[go: up one dir, main page]

CN108966223B - Physical layer authentication method and system based on single-bit covert protocol - Google Patents

Physical layer authentication method and system based on single-bit covert protocol Download PDF

Info

Publication number
CN108966223B
CN108966223B CN201810404236.XA CN201810404236A CN108966223B CN 108966223 B CN108966223 B CN 108966223B CN 201810404236 A CN201810404236 A CN 201810404236A CN 108966223 B CN108966223 B CN 108966223B
Authority
CN
China
Prior art keywords
authentication
signal
probability
bit
protocol
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201810404236.XA
Other languages
Chinese (zh)
Other versions
CN108966223A (en
Inventor
谢宁
罗钢
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen University
Original Assignee
Shenzhen University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen University filed Critical Shenzhen University
Priority to CN201810404236.XA priority Critical patent/CN108966223B/en
Publication of CN108966223A publication Critical patent/CN108966223A/en
Application granted granted Critical
Publication of CN108966223B publication Critical patent/CN108966223B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W52/00Power management, e.g. Transmission Power Control [TPC] or power classes
    • H04W52/04Transmission power control [TPC]
    • H04W52/18TPC being performed according to specific parameters
    • H04W52/24TPC being performed according to specific parameters using SIR [Signal to Interference Ratio] or other wireless path parameters
    • H04W52/241TPC being performed according to specific parameters using SIR [Signal to Interference Ratio] or other wireless path parameters taking into account channel quality metrics, e.g. SIR, SNR, CIR or Eb/lo

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Quality & Reliability (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本公开涉及一种基于单比特隐蔽性协议的物理层认证方法,是包含发射端和接收端的无线通信系统的物理层认证的隐蔽性分析方法,其特征在于,包括:发射端基于单比特隐蔽性协议向无线信道发射标记信号,标记信号包括认证信号和信息信号,在单比特隐蔽性协议中,令信息信号的能量分配因子在间隔时间段内保持固定且为优化值;接收端接收标记信号,基于单比特隐蔽性协议,对标记信号进行处理,获得保密认证概率;基于接收的信息信号的信干噪比获得认证请求传输概率、隐蔽认证拒绝概率;并且基于保密认证概率、认证请求传输概率、隐蔽认证拒绝概率计算出保密认证效率,以确定物理层认证的隐蔽等级。

Figure 201810404236

The present disclosure relates to a physical layer authentication method based on a single-bit concealment protocol, which is a concealment analysis method for physical layer authentication of a wireless communication system including a transmitter and a receiver. The protocol transmits the marker signal to the wireless channel, and the marker signal includes the authentication signal and the information signal. In the single-bit concealment protocol, the energy distribution factor of the information signal is kept fixed and is an optimized value in the interval time period; the receiver receives the marker signal, Based on the single-bit concealment protocol, the marked signal is processed to obtain the probability of confidential authentication; based on the signal-to-interference-noise ratio of the received information signal, the transmission probability of authentication request and the probability of rejection of concealed authentication are obtained; and based on the probability of confidential authentication, transmission probability of authentication request, The concealment authentication rejection probability calculates the secret authentication efficiency to determine the concealment level of the physical layer authentication.

Figure 201810404236

Description

基于单比特隐蔽性协议的物理层认证方法及系统Physical layer authentication method and system based on single-bit concealment protocol

技术领域technical field

本公开涉及无线通信技术领域,具体涉及一种基于单比特隐蔽性协议的物理层认证方法及系统。The present disclosure relates to the technical field of wireless communication, and in particular, to a physical layer authentication method and system based on a single-bit concealment protocol.

背景技术Background technique

随着无线设备的快速普及,对发射器认证的需求也急剧增长,物理层认证与基于上层密码工具的传统认证技术相比具有两个主要优势:首先,物理层认证通过允许非法接收方仅对其进行噪声观察来保护标签,从信息论的角度来看是相对安全的。其次,物理层认证使得合法的接收方能够快速的区分合法发射段和非法发射段,无需完成更高层处理。物理层设计的认证方案通常可以分为被动形式和主动形式两大类。With the rapid proliferation of wireless devices, the need for transmitter authentication has grown dramatically, and physical layer authentication has two main advantages over traditional authentication techniques based on upper-layer cryptographic tools: First, physical layer authentication allows illegitimate recipients to It performs noise observation to protect the label, which is relatively safe from an information-theoretic point of view. Second, physical layer authentication enables legitimate receivers to quickly distinguish between legitimate and illegal transmission segments without completing higher-layer processing. The authentication scheme of physical layer design can usually be divided into two categories: passive form and active form.

本文重点研究主动式,在发射端的消息信号中嵌入认证信号,然后在接收段处提取认证信号。常见的现有技术有:(1)使用时分多路复用方法将认证信号附加到数据上,但这需要额外的传输时间,并且容易将认证信号暴露给非法接收端,因为认证信号具有与消息信号相同的信噪比(SNR);(2)对于OFDM系统,通过根据认证信号在子载波上重复某些消息符号来产生环路平稳签名,这浪费了消息吞吐量;(3)频率偏移根据认证信号进行修改,然而,每秒传输的认证信号的比率相对较低;(4)对于预编码的双二进制信令系统,根据认证信号修改某些初始位,这种方案使得未知的接收段恢复消息信号具有挑战性,违背了隐蔽性的要求。This paper focuses on the active method, which embeds the authentication signal in the message signal at the transmitting end, and then extracts the authentication signal at the receiving section. Common existing technologies are: (1) The authentication signal is attached to the data using the time division multiplexing method, but this requires additional transmission time, and it is easy to expose the authentication signal to an illegal receiver, because the authentication signal has the same Signal same signal-to-noise ratio (SNR); (2) For OFDM systems, loop stationary signatures are generated by repeating certain message symbols on subcarriers according to the authentication signal, which wastes message throughput; (3) Frequency offset Modification according to the authentication signal, however, the rate of the authentication signal transmitted per second is relatively low; (4) For precoded duobinary signaling systems, some initial bits are modified according to the authentication signal, this scheme makes unknown received segments Recovering the message signal is challenging and violates the requirement of stealth.

当前使用最广泛的认证技术是认证叠加(Auth-SUP)技术,认证叠加技术能够通过软件无线电平台提供和分析实验结果。通过分析,认证叠加技术可以在一定程度上克服上述四种现有技术的缺点,满足有效认证技术的要求。Currently the most widely used authentication technology is the authentication overlay (Auth-SUP) technology, which can provide and analyze experimental results through a software-defined radio platform. Through analysis, the authentication overlay technology can overcome the shortcomings of the above four existing technologies to a certain extent, and meet the requirements of effective authentication technology.

然而,有效的物理层认证技术通常需要同时考虑安全性,鲁棒性和隐蔽性。具体而言,安全性通常是指非法接收端不能通过各种攻击(包括干扰攻击,重放攻击和模拟攻击)轻易地破坏身份认证;鲁棒性通常是指在随机衰落环境中存在传输,认证方案能够抵抗信道衰落和噪声影响;隐蔽性通常是指接收段在不知道认证方案的情况下,不能够检测到认证信号是异常的。尽管现有的技术已经提出了一个通用的物理层认证框架来综合评估安全性和鲁棒性,但是在隐蔽性方面,由于其多样性和复杂性,现有技术对隐性水平缺乏量化分析,还有很多改善的余地。However, effective physical layer authentication techniques usually need to consider security, robustness and concealment simultaneously. Specifically, security usually means that an illegal receiver cannot easily destroy identity authentication through various attacks (including jamming attacks, replay attacks and impersonation attacks); robustness usually means that there are transmissions in a random fading environment, authentication The scheme is resistant to channel fading and noise effects; concealment usually means that the receiving section cannot detect that the authentication signal is abnormal without knowing the authentication scheme. Although the existing technologies have proposed a general physical layer authentication framework to comprehensively evaluate security and robustness, in terms of stealth, due to its diversity and complexity, the existing technologies lack quantitative analysis of the stealth level, There is still a lot of room for improvement.

发明内容SUMMARY OF THE INVENTION

本公开是有鉴于上述的状况而提出的,其目的在于提供一种能够更好评估请求延迟和隐蔽性能的基于单比特隐蔽性协议的物理层认证方法及系统。The present disclosure is proposed in view of the above situation, and its purpose is to provide a single-bit stealth protocol-based physical layer authentication method and system that can better evaluate request delay and stealth performance.

为此,本公开的第一方面提供了一种基于单比特隐蔽性协议的物理层认证方法,是包含发射端和接收端的无线通信系统的物理层认证方法,其特征在于,包括:所述发射端基于单比特隐蔽性协议向无线信道发射标记信号,所述标记信号包括认证信号和信息信号,在所述单比特隐蔽性协议中,令所述信息信号的能量分配因子在间隔时间段内保持固定且为优化值;所述接收端接收所述标记信号,基于所述单比特隐蔽性协议,对所述标记信号进行处理,获得保密认证概率;基于接收的所述信息信号的信干噪比获得认证请求传输概率和隐蔽认证拒绝概率;并且基于所述保密认证概率、所述认证请求传输概率和所述隐蔽认证拒绝概率计算出保密认证效率,以确定物理层认证的隐蔽等级。To this end, a first aspect of the present disclosure provides a physical layer authentication method based on a single-bit concealment protocol, which is a physical layer authentication method of a wireless communication system including a transmitter and a receiver, and is characterized by comprising: the transmitter The terminal transmits a marker signal to the wireless channel based on a single-bit stealth protocol, the marker signal includes an authentication signal and an information signal. In the single-bit stealth protocol, the energy distribution factor of the information signal is kept in the interval time period. is fixed and is an optimized value; the receiver receives the marker signal, processes the marker signal based on the single-bit concealment protocol, and obtains a secret authentication probability; based on the received signal-to-interference-noise ratio of the information signal Obtaining the authentication request transmission probability and the concealed authentication rejection probability; and calculating the confidential authentication efficiency based on the confidential authentication probability, the authentication request transmission probability and the concealed authentication rejection probability to determine the concealment level of the physical layer authentication.

在本公开中,所述发射端基于单比特隐蔽性协议发射标记信号,所述接收端接收所述标记信号,基于单比特隐蔽性协议经过处理获得保密认证效率(secrecyauthentication efficiency,SAE)。其中,所述单比特隐蔽性协议规定标记信号中的信息信号的能量分配因子在间隔时间段内保持固定且为优化值。在这种情况下,基于单比特隐蔽性协议和用于物理层认证的衡量指标——保密认证效率(SAE),能够更好评估隐蔽等级。In the present disclosure, the transmitting end transmits a marker signal based on a single-bit stealth protocol, and the receiving end receives the marker signal, and obtains a confidentiality authentication efficiency (SAE) through processing based on the single-bit stealth protocol. Wherein, the single-bit concealment protocol stipulates that the energy distribution factor of the information signal in the marker signal remains fixed and is an optimized value within the interval time period. In this case, the stealth level can be better assessed based on the single-bit stealth protocol and the metric used for physical layer authentication, the Secrecy Authentication Efficiency (SAE).

在本公开第一方面所涉及的物理层认证方法中,在所述单比特隐蔽性协议中,所述接收端向所述发射端反馈信噪比阈值μ的单比特信息,设置

Figure BDA0001646458610000037
令PACR=0,其中,Rb表示常规信号速率。由此,能够分析隐蔽物理层认证的限制的可行性。In the physical layer authentication method involved in the first aspect of the present disclosure, in the single-bit concealment protocol, the receiving end feeds back single-bit information of a signal-to-noise ratio threshold μ to the transmitting end, and sets
Figure BDA0001646458610000037
Let P ACR = 0, where R b represents the normal signal rate. Thereby, it is possible to analyze the feasibility of concealing the limitation of physical layer authentication.

在本公开第一方面所涉及的物理层认证方法中,基于PACR=0,信息信号的能量分配因子的优化值由下式(Ⅰ)计算得到:

Figure BDA0001646458610000031
其中,
Figure BDA0001646458610000032
εART是认证请求传输概率的下限,γb表示平均信噪比,Rb表示常规信号速率。在这种情况下,能够优化单比特隐蔽性协议。In the physical layer authentication method involved in the first aspect of the present disclosure, based on P ACR =0, the optimal value of the energy distribution factor of the information signal is calculated by the following formula (I):
Figure BDA0001646458610000031
in,
Figure BDA0001646458610000032
ε ART is the lower bound of the transmission probability of the authentication request, γ b is the average signal-to-noise ratio, and R b is the normal signal rate. In this case, the single-bit stealth protocol can be optimized.

在本公开第一方面所涉及的物理层认证方法中,信道假设条件是所述接收端的信道状态信息存在单比特反馈。在这种情况下,基于单比特隐蔽性协议可以更好评估隐蔽性能。In the physical layer authentication method involved in the first aspect of the present disclosure, the channel assumption condition is that the channel state information of the receiving end has single-bit feedback. In this case, the stealth performance can be better evaluated based on the single-bit stealth protocol.

在本公开第一方面所涉及的物理层认证方法中,所述保密认证效率由下式(Ⅱ)计算得到:η=PART(1-PACR)PSA (Ⅱ),其中,PART表示所述认证请求传输概率,PACR表示所述隐蔽认证拒绝概率,PSA表示所述保密认证概率。由此,能够确定物理层认证的隐蔽等级。In the physical layer authentication method involved in the first aspect of the present disclosure, the secret authentication efficiency is calculated by the following formula (II): η=P ART (1-P ACR )P SA (II), where P ART represents The authentication request transmission probability, P ACR represents the concealed authentication rejection probability, and PSA represents the confidential authentication probability. Thereby, the concealment level of the physical layer authentication can be determined.

在本公开第一方面所涉及的物理层认证方法中,所述信息信号的信干噪比由下式(Ⅲ)计算得到:

Figure BDA0001646458610000033
其中,
Figure BDA0001646458610000034
表示所述信息信号的能量分配因子,
Figure BDA0001646458610000035
表示所述认证信号的能量分配因子,所述标记信号分块发送,γb,i表示第i块标记信号在所述接收端的信道信噪比,hb,i表示第i块标记信号的信道增益,
Figure BDA0001646458610000036
表示所述接收端的噪声方差。由此,能够得到隐蔽认证拒绝概率,进而判断物理层认证的隐蔽等级。本公开的第二方面提供了一种基于单比特隐蔽性协议的物理层认证设备,其特征在于,包括:处理器,其执行所述存储器存储的计算机程序以实现上述任一项所述的物理层认证方法;以及存储器。In the physical layer authentication method involved in the first aspect of the present disclosure, the signal-to-interference-to-noise ratio of the information signal is calculated by the following formula (III):
Figure BDA0001646458610000033
in,
Figure BDA0001646458610000034
represents the energy distribution factor of the information signal,
Figure BDA0001646458610000035
represents the energy distribution factor of the authentication signal, the marker signal is sent in blocks, γ b,i represents the channel signal-to-noise ratio of the ith block of marker signals at the receiving end, h b,i represents the channel of the ith block of marker signals gain,
Figure BDA0001646458610000036
represents the noise variance of the receiver. Thereby, the concealment authentication rejection probability can be obtained, and the concealment level of the physical layer authentication can be determined. A second aspect of the present disclosure provides a physical layer authentication device based on a single-bit stealth protocol, which is characterized by comprising: a processor that executes a computer program stored in the memory to implement the physical layer described in any of the above a layer authentication method; and a memory.

