+nk。It can be seen from the above formula that there is correlation noise between adjacent symbols, and the correlation noise in expression (4) cannot be corrected by ordinary noise whitening technology, it is necessary to eliminate the correlation noise through step S402, and estimate h k ρ t t k +n k .
在步骤S402中,利用码元的表达式,估算目标信号,将上述表达式(4)表示如下:In step S402, the expression of the symbol is used to estimate the target signal, and the above expression (4) is expressed as follows:
可以得到估算结果如下:The estimated results can be obtained as follows:
其中,表达式(9)中εk是由于BKIC模块进行干扰消除过程中产生的残余信号,εk可以被建模成高斯分布,对于慢衰落来说,(a→1),εk的方差很小,因此可以将yk中的εk去除,得到估算的hkρttk+nk。将每个路径中估算的hkρttk+nk相加,得到估算的不含导频信号的目标信号。Among them, ε k in expression (9) is due to the residual signal generated by the BKIC module during the interference cancellation process, ε k can be modeled as a Gaussian distribution, for slow fading, (a→1), the variance of ε k is very small, so the ε k in y k can be removed to obtain the estimated h k ρ t t k + nk . Add the estimated h k ρ t t k + nk in each path to obtain the estimated target signal without pilot signal.
另外,在步骤S102中,载体信号经过BKIC处理后得到目标信号,目标信号进行差分信号处理,得到目标认证信号。In addition, in step S102, the carrier signal is processed by BKIC to obtain a target signal, and the target signal is subjected to differential signal processing to obtain a target authentication signal.
在本实施方式中,差分信号处理的方法如下:In this embodiment, the differential signal processing method is as follows:
第一条件下,差分信号处理的表达式如下:Under the first condition, the expression for differential signal processing is as follows:
其中Δk为残余信号,可以近似建模为0均值方差为的高斯随机变量。where Δk is the residual signal, which can be approximately modeled as 0 with mean variance as Gaussian random variable of .
在第二条件下,差分信号处理的表达式如下:Under the second condition, the expression for differential signal processing is as follows:
其中为零均值复高斯随机变量。in is a complex Gaussian random variable with zero mean.
在本实施方式中,物理层盲认证方法还包括在接收端中,基于密钥和导频信号获得参考信号,对参考信号进行差分信号处理以获得参考认证信号,并计算目标认证信号和参考认证信号的相关性,得到检验统计量(步骤S103)。In this embodiment, the physical layer blind authentication method further includes, at the receiving end, obtaining a reference signal based on the key and the pilot signal, performing differential signal processing on the reference signal to obtain a reference authentication signal, and calculating the target authentication signal and the reference authentication signal. The correlation of the signals is used to obtain the test statistics (step S103).
在步骤S103中,基于密钥和导频信号获得参考信号是指利用哈希矩阵,由密钥和导频信号获得参考信号。由此,参考信号经过处理得到参考认证信号,可以根据参考认证信号与目标认证信号的相关性,确定目标认证信号是否通过认证。In step S103, obtaining the reference signal based on the key and the pilot signal means using a hash matrix to obtain the reference signal from the key and the pilot signal. Thus, the reference signal is processed to obtain the reference authentication signal, and it can be determined whether the target authentication signal passes the authentication according to the correlation between the reference authentication signal and the target authentication signal.
在步骤S103中,对参考信号进行差分信号处理以获得参考认证信号,计算目标认证信号和参考认证信号的相关性,得到检验统计量,可以根据检验统计量的值进行下一步判断。In step S103, differential signal processing is performed on the reference signal to obtain a reference authentication signal, and the correlation between the target authentication signal and the reference authentication signal is calculated to obtain a test statistic, and the next step can be judged according to the value of the test statistic.
在本实施方式中,对参考信号进行差分信号处理以获得参考认证信号。差分信号处理的方法与上述步骤S102中的差分处理方法相同。In this embodiment, differential signal processing is performed on the reference signal to obtain the reference authentication signal. The differential signal processing method is the same as the differential processing method in step S102 above.
在上述步骤S102中,接收端接收到的载体信号可能包含认证信号,设载体信号包含认证信息为第一条件,设载体信号不包含认证信号为第二条件。In the above step S102, the bearer signal received by the receiving end may contain an authentication signal, the first condition is set that the bearer signal contains authentication information, and the second condition is set that the bearer signal does not contain the authentication signal.
