CN107181732A - A kind of physical layer secret communication method based on modulation symbol phase place - Google Patents

A kind of physical layer secret communication method based on modulation symbol phase place Download PDF

Info

Publication number
CN107181732A
CN107181732A CN201710171744.3A CN201710171744A CN107181732A CN 107181732 A CN107181732 A CN 107181732A CN 201710171744 A CN201710171744 A CN 201710171744A CN 107181732 A CN107181732 A CN 107181732A
Authority
CN
China
Prior art keywords
msub
mrow
phase
chaos sequence
channel
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710171744.3A
Other languages
Chinese (zh)
Other versions
CN107181732B (en
Inventor
王亢
周国民
李国军
董齐芬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Police College
Original Assignee
Zhejiang Police College
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Police College filed Critical Zhejiang Police College
Priority to CN201710171744.3A priority Critical patent/CN107181732B/en
Publication of CN107181732A publication Critical patent/CN107181732A/en
Application granted granted Critical
Publication of CN107181732B publication Critical patent/CN107181732B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L27/00Modulated-carrier systems
    • H04L27/18Phase-modulated carrier systems, i.e. using phase-shift keying
    • H04L27/20Modulator circuits; Transmitter circuits
    • H04L27/2003Modulator circuits; Transmitter circuits for continuous phase modulation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/001Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Error Detection And Correction (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

A kind of encryption in physical layer communication means based on modulation symbol phase place, rectangle MQAM symbol is made up of P separate 4QAM symbols superpositions, by the phase Random-Rotation to P 4QAM symbol, realizes the safe transmission of data between validated user;Validated user both sides utilize channel condition information, the seed number of the chaos sequence generator for producing random number is determined according to channel reciprocity theorem and negotiation mechanism, and it is updated periodically seed number, reset chaos sequence generator, to produce new chaos sequence, by one group of chaos sequence of generation, approximately independent P groups are obtained by interleaver and are uniformly distributed random sequence.The reciprocity and negotiation mechanism of channel ensure that the uniformity of both sides' phase place, and the randomness of channel ensure that listener-in can not obtain the Random-Rotation phase consistent with transmitting terminal.The present invention enables validated user to realizing that the safe transmission of data, security are higher under static channel or quasistatic channel circumstance.