本公开的第三方面提供了一种计算机可读存储介质,其特征在于,所述计算机可读存储介质存储有至少一个指令,所述至少一个指令被处理器执行时实现上述任一项所述的物理层认证方法。A third aspect of the present disclosure provides a computer-readable storage medium, wherein the computer-readable storage medium stores at least one instruction, and when the at least one instruction is executed by a processor, implements any one of the above physical layer authentication method.

本公开的第四方面提供了一种基于单比特隐蔽性协议的物理层认证系统,其特征在于,包括:发射装置,所述发射装置基于单比特隐蔽性协议向无线信道发射标记信号,所述标记信号包括认证信号和信息信号,在所述单比特隐蔽性协议中,令所述信息信号的能量分配因子在间隔时间段内保持固定且为优化值;接收装置,其包括:处理模块,其接收所述标记信号,基于所述单比特隐蔽性协议,对所述标记信号进行处理,获得保密认证概率;计算模块,其基于接收的所述信息信号的信干噪比获得认证请求传输概率和隐蔽认证拒绝概率;以及判定模块,其根据所述保密认证概率、所述认证请求传输概率和所述隐蔽认证拒绝的概率计算出保密认证效率,以确定物理层认证的隐蔽等级。A fourth aspect of the present disclosure provides a physical layer authentication system based on a single-bit concealment protocol, characterized by comprising: a transmitting device, the transmitting device transmits a marking signal to a wireless channel based on a single-bit concealment protocol, the The marking signal includes an authentication signal and an information signal, and in the single-bit concealment protocol, the energy distribution factor of the information signal is kept fixed and is an optimized value in the interval time period; the receiving device includes: a processing module, which Receive the marked signal, process the marked signal based on the single-bit concealment protocol, and obtain a secret authentication probability; a calculation module, which obtains the authentication request transmission probability and a concealment authentication rejection probability; and a determination module, which calculates a confidential authentication efficiency according to the confidential authentication probability, the authentication request transmission probability and the concealed authentication rejection probability to determine the concealment level of the physical layer authentication.

在本公开中,所述发射装置基于单比特隐蔽性协议发射标记信号,所述接收装置接收所述标记信号,基于单比特隐蔽性协议经过处理获得保密认证效率(SAE)。其中,所述单比特隐蔽性协议规定标记信号中的信息信号的能量分配因子在间隔时间段内保持固定且为优化值。在这种情况下,基于单比特隐蔽性协议和用于物理层认证的衡量指标——保密认证效率(SAE),能够更好评估隐蔽等级。In the present disclosure, the transmitting device transmits a marker signal based on a single-bit stealth protocol, and the receiving device receives the marker signal, and obtains a Secrecy Authentication Efficiency (SAE) through processing based on the single-bit stealth protocol. Wherein, the single-bit concealment protocol stipulates that the energy distribution factor of the information signal in the marker signal remains fixed and is an optimized value within the interval time period. In this case, the stealth level can be better assessed based on the single-bit stealth protocol and the metric used for physical layer authentication, the Secrecy Authentication Efficiency (SAE).

在本公开第四方面所涉及的物理层认证系统中,在所述单比特隐蔽性协议中,所述接收端向所述发射端反馈信噪比阈值μ,设置

Figure BDA0001646458610000041
令PACR=0,其中,Rb表示常规信号速率。由此,能够分析隐蔽物理层认证的限制的可行性。In the physical layer authentication system involved in the fourth aspect of the present disclosure, in the single-bit concealment protocol, the receiving end feeds back a signal-to-noise ratio threshold μ to the transmitting end, and sets
Figure BDA0001646458610000041
Let P ACR = 0, where R b represents the normal signal rate. Thereby, it is possible to analyze the feasibility of concealing the limitation of physical layer authentication.

在本公开第四方面所涉及的物理层认证系统中,基于PACR=0,信息信号的能量分配因子的优化值由下式(Ⅰ)计算得到:

Figure BDA0001646458610000051
其中,
Figure BDA0001646458610000052
εART是认证请求传输概率的下限,γb表示平均信噪比,Rb表示常规信号速率。在这种情况下,能够优化单比特隐蔽性协议。In the physical layer authentication system involved in the fourth aspect of the present disclosure, based on P ACR =0, the optimal value of the energy distribution factor of the information signal is calculated by the following formula (I):
Figure BDA0001646458610000051
in,
Figure BDA0001646458610000052
ε ART is the lower bound of the transmission probability of the authentication request, γ b is the average signal-to-noise ratio, and R b is the normal signal rate. In this case, the single-bit stealth protocol can be optimized.

在本公开第四方面所涉及的物理层认证系统中,信道假设条件是所述接收装置的信道状态信息存在单比特反馈。在这种情况下,基于单比特隐蔽性协议可以更好评估隐蔽性能。In the physical layer authentication system involved in the fourth aspect of the present disclosure, the channel assumption condition is that the channel state information of the receiving device has single-bit feedback. In this case, the stealth performance can be better evaluated based on the single-bit stealth protocol.

在本公开第四方面所涉及的物理层认证系统中,在所述判定模块中,所述保密认证效率由下式(Ⅱ)计算得到:η=PART(1-PACR)PSA (Ⅱ),其中,PART表示所述认证请求传输概率,PACR表示所述隐蔽认证拒绝概率,PSA表示保密认证概率。由此,能够确定物理层认证的隐蔽等级。In the physical layer authentication system involved in the fourth aspect of the present disclosure, in the determination module, the privacy authentication efficiency is calculated by the following formula (II): η=P ART (1-P ACR )P SA (II ), where PART represents the authentication request transmission probability, P ACR represents the concealed authentication rejection probability, and PSA represents the secret authentication probability. Thereby, the concealment level of the physical layer authentication can be determined.

在本公开第四方面所涉及的物理层认证系统中,在所述计算模块中,所述信息信号的信干噪比由下式(Ⅲ)计算得到:

Figure BDA0001646458610000053
其中,
Figure BDA0001646458610000054
表示所述信息信号的能量分配因子,
Figure BDA0001646458610000055
表示所述认证信号的能量分配因子,所述标记信号分块发送,γb,i表示第i块标记信号在所述接收装置的信道信噪比,hb,i表示第i块标记信号的信道增益,
Figure BDA0001646458610000056
表示所述接收装置的噪声方差。由此,能够得到隐蔽认证拒绝概率,进而判断物理层认证的隐蔽等级。与现有技术相比,本公开的示例具备以下有益效果:In the physical layer authentication system involved in the fourth aspect of the present disclosure, in the calculation module, the signal-to-interference-to-noise ratio of the information signal is calculated by the following formula (III):
Figure BDA0001646458610000053
in,
Figure BDA0001646458610000054
represents the energy distribution factor of the information signal,
Figure BDA0001646458610000055
Represents the energy distribution factor of the authentication signal, the marker signal is sent in blocks, γ b,i represents the channel signal-to-noise ratio of the i-th marker signal at the receiving device, h b,i represents the i-th block marker signal channel gain,
Figure BDA0001646458610000056
represents the noise variance of the receiving device. Thereby, the concealment authentication rejection probability can be obtained, and the concealment level of the physical layer authentication can be determined. Compared with the prior art, the examples of the present disclosure have the following beneficial effects:

在现有的技术中,由于系统的多样性和复杂性,缺乏对隐蔽水平的定量分析,因此,本公开设计了一种单比特隐蔽性协议并提出了一种新的用于物理层认证的衡量指标——保密认证效率(SAE),能够更好评估物理层认证的隐蔽性能。In the existing technology, due to the diversity and complexity of the system, there is a lack of quantitative analysis of the concealment level. Therefore, the present disclosure designs a single-bit concealment protocol and proposes a new method for physical layer authentication. The metric—Secret Authentication Efficiency (SAE), can better evaluate the stealth performance of physical layer authentication.

附图说明Description of drawings

图1是示出了本公开的示例所涉及的物理层认证方法的信号认证示意图。FIG. 1 is a schematic diagram of signal authentication illustrating a physical layer authentication method involved in an example of the present disclosure.

图2是示出了本公开的示例所涉及的物理层认证方法流程示意图。FIG. 2 is a schematic flowchart illustrating a physical layer authentication method involved in an example of the present disclosure.

图3是示出了本公开的示例所涉及的物理层认证方法发射端发射信号的结构示意图。FIG. 3 is a schematic structural diagram illustrating a signal transmitted by a transmitter of a physical layer authentication method involved in an example of the present disclosure.

图4是示出了本公开的示例所涉及的物理层认证方法的接收端保密认证效率波形示意图。FIG. 4 is a schematic waveform diagram illustrating the efficiency of the receiving-end secret authentication of the physical layer authentication method involved in the example of the present disclosure.

图5是示出了本公开的示例所涉及的物理层认证方法的非法接收端保密认证效率波形示意图。FIG. 5 is a schematic diagram showing a waveform of the secret authentication efficiency of the illegal receiving end of the physical layer authentication method involved in the example of the present disclosure.

图6是示出了本公开的示例所涉及的物理层认证系统结构示意图。FIG. 6 is a schematic diagram showing the structure of a physical layer authentication system involved in an example of the present disclosure.

图7是示出了本公开的示例所涉及的物理层认证系统接收装置信号处理模块示意图。FIG. 7 is a schematic diagram illustrating a signal processing module of a receiving apparatus of a physical layer authentication system according to an example of the present disclosure.

图8是示出了本公开的示例所涉及的物理层认证设备的结构示意图。FIG. 8 is a schematic diagram showing the structure of a physical layer authentication device involved in an example of the present disclosure.

具体实施方式Detailed ways

以下,参考附图,详细地说明本公开的优选实施方式。在下面的说明中,对于相同的部件赋予相同的符号,省略重复的说明。另外,附图只是示意性的图,部件相互之间的尺寸的比例或者部件的形状等可以与实际的不同。Hereinafter, preferred embodiments of the present disclosure will be described in detail with reference to the accompanying drawings. In the following description, the same reference numerals are assigned to the same components, and overlapping descriptions are omitted. In addition, the drawings are only schematic diagrams, and the ratios of the dimensions of the members, the shapes of the members, and the like may be different from the actual ones.

需要说明的是,本公开的说明书和权利要求书及上述附图中的术语“第一”、“第二”、“第三”和“第四”等是用于区别不同对象,而不是用于描述特定顺序。此外,术语“包括”和“具有”以及它们任何变形,意图在于覆盖不排他的包含。例如包含了一系列步骤或单元的过程、方法、系统、产品或设备没有限定于已列出的步骤或单元,而是可选地还包括没有列出的步骤或单元,或可选地还包括对于这些过程、方法、产品或设备固有的其它步骤或单元。It should be noted that the terms "first", "second", "third" and "fourth" in the description and claims of the present disclosure and the above drawings are used to distinguish different objects, rather than used to describe a specific order. Furthermore, the terms "comprising" and "having" and any variations thereof are intended to cover non-exclusive inclusion. For example, a process, method, system, product or device comprising a series of steps or units is not limited to the listed steps or units, but optionally also includes unlisted steps or units, or optionally also includes For other steps or units inherent to these processes, methods, products or devices.

另外,在本公开的下面描述中涉及的小标题等并不是为了限制本公开的内容或范围,其仅仅是作为阅读的提示作用。这样的小标题既不能理解为用于分割文章的内容,也不应将小标题下的内容仅仅限制在小标题的范围内。In addition, the subheadings and the like mentioned in the following description of the present disclosure are not intended to limit the content or scope of the present disclosure, but only serve as a reminder for reading. Such subheadings can neither be understood to be used to divide the content of the article, nor should the content under the subheadings be limited to the scope of the subheadings.

本公开提供了基于单比特隐蔽性协议的物理层认证方法、设备和系统。在本公开中,能够更加准确地评估物理层认证的请求延迟和隐蔽性能。以下结合附图进行详细描述本公开。The present disclosure provides a physical layer authentication method, device and system based on a single-bit stealth protocol. In the present disclosure, the request delay and concealment performance of physical layer authentication can be more accurately evaluated. The present disclosure will be described in detail below with reference to the accompanying drawings.

图1是示出了本公开的示例所涉及的物理层认证方法的信号模型示意图。FIG. 1 is a schematic diagram of a signal model illustrating a physical layer authentication method involved in an example of the present disclosure.

如图1所示,基于单比特隐蔽性协议的物理层认证方法、设备和系统可以是具有发射端和接收端的无线通信系统的物理层认证方法、设备和系统。其中,接收端可以包括合法接收端和非法接收端。As shown in FIG. 1 , the physical layer authentication method, device and system based on the single-bit concealment protocol may be the physical layer authentication method, device and system of a wireless communication system having a transmitter and a receiver. The receiving end may include a legal receiving end and an illegal receiving end.

在一些示例中,如图1所示,发射端用于向无线信道发射信号。发射端通常是合法发送方。发射端也可以包括非法发送方。下文提及的发射端均是指合法发送方。接收端接收发射端发射的信号。由于接收端可以包括合法接收端和非法接收端,故发射端发射的信号既可以被合法接收端接收,也可能被非法接收端接收。In some examples, as shown in FIG. 1, a transmitter is used to transmit a signal to a wireless channel. The transmitter is usually the legitimate sender. The transmitting end may also include illegal senders. The transmitter mentioned below refers to the legitimate sender. The receiver receives the signal transmitted by the transmitter. Since the receiving end can include a legal receiving end and an illegal receiving end, the signal transmitted by the transmitting end can be received by both the legal receiving end and the illegal receiving end.

在一些示例中,接收端可以是测试接收端。测试接收端通常是指用于检测发射端的发射信号的接收端。例如,测试接收端可以是在模拟日常生活中的无线信道的场景下,用于检测发射端发射信号的测试设备。其中,测试接收端可以包括合法接收端和非法接收端。In some examples, the receiver may be a test receiver. The test receiving end usually refers to the receiving end used to detect the transmitted signal of the transmitting end. For example, the test receiving end may be a test device used to detect the signal transmitted by the transmitting end under the scenario of simulating a wireless channel in daily life. Wherein, the test receiving end may include a legal receiving end and an illegal receiving end.

在一些示例中,发射端可以是两个或两个以上,接收端可以是两个或两个以上,具体而言,合法接收端可以是两个或两个以上,非法接收端也可以分别是两个或两个以上。In some examples, there may be two or more transmitters and two or more receivers. Specifically, there may be two or more legitimate receivers, and illegal receivers may be respectively two or more.

在一些示例中,如图1所示,在非法接收端存在的情况下,发射端发送认证请求,合法接收端向发射端反馈信噪比阈值。In some examples, as shown in FIG. 1 , when an illegal receiver exists, the transmitter sends an authentication request, and the legitimate receiver feeds back a signal-to-noise ratio threshold to the transmitter.