其中,在接收端,载体信号顺序地对频率选择性衰落信道的每个路径中的载体信号进行盲已知干扰消除(BKIC)处理得到目标信号,对目标信号进行差分信号处理以获得目标认证信号。在接收端,基于密钥和导频信号获得参考信号,参考信号经过差分(DP)信号处理后得到参考认证信号。接收端的哈希矩阵、密钥和导频信号生成参考信号的规则与发送端的哈希矩阵、密钥和导频信号生成认证信号的规则相同。参考认证信号可以看做是第一条件中的认证信号,目标认证信号可以看做是第一条件中的载体信号。由此,第一条件可以表示为目标认证信号中包括参考认证信号;第二条件可以表示为目标认证信号中不包括参考认证信号。Among them, at the receiving end, the carrier signal sequentially performs Blind Known Interference Cancellation (BKIC) processing on the carrier signal in each path of the frequency selective fading channel to obtain the target signal, and performs differential signal processing on the target signal to obtain the target authentication signal . At the receiving end, the reference signal is obtained based on the key and the pilot signal, and the reference signal is processed by differential (DP) signal to obtain the reference authentication signal. The rule for generating the reference signal by the hash matrix, key and pilot signal at the receiving end is the same as the rule for generating the authentication signal by the hash matrix, key and pilot signal at the sending end. The reference authentication signal can be regarded as the authentication signal in the first condition, and the target authentication signal can be regarded as the carrier signal in the first condition. Thus, the first condition may be expressed as the target authentication signal includes the reference authentication signal; the second condition may be expressed as the target authentication signal does not include the reference authentication signal.
在本实施方式中,物理层盲认证方法还包括将检验统计量与规定阈值进行比较,从而确定载体信号是否能够通过认证(步骤S104)。In this embodiment, the physical layer blind authentication method further includes comparing the test statistic with a prescribed threshold, so as to determine whether the bearer signal can pass the authentication (step S104).
在步骤S104中,若检验统计量不小于规定阈值,则判定载体信号通过认证;若检验统计量小于规定阈值,则判定载体信号没有通过认证。In step S104, if the test statistic is not less than the specified threshold, it is determined that the bearer signal has passed the authentication; if the test statistic is less than the specified threshold, it is determined that the bearer signal has not passed the authentication.
在本实施方式中,若检验统计量不小于规定阈值,则载体信号中包含参考认证信号,即载体信号通过认证;若检验统计量小于规定阈值,则载体信号中不包含参考认证信号,即载体信号没有通过认证。In this embodiment, if the test statistic is not less than the specified threshold, the carrier signal contains the reference authentication signal, that is, the carrier signal has passed the authentication; if the test statistic is smaller than the specified threshold, the carrier signal does not contain the reference authentication signal, that is, the carrier Signal is not authenticated.
另外,在本实施方式中,规定阈值是通过假设验证条件得到的,上述的第一条件和第二条件分别是假设验证条件的第一条件H1和第二条件H0。In addition, in this embodiment, the predetermined threshold value is obtained through hypothesis verification conditions, and the above-mentioned first condition and second condition are respectively the first condition H 1 and the second condition H 0 of the hypothesis verification conditions.
在本实施方式中,第一条件H1下,检验统计量的表达式如下:In this embodiment, under the first condition H1 , the expression of the test statistic is as follows:
第二条件H0下,检验统计量的表达式如下:Under the second condition H 0 , the expression of the test statistic is as follows:
其中,为0均值方差为的高斯随机变量,φi是0均值方差为的高斯随机变量。in, is 0 mean variance is Gaussian random variable, φ i is 0 mean variance is Gaussian random variable of .
另外,规定阈值由(τi|H0)分布相关的虚警概率εFA决定,表示如下:In addition, the specified threshold It is determined by the false alarm probability ε FA related to the (τ i |H 0 ) distribution, expressed as follows:
其中(τi|H0)是在第二条件下得到的检验统计量,也即导频信号的统计特性。由此,规定阈值可以基于导频信号的统计特性以及预设的虚警概率上限得到。Where (τ i |H 0 ) is the test statistic obtained under the second condition, that is, the statistical characteristic of the pilot signal. Therefore, the specified threshold can be obtained based on the statistical characteristics of the pilot signal and the preset upper limit of the false alarm probability.
另外,在本实施方式中,如果发射端的身份被认证后,将认证信号可以当成额外的导频信号来恢复信号。由此,可以提高信号码元恢复的性能和对信道响应的估计性能。In addition, in this embodiment, if the identity of the transmitter is authenticated, the authentication signal can be used as an additional pilot signal to recover the signal. Thus, the performance of signal symbol recovery and the performance of estimation of channel response can be improved.