Description

A kind of physical layer secret communication method based on modulation symbol phase place
Technical field
The present invention relates to radio communication and field of information security technology, and in particular to is based on modulation symbol phase based on one kind The physical layer secret communication method of rotation.
Background technology
Safety of physical layer receives researcher's in recent years as the scheme for the secure communication that can theoretically prove Extensive concern, the safety of physical layer technology of main flow can use key and be divided into two classes according to whetheing there is.
In the safety of physical layer technology without key, secrecy capacity is defined as legitimate channel (channel between validated user) Channel capacity and tapping channel (channel between sender and disabled user) channel capacity difference.When secrecy capacity is more than The transmission being perfectly safe can be realized when 0, between validated user;When secrecy capacity is less than 0, then it can not ensure the safety of information again Transmission.Due to the presence of channel fading, it is possible that the channel capacity of legitimate channel is less than the channel capacity of tapping channel, from And can not ensure that secrecy capacity is consistently greater than 0.Propose at present without key physical layer secrecy technology mainly by man made noise, The methods such as velocity of wave shaping, diversity so that secrecy capacity is more than 0, so as to realize being perfectly safe for information transfer.It is used for realizing at present Channel coding without key secure communication, which is thrown away, is so in the theory study stage, and the safety of physical layer technology of no key is only resided within Theoretical research stage, does not put into also and is applied in commercial communication or military communication.
Corresponding with the safety of physical layer technology without key, another kind of is the safety of physical layer technology for having key, this kind of skill Art mainly produces key using the stochastic behaviour and reciprocity of channel, and information waiting for transmission is added in data link layer It is close.However, this kind of method is not but to be applied to all communication situations, for example when validated user channel for static channel or Person is quasistatic channel, and the key entropy for generating key is too low, and the security of information transfer is also substantially reduced therewith.
The content of the invention
In order to overcome the shortcomings of that the security of existing physical layer communication method is relatively low, enable validated user in static state The safe transmission of data is realized under channel or quasistatic channel circumstance, the present invention proposes that a kind of security is higher based on modulation The physical layer secret communication method of symbol phase rotation.
In order to solve the above-mentioned technical problem the present invention provides following technical scheme:
A kind of physical layer secret communication method based on modulation symbol phase place, it is characterised in that:Including physical layer Encryption process and decryption processes;
The encryption process of the physical layer comprises the following steps:
1-1:One group of equally distributed chaos sequence is produced with Tent mapping equations, the seed number of chaos sequence is then by channel Coefficient and negotiation mechanism are determined.One group of chaos sequence, after interweaving by interleaver, generates P group chaos sequences.
1-2:P group rotatable phases, the phase for changing 4QAM symbols are generated with the P groups chaos sequence obtained in step 1-1 Position, each 4QAM symbol is to that should have a rotatable phase.
1-3:Bit information waiting for transmission is modulated with 4QAM, the P group 4QAM symbols of generation.According to the generation in step 1-2 Rotatable phase change the phase of itself, after vector superposed, generate rectangle MQAM symbols, be then forwarded to legal reception Side, completes the encryption in physical layer.
The decryption processes of the physical layer comprise the following steps:
2-1:One group of equally distributed chaos sequence is produced with Tent mapping equations, the seed number of chaos sequence is also to pass through What channel coefficients and negotiation mechanism were determined.It is considered that channel coefficients are invariable, now roots in channel coherency time It is believed that the channel coefficients that road reciprocity theorem is obtained are effective, then mechanism ensures the uniformity of seed number through consultation.
2-2:Legal recipient receives the modulation symbol after encryption of sender's transmission.
2-3:P group rotatable phases are generated after interleaver with the chaos sequence produced in step 2-1.
2-4:The phase of the modulation symbol received in recovering step 2-2, and digital demodulation is iterated to it, compared Special information, completes the decryption in physical layer.
In the step 1-1 and 2-1, the initial value of chaos sequence is determined by channel condition information, and mapped with Tent Equation generates the equally distributed chaos sequence of P groups, and process is as follows:
Sender or recipient obtain one group of channel coefficients and take its envelope, are denoted as respectively as { ∣ ht,l∣, l=1,2 ... }, The envelope of channel coefficients is quantified according to a threshold value Λ, one group of binary sequence { q is obtainedl, specific quantization scheme It is as follows:
Wherein adaptive threshold
μ is average in formula, and σ is mean square deviation.After quantization stage, radio channel characteristic value is converted to 01 bit stream; After consulting by negotiation mechanism, communicating pair has completely the same random seed sequence ql∈ { 0,1 }, l=1,2 ..., Q, By the random seed sequence that length is QIt is converted into the seed number a of chaos sequence1, a1Mathematic(al) representation be:
a1Then it is substituting to Tent mapping equations:
ak+1=2 β (1- | ak|) -1, β=1
Iteration obtains one group of equally distributed chaos sequence { a in (- 1,1) are intervalk, k=1,2 ... };Periodicity real estate Raw random seed a1, and chaos sequence generator is resetted, produce new chaos sequence.
In the step 1-2 and 2-3, revolved respectively with the P groups chaos sequence generation P groups obtained in step 1-1 and 2-1 Phase inversion position, process is as follows:
Chaos sequence should be sent into before being used to generate rotatable phase in an interleaver, and the sequence after intertexture is approximate It is separate;The line number C of interleaver is set>P, the then C sequence number read by row chooses P therein as phase The P group stochastic variables of rotation;