在一些示例中,上述如图1的信号模型中的发射端可以包括基站或用户设备。基站(例如接入点)可以是指接入网中在空中接口上通过一个或多个扇区与无线终端通信的设备。基站可用于将收到的空中帧与IP分组进行相互转换,作为无线终端与接入网的其余部分之间的路由器,其中,接入网的其余部分可包括网际协议(IP)网络。基站还可以协调对空中接口的属性管理。例如,基站可以是GSM或CDMA中的基站(BTS,Base TransceiverStation),也可以是WCDMA中的基站(NodeB),还可以是LTE中的演进型基站(NodeB或eNB或e-NodeB,evolutional Node B)。In some examples, the above-mentioned transmitting end in the signal model of FIG. 1 may include a base station or a user equipment. A base station (eg, an access point) may refer to a device in an access network that communicates with wireless terminals over the air interface through one or more sectors. The base station may be used to convert received air frames to and from IP packets, acting as a router between the wireless terminal and the rest of the access network, which may include an Internet Protocol (IP) network. The base station may also coordinate attribute management of the air interface. For example, the base station may be a base station (BTS, Base TransceiverStation) in GSM or CDMA, a base station (NodeB) in WCDMA, or an evolved base station (NodeB or eNB or e-NodeB, evolutional Node B) in LTE ).

在一些示例中,用户设备可以包括但不限于智能手机、笔记本电脑、个人计算机(Personal Computer,PC)、个人数字助理(Personal Digital Assistant,PDA)、移动互联网设备(Mobile Internet Device,MID)、穿戴设备(如智能手表、智能手环、智能眼镜)等各类电子设备,其中,该用户设备的操作系统可包括但不限于Android操作系统、IOS操作系统、Symbian(塞班)操作系统、Black Berry(黑莓)操作系统、Windows Phone8操作系统等。In some examples, the user equipment may include, but is not limited to, a smartphone, a notebook computer, a personal computer (PC), a personal digital assistant (PDA), a mobile internet device (MID), a wearable Equipment (such as smart watches, smart bracelets, smart glasses) and other electronic equipment, where the operating system of the user equipment may include but not limited to Android operating system, IOS operating system, Symbian (Symbian) operating system, BlackBerry (Blackberry) operating system, Windows Phone8 operating system, etc.

在一些示例中,接收端可以包括基站。基站(例如接入点)可以是指接入网中在空中接口上通过一个或多个扇区与无线终端通信的设备。基站可用于将收到的空中帧与IP分组进行相互转换,作为无线终端与接入网的其余部分之间的路由器,其中,接入网的其余部分可包括网际协议(IP)网络。基站还可以协调对空中接口的属性管理。例如,基站可以是GSM或CDMA中的基站(BTS,Base Transceiver Station),也可以是WCDMA中的基站(NodeB),还可以是LTE中的演进型基站(NodeB或eNB或e-NodeB,evolutional Node B)。In some examples, the receiving end may include a base station. A base station (eg, an access point) may refer to a device in an access network that communicates with wireless terminals over the air interface through one or more sectors. The base station may be used to convert received air frames to and from IP packets, acting as a router between the wireless terminal and the rest of the access network, which may include an Internet Protocol (IP) network. The base station may also coordinate attribute management of the air interface. For example, the base station may be a base station (BTS, Base Transceiver Station) in GSM or CDMA, a base station (NodeB) in WCDMA, or an evolved base station (NodeB or eNB or e-NodeB, evolutional Node) in LTE B).

在另一些示例中,接收端还可以包括用户设备或测试设备。用户设备或测试设备可以包括但不限于智能手机、笔记本电脑、个人计算机(Personal Computer,PC)、个人数字助理(Personal Digital Assistant,PDA)、移动互联网设备(Mobile Internet Device,MID)、穿戴设备(如智能手表、智能手环、智能眼镜)等各类电子设备。其中,该用户设备或测试设备的操作系统可包括但不限于Android操作系统、IOS操作系统、Symbian(塞班)操作系统、Black Berry(黑莓)操作系统、Windows Phone8操作系统等。In other examples, the receiving end may also include user equipment or test equipment. User equipment or test equipment may include but not limited to smart phones, notebook computers, personal computers (Personal Computer, PC), personal digital assistants (Personal Digital Assistant, PDA), mobile Internet devices (Mobile Internet Device, MID), wearable devices ( Such as smart watches, smart bracelets, smart glasses) and other electronic devices. Wherein, the operating system of the user equipment or test equipment may include but not limited to Android operating system, IOS operating system, Symbian (Symbian) operating system, BlackBerry (Blackberry) operating system, Windows Phone8 operating system, and the like.

图2是示出了本公开的示例所涉及的物理层认证方法流程示意图。图3是示出了本公开的示例所涉及的物理层认证方法发射端发射信号的结构示意图。FIG. 2 is a schematic flowchart illustrating a physical layer authentication method involved in an example of the present disclosure. FIG. 3 is a schematic structural diagram illustrating a signal transmitted by a transmitter of a physical layer authentication method involved in an example of the present disclosure.

在一些示例中,基于单比特隐蔽性协议的物理层认证方法(有时简称“物理层认证方法”),是具有发射端和接收端的无线通信系统的物理层认证方法。其中,接收端可以包括合法接收端和非法接收端。另外,在下面的描述中,非法接收端有时也称为监听端。In some examples, a single-bit stealth protocol-based physical layer authentication method (sometimes referred to as "physical layer authentication method") is a physical layer authentication method for a wireless communication system having a transmitter and a receiver. The receiving end may include a legal receiving end and an illegal receiving end. In addition, in the following description, the illegal receiving end is sometimes also referred to as the listening end.

另外,基于图1所示的信号模型,如图2所示,基于单比特隐蔽性协议的物理层认证方法包括发射端基于单比特隐蔽性协议向无线信道发射标记信号,标记信号包括认证信号和信息信号,在单比特隐蔽性协议中,令信息信号的能量分配因子在间隔时间段内保持固定且为优化值(步骤S110)。In addition, based on the signal model shown in FIG. 1, as shown in FIG. 2, the physical layer authentication method based on the single-bit stealth protocol includes that the transmitter transmits a marker signal to the wireless channel based on the single-bit stealth protocol, and the marker signal includes the authentication signal and For the information signal, in the single-bit stealth protocol, the energy distribution factor of the information signal is kept fixed and is an optimized value in the interval time period (step S110).

在步骤S110中,物理层认证方法的信道假设条件可以是接收端的信道状态信息存在单比特的情况,也即发射端知道接收端反馈的单比特的信道状态信息。具体而言,如上所述,接收端可以包括合法接收端和非法接收端。在一般通信过程中,非法接收端不向发射端反馈信道状态信息,而合法接收端向发射端反馈信道状态信息。即发射端有可能不知道任何关于非法接收端的信道状态信息,而发射端有可能知道合法接收端的单比特的信道状态信息反馈。但是,在上述物理层认证方法的信道假设条件下,即在非法接收端的信道状态信息未知和合法接收端的信道状态信息存在单比特反馈的情况下,也能够通过本公开的物理层认证方法,更好评估物理层认证的隐蔽性能。In step S110, the channel assumption condition of the physical layer authentication method may be that the channel state information of the receiving end has a single bit, that is, the transmitting end knows the single-bit channel state information fed back by the receiving end. Specifically, as mentioned above, the receiving end may include a legal receiving end and an illegal receiving end. In a general communication process, the illegal receiving end does not feed back channel state information to the transmitting end, while the legitimate receiving end feeds back the channel state information to the transmitting end. That is, the transmitting end may not know any channel state information about the illegal receiving end, while the transmitting end may know the single-bit channel state information feedback of the legitimate receiving end. However, under the channel assumption condition of the above physical layer authentication method, that is, in the case where the channel state information of the illegal receiving end is unknown and the channel state information of the legitimate receiving end has single-bit feedback, the physical layer authentication method of the present disclosure can also be used to improve the performance of the system. Good for evaluating the stealth performance of physical layer authentication.

在一些示例中,信道状态信息(Channel State Information,CSI)可以是通信链路的信道属性。例如,信道状态信息可以是信号散射、环境衰弱、距离衰减等信息。In some examples, Channel State Information (CSI) may be channel properties of the communication link. For example, the channel state information may be information such as signal scattering, environmental attenuation, distance attenuation, and the like.

在一些示例中,基于上述信号模型,发射端可以向无线信道发射标记信号。也即发射端可以发送认证请求。如图3所示,标记信号可以包括认证信号和信息信号。认证信号可以反应发射端和合法接收端之间共享的密钥知识。信息信号可以反映所要传递的信息。认证信号可以叠加在信息信号上。标记信号可以是成块发射的。标记信号可以由下式(1)计算得到:In some examples, based on the signal model described above, the transmitter may transmit a marker signal to the wireless channel. That is, the transmitter can send an authentication request. As shown in FIG. 3, the marker signal may include an authentication signal and an information signal. The authentication signal can reflect the shared key knowledge between the transmitter and the legitimate receiver. The information signal can reflect the information to be conveyed. The authentication signal may be superimposed on the information signal. The marker signal may be transmitted in blocks. The marker signal can be calculated by the following formula (1):

xi=ρssitti (1)x is s it t i (1)

其中,xi表示第i块标记信号,si表示第i块信息信号,ti表示第i块认证信号。另外,

Figure BDA0001646458610000091
表示消息信号的能量分配因子,
Figure BDA0001646458610000092
表示认证信号的能量分配因子。Wherein, x i represents the flag signal of the ith block, si represents the information signal of the ith block, and ti represents the authentication signal of the ith block. in addition,
Figure BDA0001646458610000091
represents the energy distribution factor of the message signal,
Figure BDA0001646458610000092
Represents the energy distribution factor of the authentication signal.

本实施方式不限于此,发射端可以向无线信道发射常规信号。常规信号中不包括认证信号。也即认证信号的能量分配因子

Figure BDA0001646458610000093
为零,此时常规信号可以表示为xi=si。另外常规信号的速率可以被设置为Rb。This embodiment is not limited to this, and the transmitting end may transmit regular signals to the wireless channel. Authentication signals are not included in regular signals. That is, the energy distribution factor of the authentication signal
Figure BDA0001646458610000093
zero, the conventional signal can be expressed as x i =s i at this time. In addition the rate of the regular signal can be set to R b .

在一些示例中,物理层认证方法遵从的协议可以是单比特隐蔽性协议。另外,在上述的信道假设条件下,单比特隐蔽性协议对于本公开的物理层优化隐蔽性分析方法有效。单比特隐蔽性协议规定了信息信号的能量分配因子

Figure BDA0001646458610000101
在间隔时间段内保持固定。即发射端向无线信道发射标记信号时,标记信号中的信息信号的能量分配因子在间隔时间段内保持固定。换而言之,单比特隐蔽性协议规定了发射端以在间隔时间段内保持固定的能量分配因子
Figure BDA0001646458610000102
发送认证请求。其中,信息信号的能量分配因子
Figure BDA0001646458610000103
可以称为认证协议参数。In some examples, the protocol to which the physical layer authentication method follows may be a single-bit stealth protocol. In addition, under the above-mentioned channel assumptions, the single-bit stealth protocol is effective for the physical layer optimization stealth analysis method of the present disclosure. The single-bit concealment protocol specifies the energy distribution factor of the information signal
Figure BDA0001646458610000101
remain fixed during the interval period. That is, when the transmitting end transmits the marker signal to the wireless channel, the energy distribution factor of the information signal in the marker signal remains fixed in the interval period. In other words, the single-bit stealth protocol specifies the transmitter to maintain a fixed energy allocation factor during the interval
Figure BDA0001646458610000102
Send an authentication request. Among them, the energy distribution factor of the information signal
Figure BDA0001646458610000103
Can be called authentication protocol parameters.

在一些示例中,在间隔时间段内保持固定的能量分配因子

Figure BDA0001646458610000104
表示能量分配因子
Figure BDA0001646458610000105
不是在整个通信过程中恒定不变的。在不同的时间段,能量分配因子
Figure BDA0001646458610000106
可以不同,在时间段内的能量分配因子可以保持固定。In some examples, a fixed energy allocation factor is maintained over the interval
Figure BDA0001646458610000104
represents the energy distribution factor
Figure BDA0001646458610000105
Not constant throughout the communication process. At different time periods, the energy distribution factor
Figure BDA0001646458610000106
can be different, and the energy allocation factor over the time period can remain fixed.

在另一些示例中,单比特隐蔽性协议还规定了信息信号的能量分配因子

Figure BDA0001646458610000107
在间隔时间段内是优化值。也即时间段内的信息信号的能量分配因子
Figure BDA0001646458610000108
可以是相应时间段内的能量分配因子优化值。In other examples, the single-bit stealth protocol also specifies an energy allocation factor for the information signal
Figure BDA0001646458610000107
During the interval period is the optimized value. That is, the energy distribution factor of the information signal in the time period
Figure BDA0001646458610000108
It can be the optimized value of the energy distribution factor in the corresponding time period.

在这种情况下,如是能量分配因子

Figure BDA0001646458610000109
优化值在整个通信过程中是恒定的,那么不同的时间段的能量分配因子相同。也即在整个通信过程中能量分配因子
Figure BDA00016464586100001010
恒定且为优化值。另外,不同时间段内的能量分配因子
Figure BDA00016464586100001011
也可以不同。能量分配因子
Figure BDA00016464586100001012
优化值的获取后续进行详细描述。In this case, the energy distribution factor
Figure BDA0001646458610000109
The optimal value is constant in the whole communication process, then the energy distribution factor of different time periods is the same. That is, the energy distribution factor in the whole communication process
Figure BDA00016464586100001010
Constant and optimized value. In addition, the energy allocation factor in different time periods
Figure BDA00016464586100001011
Can also be different. energy distribution factor
Figure BDA00016464586100001012
The acquisition of the optimized value will be described in detail later.

在步骤S110中,发射端基于单比特隐蔽性协议向无线信道发射标记信号。也即标记信号被发射端发射进入无线信道。其中,无线信道存在信道增益h。故经过无线信道传输的标记信号可以包括信道增益h。In step S110, the transmitting end transmits the marker signal to the wireless channel based on the single-bit concealment protocol. That is, the marker signal is transmitted by the transmitting end into the wireless channel. Among them, the wireless channel has a channel gain h. Therefore, the marker signal transmitted through the wireless channel can include the channel gain h.

在一些示例中,基于单比特隐蔽性协议的物理层认证方法还可以包括接收端接收标记信号,基于单比特隐蔽性协议,对标记信号进行相关处理,获得保密认证概率(步骤S120)。In some examples, the physical layer authentication method based on the single-bit stealth protocol may further include the receiving end receiving the marker signal, and performing correlation processing on the marker signal based on the single-bit stealth protocol to obtain a secret authentication probability (step S120).