另外,在本实施方式中,认证信号叠加到导频信号,避免了对常规信号的提取带来的不利影响。由此,避免降低接收端的信干噪比(SINR)。In addition, in this embodiment, the authentication signal is superimposed on the pilot signal, which avoids adverse effects on the extraction of conventional signals. Thus, the reduction of the signal-to-interference-noise ratio (SINR) at the receiving end is avoided.
本实施方式中,基于平滑技术的无线通信频率选择性衰落信道的物理层盲认证方法不需要占用额外的信号带宽。另外,在接收端,对载体信号进行信息信号提取时,认证信号不会成为信息信号的噪声,即认证信号不会影响信息信号的提取。认证信号不影响接收端噪声的统计特性。In this embodiment, the physical layer blind authentication method of the wireless communication frequency selective fading channel based on the smoothing technology does not need to occupy additional signal bandwidth. In addition, at the receiving end, when the information signal is extracted from the carrier signal, the authentication signal will not become noise of the information signal, that is, the authentication signal will not affect the extraction of the information signal. The authentication signal does not affect the statistical properties of the noise at the receiver.
在本实施方式中,物理层盲认证方法处理的是具有多个路径的频率选择性衰落信道,也即多路径信道,更加适应于实际通信场景中复杂多变的无线通信环境。另外,认证信号是叠加在导频信号中的,如果将认证信号与导频叠加后的信号的整体当成导频信号,用来进行信道估计,还能提高信道估计的准确性。In this embodiment, the physical layer blind authentication method deals with a frequency-selective fading channel with multiple paths, that is, a multi-path channel, which is more suitable for complex and changeable wireless communication environments in actual communication scenarios. In addition, the authentication signal is superimposed on the pilot signal. If the whole of the superimposed signal of the authentication signal and the pilot is used as a pilot signal for channel estimation, the accuracy of channel estimation can also be improved.
本实施方式公开一种基于平滑技术的无线通信频率选择性衰落信道的物理层盲认证系统。图5是示出了本发明的实施方式所涉及的物理层盲认证系统发射端信号处理模块示意图。图6是示出了本发明的实施方式所涉及的物理层盲认证系统接收端信号处理模块示意图。The embodiment discloses a physical layer blind authentication system of a wireless communication frequency selective fading channel based on a smoothing technology. Fig. 5 is a schematic diagram showing a signal processing module of a transmitting end of the physical layer blind authentication system involved in an embodiment of the present invention. FIG. 6 is a schematic diagram showing a signal processing module at a receiving end of a physical layer blind authentication system according to an embodiment of the present invention.
在本实施方式中,如图5所示,物理层盲认证系统包括发射装置20。发射装置20包括第一生成模块201、第二生成模块202和合成模块203。In this embodiment, as shown in FIG. 5 , the physical layer blind authentication system includes a transmitting device 20 . The transmitting device 20 includes a first generating module 201 , a second generating module 202 and a combining module 203 .
在本实施方式中,如图5所示,第一生成模块201生成认证信号。也即密钥和导频信号经过第一生成模块201生成认证信号。第一生成模块201中包含哈希矩阵。认证信号是密钥和导频信号利用哈希矩阵得到的。其中,得到的认证信号与导频信号的信号长度相同。In this embodiment, as shown in FIG. 5 , the first generating module 201 generates an authentication signal. That is, the key and the pilot signal generate an authentication signal through the first generation module 201 . The first generation module 201 includes a hash matrix. The authentication signal is obtained by using the hash matrix of the key and the pilot signal. Wherein, the signal length of the obtained authentication signal is the same as that of the pilot signal.
在本实施方式中,如图5所示,第二生成模块202生成了载体信号的导频部分。也即认证信号通过第二生成模块202加载到导频信号上,生成载体信号的导频部分。载体信号的导频部分的表达式为公式(1),另外,载体信号的导频部分的长度为认证信号的信号长度或导频信号的信号长度。In this embodiment, as shown in FIG. 5 , the second generation module 202 generates the pilot part of the carrier signal. That is, the authentication signal is loaded onto the pilot signal by the second generation module 202 to generate the pilot part of the carrier signal. The expression of the pilot part of the bearer signal is formula (1). In addition, the length of the pilot part of the bearer signal is the signal length of the authentication signal or the signal length of the pilot signal.