Chaos number after intertexture is to obey (- 1,1) interval interior equally distributed stochastic variable, is floating number, has The floating number of infinite precision requirement, but can not meet in systems in practice;For chaos sequence number ai, take its fractional part The numerical value of m, n, p, constitute an integer, then mould K again, obtain the angle of phase place, its mathematic(al) representation is
Da,i=mod (Extract (ai,m,n,p),K)
Therefore, Da,iIt is to set resolving accuracy, in 360 degree of interior equally distributed stochastic variable θk, walked for 1-2 and 2-3 Phase place in rapid.
In the step 1-3, bit information waiting for transmission is modulated by 4QAM, and the modulation symbol of generation is according to step 1- The rotatable phase of generation in 2 changes the phase of itself, and process is as follows:
Bit { b waiting for transmission2p-1,b2p| p=1,2 ... P } symbol that is generated after 4QAM is modulated of information is denoted as { sp|p =1,2 ... P }, it can regard that MQAM symbol s, s mathematic(al) representation are as follows after P roads 4QAM symbol superposition as:
WhereinChanged with the rotatable phase generated in step 1-2 The phase of 4QAM symbols, μ then represents modulation symbol to be sent after phase place change, the also referred to as modulation symbol after encryption, Its mathematic(al) representation is:
In the step 2-4, recover the phase of modulation symbol received, process is as follows:
To first time iteration, r is inputted1=r, does phase reverse rotation, obtains:
After being demodulated with 4QAM, bit is obtainedCorresponding modulation symbol is obtained after 4QAM is modulated againTogether When, export r2For
It is assumed that this time iterative demodulation is correct, namelyThen export r2It is reduced to:
Next iterative demodulation is sent into, by that analogy, Iterative restoration goes out whole bit informations
The present invention technical concept be:Known by Principle of Communication, Some Higher-order Rectangular MQAM constellation symbols (such as 16QAM, 64QAM) Can be seen as byThe separate 4QAM symbolic vectors in road are formed by stacking.That is, log2M bit, It is divided into P groups, every group of 2 bits, every 2 bits are modulated by the 4QAM of different amplitudes, then vector superposed composition MQAM modulation, its Mathematic(al) representation is
The present invention is discrete phaseIt is generalized on continuous phase interval [- π, π], namely in transmitting terminal, it is raw Into P separate, the equally distributed stochastic variables on [- π, π], random phase is done to P roads 4QAM modulation symbols respectively Rotation, then the vector superposed MQAM symbols for constituting encryption.In receiving terminal, it is necessary to do phase reverse rotation to P roads 4QAM modulation symbols, Could correctly it demodulate.
Random phase θkProduced by chaos sequence generator, receiving-transmitting sides there must be identical seed number, could produce Consistent chaos sequence (random phase).According to channel reciprocity and the negotiation mechanism of chaos sequence seed number, it is ensured that seed Several randomness and the uniformity of receiving-transmitting sides chaos sequence.It is assumed that listener-in and receiving terminal have different locus, Channel i.e. between transmitting terminal-receiving terminal and transmitting terminal-listener-in does not have correlation, and listener-in can not possibly produce and legitimate receipt Person's identical seed number.Therefore, listener-in can not possibly produce the random phase consistent with sender, it is impossible to correct demodulation, namely Any information of legitimate correspondence both sides can not be intercepted.After one group of chaos sequence interweaves by interleaver, the approximate phase of generation P groups Mutual independent chaos sequence.Thus, recipient can accurately recover to receive the phase of symbol, obtain effective after digital demodulation Information.
Equally distributed chaos sequence, its seed number channel shape between legitimate correspondence user are produced with chaotic maps equation State information (CSI) and negotiation mechanism are produced, and periodically reset seed number according to validated user channel condition information.In order to Simplify the Chaotic Synchronous problem between validated user, sender is only with a chaos sequence generator, and recipient is also such.Adopt The method interweaved with interleaver, by the approximately independent P groups random number of one group of generating random number.Beneficial effects of the present invention are:Make Validated user can be to the safe transmission that data are realized under static channel or quasistatic channel circumstance;Security is higher.
Brief description of the drawings
Fig. 1 is that 16QAM can be made up of 2 4QAM.
Fig. 2 is Block Interleaver.
Fig. 3 is transmitting terminal block diagram.
Fig. 4 be receive, phase do not do recover processing symbol constellation.
Fig. 5 is receiving terminal block diagram.
Fig. 6 is the bit error rate under the conditions of legitimate receipt side's signal to noise ratio different with illicit reception side.
Embodiment
Below in conjunction with the accompanying drawings, the present invention is described in detail.
1~Fig. 6 of reference picture, a kind of physical layer secret communication method based on modulation symbol phase place, including physical layer Encryption process and decryption processes;
The encryption process of the physical layer comprises the following steps:
1-1:One group of equally distributed chaos sequence is produced with Tent mapping equations, the seed number of chaos sequence is then by channel Coefficient and negotiation mechanism are determined.One group of chaos sequence, after interweaving by interleaver, generates P group chaos sequences.
1-2:P group rotatable phases, the phase for changing 4QAM symbols are generated with the P groups chaos sequence obtained in step 1-1 Position, each 4QAM symbol is to that should have a rotatable phase.
1-3:Bit information waiting for transmission is modulated with 4QAM, the P group 4QAM symbols of generation.According to the generation in step 1-2 Rotatable phase change the phase of itself, after vector superposed, generate rectangle MQAM symbols, be then forwarded to legal reception Side, completes the encryption in physical layer.
The decryption processes of the physical layer comprise the following steps:
2-1:One group of equally distributed chaos sequence is produced with Tent mapping equations, the seed number of chaos sequence is also to pass through What channel coefficients and negotiation mechanism were determined.It is considered that channel coefficients are invariable, now roots in channel coherency time It is believed that the channel coefficients that road reciprocity theorem is obtained are effective, then mechanism ensures the uniformity of seed number through consultation.