在步骤S120中,由于步骤S110中的标记信号是分块发射的,故标记信号可以被接收端分块接收。由于接收端可以包括合法接收端和非法接收端,故在无线通信系统中接收信号的可以包括合法接收端和非法接收端。其中,合法接收端接收的经过无线信道的标记信号可以由下式(2)计算得到:In step S120, since the marker signal in step S110 is transmitted in blocks, the marker signal can be received by the receiver in blocks. Since the receivers may include legal receivers and illegal receivers, those receiving signals in the wireless communication system may include legal receivers and illegal receivers. Among them, the marked signal received by the legitimate receiver through the wireless channel can be calculated by the following formula (2):

yb,i=hb,ixi+nb,i (2)y b,i =h b,i x i +n b,i (2)

其中,hb,i表示合法接收端接收的第i块标记信号的信道增益。nb,i表示合法接收端的噪声。另外,hb,i服从0均值方差为

Figure BDA0001646458610000111
的复高斯分布。nb,i服从0均值方差为
Figure BDA0001646458610000112
的复高斯分布。Among them, h b,i represents the channel gain of the ith block of marked signals received by the legitimate receiver. n b,i represents the noise at the legitimate receiver. In addition, h b,i obeys 0 mean variance as
Figure BDA0001646458610000111
complex Gaussian distribution. n b, i obey 0 mean variance as
Figure BDA0001646458610000112
complex Gaussian distribution.

在一些示例中,由于标记信号可以被接收端(包括合法接收端和非法接收端)分块接收,其中,合法接收端测得的每块标记信号的信道信噪比分别可以由下式(3)计算得到:In some examples, since the marker signal can be received by receivers (including legal receivers and illegal receivers) in blocks, the channel signal-to-noise ratio of each block of marker signals measured by the legal receiver can be expressed by the following formula (3 ) is calculated to get:

Figure BDA0001646458610000113
Figure BDA0001646458610000113

其中,

Figure BDA0001646458610000114
表示合法接收端的噪声方差。另外,合法接收端测得的标记信号的平均信噪比分别可以由下式(4)计算得到:in,
Figure BDA0001646458610000114
represents the noise variance at the legitimate receiver. In addition, the average signal-to-noise ratio of the marked signal measured by the legitimate receiving end can be calculated by the following formula (4):

Figure BDA0001646458610000115
Figure BDA0001646458610000115

另外,在一些示例中,非法接收端接收的经过无线信道的标记信号、非法接收端测得的每块标记信号的信道信噪比以及非法接收端测得的标记信号的平均信噪比可以类比合法接收端的上述计算方式。In addition, in some examples, the signal-to-noise ratio of the marker signal received by the illegal receiver through the wireless channel, the channel signal-to-noise ratio of each block of marker signals measured by the illegal receiver, and the average signal-to-noise ratio of the marker signal measured by the illegal receiver can be compared by analogy The above calculation method of the legitimate receiver.

在一些示例中,接收端可以进行信道估计,也即合法接收端和非法接收端可以进行信道估计。通过信道估计,合法接收端和非法接收端可以估计出接收的经过无线信道传输的标记信号yi中的目标标记信号

Figure BDA00016464586100001117
In some examples, the receiver can perform channel estimation, that is, the legitimate receiver and the illegal receiver can perform channel estimation. Through channel estimation, the legitimate receiver and the illegal receiver can estimate the target marker signal in the received marker signal yi transmitted through the wireless channel
Figure BDA00016464586100001117

在一些示例中,由于合法接收端知晓单比特隐蔽性协议,非法接收端不知道到单比特隐蔽性协议,故合法接收端可以基于单比特隐蔽性协议进一步处理目标标记信号

Figure BDA0001646458610000116
下面在对信号的处理中所涉及的接收端若无特别说明均是指合法接收端。In some examples, since the legitimate receiver knows the single-bit concealment protocol and the illegal receiver does not know the single-bit concealment protocol, the legitimate receiver can further process the target marker signal based on the single-bit concealment protocol
Figure BDA0001646458610000116
The receivers involved in the signal processing below refer to legitimate receivers unless otherwise specified.

在一些示例中,单比特隐蔽性协议设置了信息信号的能量分配因子

Figure BDA0001646458610000117
的初始值(即第一个时间段的能量分配因子
Figure BDA0001646458610000118
值),又因为
Figure BDA0001646458610000119
故认证信号的能量分配因子ρt 2的值也可以确定。故在知道
Figure BDA00016464586100001110
Figure BDA00016464586100001111
Figure BDA00016464586100001112
的情况下,接收端可以提取出目标标记信号
Figure BDA00016464586100001113
中的残余信号ri。另外,能量分配因子
Figure BDA00016464586100001114
可以被优化,自第二个时间段起(包含第二个时间段)单比特隐蔽性协议中设置的能量分配因子
Figure BDA00016464586100001115
也可以为优化的能量分配因子
Figure BDA00016464586100001116
值。由此,能够使单比特隐蔽性协议得到优化。In some examples, the single-bit stealth protocol sets the energy allocation factor for the information signal
Figure BDA0001646458610000117
The initial value of (i.e. the energy distribution factor for the first time period
Figure BDA0001646458610000118
value), and because
Figure BDA0001646458610000119
Therefore, the value of the energy distribution factor ρ t 2 of the authentication signal can also be determined. so know
Figure BDA00016464586100001110
Figure BDA00016464586100001111
and
Figure BDA00016464586100001112
In the case of , the receiver can extract the target marker signal
Figure BDA00016464586100001113
residual signal ri in . In addition, the energy distribution factor
Figure BDA00016464586100001114
can be optimized, since the second time period (including the second time period) the energy distribution factor set in the single-bit stealth protocol
Figure BDA00016464586100001115
It is also possible to assign factors for the optimized energy
Figure BDA00016464586100001116
value. Thereby, the single-bit concealment protocol can be optimized.

在一些示例中,接收端获取残余信号ri后,可以进一步判断残余信号ri中是否包含认证信号ti。接收端可以根据判断的结果向发射端反馈标记信号的信噪比阈值μ的单比特信息。由于接收端的反馈基于单比特隐蔽性协议,故接收端可以是基于单比特隐蔽性协议向发射端反馈信噪比阈值μ的单比特信息。也即,在单比特隐蔽性协议中,接收端向发射端反馈信噪比阈值μ的单比特信息。另外,在单比特隐蔽性协议下信噪比阈值μ在一定范围内具有可行性。信噪比阈值μ的可行范围的获得后续进行详细描述。In some examples, after acquiring the residual signal ri , the receiving end may further determine whether the residual signal ri includes the authentication signal t i . The receiving end can feed back the single-bit information of the signal-to-noise ratio threshold μ of the marker signal to the transmitting end according to the judgment result. Since the feedback of the receiving end is based on the single-bit concealment protocol, the receiving end may feed back the single-bit information of the signal-to-noise ratio threshold μ to the transmitting end based on the single-bit concealment protocol. That is, in the single-bit concealment protocol, the receiving end feeds back single-bit information of the signal-to-noise ratio threshold μ to the transmitting end. In addition, the signal-to-noise ratio threshold μ is feasible within a certain range under the single-bit concealment protocol. The obtaining of the feasible range of the signal-to-noise ratio threshold μ will be described in detail later.

另外,在一些示例中,接收端可以判断残余信号ri中是否包含认证信号ti。根据判断的结果接收端可以得到虚警概率(PFA)和检测率(PD)。在虚警概率(PFA)的约束下基于检测率(PD)可以得到保密认证概率(Probability of secrecy authentication,PSA)。保密认证概率(PSA)可以由下式(5)计算得到:In addition, in some examples, the receiving end may determine whether the residual signal ri includes the authentication signal t i . According to the judgment result, the receiving end can obtain the false alarm probability (PFA) and the detection rate (PD). The Probability of Secrecy Authentication (PSA) can be obtained based on the Detection Rate (PD) under the constraint of the False Alarm Probability (PFA). The secret authentication probability (PSA) can be calculated by the following formula (5):

PSA=max{PD,1-PD,2,0} (5)P SA = max{P D,1 -P D,2 ,0} (5)

其中,PD,1表示合法接收端的检测率,PD,2表示非法接收端的检测率。由此,通过保密认证概率(PSA)可以确定标记信号被非法接收端监测的情况。Among them, P D,1 represents the detection rate of the legitimate receiving end, and P D,2 represents the detection rate of the illegal receiving end. Thus, it can be determined that the marker signal is being monitored by an unauthorized receiver through the security authentication probability (PSA).

在一些示例中,物理层认证方法还可以包括基于接收的信息信号的信干噪比获得认证请求传输概率和隐蔽认证拒绝概率(步骤S130)。In some examples, the physical layer authentication method may further include obtaining the authentication request transmission probability and the covert authentication rejection probability based on the signal-to-interference-noise ratio of the received information signal (step S130).

在步骤S130中,规定的接收端接收的标记信号的信干噪比(the terminologymessage-to-interference-plus-noise ratio,MINR)可以由下式(6)计算得到:In step S130, the signal-to-interference-to-noise ratio (the terminology message-to-interference-plus-noise ratio, MINR) of the marker signal received by the specified receiver can be calculated by the following formula (6):

Figure BDA0001646458610000121
Figure BDA0001646458610000121

其中,

Figure BDA0001646458610000122
表示信息信号的能量分配因子。
Figure BDA0001646458610000123
表示认证信号的能量分配因子。由于标记信号分块发送,γb,i表示第i块接收端的信道信噪比。hb,i表示接收端接收的第i块标记信号的信道增益。in,
Figure BDA0001646458610000122
Represents the energy distribution factor of the information signal.
Figure BDA0001646458610000123
Represents the energy distribution factor of the authentication signal. Since the marker signal is sent in blocks, γ b,i represents the channel signal-to-noise ratio at the receiving end of the ith block. h b,i represents the channel gain of the i-th block marked signal received by the receiver.

在一些示例中,若发射端发射的信号是常规信号,即发射端发射的信号不包括认证信号,则认证信号的能量分配因子

Figure BDA0001646458610000124
为零,信息信号的能量分配因子
Figure BDA0001646458610000131
为1。由此,
Figure BDA0001646458610000132
若发射端发射的信号是标记信号,则认证信号的能量分配因子
Figure BDA0001646458610000133
不为零,由式(6)可知,发射端发射标记信号时的信干噪比(MINR)比发射端发射常规信号时的信干噪比(MINR)小,故发射端发射标记信号时,信干噪比(MINR)满足
Figure BDA0001646458610000134
In some examples, if the signal transmitted by the transmitting end is a regular signal, that is, the signal transmitted by the transmitting end does not include the authentication signal, the energy distribution factor of the authentication signal
Figure BDA0001646458610000124
zero, the energy distribution factor of the information signal
Figure BDA0001646458610000131
is 1. thus,
Figure BDA0001646458610000132
If the signal transmitted by the transmitter is a marker signal, the energy distribution factor of the authentication signal
Figure BDA0001646458610000133
is not zero. From equation (6), it can be known that the signal-to-interference-to-noise ratio (MINR) when the transmitter transmits the marked signal is smaller than the signal-to-interference and noise ratio (MINR) when the transmitter transmits the conventional signal, so when the transmitter transmits the marked signal, Signal-to-interference-to-noise ratio (MINR)
Figure BDA0001646458610000134

另外,认证请求传输概率(Probability of authentication-requesttransmission,PART)可以根据上述的信干噪比(MINR)得到。认证请求传输概率(PART)可以由下式(7)计算得到:In addition, the authentication request transmission probability (Probability of authentication-request transmission, PART) can be obtained according to the above-mentioned signal to interference and noise ratio (MINR). The authentication request transmission probability (PART) can be calculated by the following formula (7):

Figure BDA0001646458610000135
Figure BDA0001646458610000135

由此,根据认证请求传输概率(PART)能够衡量认证传输请求延迟的性能。Thus, the performance of the authentication transmission request delay can be measured according to the authentication request transmission probability (PART).

在一些示例中,基于上述步骤S110中的信道假设条件,为了维持隐蔽性要求,设置信噪比阈值μ,使信噪比阈值满足

Figure BDA0001646458610000136
结合式(7)可以得出式(8)所示的认证请求传输概率(PART):In some examples, based on the channel assumptions in the above step S110, in order to maintain the concealment requirement, the signal-to-noise ratio threshold μ is set so that the signal-to-noise ratio threshold satisfies
Figure BDA0001646458610000136
Combined with equation (7), the authentication request transmission probability (PART) shown in equation (8) can be obtained:

Figure BDA0001646458610000137
Figure BDA0001646458610000137

其中,Rb表示常规信号速率。where R b represents the normal signal rate.

在一些示例中,在单比特隐蔽性协议下,认证请求传输概率(PART)的值需要满足

Figure BDA0001646458610000138
其中,εART是认证请求传输概率(PART)的下限,且其满足0≤εART≤εART1。其中,εART1满足
Figure BDA0001646458610000139
基于上述认证请求传输概率(PART)的约束条件,可以得到接收端反馈的信噪比阈值μ的可行范围,即
Figure BDA00016464586100001310
In some examples, under a single-bit stealth protocol, the value of the authentication request transmission probability (PART) needs to satisfy
Figure BDA0001646458610000138
Among them, ε ART is the lower limit of the authentication request transmission probability (PART), and it satisfies 0≤ε ART ≤ε ART1 . where ε ART1 satisfies
Figure BDA0001646458610000139
Based on the above constraints on the transmission probability of authentication request (PART), the feasible range of the signal-to-noise ratio threshold μ fed back by the receiver can be obtained, that is,
Figure BDA00016464586100001310

另外,在一些示例中,在标记信号中的信息信号不能实现在接收端无错误地被解码时,接收端就会发生认证隐蔽拒绝事件。此时的认证隐蔽拒绝的概率(Probability ofauthentication-covertness rejection,PACR)可以被认为是认证请求传输概率(PART)条件下的认证隐蔽拒绝概率。认证隐蔽拒绝概率也称隐蔽认证拒绝概率。隐蔽认证拒绝概率(PACR)可以根据上述的信干噪比(MINR)得到。隐蔽认证拒绝概率(PACR)可以由下式(9)计算得到:Additionally, in some examples, an authentication concealment rejection event occurs at the receiving end when the information signal in the flag signal cannot be decoded without error at the receiving end. The probability of authentication-covertness rejection (Probability of authentication-covertness rejection, PACR) at this time can be regarded as the probability of authentication-covertness rejection under the condition of authentication request transmission probability (PART). The authentication concealment rejection probability is also called the concealment authentication rejection probability. The Covert Authentication Rejection Probability (PACR) can be obtained from the above-mentioned Signal to Interference and Noise Ratio (MINR). The probability of covert authentication rejection (PACR) can be calculated by the following formula (9):

Figure BDA0001646458610000141
Figure BDA0001646458610000141

在一些示例中,设置信噪比阈值μ,使信噪比阈值满足

Figure BDA0001646458610000142
对其进行变形可以得到,
Figure BDA0001646458610000143
在这种情况下,结合式(9)可以得出PACR=0。由此,可以看出在标记信号中的信息信号不能实现在接收端无错误地被解码时,接收端不可能发生认证隐蔽拒绝事件。也即任何隐蔽约束都是可行的。In some examples, the signal-to-noise ratio threshold μ is set such that the signal-to-noise ratio threshold satisfies
Figure BDA0001646458610000142
Transform it to get,
Figure BDA0001646458610000143
In this case, P ACR = 0 can be obtained in combination with equation (9). From this, it can be seen that when the information signal in the marker signal cannot be decoded without error at the receiving end, the authentication concealment rejection event cannot occur at the receiving end. That is, any hidden constraints are feasible.