在本实施方式中,如图5所示,合成模块203生成了载体信号。也即载体信号的导频部分和信息部分通过合成模块203组合在一起,生成载体信号。载体信号的信息部分是信息信号。In this embodiment, as shown in FIG. 5 , the synthesis module 203 generates a carrier signal. That is to say, the pilot part and the information part of the carrier signal are combined through the combination module 203 to generate the carrier signal. The information part of the carrier signal is the information signal.
在本实施方式中,载体信号是按数据块分块发送的。每块载体信号包括导频部分和信息部分。认证信号或导频信号的信号长度与信息信号的信号长度和等于每块载体信号的长度。另外,载体信号是以数据块的形式分块发射有利于对数据进行操作。In this embodiment, the bearer signal is sent in blocks according to data blocks. Each block of carrier signals includes a pilot part and an information part. The sum of the signal length of the authentication signal or the pilot signal and the signal length of the information signal is equal to the length of each carrier signal. In addition, the carrier signal is transmitted in blocks in the form of data blocks, which facilitates operations on the data.
在本实施方式中,发射端的发射装置20生成的载体信号经过无线信道到达接收端的接收装置30。另外,无线信道是具有多个路径的频率选择性衰落信道。In this embodiment, the carrier signal generated by the transmitting device 20 at the transmitting end reaches the receiving device 30 at the receiving end through a wireless channel. In addition, the wireless channel is a frequency selective fading channel with multiple paths.
在本实施方式中,物理层盲认证系统还包括接收装置30。接收装置30包括第一处理模块、第二处理模块和判定模块。In this embodiment, the physical layer blind authentication system further includes a receiving device 30 . The receiving device 30 includes a first processing module, a second processing module and a determination module.
在本实施方式中,第一处理模块包括盲已知干扰消除(BKIC)模块301。载体信号经过盲已知干扰消除(BKIC)模块301。具体而言,频率选择性衰落信道的每个路径中的载体信号顺序地经过盲已知干扰消除(BKIC)模块301进行盲已知干扰消除(BKIC)处理,消除了载频信号中的导频信号。In this embodiment, the first processing module includes a Blind Known Interference Cancellation (BKIC) module 301 . The bearer signal goes through a blind known interference cancellation (BKIC) module 301 . Specifically, the carrier signal in each path of the frequency selective fading channel is sequentially processed by the blind known interference cancellation (BKIC) module 301 to eliminate the pilot frequency in the carrier frequency signal Signal.
在本实施方式中,盲已知干扰消除(BKIC)模块301运用了步骤S102中利用相邻的码元,通过平滑技术消除导频信号的BKIC处理方法。具体步骤如图4所示,BKIC处理包括确定不同条件下每个码元的表达式(步骤S401)和利用码元的表达式,估算目标信号(步骤S402)。In this embodiment, the Blind Known Interference Cancellation (BKIC) module 301 uses the BKIC processing method in step S102, which utilizes adjacent symbols and eliminates pilot signals through smoothing techniques. The specific steps are shown in Figure 4. BKIC processing includes determining the expression of each symbol under different conditions (step S401) and estimating the target signal by using the expression of the symbol (step S402).
在本实施方式中,如图6所示,第一处理模块还包括差分(DP)处理模块302。DP处理模块302运用了步骤S102中差分信号处理方法。DP处理模块302对目标信号进行差分信号处理,得到目标认证信号。由此,消除了目标认证信号中hk的影响,也即消除信道对载体信号的影响。In this embodiment, as shown in FIG. 6 , the first processing module further includes a differential (DP) processing module 302 . The DP processing module 302 uses the differential signal processing method in step S102. The DP processing module 302 performs differential signal processing on the target signal to obtain a target authentication signal. Thus, the influence of h k in the target authentication signal is eliminated, that is, the influence of the channel on the bearer signal is eliminated.
在DP处理模块302中,第一条件下,差分信号处理的表达式为公式(10),其中Δk为残余信号,可以近似建模为0均值方差为的高斯随机变量。在第二条件下,差分信号处理的表达式为公式(11),其中为零均值复高斯随机变量。In the DP processing module 302, under the first condition, the expression of differential signal processing is formula (10), where Δ k is the residual signal, which can be modeled approximately as 0 with a mean variance of Gaussian random variable of . Under the second condition, the expression for differential signal processing is formula (11), where is a complex Gaussian random variable with zero mean.