2-2:Legal recipient receives the modulation symbol after encryption of sender's transmission.
2-3:P group rotatable phases are generated after interleaver with the chaos sequence produced in step 2-1.
2-4:The phase of the modulation symbol received in recovering step 2-2, and digital demodulation is iterated to it, compared Special information, completes the decryption in physical layer.
By taking rectangle 16QAM as an example, " x " represents the symbol on 16QAM planispheres on Fig. 1, and each quadrant contains 4 symbols Number, this 4 symbols constitute one using " o " be coordinate center, radius as4QAM constellations.Meanwhile, this 4 " o " are also constituted Radius is4QAM constellations.Fig. 1 visually represents a 16QAM constellation and can be made up of 2 4QAM constellations.
In the step 1-1 and 2-1, sender (recipient) obtain one group of channel coefficients take its envelope, be denoted as respectively for {∣ht,l∣, l=1,2 ... }.The envelope of channel coefficients and adaptive threshold value are compared quantization, obtain one group it is binary Sequence { ql, quantization scheme is as follows:
Wherein adaptive threshold
μ is average in formula, and σ is mean square deviation.After quantization stage, radio channel characteristic value is converted to 01 bit stream. Due to there is the reasons such as interference and noise, and device hardware mismatch in wireless channel, 01 bit stream of receiving-transmitting sides is caused Not fully match.It is very sensitive for initial value (seed number) in view of chaos sequence, two chaos sequence initial values even It is to have 10-10Error all to cause the chaos subsequently produced to count up to complete different.Therefore, present invention employs Brassard The Caseade agreements that G was proposed in 1994 carry out 01 bit stream information mediation so that communicating pair has completely the same random Seed Sequences ql∈ { 0,1 }, l=1,2 ..., Q.By the random seed sequence that length is QIt is converted into the kind of chaos sequence Subnumber a1, a1Mathematic(al) representation be:
Obvious a1∈(-1,1)。a1It is substituting to Tent mapping equations:
ak+1=2 β (1- | ak|) -1, β=1
Iteration obtains one group of equally distributed chaos sequence { a in (- 1,1) are intervalk, k=1,2 ... }.In order to further Strengthen the communication security of legal both sides, periodically produce random seed a1, and chaos sequence generator is resetted, produce newly Chaos sequence.
In order to obtain the equally distributed stochastic variable of P groups, foregoing chaos sequence generator, by friendship as shown in Figure 2 Knit device.Fig. 2 is a Block Interleaver, and data are entered by row write, is read by row.The sequence of chaos sequence generator generation, it is front and rear Several random numbers have certain correlation, but by after interleaver as shown in Figure 2, context interval is at least 8, because This is approximately independent.Furthermore, the line number C of interleaver is set>P, the then C sequence number read by row chooses P work therein For the P group stochastic variables for phase place.How therein P are chosen from C numbers, and receiving-transmitting sides are arranged in advance, But for the listener-in of unknown selection rule, further increase the difficulty for intercepting legal intercommunication information.
P group stochastic variables after interleaver, are to obey (- 1,1) interval interior equally distributed stochastic variable, are Floating number.Floating number with infinite precision requirement, can not meet, for example the digit of DA conversion chips in systems in practice It is limited.To chaos sequence number ai(being represented with 10 systems), takes the numerical value of m, n, p of its fractional part, constitutes one Integer, then mould M again, obtains the angle of phase place.Its mathematic(al) representation is
Da,i=mod (Extract (ai,m,n,p),M)
In systems in practice, as long as taking value of the chaos value rearward on the optional position of several just can be with, such as the 10th, 11 and 12.Due to chaotic characteristic, distributing homogeneity can be protected.Therefore, Da,iBe with certain resolving accuracy (depend on m, n, P, M value), the equally distributed stochastic variable θ in 360 degreek, for the phase place in 1-2 and 2-3 steps.Similarly, How listener-in is if it is not known that from aiObtain Da,i, still can not correctly demodulate any information of sender.
In the step 1-3, bit { b waiting for transmission1,b2,b3,b4It is divided into 2 groups, namely { b1,b2And { b3,b4}.Such as Shown in Fig. 3, every group of 2 bits are denoted as s respectively after 4QAM is modulated1And s2.It can regard as after two-way 4QAM symbol superposition 16QAM symbol s, its mathematic(al) representation is:
WhereinWith two groups generated in step 1-2 independent identically distributed rotatable phase θ1With θ2Change s respectively1And s2Phase, s then represents the modulation symbol after phase place change, is also the modulation symbol after encrypting, and it is counted Learning expression formula is:
Bit { b is can be seen that from this mathematic(al) representation and Fig. 11,b2Power be { b3,b44 timesWith lower bit error rate, therefore in actual applications, important data can be put into { b1,b2} In this group, and hardly important data are put into { b3,b4In.
It is assumed that channel is additive white Gaussian noise channels (AWGN), in step 2-2, the process for receiving sender's transmission adds Modulation symbol r after close processing, its mathematic(al) representation is
W is multiple Gauss noise in formula,Fig. 4 show symbol signal to noise ratio When, receive The symbol constellation that side is obtained.
In step 2-4, with the phase generated in step 2-3Carry out Iterative restoration and go out what P groups were selected at random 4QAM, as shown in Figure 5.To first time iteration, r is inputted1=r, does phase reverse rotation, obtains
After being demodulated with 4QAM, bit is obtainedCorresponding modulation symbol is obtained after 4QAM is modulated againTogether When, export r2For
It is assumed that this time iterative demodulation is correct, namelyThen export r2It is reduced to
Send into next iterative demodulation.By that analogy, Iterative restoration goes out whole bit informations
It is then the error code that bit information is obtained without code check and disabled user for the bit information that validated user is obtained shown in Fig. 6 Rate.No matter the quality (using signal to noise ratio as measurement index) of communication condition, it is left that the bit error rate of disabled user maintains 0.5 all the time The right side, this explanation disabled user is the content communicated between " guessing " validated user, can not therefrom extract and obtain effective information.