另外,在单比特隐蔽性协议下,隐蔽认证拒绝概率(PACR)需要满足

Figure BDA0001646458610000144
其中,εACR是隐蔽认证拒绝概率(PACR)的上限,其满足0≤εACR≤1。由此,根据隐蔽认证概率(PACR)能够量度物理层认证技术的隐蔽等级。In addition, under the single-bit concealment protocol, the Probability of Concealed Authentication Rejection (PACR) needs to satisfy
Figure BDA0001646458610000144
Among them, ε ACR is the upper limit of the covert authentication rejection probability (PACR), which satisfies 0≤ε ACR ≤1. Thus, the concealment level of the physical layer authentication technique can be measured according to the probability of concealment authentication (PACR).

在一些示例中,基于上述隐蔽认证拒绝概率(PACR)的约束条件,可以得到接收端反馈的信噪比阈值μ的可行范围,即

Figure BDA0001646458610000145
其中,
Figure BDA0001646458610000146
In some examples, based on the above constraints of the probability of concealed authentication rejection (PACR), the feasible range of the signal-to-noise ratio threshold μ fed back by the receiver can be obtained, that is,
Figure BDA0001646458610000145
in,
Figure BDA0001646458610000146

故在单比特隐蔽性协议下接收端反馈的信噪比阈值μ的可行范围是可以综合上述认证请求传输概率(PART)的约束条件和隐蔽认证拒绝概率(PACR)的约束条件得到的。Therefore, the feasible range of the signal-to-noise ratio threshold μ fed back by the receiver under the single-bit concealment protocol can be obtained by synthesizing the above constraints of the probability of transmission of authentication request (PART) and the constraint of probability of concealed authentication rejection (PACR).

另外,在一些示例中,在单比特隐蔽性协议下,基于上述PACR=0的约束条件,为满足

Figure BDA0001646458610000147
通过下式(10)优化的能量分配因子
Figure BDA0001646458610000148
In addition, in some examples, under the single-bit concealment protocol, based on the above-mentioned constraint condition of P ACR =0, in order to satisfy the
Figure BDA0001646458610000147
The energy distribution factor optimized by the following equation (10)
Figure BDA0001646458610000148

Figure BDA0001646458610000149
Figure BDA0001646458610000149

其中,

Figure BDA00016464586100001410
in,
Figure BDA00016464586100001410

在一些示例中,物理层认证方法还可以包括基于保密认证概率、认证请求传输概率和隐蔽认证拒绝概率计算出保密认证效率,以确定物理层认证的隐蔽等级(步骤S140)。In some examples, the physical layer authentication method may further include calculating the privacy authentication efficiency based on the privacy authentication probability, the authentication request transmission probability and the concealment authentication rejection probability to determine the concealment level of the physical layer authentication (step S140).

在步骤S140中,保密认证概率(PSA)、认证请求传输概率(PART)和隐蔽认证拒绝概率(PACR)可以通过上述步骤S120和S130得到。In step S140 , the privacy authentication probability (PSA), the authentication request transmission probability (PART) and the concealed authentication rejection probability (PACR) can be obtained through the above steps S120 and S130.

在一些示例中,基于保密认证概率(PSA)、认证请求传输概率(PART)和隐蔽认证拒绝概率(PACR)计算出保密认证效率(secrecy authentication efficiency,SAE)。In some examples, the secret authentication efficiency (SAE) is calculated based on the secret authentication probability (PSA), the authentication request transmission probability (PART), and the covert authentication rejection probability (PACR).

在一些示例中,规定保密认证效率(SAE)可以由下式(11)计算得到:In some examples, the prescribed secret authentication efficiency (SAE) can be calculated by the following equation (11):

η=PART(1-PACR)PSA (11)η=P ART (1-P ACR )P SA (11)

其中,PART表示认证请求传输概率(PART),PACR表示隐蔽认证拒绝概率(PACR),PSA表示保密认证概率(PSA)。η表示保密认证效率(SAE)。另外,使保密认证效率(SAE)具有非零正值的条件是满足上述信噪比阈值μ的可行范围同时需要满足

Figure BDA0001646458610000151
Among them, PART represents the authentication request transmission probability (PART), P ACR represents the covert authentication rejection probability ( PACR ), and PSA represents the secret authentication probability (PSA). η represents the Secret Authentication Efficiency (SAE). In addition, the condition for the security authentication efficiency (SAE) to have a non-zero positive value is to satisfy the feasible range of the above-mentioned signal-to-noise ratio threshold μ and also to satisfy the
Figure BDA0001646458610000151

在一些示例中,保密认证效率(SAE)中包括认证请求传输概率(PART)和隐蔽认证拒绝概率(PACR),其中认证请求传输概率(PART)可以评估物理层认证的请求延迟。隐蔽认证拒绝概率(PACR)可以确定物理层认证的隐蔽等级。由此,保密认证效率(SAE)可以更好评估请求延迟和隐蔽等级。In some examples, the Privacy Authentication Efficiency (SAE) includes the Authentication Request Transmission Probability (PART) and the Covert Authentication Rejection Probability (PACR), where the Authentication Request Transmission Probability (PART) may assess the request delay for physical layer authentication. The Probability of Covert Authentication Rejection (PACR) can determine the stealth level of the physical layer authentication. As a result, Secrecy Authentication Efficiency (SAE) can better assess request latency and stealth levels.

另外,在一些示例中,在优化的能量分配因子

Figure BDA0001646458610000152
和可行性范围内的信噪比阈值μ情况下,受认证请求传输概率(PART)和隐蔽认证拒绝概率(PACR)约束的保密认证效率(SAE)获得最大值。具体而言,保密认证效率(SAE)最大值、认证请求传输概率(PART)和隐蔽认证拒绝概率(PACR)的关系由下式(12)获得:Additionally, in some examples, at the optimized energy distribution factor
Figure BDA0001646458610000152
Secrecy Authentication Efficiency (SAE) constrained by Authentication Request Transmission Probability (PART) and Covert Authentication Rejection Probability (PACR) obtains the maximum value under the condition of SNR threshold μ within the feasible range. Specifically, the relationship between the maximum value of confidential authentication efficiency (SAE), the probability of transmission of authentication requests (PART) and the probability of concealed authentication rejection (PACR) is obtained by the following formula (12):

Figure BDA0001646458610000153
Figure BDA0001646458610000153

其中,εACR是隐蔽认证拒绝概率(PACR)的上限,而εART是认证请求传输概率(PART)的下限,Rb表示常规信号速率。where ε ACR is the upper bound of the probability of covert authentication rejection (PACR), ε ART is the lower bound of the probability of transmission of authentication requests (PART), and R b represents the regular signal rate.

在一些示例中,发射端基于单比特隐蔽性协议发射标记信号,接收端接收标记信号,基于单比特隐蔽性协议经过处理获得保密认证效率(SAE)。其中,单比特隐蔽性协议规定标记信号中的信息信号的能量分配因子在间隔时间段内保持固定。在这种情况下,基于单比特隐蔽性协议和用于物理层认证的衡量指标——保密认证效率(SAE),能够更好评估隐蔽等级。In some examples, the transmitting end transmits the marking signal based on the single-bit stealth protocol, the receiving terminal receives the marking signal, and obtains the Security Authentication Efficiency (SAE) through processing based on the single-bit stealth protocol. Among them, the single-bit concealment protocol stipulates that the energy distribution factor of the information signal in the marker signal remains fixed in the interval time period. In this case, the stealth level can be better assessed based on the single-bit stealth protocol and the metric used for physical layer authentication, the Secrecy Authentication Efficiency (SAE).

图4是示出了本公开的示例所涉及的物理层认证方法的接收端保密认证效率波形示意图。FIG. 4 is a schematic waveform diagram illustrating the efficiency of the receiving-end secret authentication of the physical layer authentication method involved in the example of the present disclosure.

在一些示例中,如图4所示,在单比特隐蔽性协议下,接收端的信噪比小于等于15dB时,保密认证效率(SAE)一直为零,当接收端的信噪比继续增大时,保密认证效率(SAE)迅速增加并接近于1。In some examples, as shown in Figure 4, under the single-bit concealment protocol, when the signal-to-noise ratio of the receiving end is less than or equal to 15dB, the confidentiality authentication efficiency (SAE) is always zero, and when the signal-to-noise ratio of the receiving end continues to increase, The Secret Authentication Efficiency (SAE) increases rapidly and approaches 1.

根据图可知,在非单比特隐蔽性协议下,信息信号的能量分配因子

Figure BDA0001646458610000162
恒定为0.9时,在接收端的信噪比小于等于17dB时,保密认证效率(SAE)一直为零。当接收端的信噪比继续增大时,保密认证效率(SAE)迅速增加并接近于1。信息信号的能量分配因子
Figure BDA0001646458610000161
恒定为0.8时,在接收端的信噪比小于等于24dB时,保密认证效率(SAE)一直为零。当接收端的信噪比继续增大时,保密认证效率(SAE)迅速增加并接近于1。According to the figure, under the non-single-bit concealment protocol, the energy distribution factor of the information signal
Figure BDA0001646458610000162
When it is constant at 0.9, when the signal-to-noise ratio of the receiving end is less than or equal to 17dB, the secret authentication efficiency (SAE) is always zero. When the signal-to-noise ratio at the receiving end continues to increase, the Secrecy Authentication Efficiency (SAE) increases rapidly and approaches 1. Energy distribution factor of information signal
Figure BDA0001646458610000161
When it is constant at 0.8, when the signal-to-noise ratio of the receiving end is less than or equal to 24dB, the security authentication efficiency (SAE) is always zero. When the signal-to-noise ratio at the receiving end continues to increase, the Secrecy Authentication Efficiency (SAE) increases rapidly and approaches 1.

由图可知,单比特隐蔽性协议下对接收端的信噪比要求比非单比特隐蔽性协议下对接收端的信噪比要求低,因此,在接收端信噪比较低时单比特隐蔽性协议更加优越。It can be seen from the figure that the SNR requirement of the receiver under the single-bit concealment protocol is lower than that of the receiver under the non-single-bit concealment protocol. Therefore, when the SNR of the receiver is low, the single-bit concealment protocol more superior.

图5是示出了本公开的示例所涉及的物理层认证方法的非法接收端保密认证效率波形示意图。FIG. 5 is a schematic diagram showing a waveform of the secret authentication efficiency of the illegal receiving end of the physical layer authentication method involved in the example of the present disclosure.

在一些示例中,如图5所示,在单比特隐蔽性协议下,非法接收端的信噪比小于等于17dB时,保密认证效率(SAE)接近于1且变化不大,当非法接收端的信噪比继续增大时,保密认证效率(SAE)迅速减小并接近于0,并在后续的非法接收端的信噪比继续增大时,保密认证效率(SAE)慢慢减小至0。In some examples, as shown in Figure 5, under the single-bit concealment protocol, when the signal-to-noise ratio of the illegal receiver is less than or equal to 17dB, the security authentication efficiency (SAE) is close to 1 and does not change much. When the ratio continues to increase, the Secrecy Authentication Efficiency (SAE) decreases rapidly and approaches 0, and when the SNR of the subsequent illegal receiver continues to increase, the Secrecy Authentication Efficiency (SAE) gradually decreases to 0.

根据图可知,在非单比特隐蔽性协议下,信息信号的能量分配因子

Figure BDA0001646458610000171
恒定为0.9时,在非法接收端的信噪比小于等于15dB时,保密认证效率(SAE)接近于1且变化不大。当非法接收端的信噪比继续增大时,保密认证效率(SAE)迅速减小并接近于0,并在后续的非法接收端的信噪比继续增大时,慢慢减小至0。信息信号的能量分配因子
Figure BDA0001646458610000172
恒定为0.8时,非法接收端的保密认证效率(SAE)一直为0。According to the figure, under the non-single-bit concealment protocol, the energy distribution factor of the information signal
Figure BDA0001646458610000171
When it is constant at 0.9, when the signal-to-noise ratio of the illegal receiver is less than or equal to 15dB, the secret authentication efficiency (SAE) is close to 1 and does not change much. When the SNR of the illegal receiving end continues to increase, the Secrecy Authentication Efficiency (SAE) decreases rapidly and is close to 0, and gradually decreases to 0 when the SNR of the subsequent illegal receiving end continues to increase. Energy distribution factor of information signal
Figure BDA0001646458610000172
When it is constant at 0.8, the secret authentication efficiency (SAE) of the illegal receiver is always 0.

综合考虑对合法接收端和非法接收端的不同要求,例如,对合法接收端和非法接收端的保密认证效率(SAE)的不同要求,基于单比特隐蔽性协议的物理层认证方法更加有效。Considering the different requirements for legitimate receivers and illegal receivers, for example, the different requirements for Secrecy Authentication Efficiency (SAE) of legitimate receivers and illegal receivers, the physical layer authentication method based on the single-bit concealment protocol is more effective.

图6是示出了本公开的示例所涉及的物理层认证系统结构示意图。图7是示出了本公开的示例所涉及的物理层认证系统接收装置信号处理模块示意图。FIG. 6 is a schematic diagram showing the structure of a physical layer authentication system involved in an example of the present disclosure. FIG. 7 is a schematic diagram illustrating a signal processing module of a receiving apparatus of a physical layer authentication system according to an example of the present disclosure.

在一些示例中,基于单比特隐蔽性协议的物理层认证系统,是具有发射装置和接收装置的无线通信系统的物理层认证系统。其中,接收装置可以包括合法接收装置和非法接收装置。另外,本公开中的发射装置和发射端可以是相同的概念,接收装置和接收端可以是相同的概念。In some examples, the single-bit stealth protocol based physical layer authentication system is a physical layer authentication system of a wireless communication system having a transmitting device and a receiving device. Wherein, the receiving device may include a legal receiving device and an illegal receiving device. In addition, the transmitting device and the transmitting end in the present disclosure may be the same concept, and the receiving device and the receiving end may be the same concept.

在一些示例中,如图6所示,基于单比特隐蔽性协议的物理层认证系统1(简称物理层认证系统1)可以包括发射装置10和接收装置20。接收装置20可以包括合法接收装置和非法接收装置。In some examples, as shown in FIG. 6 , the physical layer authentication system 1 based on the single-bit stealth protocol (referred to as the physical layer authentication system 1 ) may include a transmitting apparatus 10 and a receiving apparatus 20 . The receiving device 20 may include legitimate receiving devices and illegal receiving devices.

在一些示例中,发射装置10基于单比特隐蔽性协议向无线信道发射标记信号,标记信号包括认证信号和信息信号,在单比特隐蔽性协议中,令信息信号的能量分配因子在间隔时间段内保持固定且为优化值。In some examples, the transmitting device 10 transmits a marker signal to the wireless channel based on a single-bit stealth protocol, the marker signal includes an authentication signal and an information signal, and in the single-bit stealth protocol, the energy distribution factor of the information signal is within the interval time period. Remains fixed and optimized.