在本实施方式中,如图6所示,第二处理模块还包括哈希矩阵处理模块303。导频信号和密钥通过哈希矩阵处理模块303得到参考信号。哈希矩阵处理模块303运用了步骤S103中生产参考信号的方法。哈希矩阵处理模块303中包括哈希矩阵。In this embodiment, as shown in FIG. 6 , the second processing module further includes a hash matrix processing module 303 . The reference signal is obtained from the pilot signal and the key through the hash matrix processing module 303 . The hash matrix processing module 303 uses the method for generating reference signals in step S103. The hash matrix processing module 303 includes a hash matrix.
在本实施方式中,如图6所示,第二处理模块还包括差分(DP)处理模块304。差分(DP)处理模块304对参考信号进行差分信号处理,得到参考认证信号。DP处理模块304运用了步骤S103中差分信号处理方法。In this embodiment, as shown in FIG. 6 , the second processing module further includes a differential (DP) processing module 304 . The differential (DP) processing module 304 performs differential signal processing on the reference signal to obtain a reference authentication signal. The DP processing module 304 uses the differential signal processing method in step S103.
在本实施方式中,如图6所示,第二处理模块还包括运算模块305。运算模块305用来计算目标认证信号和参考认证信号的检验统计量。运算模块305运用的计算方法是步骤S103中的计算方法。In this embodiment, as shown in FIG. 6 , the second processing module further includes an operation module 305 . The calculation module 305 is used to calculate the test statistics of the target authentication signal and the reference authentication signal. The calculation method used by the calculation module 305 is the calculation method in step S103.
在本实施方式中,如图6所示,第二处理模块还包括判定模块306。判定模块306通过比较检验统计量和规定阈值,确定目标认证信号是否通过认证。也即确定载体信号是否能够通过认证。In this embodiment, as shown in FIG. 6 , the second processing module further includes a determination module 306 . The decision module 306 determines whether the target authentication signal passes the authentication by comparing the test statistic with a prescribed threshold. That is, it is determined whether the bearer signal can pass the authentication.
在本实施方式中,判定模块306中的规定阈值是基于导频信号的统计特性以及预设的虚警概率上限得到。规定阈值的计算方法为步骤S103中的阈值计算方法。In this embodiment, the predetermined threshold in the determination module 306 is obtained based on the statistical characteristics of the pilot signal and the preset upper limit of the false alarm probability. The calculation method of the predetermined threshold is the threshold calculation method in step S103.
本实施方式公开一种基于平滑技术的无线通信频率选择性衰落信道的物理层盲认证设备50。图7是示出了本发明的实施方式所涉及的一种物理层盲认证设备的结构示意图。在本实施方式中,发射端与接收端都包含如图7所示的认证设备50。This embodiment discloses a physical layer blind authentication device 50 for a wireless communication frequency selective fading channel based on a smoothing technology. Fig. 7 is a schematic structural diagram showing a physical layer blind authentication device involved in an embodiment of the present invention. In this embodiment, both the transmitting end and the receiving end include an authentication device 50 as shown in FIG. 7 .
在本实施方式中,如图7所示,认证设备50包括处理器501和存储器502。其中,处理器501以及存储器502分别连接通信总线。存储器502可以是高速RAM存储器,也可以是非易失性的存储器(non-volatile memory)。本领域技术人员可以理解,图7中示出的认证设备50的结构并不构成对本发明的限定,它既可以是总线形结构,也可以是星型结构,还可以包括比图7所示的更多或更少的部件,或者组合某些部件,或者不同的部件布置。In this embodiment, as shown in FIG. 7 , the authentication device 50 includes a processor 501 and a memory 502 . Wherein, the processor 501 and the memory 502 are respectively connected to the communication bus. The memory 502 may be a high-speed RAM memory, or a non-volatile memory (non-volatile memory). Those skilled in the art can understand that the structure of the authentication device 50 shown in FIG. 7 does not constitute a limitation to the present invention. It can be a bus structure or a star structure, and it can also include a structure other than that shown in FIG. More or fewer components, or combinations of certain components, or different arrangements of components.
其中,处理器501为认证设备的控制中心,可以是中央处理器(CentralProcessing Unit,CPU),处理器501利用各种接口和线路连接整个认证设备的各个部分,通过运行或执行存储在存储器502内的软件程序和/或模块,以及调用存储在存储器502内存储的程序代码,用于执行以下操作:Wherein, the processor 501 is the control center of the authentication device, which may be a central processing unit (Central Processing Unit, CPU). The software programs and/or modules, as well as call the program codes stored in the memory 502, are used to perform the following operations:
发射端向无线信道发射载体信号,载体信号包括认证信号、导频信号和信息信号,认证信号叠加到导频信号,无线信道是具有多个路径的频率选择性衰落信道(由发射端的认证设备50执行)。The transmitting end transmits a carrier signal to the wireless channel. The carrier signal includes an authentication signal, a pilot signal and an information signal. The authentication signal is superimposed on the pilot signal. The wireless channel is a frequency selective fading channel with multiple paths (by the authentication device 50 at the transmitting end) implement).