Claims (5)

1. a kind of physical layer secret communication method based on modulation symbol phase place, it is characterised in that:Adding including physical layer Close processing procedure and decryption processes;
The encryption process of the physical layer comprises the following steps:
1-1:One group of equally distributed chaos sequence is produced with Tent mapping equations, the seed number of chaos sequence is then by channel coefficients Determined with negotiation mechanism;One group of chaos sequence, after interweaving by interleaver, generates P group chaos sequences;
1-2:With the P groups chaos sequence generation P group rotatable phases obtained in step 1-1, the phase for changing 4QAM symbols, often One 4QAM symbol is all to that should have a rotatable phase;
1-3:Bit information waiting for transmission is modulated with 4QAM, the P group 4QAM symbols of generation;The rotation of generation in step 1-2 Turn the phase of phase change itself, after vector superposed, generate rectangle MQAM symbols, wherein M and P meet relation:Legal recipient is then forwarded to, the encryption in physical layer is completed;
The decryption processes of the physical layer comprise the following steps:
2-1:One group of equally distributed chaos sequence is produced with Tent mapping equations, the seed number of chaos sequence is also by channel What coefficient and negotiation mechanism were determined;Think in channel coherency time channel coefficients be it is invariable, it is now mutual according to channel The channel coefficients that easy property theorem is obtained are effective, then mechanism ensures the uniformity of seed number through consultation;
2-2:Legal recipient receives the modulation symbol after encryption of sender's transmission;
2-3:P group rotatable phases are generated after interleaver with the chaos sequence produced in step 2-1;
2-4:The phase of the modulation symbol received in recovering step 2-2, and digital demodulation is iterated to it, obtain bit letter Breath, completes the decryption in physical layer.
2. a kind of physical layer secret communication method based on modulation symbol phase place as claimed in claim 1, its feature exists In:In the step 1-1 and 2-1, the initial value of chaos sequence is determined by channel condition information, and given birth to Tent mapping equations Into the equally distributed chaos sequence of P groups, process is as follows:
Sender or recipient obtain one group of channel coefficients and take its envelope, are denoted as respectively as { ∣ ht,l∣, l=1,2 ... }, it will believe The envelope of road coefficient quantifies according to a threshold value Λ, obtains one group of binary sequence { ql, specific quantization scheme is as follows:
Wherein adaptive threshold
<mfenced open = "{" close = ""> <mtable> <mtr> <mtd> <msub> <mi>&amp;Lambda;</mi> <mo>+</mo> </msub> <mo>=</mo> <mi>&amp;mu;</mi> <mo>+</mo> <mi>&amp;alpha;</mi> <mi>&amp;sigma;</mi> </mtd> </mtr> <mtr> <mtd> <msub> <mi>&amp;Lambda;</mi> <mo>-</mo> </msub> <mo>=</mo> <mi>&amp;mu;</mi> <mo>-</mo> <mi>&amp;alpha;</mi> <mi>&amp;sigma;</mi> </mtd> </mtr> </mtable> </mfenced>
μ is average in formula, and σ is mean square deviation;After quantization stage, radio channel characteristic value is converted to 01 bit stream;By After negotiation mechanism is consulted, communicating pair has completely the same random seed sequence ql∈ { 0,1 }, l=1,2 ..., Q, by length Spend the random seed sequence for QIt is converted into the seed number a of chaos sequence1, a1Mathematic(al) representation be:
<mrow> <msub> <mi>a</mi> <mn>1</mn> </msub> <mo>=</mo> <msup> <mrow> <mo>(</mo> <mo>-</mo> <mn>1</mn> <mo>)</mo> </mrow> <msub> <mi>q</mi> <mn>1</mn> </msub> </msup> <msubsup> <mi>&amp;Sigma;</mi> <mrow> <mi>l</mi> <mo>=</mo> <mn>2</mn> </mrow> <mi>Q</mi> </msubsup> <msub> <mi>q</mi> <mi>l</mi> </msub> <msup> <mn>2</mn> <mrow> <mn>1</mn> <mo>-</mo> <mi>l</mi> </mrow> </msup> </mrow>
a1Then it is substituting to Tent mapping equations:
ak+1=2 β (1- | ak|) -1, β=1
Iteration obtains one group of equally distributed chaos sequence { a in (- 1,1) are intervalk, k=1,2 ... };Periodically produce with The sub- a of machine1, and chaos sequence generator is resetted, produce new chaos sequence.