在一些示例中,发射装置10所在的物理层认证系统1的信道假设条件可以是接收端的信道状态信息存在单比特的情况,也即发射端知道接收端反馈的单比特的信道状态信息。具体而言,可以类比上述步骤S110中的信道假设条件。In some examples, the channel assumption of the physical layer authentication system 1 where the transmitting device 10 is located may be that the channel state information of the receiving end has a single bit, that is, the transmitting end knows the single-bit channel state information fed back by the receiving end. Specifically, the channel assumption condition in the above step S110 can be analogized.

在一些示例中,发射装置10向无线信道发射标记信号。也即发射装置10可以发送认证请求。标记信号可以包括认证信号和信息信号。认证信号可以反应发射装置10和合法接收装置之间共享的密钥知识。信息信号可以反映所要传递的信息。认证信号可以叠加在信息信号上。标记信号可以是成块发射的。标记信号可以如式(1)所示。本实施方式不限于此,发射装置10可以向无线信道发射常规信号。常规信号中不包括认证信号。In some examples, transmitting device 10 transmits a marker signal to a wireless channel. That is, the transmitting apparatus 10 can send an authentication request. Flag signals may include authentication signals and information signals. The authentication signal may reflect knowledge of the key shared between the transmitting device 10 and the legitimate receiving device. The information signal can reflect the information to be conveyed. The authentication signal may be superimposed on the information signal. The marker signal may be transmitted in blocks. The marker signal can be as shown in Equation (1). The present embodiment is not limited thereto, and the transmitting apparatus 10 may transmit regular signals to the wireless channel. Authentication signals are not included in regular signals.

在一些示例中,基于上述的信道假设条件设置了单比特隐蔽性协议。发射装置10在向无线信道发射标记信号时,遵从的协议可以是单比特隐蔽性协议。单比特隐蔽性协议规定了信息信号的能量分配因子

Figure BDA0001646458610000181
在间隔时间段内保持固定。即发射端向无线信道发射标记信号时,标记信号中的信息信号的能量分配因子在间隔时间段内保持固定。换而言之,单比特隐蔽性协议规定了发射端以在间隔时间段内保持固定的能量分配因子
Figure BDA0001646458610000182
发送认证请求。如图6所示,实线表示发射装置10发送认证请求。其中,信息信号的能量分配因子
Figure BDA0001646458610000183
可以称为认证协议参数。In some examples, a single-bit stealth protocol is set up based on the channel assumptions described above. When the transmitting device 10 transmits the marker signal to the wireless channel, the protocol complied with may be a single-bit concealment protocol. The single-bit concealment protocol specifies the energy distribution factor of the information signal
Figure BDA0001646458610000181
remain fixed during the interval period. That is, when the transmitting end transmits the marker signal to the wireless channel, the energy distribution factor of the information signal in the marker signal remains fixed in the interval period. In other words, the single-bit stealth protocol specifies the transmitter to maintain a fixed energy allocation factor during the interval
Figure BDA0001646458610000182
Send an authentication request. As shown in FIG. 6 , the solid line indicates that the transmitting device 10 sends the authentication request. Among them, the energy distribution factor of the information signal
Figure BDA0001646458610000183
Can be called authentication protocol parameters.

在一些示例中,在间隔时间段内保持固定的能量分配因子

Figure BDA0001646458610000184
表示能量分配因子
Figure BDA0001646458610000185
不是在整个通信过程中恒定不变的。在不同的时间段,能量分配因子
Figure BDA0001646458610000186
可以不同,在时间段内的能量分配因子可以保持固定。In some examples, a fixed energy allocation factor is maintained over the interval
Figure BDA0001646458610000184
represents the energy distribution factor
Figure BDA0001646458610000185
Not constant throughout the communication process. At different time periods, the energy distribution factor
Figure BDA0001646458610000186
can be different, and the energy allocation factor over the time period can remain fixed.

在一些示例中,单比特隐蔽性协议还规定了信息信号的能量分配因子

Figure BDA0001646458610000187
在间隔时间段内是优化值。也即时间段内的信息信号的能量分配因子
Figure BDA0001646458610000188
也可以是相应时间段内的能量分配因子
Figure BDA0001646458610000189
优化值。能量分配因子
Figure BDA00016464586100001810
优化值的获取类比上述物理层认证方法中的优化能量分配因子
Figure BDA00016464586100001811
的方法。In some examples, the single-bit stealth protocol also specifies an energy allocation factor for the information signal
Figure BDA0001646458610000187
During the interval period is the optimized value. That is, the energy distribution factor of the information signal in the time period
Figure BDA0001646458610000188
It can also be the energy distribution factor in the corresponding time period
Figure BDA0001646458610000189
optimized value. energy distribution factor
Figure BDA00016464586100001810
The acquisition of the optimized value is analogous to the optimized energy allocation factor in the above physical layer authentication method
Figure BDA00016464586100001811
Methods.

在一些示例中,发射装置10基于单比特隐蔽性协议向无线信道发射标记信号。其中,无线信道存在信道增益h。故经过无线信道传输的标记信号可以包括信道增益h。In some examples, transmitting device 10 transmits a marker signal to a wireless channel based on a single-bit stealth protocol. Among them, the wireless channel has a channel gain h. Therefore, the marker signal transmitted through the wireless channel can include the channel gain h.

在一些示例中,由于非法接收装置不知道单比特隐蔽性协议且与发射装置10之间也没有共享的密钥知识,故非法接收装置对接收到的标记信号通常不能进行处理以进行隐蔽性分析。下面在对信号的处理中所涉及的接收装置20若无特别说明均是指合法接收装置。In some examples, since the illicit receiving device has no knowledge of the single-bit stealth protocol and no shared key knowledge with the transmitting device 10, the illicit receiving device typically cannot process the received flag signal for stealth analysis . The receiving device 20 involved in the signal processing below refers to a legitimate receiving device unless otherwise specified.

在一些示例中,如图6所示,物理层认证系统1还可以包括接收装置20。接收装置20可以用于接收和处理经过无线信道的标记信号。接收装置20向发射装置10反馈信噪比阈值μ的单比特信息。如图6所示,虚线表示接收装置20对发射装置10的反馈。In some examples, as shown in FIG. 6 , the physical layer authentication system 1 may further include a receiving apparatus 20 . The receiving means 20 may be used to receive and process the marker signal via the wireless channel. The receiving device 20 feeds back the single-bit information of the signal-to-noise ratio threshold μ to the transmitting device 10 . As shown in FIG. 6 , the dotted line represents the feedback from the receiving device 20 to the transmitting device 10 .

在一些示例中,如图7所示,接收装置20可以包括处理模块21。处理模块21接收标记信号,基于单比特隐蔽性协议,对标记信号进行处理,获得保密认证概率(PSA)。In some examples, as shown in FIG. 7 , the receiving apparatus 20 may include a processing module 21 . The processing module 21 receives the marker signal, processes the marker signal based on the single-bit concealment protocol, and obtains a Privacy Authentication Probability (PSA).

在一些示例中,由于发射装置10发射的标记信号是分块发射的,故标记信号可以被接收装置20分块接收。由于非法接收装置也可以分块接收标记信号。故接收装置20中的处理模块21接收到的标记信号如式(2)所示。In some examples, since the marker signal transmitted by the transmitting device 10 is transmitted in blocks, the marker signal may be received by the receiving device 20 in blocks. Since the illegal receiving device can also receive the marker signal in blocks. Therefore, the mark signal received by the processing module 21 in the receiving device 20 is shown in formula (2).

在一些示例中,接收装置20中的处理模块21和非法接收装置可以进行信道估计。通过信道估计,处理模块21和非法接收装置可以估计出接收的经过无线信道传输的标记信号yi中的目标标记信号

Figure BDA0001646458610000191
另外,处理模块21接收的每块标记信号的信噪比SNR分别可以如式(3)所示。处理模块21接收的标记信号的平均信噪比SNR分别可以如式(4)所示。In some examples, the processing module 21 in the receiving device 20 and the illegal receiving device may perform channel estimation. Through channel estimation, the processing module 21 and the illegal receiving device can estimate the target marker signal in the received marker signal yi transmitted through the wireless channel
Figure BDA0001646458610000191
In addition, the signal-to-noise ratio (SNR) of each block of marker signals received by the processing module 21 may be respectively shown in equation (3). The average signal-to-noise ratio SNR of the marker signal received by the processing module 21 may be respectively shown in equation (4).

在一些示例中,由于接收装置20知晓单比特隐蔽性协议,非法接收装置不知道到单比特隐蔽性协议,故接收装置20的处理模块21可以基于单比特隐蔽性协议进一步处理目标标记信号

Figure BDA0001646458610000192
In some examples, since the receiving device 20 knows the single-bit stealth protocol and the illegal receiving device does not know the single-bit stealth protocol, the processing module 21 of the receiving device 20 can further process the target marker signal based on the single-bit stealth protocol
Figure BDA0001646458610000192

在一些示例中,单比特隐蔽性协议设置了信息信号的能量分配因子

Figure BDA0001646458610000193
的初始值(即第一个时间段的能量分配因子
Figure BDA0001646458610000194
值),又因为
Figure BDA0001646458610000195
故认证信号的能量分配因子
Figure BDA0001646458610000196
的值也可以确定。故在知道
Figure BDA0001646458610000197
Figure BDA0001646458610000198
Figure BDA0001646458610000199
的情况下,接收端可以提取出目标标记信号
Figure BDA00016464586100001910
中的残余信号ri。另外,能量分配因子
Figure BDA00016464586100001911
可以被优化,自第二个时间段起(包含第二个时间段)单比特隐蔽性协议中设置的能量分配因子
Figure BDA00016464586100001912
也可以为优化的能量分配因子
Figure BDA00016464586100001913
值。由此,能够使单比特隐蔽性协议得到优化。In some examples, the single-bit stealth protocol sets the energy allocation factor for the information signal
Figure BDA0001646458610000193
The initial value of (i.e. the energy distribution factor for the first time period
Figure BDA0001646458610000194
value), and because
Figure BDA0001646458610000195
Therefore, the energy distribution factor of the authentication signal
Figure BDA0001646458610000196
value can also be determined. so know
Figure BDA0001646458610000197
Figure BDA0001646458610000198
and
Figure BDA0001646458610000199
In the case of , the receiver can extract the target marker signal
Figure BDA00016464586100001910
residual signal ri in . In addition, the energy distribution factor
Figure BDA00016464586100001911
can be optimized, since the second time period (including the second time period) the energy distribution factor set in the single-bit stealth protocol
Figure BDA00016464586100001912
It is also possible to assign factors to the optimized energy
Figure BDA00016464586100001913
value. Thereby, the single-bit concealment protocol can be optimized.

在一些示例中,处理模块21获取残余信号ri后,可以进一步判断残余信号ri中是否包含认证信号ti。接收装置20可以根据判断的结果将标记信号的信噪比的阈值μ反馈给发射装置10。也即接收装置20可以是基于单比特隐蔽性协议向发射装置10反馈信噪比阈值μ的单比特信息。也即,在单比特隐蔽性协议中,接收装置向发射装置反馈信噪比阈值μ的单比特信息。信噪比阈值μ的可行范围可以类比上述物理层认证方法中的信噪比阈值μ的获取。In some examples, after the processing module 21 obtains the residual signal ri , it can further determine whether the residual signal ri includes the authentication signal ti . The receiving device 20 may feed back the threshold μ of the signal-to-noise ratio of the marker signal to the transmitting device 10 according to the judgment result. That is, the receiving apparatus 20 may feed back the single-bit information of the signal-to-noise ratio threshold μ to the transmitting apparatus 10 based on the single-bit concealment protocol. That is, in the single-bit concealment protocol, the receiving apparatus feeds back single-bit information of the signal-to-noise ratio threshold μ to the transmitting apparatus. The feasible range of the signal-to-noise ratio threshold μ can be analogous to the acquisition of the signal-to-noise ratio threshold μ in the above-mentioned physical layer authentication method.

另外,在一些示例中,接收装置20可以判断残余信号ri中是否包含认证信号ti。根据判断的结果接收装置20可以得到虚警概率(PFA)和检测率(PD)。基于检测率(PD)可以得到保密认证概率(PSA)。保密认证概率(PSA)可以如式(5)所示。In addition, in some examples, the receiving apparatus 20 may determine whether the authentication signal t i is included in the residual signal ri . According to the judgment result, the receiving device 20 can obtain the false alarm probability (PFA) and the detection rate (PD). The Privacy Authentication Probability (PSA) can be obtained based on the Detection Rate (PD). The secret authentication probability (PSA) can be shown as formula (5).

在一些示例中,如图7所示,接收装置20可以包括计算模块22。计算模块22基于接收的信息信号的信干噪比获得认证请求传输概率和隐蔽认证拒绝概率。In some examples, as shown in FIG. 7 , the receiving apparatus 20 may include a computing module 22 . The calculation module 22 obtains the authentication request transmission probability and the concealed authentication rejection probability based on the signal-to-interference-noise ratio of the received information signal.

在一些示例中,规定的接收装置20接收的标记信号的信干噪比(MINR)可以如式(6)所示。若发射装置10发射的信号是常规信号,即发射装置10发射的信号不包括认证信号,则认证信号的能量分配因子

Figure BDA0001646458610000201
为零,信息信号的能量分配因子
Figure BDA0001646458610000202
为1。由此,
Figure BDA0001646458610000203
若发射装置10发射的信号是标记信号,则认证信号的能量分配因子
Figure BDA0001646458610000204
不为零,由式(6)可知,发射端发射标记信号时的信干噪比(MINR)比发射端发射常规信号时的信干噪比(MINR)小,故发射端发射标记信号时,信干噪比(MINR)满足
Figure BDA0001646458610000205
In some examples, the prescribed signal-to-interference-to-noise ratio (MINR) of the marker signal received by the receiving device 20 may be as shown in equation (6). If the signal transmitted by the transmitting device 10 is a conventional signal, that is, the signal transmitted by the transmitting device 10 does not include an authentication signal, the energy distribution factor of the authentication signal
Figure BDA0001646458610000201
zero, the energy distribution factor of the information signal
Figure BDA0001646458610000202
is 1. thus,
Figure BDA0001646458610000203
If the signal transmitted by the transmitting device 10 is a marker signal, the energy distribution factor of the authentication signal
Figure BDA0001646458610000204
is not zero. From equation (6), it can be known that the signal-to-interference-to-noise ratio (MINR) when the transmitter transmits the marked signal is smaller than the signal-to-interference and noise ratio (MINR) when the transmitter transmits the conventional signal, so when the transmitter transmits the marked signal, Signal-to-interference-to-noise ratio (MINR)
Figure BDA0001646458610000205

另外,认证请求传输概率(PART)可以根据上述的信干噪比(MINR)得到。认证请求传输概率(PART)可以如式(7)所示。认证请求传输概率(PART)能够衡量认证传输请求延迟的性能。在一些示例中,由于物理层认证系统1基于上述的信道假设条件,为了维持隐蔽性要求,设置信噪比阈值μ,使信噪比阈值满足

Figure BDA0001646458610000206
结合式(7)可以得出式(8)所示的认证请求传输概率(PART)。In addition, the authentication request transmission probability (PART) can be obtained according to the above-mentioned signal to interference and noise ratio (MINR). The authentication request transmission probability (PART) can be shown in equation (7). Authentication Request Transmission Probability (PART) can measure the performance of authentication transmission request delay. In some examples, since the physical layer authentication system 1 is based on the above-mentioned channel assumptions, in order to maintain the concealment requirement, the signal-to-noise ratio threshold μ is set so that the signal-to-noise ratio threshold satisfies
Figure BDA0001646458610000206
Combined with equation (7), the authentication request transmission probability (PART) shown in equation (8) can be obtained.