接收端接收载体信号,顺序地对频率选择性衰落信道的每个路径中的载体信号进行盲已知干扰消除(BKIC)处理得到目标信号,对目标信号进行差分信号处理以获得目标认证信号,在BKIC处理中,利用相邻的码元,通过平滑技术消除导频信号;在接收端中,基于密钥和导频信号获得参考信号,对参考信号进行差分信号处理以获得参考认证信号,并计算目标认证信号和参考认证信号的相关性,得到检验统计量;并且将检验统计量与规定阈值进行比较,从而确定载体信号是否能够通过认证(由接收端的认证设备50执行)。The receiving end receives the carrier signal, sequentially performs Blind Known Interference Cancellation (BKIC) processing on the carrier signal in each path of the frequency selective fading channel to obtain the target signal, and performs differential signal processing on the target signal to obtain the target authentication signal. In BKIC processing, the adjacent symbols are used to eliminate the pilot signal through smoothing technology; at the receiving end, the reference signal is obtained based on the key and the pilot signal, and the reference signal is differentially processed to obtain the reference authentication signal, and the calculation The correlation between the target authentication signal and the reference authentication signal is used to obtain a test statistic; and the test statistic is compared with a prescribed threshold to determine whether the carrier signal can pass the authentication (executed by the authentication device 50 at the receiving end).
在本实施方式中,发射端的认证设备50的处理器501的还执行以下操作:载体信号以数据块的形式分块发射。In this embodiment, the processor 501 of the authentication device 50 at the transmitting end further performs the following operations: the carrier signal is transmitted in blocks in the form of data blocks.
在本实施方式中,发射端的认证设备50的处理器501的还执行以下操作:在每块载体信号中,导频信号的信号长度与信息信号的信号长度和等于载体信号的信号长度。In this embodiment, the processor 501 of the authentication device 50 at the transmitting end further performs the following operations: in each carrier signal, the sum of the signal length of the pilot signal and the signal length of the information signal is equal to the signal length of the carrier signal.
在本实施方式中,接收端的认证设备50的处理器501的还执行以下操作:利用哈希矩阵,基于密钥和导频信号获得参考信号。In this embodiment, the processor 501 of the authentication device 50 at the receiving end further performs the following operation: obtain a reference signal based on a key and a pilot signal by using a hash matrix.
在本实施方式中,接收端的认证设备50的处理器501的还执行以下操作:若检验统计量不小于规定阈值,则载体信号通过认证。In this embodiment, the processor 501 of the authentication device 50 at the receiving end further performs the following operation: if the test statistic is not less than a prescribed threshold, the carrier signal passes the authentication.
在本实施方式中,接收端的认证设备50的处理器501的还执行以下操作:规定阈值基于导频信号的统计特性以及预设的虚警概率上限得到。In this embodiment, the processor 501 of the authentication device 50 at the receiving end further performs the following operations: the specified threshold is obtained based on the statistical characteristics of the pilot signal and the preset upper limit of the false alarm probability.
在本实施方式中,应该理解到,所揭露的设备,可通过其它的方式实现。例如,以上所描述的设备实施方式仅仅是示意性的,例如所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性或其它的形式。In this implementation manner, it should be understood that the disclosed device may be implemented in other ways. For example, the device implementation described above is only illustrative, for example, the division of the units is only a logical function division, and there may be other division methods in actual implementation, for example, multiple units or components can be combined or can be Integrate into another system, or some features may be ignored, or not implemented. In another point, the mutual coupling or direct coupling or communication connection shown or discussed may be through some interfaces, and the indirect coupling or communication connection of devices or units may be in electrical or other forms.
作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。A unit described as a separate component may or may not be physically separated, and a component displayed as a unit may or may not be a physical unit, that is, it may be located in one place, or may be distributed to multiple network units. Part or all of the units can be selected according to actual needs to achieve the purpose of the solution of this embodiment.
另外,在本发明实施方式中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。In addition, each functional unit in the embodiment of the present invention may be integrated into one processing unit, each unit may exist separately physically, or two or more units may be integrated into one unit. The above-mentioned integrated units can be implemented in the form of hardware or in the form of software functional units.