3. a kind of physical layer secret communication method based on modulation symbol phase place as claimed in claim 2, its feature exists In:In the step 1-2 and 2-3, phase is rotated with the P groups chaos sequence generation P groups obtained in step 1-1 and 2-1 respectively Position, process is as follows:
Chaos sequence should be sent into before being used to generate rotatable phase in an interleaver, and the sequence after intertexture is approximately mutual It is independent;The line number C of interleaver is set>P, the then C sequence number read by row chooses P therein as phase place P group stochastic variables;
Chaos number after intertexture is to obey (- 1,1) interval interior equally distributed stochastic variable, is floating number, with unlimited The floating number of required precision, but can not meet in systems in practice;For chaos sequence number ai, take the of its fractional part The numerical value of m, n, p, constitutes an integer, then mould K again, obtains the angle of phase place, its mathematic(al) representation is
Da,i=mod (Extract (ai,m,n,p),K)
Therefore, Da,iIt is to set resolving accuracy, in 360 degree of interior equally distributed stochastic variable θk, in 1-2 and 2-3 steps Phase place.
4. a kind of physical layer secret communication method based on modulation symbol phase place as claimed in claim 3, its feature exists In:In the step 1-3, bit information waiting for transmission is modulated by 4QAM, and the modulation symbol of generation is according in step 1-2 The rotatable phase of generation changes the phase of itself, and process is as follows:
Bit { b waiting for transmission2p-1,b2p| p=1,2 ... P } symbol that is generated after 4QAM is modulated of information is denoted as { sp| p=1, 2 ... P }, it can regard that MQAM symbol s, s mathematic(al) representation are as follows after P roads 4QAM symbol superposition as:
<mrow> <mi>s</mi> <mo>=</mo> <munderover> <mo>&amp;Sigma;</mo> <mrow> <mi>p</mi> <mo>=</mo> <mn>1</mn> </mrow> <mi>P</mi> </munderover> <msub> <mi>s</mi> <mi>p</mi> </msub> </mrow>
WhereinChange 4QAM with the rotatable phase generated in step 1-2 The phase of symbol, μ then represents modulation symbol to be sent after phase place change, the modulation symbol after also referred to as encrypting, its number Learning expression formula is:
<mrow> <mi>&amp;mu;</mi> <mo>=</mo> <msubsup> <mi>&amp;Sigma;</mi> <mrow> <mi>p</mi> <mo>=</mo> <mn>1</mn> </mrow> <mi>P</mi> </msubsup> <msub> <mi>s</mi> <mi>p</mi> </msub> <mo>&amp;CenterDot;</mo> <msup> <mi>e</mi> <mrow> <msub> <mi>i&amp;theta;</mi> <mi>p</mi> </msub> </mrow> </msup> <mo>.</mo> </mrow>
5. a kind of physical layer secret communication method based on modulation symbol phase place as claimed in claim 4, its feature exists In:In the step 2-4, recover the phase of modulation symbol received, process is as follows:
To first time iteration, r is inputted1=r, does phase reverse rotation, obtains:
After being demodulated with 4QAM, bit is obtainedCorresponding modulation symbol is obtained after 4QAM is modulated againMeanwhile, it is defeated Go out r2For
<mrow> <msub> <mi>r</mi> <mn>2</mn> </msub> <mo>=</mo> <msub> <mi>r</mi> <mn>1</mn> </msub> <mo>-</mo> <msub> <mover> <mi>s</mi> <mo>^</mo> </mover> <mn>1</mn> </msub> <msup> <mi>e</mi> <mrow> <msub> <mi>i&amp;theta;</mi> <mn>1</mn> </msub> </mrow> </msup> <mo>=</mo> <mrow> <mo>(</mo> <msub> <mi>s</mi> <mn>1</mn> </msub> <mo>-</mo> <msub> <mover> <mi>s</mi> <mo>^</mo> </mover> <mn>1</mn> </msub> <mo>)</mo> </mrow> <msup> <mi>e</mi> <mrow> <msub> <mi>i&amp;theta;</mi> <mn>1</mn> </msub> </mrow> </msup> <mo>+</mo> <msub> <mi>s</mi> <mn>2</mn> </msub> <msup> <mi>e</mi> <mrow> <msub> <mi>i&amp;theta;</mi> <mn>2</mn> </msub> </mrow> </msup> <mo>+</mo> <mi>w</mi> </mrow>
It is assumed that this time iterative demodulation is correct, namelyThen export r2It is reduced to:
<mrow> <msub> <mi>r</mi> <mn>2</mn> </msub> <mo>=</mo> <msub> <mi>s</mi> <mn>2</mn> </msub> <msup> <mi>e</mi> <mrow> <msub> <mi>i&amp;theta;</mi> <mn>2</mn> </msub> </mrow> </msup> <mo>+</mo> <mi>w</mi> </mrow>
Next iterative demodulation is sent into, by that analogy, Iterative restoration goes out whole bit informations
CN201710171744.3A 2017-03-22 2017-03-22 Physical layer secret communication method based on modulation symbol phase rotation Expired - Fee Related CN107181732B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710171744.3A CN107181732B (en) 2017-03-22 2017-03-22 Physical layer secret communication method based on modulation symbol phase rotation