在一些示例中,在单比特隐蔽性协议下,认证请求传输概率(PART)的值需要满足

Figure BDA0001646458610000207
其中,εART是认证请求传输概率(PART)的下限,且其满足0≤εART≤εART1。其中,εART1满足
Figure BDA0001646458610000208
In some examples, under a single-bit stealth protocol, the value of the authentication request transmission probability (PART) needs to satisfy
Figure BDA0001646458610000207
Among them, ε ART is the lower limit of the authentication request transmission probability (PART), and it satisfies 0≤ε ART ≤ε ART1 . where ε ART1 satisfies
Figure BDA0001646458610000208

另外,在一些示例中,在标记信号中的信息信号不能实现在接收装置20无错误地被解码时,接收装置20就会发生认证隐蔽拒绝事件。隐蔽认证拒绝概率(PACR)可以根据上述的信干噪比(MINR)得到。隐蔽认证拒绝概率(PACR)可以如式(9)所示。Additionally, in some examples, when the information signal in the flag signal cannot be decoded without error by the receiving device 20, the receiving device 20 may experience an authentication concealment rejection event. The Covert Authentication Rejection Probability (PACR) can be obtained from the above-mentioned Signal to Interference and Noise Ratio (MINR). The probability of covert authentication rejection (PACR) can be shown in equation (9).

在一些示例中,设置信噪比阈值μ,使信噪比阈值满足

Figure BDA0001646458610000211
对其进行变形可以得到,
Figure BDA0001646458610000212
在这种情况下,结合式(9)可以得出PACR=0。由此,可以看出在标记信号中的信息信号不能实现在接收端无错误地被解码时,接收端不可能发生发生认证隐蔽拒绝事件。也即任何隐蔽约束都是可行的。In some examples, the signal-to-noise ratio threshold μ is set such that the signal-to-noise ratio threshold satisfies
Figure BDA0001646458610000211
Transform it to get,
Figure BDA0001646458610000212
In this case, P ACR = 0 can be obtained in combination with equation (9). From this, it can be seen that when the information signal in the marker signal cannot be decoded without error at the receiving end, the authentication concealment rejection event cannot occur at the receiving end. That is, any hidden constraints are feasible.

另外,在单比特隐蔽性协议下,隐蔽认证拒绝概率(PACR)需要满足

Figure BDA0001646458610000213
其中,εACR是隐蔽认证拒绝概率(PACR)的上限,其满足εACR≤1。由此,根据隐蔽认证概率(PACR)能够量度物理层认证技术的隐蔽等级。In addition, under the single-bit concealment protocol, the Probability of Concealed Authentication Rejection (PACR) needs to satisfy
Figure BDA0001646458610000213
where ε ACR is an upper bound on the probability of covert authentication rejection (PACR), which satisfies ε ACR ≤1. Thus, the concealment level of the physical layer authentication technique can be measured according to the probability of concealment authentication (PACR).

另外,在一些示例中,在单比特隐蔽性协议下,基于PACR=0和

Figure BDA0001646458610000214
通过式(10)得到优化的能量分配因子
Figure BDA0001646458610000215
Additionally, in some examples, under single-bit stealth protocols, based on P ACR = 0 and
Figure BDA0001646458610000214
The optimized energy distribution factor is obtained by formula (10)
Figure BDA0001646458610000215

在一些示例中,如图7所示,接收装置20可以包括判定模块23。判定模块23根据保密认证概率、认证请求传输概率和隐蔽认证拒绝的概率计算出保密认证效率,以确定物理层认证的请求延迟和隐蔽等级。In some examples, as shown in FIG. 7 , the receiving apparatus 20 may include a determination module 23 . The determination module 23 calculates the secret authentication efficiency according to the secret authentication probability, the authentication request transmission probability and the concealed authentication rejection probability, so as to determine the request delay and concealment level of the physical layer authentication.

另外,在一些示例中,保密认证概率(PSA)、认证请求传输概率(PART)和隐蔽认证拒绝概率(PACR)可以通过处理模块21和计算模块22得到。Additionally, in some examples, the Probability of Secrecy Authentication (PSA), Probability of Transmission of Authentication Requests (PART), and Probability of Covert Authentication Rejection (PACR) may be obtained by the processing module 21 and the computing module 22 .

在一些示例中,基于保密认证概率(PSA)、认证请求传输概率(PART)和隐蔽认证拒绝概率(PACR)计算出保密认证效率(SAE)。规定保密认证效率(SAE)可以由如式(11)所示。In some examples, the Privacy Authentication Efficiency (SAE) is calculated based on the Privacy Authentication Probability (PSA), the Authentication Request Transmission Probability (PART), and the Covert Authentication Rejection Probability (PACR). Prescribed Secret Authentication Efficiency (SAE) can be expressed as Equation (11).

在一些示例中,保密认证效率(SAE)中包括认证请求传输概率(PART)和隐蔽认证拒绝概率(PACR),其中认证请求传输概率(PART)可以评估物理层认证的请求延迟。隐蔽认证拒绝概率(PACR)可以确定物理层认证的隐蔽等级。由此,保密认证效率(SAE)可以更好评估请求延迟和隐蔽等级。In some examples, the Privacy Authentication Efficiency (SAE) includes the Authentication Request Transmission Probability (PART) and the Covert Authentication Rejection Probability (PACR), where the Authentication Request Transmission Probability (PART) may assess the request delay for physical layer authentication. The Probability of Covert Authentication Rejection (PACR) can determine the stealth level of the physical layer authentication. As a result, Secrecy Authentication Efficiency (SAE) can better assess request latency and stealth levels.

另外,在一些示例中,在优化的能量分配因子

Figure BDA0001646458610000216
和可行性范围内的信噪比阈值μ情况下,受认证请求传输概率(PART)和隐蔽认证拒绝概率(PACR)约束的保密认证效率(SAE)获得最大值。具体而言,保密认证效率(SAE)最大值、认证请求传输概率(PART)和隐蔽认证拒绝概率(PACR)的关系由式(12)获得。Additionally, in some examples, at the optimized energy distribution factor
Figure BDA0001646458610000216
Secrecy Authentication Efficiency (SAE) constrained by Authentication Request Transmission Probability (PART) and Covert Authentication Rejection Probability (PACR) obtains the maximum value under the condition of SNR threshold μ within the feasible range. Specifically, the relationship between the maximum value of confidential authentication efficiency (SAE), the probability of transmission of authentication requests (PART) and the probability of concealed authentication rejection (PACR) is obtained by Equation (12).

图8是示出了本公开的示例所涉及的物理层认证设备的结构示意图。在一些示例中,发射端与接收端都包含如图8所示的认证设备30。FIG. 8 is a schematic diagram showing the structure of a physical layer authentication device involved in an example of the present disclosure. In some examples, both the transmitter and the receiver include an authentication device 30 as shown in FIG. 8 .

在一些示例中,如图8所示,认证设备30包括处理器31和存储器32。其中,处理器31以及存储器32分别连接通信总线。在一些示例中,存储器32可以是高速RAM存储器,也可以是非易失性的存储器(non-volatile memory)。本领域技术人员可以理解,图8中示出的认证设备30的结构并不构成对本公开的限定,它既可以是总线形结构,也可以是星型结构,还可以包括比图8所示的更多或更少的部件,或者组合某些部件,或者不同的部件布置。In some examples, as shown in FIG. 8 , the authentication device 30 includes a processor 31 and a memory 32 . The processor 31 and the memory 32 are respectively connected to the communication bus. In some examples, memory 32 may be high-speed RAM memory or non-volatile memory. Those skilled in the art can understand that the structure of the authentication device 30 shown in FIG. 8 does not constitute a limitation of the present disclosure, and it can be either a bus-shaped structure, a star-shaped structure, or a More or fewer components, or a combination of certain components, or a different arrangement of components.

其中,处理器31为认证设备30的控制中心。在一些示例中,可以是中央处理器(Central Processing Unit,CPU),处理器31利用各种接口和线路连接整个认证设备30的各个部分,通过运行或执行存储在存储器32内的软件程序和/或模块,以及调用存储在存储器32内存储的程序代码,用于执行以下操作:The processor 31 is the control center of the authentication device 30 . In some examples, it can be a central processing unit (Central Processing Unit, CPU). The processor 31 uses various interfaces and lines to connect various parts of the entire authentication device 30, and by running or executing the software programs stored in the memory 32 and/or or modules, and call program code stored in memory 32 for performing the following operations:

在接收端的信道状态信息存在单比特反馈的情况下,发射端基于单比特隐蔽性协议向无线信道发射标记信号,标记信号包括认证信号和信息信号,在单比特隐蔽性协议中,令信息信号的能量分配因子在间隔时间段内保持固定且为优化值(由发射端的认证设备30执行)。In the case of single-bit feedback in the channel state information of the receiver, the transmitter transmits a marker signal to the wireless channel based on the single-bit stealth protocol. The marker signal includes an authentication signal and an information signal. In the single-bit stealth protocol, let the information signal The energy allocation factor remains fixed and optimized for the interval period (performed by the authentication device 30 at the transmitting end).

接收端接收标记信号,基于单比特隐蔽性协议,对标记信号进行处理,获得保密认证概率;基于接收的信息信号的信干噪比获得认证请求传输概率和隐蔽认证拒绝概率;并且基于保密认证概率、认证请求传输概率和隐蔽认证拒绝概率计算出保密认证效率,以确定物理层认证的隐蔽等级(由接收端的认证设备30执行)。The receiving end receives the marked signal, processes the marked signal based on the single-bit concealment protocol, and obtains the secret authentication probability; based on the signal-to-interference-noise ratio of the received information signal, the authentication request transmission probability and the concealed authentication rejection probability are obtained; and based on the secret authentication probability , the authentication request transmission probability and the concealed authentication rejection probability to calculate the secret authentication efficiency to determine the concealment level of the physical layer authentication (executed by the authentication device 30 at the receiving end).

在一些示例中,认证设备30的处理器31还执行以下操作:在单比特隐蔽性协议中,向发射端反馈信噪比阈值μ的单比特信息,设置

Figure BDA0001646458610000221
令PACR=0,其中,Rb表示常规信号速率。In some examples, the processor 31 of the authentication device 30 also performs the following operations: in the single-bit concealment protocol, feedback the single-bit information of the signal-to-noise ratio threshold μ to the transmitter, set
Figure BDA0001646458610000221
Let P ACR = 0, where R b represents the normal signal rate.

在一些示例中,认证设备30的处理器31还执行以下操作:基于PACR=0,信息信号的能量分配因子的优化值由下式(10)计算得到:

Figure BDA0001646458610000231
其中,
Figure BDA0001646458610000232
εART是认证请求传输概率的下限,γb表示平均信噪比,Rb表示常规信号速率。In some examples, the processor 31 of the authentication device 30 also performs the following operations: based on P ACR =0, the optimal value of the energy distribution factor of the information signal is calculated by the following formula (10):
Figure BDA0001646458610000231
in,
Figure BDA0001646458610000232
ε ART is the lower bound of the transmission probability of the authentication request, γ b is the average signal-to-noise ratio, and R b is the normal signal rate.

在一些示例中,认证设备30的处理器31还执行以下操作:保密认证效率由下式(11)计算得到:η=PART(1-PACR)PSA (11),其中,PART表示认证请求传输概率,PACR表示隐蔽认证拒绝概率,PSA表示保密认证概率。In some examples, the processor 31 of the authentication device 30 also performs the following operations: The secret authentication efficiency is calculated by the following formula (11): η=P ART (1-P ACR )P SA (11), where PART represents Authentication request transmission probability, P ACR represents the probability of concealed authentication rejection, and PSA represents the probability of confidential authentication.

在一些示例中,认证设备30的处理器31还执行以下操作:信息信号的信干噪比由下式(6)计算得到:

Figure BDA0001646458610000233
其中,
Figure BDA0001646458610000234
表示信息信号的能量分配因子,
Figure BDA0001646458610000235
表示认证信号的能量分配因子,标记信号分块发送,γb,i表示第i块标记信号在接收端的信道信噪比,hb,i表示第i块标记信号的信道增益,
Figure BDA0001646458610000236
表示接收端的噪声方差。In some examples, the processor 31 of the authentication device 30 also performs the following operations: the signal-to-interference-to-noise ratio of the information signal is calculated by the following formula (6):
Figure BDA0001646458610000233
in,
Figure BDA0001646458610000234
represents the energy distribution factor of the information signal,
Figure BDA0001646458610000235
Represents the energy distribution factor of the authentication signal, the marker signal is sent in blocks, γ b,i represents the channel signal-to-noise ratio of the ith block of marker signals at the receiving end, h b,i represents the channel gain of the ith block of marker signals,
Figure BDA0001646458610000236
represents the noise variance at the receiver.

在一些示例中,应该理解到,所揭露的设备,可通过其它的方式实现。例如,以上所描述的设备示例中仅仅是示意性的,例如所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性或其它的形式。In some examples, it should be understood that the disclosed apparatus may be implemented in other ways. For example, the device examples described above are only schematic. For example, the division of the units is only a logical function division. In actual implementation, there may be other division methods. For example, multiple units or components may be combined or may be Integration into another system, or some features can be ignored, or not implemented. On the other hand, the shown or discussed mutual coupling or direct coupling or communication connection may be through some interfaces, indirect coupling or communication connection of devices or units, and may be in electrical or other forms.

作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。Units described as separate components may or may not be physically separated, and components shown as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution in this embodiment.

另外,在一些示例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。In addition, in some examples, each functional unit may be integrated into one processing unit, or each unit may exist physically alone, or two or more units may be integrated into one unit. The above-mentioned integrated units may be implemented in the form of hardware, or may be implemented in the form of software functional units.

在一些示例中,集成的单元如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储器中。基于这样的理解,本公开的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的全部或部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储器中,包括若干指令用以使得一台计算机设备(可为个人计算机、服务器或者网络设备等)执行本公开各个实施例所述方法的全部或部分步骤。而前述的存储器包括:U盘、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、移动硬盘、磁碟或者光盘等各种可以存储程序代码的介质。In some examples, the integrated unit, if implemented as a software functional unit and sold or used as a stand-alone product, may be stored in a computer-readable memory. Based on such understanding, the technical solutions of the present disclosure essentially or the parts that contribute to the prior art or all or part of the technical solutions can be embodied in the form of software products, and the computer software products are stored in a memory, Several instructions are included to cause a computer device (which may be a personal computer, a server, or a network device, etc.) to perform all or part of the steps of the methods described in the various embodiments of the present disclosure. The aforementioned memory includes: U disk, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), mobile hard disk, magnetic disk or optical disk and other media that can store program codes.