所述集成的单元如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储器中。基于这样的理解,本发明的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的全部或部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储器中,包括若干指令用以使得一台计算机设备(可为个人计算机、服务器或者网络设备等)执行本发明各个实施例所述方法的全部或部分步骤。而前述的存储器包括:U盘、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、移动硬盘、磁碟或者光盘等各种可以存储程序代码的介质。If the integrated unit is realized in the form of a software function unit and sold or used as an independent product, it can be stored in a computer-readable memory. Based on this understanding, the essence of the technical solution of the present invention or the part that contributes to the prior art or all or part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a memory. Several instructions are included to make a computer device (which may be a personal computer, server or network device, etc.) execute all or part of the steps of the methods described in the various embodiments of the present invention. The aforementioned memory includes: U disk, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), mobile hard disk, magnetic disk or optical disk and other media that can store program codes.
本实施方式公开一种计算机可读存储介质,本领域普通技术人员可以理解上述实施方式的各种物理层盲认证方法中的全部或部分步骤是可以通过程序(指令)来指令相关的硬件来完成,该程序(指令)可以存储于计算机可读存储器(存储介质)中,存储器可以包括:闪存盘、只读存储器(英文:Read-Only Memory,简称:ROM)、随机存取器(英文:RandomAccess Memory,简称:RAM)、磁盘或光盘等。This embodiment discloses a computer-readable storage medium. Those skilled in the art can understand that all or part of the steps in the various physical layer blind authentication methods in the above embodiments can be completed by instructing related hardware through programs (instructions) , the program (instruction) can be stored in a computer-readable memory (storage medium), and the memory can include: a flash disk, a read-only memory (English: Read-Only Memory, referred to as: ROM), a random access device (English: RandomAccess Memory, referred to as: RAM), disk or CD-ROM, etc.
虽然以上结合附图和实施例对本发明进行了具体说明,但是可以理解,上述说明不以任何形式限制本发明。本领域技术人员在不偏离本发明的实质精神和范围的情况下可以根据需要对本发明进行变形和变化,这些变形和变化均落入本发明的范围内。Although the present invention has been specifically described above in conjunction with the drawings and embodiments, it should be understood that the above description does not limit the present invention in any form. Those skilled in the art can make modifications and changes to the present invention as required without departing from the true spirit and scope of the present invention, and these modifications and changes all fall within the scope of the present invention.
Claims (11)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201711336107.3A CN108156102B (en) | 2017-12-13 | 2017-12-13 | Blind authentication method and system of frequency selective fading channel based on smoothing technology |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201711336107.3A CN108156102B (en) | 2017-12-13 | 2017-12-13 | Blind authentication method and system of frequency selective fading channel based on smoothing technology |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN108156102A true CN108156102A (en) | 2018-06-12 |
| CN108156102B CN108156102B (en) | 2020-06-26 |
Family
ID=62467197
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201711336107.3A Expired - Fee Related CN108156102B (en) | 2017-12-13 | 2017-12-13 | Blind authentication method and system of frequency selective fading channel based on smoothing technology |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN108156102B (en) |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN109068284A (en) * | 2018-09-28 | 2018-12-21 | 深圳大学 | The physical layer authentication method and system connected based on group between internet of things equipment |
| CN109168166A (en) * | 2018-11-22 | 2019-01-08 | 深圳大学 | The safety detecting method of physical layer Verification System |
Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20130159722A1 (en) * | 2011-12-16 | 2013-06-20 | University Of Maryland | Active sensing for dynamic spectrum access |
| CN103733560A (en) * | 2011-08-12 | 2014-04-16 | 交互数字专利控股公司 | Downlink resource allocation for flexible bandwidth operation in wireless systems |
| CN105635125A (en) * | 2015-12-25 | 2016-06-01 | 电子科技大学 | Physical layer combined authentication method based on RF fingerprint and channel information |
| CN106664194A (en) * | 2014-04-04 | 2017-05-10 | 尼克根合伙Ip有限责任公司 | System and method for communication using orbital angular momentum with multiple layer overlay modulation |
| CN107196920A (en) * | 2017-04-28 | 2017-09-22 | 中国人民解放军信息工程大学 | A kind of key towards wireless communication system produces distribution method |
-
2017
- 2017-12-13 CN CN201711336107.3A patent/CN108156102B/en not_active Expired - Fee Related
Patent Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN103733560A (en) * | 2011-08-12 | 2014-04-16 | 交互数字专利控股公司 | Downlink resource allocation for flexible bandwidth operation in wireless systems |