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710171744.3A CN107181732B (en) 2017-03-22 2017-03-22 Physical layer secret communication method based on modulation symbol phase rotation

Publications (2)

Publication Number Publication Date
CN107181732A true CN107181732A (en) 2017-09-19
CN107181732B CN107181732B (en) 2020-01-17

Family

ID=59830109

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710171744.3A Expired - Fee Related CN107181732B (en) 2017-03-22 2017-03-22 Physical layer secret communication method based on modulation symbol phase rotation

Country Status (1)

Country Link
CN (1) CN107181732B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109889338A (en) * 2019-04-22 2019-06-14 苏州大学 Quantum encryption method based on chaos sequence
CN110417817A (en) * 2019-08-30 2019-11-05 哈尔滨工业大学 A kind of encryption in physical layer based on interleaved multi-user, decryption method and system
CN110830148A (en) * 2018-08-07 2020-02-21 黎光洁 Uplink common control channel configuration method for non-aligned multi-user transmission
CN112565125A (en) * 2020-11-20 2021-03-26 江苏科技大学 OFDM-based high-speed mobile wireless communication security method
CN112929318A (en) * 2021-02-09 2021-06-08 电子科技大学 Constellation shaping safety access method for optical access network
CN113645245A (en) * 2021-08-16 2021-11-12 清华大学 DM-OFDM system physical layer security realization method and device for enhancing robustness
WO2023240566A1 (en) * 2022-06-16 2023-12-21 Oppo广东移动通信有限公司 Sequence generation method and device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2003010917A1 (en) * 2001-07-24 2003-02-06 Atlinks Usa, Inc. Narrow band chaotic frequency modulation using skewed tent maps
CN1574703A (en) * 2003-06-18 2005-02-02 三星电子株式会社 Method and apparatus for generating preamble using chaotic sequence
CN106452719A (en) * 2016-07-15 2017-02-22 浙江工业大学 Safety communication method based on combination of artificial Rayleigh fading and adaptive modulation