在一些示例中公开了一种计算机可读存储介质,本领域普通技术人员可以理解上述示例中的各种物理层认证方法中的全部或部分步骤是可以通过程序(指令)来指令相关的硬件来完成,该程序(指令)可以存储于计算机可读存储器(存储介质)中,存储器可以包括:闪存盘、只读存储器(Read-Only Memory,ROM)、随机存取器(Random Access Memory,RAM)、磁盘或光盘等。In some examples, a computer-readable storage medium is disclosed, and those of ordinary skill in the art can understand that all or part of the steps in the various physical layer authentication methods in the above examples can be implemented by instructing relevant hardware through programs (instructions). Completion, the program (instruction) can be stored in a computer-readable memory (storage medium), and the memory can include: a flash disk, a read-only memory (Read-Only Memory, ROM), a random access device (Random Access Memory, RAM) , disk or CD, etc.

虽然以上结合附图和实施例对本公开进行了具体说明,但是可以理解,上述说明不以任何形式限制本公开。本领域技术人员在不偏离本公开的实质精神和范围的情况下可以根据需要对本公开进行变形和变化,这些变形和变化均落入本公开的范围内。Although the present disclosure has been specifically described above with reference to the accompanying drawings and embodiments, it should be understood that the above description does not limit the present disclosure in any form. Those skilled in the art can make modifications and changes of the present disclosure as required without departing from the essential spirit and scope of the present disclosure, and these modifications and changes all fall within the scope of the present disclosure.

Claims (2)

1.一种基于单比特隐蔽性协议的物理层认证方法,是包含发射端和接收端的无线通信系统的物理层认证的隐蔽性分析方法,其特征在于,1. a physical layer authentication method based on single-bit concealment protocol, is the concealment analysis method of the physical layer authentication of the wireless communication system comprising transmitting end and receiving end, it is characterized in that, 包括:include: 所述发射端基于单比特隐蔽性协议向无线信道发射标记信号,所述标记信号包括认证信号和信息信号,在所述单比特隐蔽性协议中,令所述信息信号的能量分配因子在间隔时间段内保持固定且为优化值;The transmitting end transmits a marker signal to the wireless channel based on a single-bit stealth protocol, and the marker signal includes an authentication signal and an information signal. In the single-bit stealth protocol, the energy distribution factor of the information signal is set at the interval time. The segment remains fixed and is an optimized value; 所述接收端接收所述标记信号,基于所述单比特隐蔽性协议,对所述标记信号进行处理,获得保密认证概率;The receiving end receives the marked signal, and based on the single-bit concealment protocol, processes the marked signal to obtain a secret authentication probability; 基于接收的所述标记信号的信干噪比获得认证请求传输概率和隐蔽认证拒绝概率;并且obtaining an authentication request transmission probability and a covert authentication rejection probability based on the received signal-to-interference-noise ratio of the flag signal; and 基于所述保密认证概率、所述认证请求传输概率和所述隐蔽认证拒绝概率计算出保密认证效率,以确定物理层认证的隐蔽等级,The secret authentication efficiency is calculated based on the secret authentication probability, the authentication request transmission probability and the concealed authentication rejection probability to determine the concealment level of the physical layer authentication, 其中,所述保密认证效率满足:η=PART(1-PACR)PSA,其中,η表示所述保密认证效率,PART表示所述认证请求传输概率,且满足
Figure FDA0002842695620000011
PACR表示所述隐蔽认证拒绝概率,且满足
Figure FDA0002842695620000012
PSA表示所述保密认证概率,且满足PSA=max{PD,1-PD,2,0},μ表示信噪比阈值,所述标记信号的信干噪比满足:
Wherein, the secret authentication efficiency satisfies: η=P ART (1-P ACR )P SA , where n represents the secret authentication efficiency, PART represents the authentication request transmission probability, and satisfies
Figure FDA0002842695620000011
P ACR represents the covert authentication rejection probability, and satisfies
Figure FDA0002842695620000012
P SA represents the secret authentication probability, and satisfies P SA =max{P D,1 -P D,2 ,0}, μ represents the signal-to-noise ratio threshold, and the signal-to-interference-noise ratio of the marker signal satisfies:
Figure FDA0002842695620000013
其中,
Figure FDA0002842695620000014
表示所述信息信号的能量分配因子,
Figure FDA0002842695620000015
表示所述认证信号的能量分配因子,所述标记信号分块发送,γb,i表示第i块标记信号在所述接收端的信道信噪比,hb,i表示第i块标记信号的信道增益,
Figure FDA0002842695620000016
表示所述接收端的噪声方差,Rb表示常规信号速率,PD,1表示合法接收端的检测率,PD,2表示非法接收端的检测率,在所述单比特隐蔽性协议中,设置
Figure FDA0002842695620000017
令PACR=0,基于PACR=0,信息信号的能量分配因子的优化值满足:
Figure FDA0002842695620000018
其中,
Figure FDA0002842695620000019
εART是认证请求传输概率的下限,γb表示平均信噪比。
Figure FDA0002842695620000013
in,
Figure FDA0002842695620000014
represents the energy distribution factor of the information signal,
Figure FDA0002842695620000015
represents the energy distribution factor of the authentication signal, the marker signal is sent in blocks, γ b,i represents the channel signal-to-noise ratio of the ith block of marker signals at the receiving end, h b,i represents the channel of the ith block of marker signals gain,
Figure FDA0002842695620000016
represents the noise variance of the receiving end, R b represents the normal signal rate, P D,1 represents the detection rate of the legitimate receiving end, and P D,2 represents the detection rate of the illegal receiving end. In the single-bit concealment protocol, set
Figure FDA0002842695620000017
Let P ACR =0, based on P ACR =0, the optimal value of the energy distribution factor of the information signal satisfies:
Figure FDA0002842695620000018
in,
Figure FDA0002842695620000019
ε ART is the lower bound of the transmission probability of the authentication request, and γ b represents the average signal-to-noise ratio.
2.一种基于单比特隐蔽性协议的物理层认证系统,其特征在于,2. a physical layer authentication system based on single-bit concealment protocol, is characterized in that, 包括:include: 发射装置,所述发射装置基于单比特隐蔽性协议向无线信道发射标记信号,所述标记信号包括认证信号和信息信号,在所述单比特隐蔽性协议中,令所述信息信号的能量分配因子在间隔时间段内保持固定且为优化值;A transmitting device, the transmitting device transmits a marker signal to a wireless channel based on a single-bit stealth protocol, the marker signal includes an authentication signal and an information signal, and in the single-bit stealth protocol, let the energy distribution factor of the information signal It remains fixed and optimized for the interval period; 接收装置,其包括:处理模块,其接收所述标记信号,基于所述单比特隐蔽性协议,对所述标记信号进行处理,获得保密认证概率;计算模块,其基于接收的所述标记信号的信干噪比获得认证请求传输概率和隐蔽认证拒绝概率;以及判定模块,其根据所述保密认证概率、所述认证请求传输概率和所述隐蔽认证拒绝的概率计算出保密认证效率,以确定物理层认证的隐蔽等级,A receiving device, comprising: a processing module, which receives the marking signal, processes the marking signal based on the single-bit concealment protocol, and obtains a secret authentication probability; a computing module, which is based on the received marking signal The signal-to-interference-noise ratio obtains the authentication request transmission probability and the concealed authentication rejection probability; and a determination module, which calculates the confidential authentication efficiency according to the confidential authentication probability, the authentication request transmission probability and the concealed authentication rejection probability to determine the physical Layer authentication concealment level, 其中,所述保密认证效率满足:η=PART(1-PACR)PSA,其中,η表示所述保密认证效率,PART表示所述认证请求传输概率,且满足
Figure FDA0002842695620000021
PACR表示所述隐蔽认证拒绝概率,且满足
Figure FDA0002842695620000022
PSA表示所述保密认证概率,且满足PSA=max{PD,1-PD,2,0},μ表示信噪比阈值,所述标记信号的信干噪比满足:
Wherein, the secret authentication efficiency satisfies: η=P ART (1-P ACR )P SA , where n represents the secret authentication efficiency, PART represents the authentication request transmission probability, and satisfies
Figure FDA0002842695620000021
P ACR represents the covert authentication rejection probability, and satisfies
Figure FDA0002842695620000022
P SA represents the secret authentication probability, and satisfies P SA =max{P D,1 -P D,2 ,0}, μ represents the signal-to-noise ratio threshold, and the signal-to-interference-noise ratio of the marker signal satisfies:
Figure FDA0002842695620000023
其中,
Figure FDA0002842695620000024
表示所述信息信号的能量分配因子,
Figure FDA0002842695620000025
表示所述认证信号的能量分配因子,所述标记信号分块发送,γb,i表示第i块标记信号在所述接收装置的信道信噪比,hb,i表示第i块标记信号的信道增益,
Figure FDA0002842695620000026
表示所述接收装置的噪声方差,Rb表示常规信号速率,PD,1表示合法接收装置的检测率,PD,2表示非法接收装置的检测率,在所述单比特隐蔽性协议中,设置
Figure FDA0002842695620000027
令PACR=0,基于PACR=0,信息信号的能量分配因子的优化值满足:
Figure FDA0002842695620000028
其中,
Figure FDA0002842695620000029
εART是认证请求传输概率的下限,γb表示平均信噪比。
Figure FDA0002842695620000023
in,
Figure FDA0002842695620000024
represents the energy distribution factor of the information signal,
Figure FDA0002842695620000025
Represents the energy distribution factor of the authentication signal, the marker signal is sent in blocks, γ b,i represents the channel signal-to-noise ratio of the i-th marker signal at the receiving device, h b,i represents the i-th block marker signal channel gain,
Figure FDA0002842695620000026
represents the noise variance of the receiving device, R b represents the normal signal rate, P D,1 represents the detection rate of the legitimate receiving device, and P D,2 represents the detection rate of the illegal receiving device. In the single-bit concealment protocol, set up
Figure FDA0002842695620000027
Let P ACR =0, based on P ACR =0, the optimal value of the energy distribution factor of the information signal satisfies:
Figure FDA0002842695620000028
in,
Figure FDA0002842695620000029
ε ART is the lower bound of the transmission probability of the authentication request, and γ b represents the average signal-to-noise ratio.
CN201810404236.XA 2018-04-28 2018-04-28 Physical layer authentication method and system based on single-bit covert protocol Expired - Fee Related CN108966223B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810404236.XA CN108966223B (en) 2018-04-28 2018-04-28 Physical layer authentication method and system based on single-bit covert protocol

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810404236.XA CN108966223B (en) 2018-04-28 2018-04-28 Physical layer authentication method and system based on single-bit covert protocol

Publications (2)

Publication Number Publication Date
CN108966223A CN108966223A (en) 2018-12-07
CN108966223B true CN108966223B (en) 2021-03-09

Family

ID=64499018

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810404236.XA Expired - Fee Related CN108966223B (en) 2018-04-28 2018-04-28 Physical layer authentication method and system based on single-bit covert protocol

Country Status (1)

Country Link
CN (1) CN108966223B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113194464B (en) * 2021-04-26 2022-05-17 北京理工大学 A method and device for concealed communication at the physical layer of the Internet of Things based on spectrum detection

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106656405A (en) * 2016-10-19 2017-05-10 浙江大学 Method for minimizing system confidentiality interruption probability using energy station
CN106792685A (en) * 2016-12-13 2017-05-31 北京北邮信息网络产业研究院有限公司 A kind of joint qualification method based on carrier frequency and received signal strength

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7079480B2 (en) * 2000-10-28 2006-07-18 Agee Brian G Enhancing security and efficiency of wireless communications through structural embedding

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106656405A (en) * 2016-10-19 2017-05-10 浙江大学 Method for minimizing system confidentiality interruption probability using energy station
CN106792685A (en) * 2016-12-13 2017-05-31 北京北邮信息网络产业研究院有限公司 A kind of joint qualification method based on carrier frequency and received signal strength

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
"LTE/SAE Security Issues on 4G Wireless Networks";Anastasios N. Bikos; Nicolas Sklavos;《IEEE Security & Privacy》;20121022;全文 *
"Physical-layer authentication for wireless security enhancement: current challenges and future developments";Xianbin Wang; Peng Hao; Lajos Hanzo;《 IEEE Communications Magazine 》;20160623;全文 *
"基于3GPP LTE-A中继传输技术的安全性分析";陈自强;《中国优秀硕士学位论文全文数据库 信息科技辑》;20150415;全文 *
"物理层安全中保密容量提升方法的研究";陈一杰;《中国优秀硕士学位论文全文数据库 信息科技辑》;20140315;全文 *

Also Published As

Publication number Publication date
CN108966223A (en) 2018-12-07

Similar Documents

Publication Publication Date Title
CN109168166B (en) Security Detection Method of Physical Layer Authentication System
CN111555836B (en) Wireless covert communication model and method based on multi-node cooperative interference blocking
CN112383380B (en) Covert vehicle communication method based on non-orthogonal multiple access technology
CN110381510A (en) Non-orthogonal multiple Verification System based on superposition physical layer authenticating tag
Huang et al. Identifying the fake base station: A location based approach
US20200015082A1 (en) Secure Physical Layer Slope Authentication Method in Wireless Communications and Apparatus
CN110381511B (en) Non-Orthogonal Multiple Access Authentication System Based on Shared Physical Layer Authentication Labels
CN110324830B (en) Non-Orthogonal Multiple Access Authentication System Based on Time Division Multiplexing Physical Layer Authentication Labels
CN108206795A (en) Blind authentication method and system based on the frequency selective fading channels that confidence is transmitted
CN108966223B (en) Physical layer authentication method and system based on single-bit covert protocol
CN108173791B (en) Physical layer blind authentication method and system for time-varying fading channel based on smoothing technology
US20200015083A1 (en) Robust Physical Layer Slope Authentication Method in Wireless Communications and Apparatus
CN114531674B (en) A joint confidentiality and covert communication method and system based on rate division
CN110312255B (en) Parameter optimization method of non-orthogonal multiple access authentication system based on superimposed authentication tags
CN110380798B (en) A Non-Orthogonal Multiple Access Authentication System and Parameter Optimization Method Based on Shared Authentication Labels
CN110392371B (en) Optimization method of non-orthogonal multiple access authentication system based on time division multiplexing authentication tag
CN108156102B (en) Blind authentication method and system of frequency selective fading channel based on smoothing technology
CN108934011B (en) Method, device, storage medium and system for analyzing concealment of physical layer authentication
CN108966222B (en) Physical layer authentication method and system based on self-adaptive covert protocol
CN108934012B (en) Physical Layer Authentication Method and System Based on Optimal Concealment Protocol
CN110337094B (en) A secure transmission system and method for D2D content sharing
US11412378B2 (en) Smoothing technology-based blind authentication method and system for frequency selective fading channel
CN111683363B (en) Physical layer authentication method and system in airspace modulation system
CN118233968A (en) A secure transmission method based on internal wiretapping and monitoring in rate division multiple access networks
WO2019205179A1 (en) Physical layer authentication method and system based on optimal secrecy protocol

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20210309