| US20130159722A1 (en) * | 2011-12-16 | 2013-06-20 | University Of Maryland | Active sensing for dynamic spectrum access |
| CN106664194A (en) * | 2014-04-04 | 2017-05-10 | 尼克根合伙Ip有限责任公司 | System and method for communication using orbital angular momentum with multiple layer overlay modulation |
| CN105635125A (en) * | 2015-12-25 | 2016-06-01 | 电子科技大学 | Physical layer combined authentication method based on RF fingerprint and channel information |
| CN107196920A (en) * | 2017-04-28 | 2017-09-22 | 中国人民解放军信息工程大学 | A kind of key towards wireless communication system produces distribution method |
Non-Patent Citations (1)
| Title |
|---|
| 季新生等: ""基于哈希方法的物理层认证机制"", 《电子与信息学报》 * |
Cited By (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN109068284A (en) * | 2018-09-28 | 2018-12-21 | 深圳大学 | The physical layer authentication method and system connected based on group between internet of things equipment |
| CN109068284B (en) * | 2018-09-28 | 2021-05-25 | 深圳大学 | Physical layer authentication method and system based on group connection among Internet of things devices |
| CN109168166A (en) * | 2018-11-22 | 2019-01-08 | 深圳大学 | The safety detecting method of physical layer Verification System |
| CN109168166B (en) * | 2018-11-22 | 2020-08-18 | 深圳大学 | Security Detection Method of Physical Layer Authentication System |
Also Published As
| Publication number | Publication date |
|---|---|
| CN108156102B (en) | 2020-06-26 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Jorswieck et al. | Broadcasting into the uncertainty: Authentication and confidentiality by physical-layer processing | |
| CN106161297B (en) | Anti-pilot spoofing attack channel estimation and identification method based on independent component analysis in OFDM systems | |
| CN108206795B (en) | Blind authentication method and system of frequency selective fading channel based on confidence transfer | |
| US11330434B2 (en) | Security detection for a physical layer authentication system that considers signal-discriminating capability of an active adversary | |
| CN110381510A (en) | Non-orthogonal multiple Verification System based on superposition physical layer authenticating tag | |
| CN108173791B (en) | Physical layer blind authentication method and system for time-varying fading channel based on smoothing technology | |
| CN110381511A (en) | Non-orthogonal multiple Verification System based on shared physical layer authenticating tag | |
| CN108156102B (en) | Blind authentication method and system of frequency selective fading channel based on smoothing technology | |
| CN109348477A (en) | Physical layer authentication method for wireless Internet of things based on service network | |
| Hou et al. | Message integrity protection over wireless channel by countering signal cancellation: Theory and practice | |
| Yu et al. | AuthCTC: Defending against waveform emulation attack in heterogeneous IoT environments | |
| US11412378B2 (en) | Smoothing technology-based blind authentication method and system for frequency selective fading channel | |
| CN110324830A (en) | Non-orthogonal multiple Verification System based on time multiplexed physical layer authenticating tag | |
| CN108199991B (en) | Physical layer blind authentication method and system of time-varying fading channel based on confidence transfer | |
| CN110380798A (en) | The parameter optimization method of non-orthogonal multiple Verification System based on shared authenticating tag | |
| Refaey | Multilayer authentication for communication systems based on physical-layer attributes | |
| CN110011980B (en) | A method and system for locating legitimate users and eavesdropping users | |
| US11510055B2 (en) | Smoothing-technology-based physical layer blind authentication method and system for time-varying fading channel | |
| Albehadili et al. | Machine learning-based PHY-authentication for mobile OFDM transceivers | |
| WO2013075484A1 (en) | Method and device for detecting interference | |
| CN110312255A (en) | Parameter optimization method of non-orthogonal multiple access authentication system based on superimposed authentication tags | |
| CN109982326B (en) | Physical layer security authentication method based on large-scale fading characteristics | |
| Han et al. | Multi-frequency band physical-layer authentication in indoor environment | |
| US10924318B2 (en) | Belief propagation-based blind authentication method and system for frequency selective fading channel | |
| CN111683363A (en) | Physical layer authentication method and system in airspace modulation system |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| GR01 | Patent grant | ||
| GR01 | Patent grant | ||
| CF01 | Termination of patent right due to non-payment of annual fee | ||
| CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20200626 |