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2003010917A1 (en) * 2001-07-24 2003-02-06 Atlinks Usa, Inc. Narrow band chaotic frequency modulation using skewed tent maps
CN1574703A (en) * 2003-06-18 2005-02-02 三星电子株式会社 Method and apparatus for generating preamble using chaotic sequence
CN106452719A (en) * 2016-07-15 2017-02-22 浙江工业大学 Safety communication method based on combination of artificial Rayleigh fading and adaptive modulation

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110830148A (en) * 2018-08-07 2020-02-21 黎光洁 Uplink common control channel configuration method for non-aligned multi-user transmission
CN110830148B (en) * 2018-08-07 2023-06-09 黎光洁 Uplink common control channel configuration method for unaligned multi-user transmission
CN109889338A (en) * 2019-04-22 2019-06-14 苏州大学 Quantum encryption method based on chaos sequence
CN110417817A (en) * 2019-08-30 2019-11-05 哈尔滨工业大学 A kind of encryption in physical layer based on interleaved multi-user, decryption method and system
CN112565125A (en) * 2020-11-20 2021-03-26 江苏科技大学 OFDM-based high-speed mobile wireless communication security method
CN112565125B (en) * 2020-11-20 2024-05-03 江苏科技大学 High-speed mobile wireless communication confidentiality method based on OFDM
CN112929318A (en) * 2021-02-09 2021-06-08 电子科技大学 Constellation shaping safety access method for optical access network
CN113645245A (en) * 2021-08-16 2021-11-12 清华大学 DM-OFDM system physical layer security realization method and device for enhancing robustness
WO2023240566A1 (en) * 2022-06-16 2023-12-21 Oppo广东移动通信有限公司 Sequence generation method and device

Also Published As

Publication number Publication date
CN107181732B (en) 2020-01-17

Similar Documents

Publication Publication Date Title
CN107181732A (en) A kind of physical layer secret communication method based on modulation symbol phase place
CN109241755B (en) Image encryption method based on three-dimensional scrambling model and chaos
CN102474313B (en) Transmission apparatus, reception apparatus, transmission method, reception method, and method for generating multi-dimensional constellations
CN109768990B (en) Physical layer secure transmission method based on asymmetric key
CN108833390B (en) Matrix transformation-based packet physical layer encryption method
CN110677236A (en) OFDM encryption method based on composite chaotic system and XOR operation
CN111417038B (en) Safe optical access method based on two-stage spherical constellation masking
CN106027231B (en) A method of cascade error correction being carried out to error code in the processing after quantum key distribution
Chen et al. Design and analysis of multi-level physical-layer network coding for Gaussian two-way relay channels
Harshan et al. A novel power allocation scheme for two-user GMAC with finite input constellations
CN108494463A (en) The safe transmission method of physical layer of quasi-orthogonal space time block code based on constellation rotation
CN108574574A (en) Physical layer encryption method based on multi-dimensional constellation rotation
CN104780051A (en) Side channel attack method for SM2 public key cryptography encryption algorithm
Saračević et al. Source and channel models for secret-key agreement based on Catalan numbers and the lattice path combinatorial approach
CN104125059A (en) Compound time varying password and time varying type data encryption method
CN113271201A (en) Dynamic AES physical layer data encryption method
CN116318694B (en) Information transmission method and system based on power division multiplexing four-dimensional region joint encryption
Pandey et al. Particle swarm optimization in cryptanalysis of DES
CN106452719B (en) Safety communicating method based on the modulation of artificial Rayleigh fading combining adaptive
Nadeem Position-based quantum cryptography over untrusted networks
CN112887244B (en) Safety communication system based on spatial position point
Vigila et al. Key generation based on elliptic curve over finite prime field
Li et al. Design of an energy-efficient multidimensional secure constellation for 5g communications
CN109409106B (en) Novel Shannon perfect secrecy method of infinite alphabet
CN103152171B (en) The interior of variable-key takes turns displacement stream cipher encrypting method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20200117