CN108173791A - The blind authentication method of physical layer and system of time-varying fading channels based on smoothing technique - Google Patents

The blind authentication method of physical layer and system of time-varying fading channels based on smoothing technique Download PDF

Info

Publication number
CN108173791A
CN108173791A CN201711347201.9A CN201711347201A CN108173791A CN 108173791 A CN108173791 A CN 108173791A CN 201711347201 A CN201711347201 A CN 201711347201A CN 108173791 A CN108173791 A CN 108173791A
Authority
CN
China
Prior art keywords
signal
authentication
blind
physical layer
pilot
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201711347201.9A
Other languages
Chinese (zh)
Other versions
CN108173791B (en
Inventor
谢宁
张莉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen University
Original Assignee
Shenzhen University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen University filed Critical Shenzhen University
Priority to CN201711347201.9A priority Critical patent/CN108173791B/en
Publication of CN108173791A publication Critical patent/CN108173791A/en
Application granted granted Critical
Publication of CN108173791B publication Critical patent/CN108173791B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L25/00Baseband systems
    • H04L25/02Details ; arrangements for supplying electrical power along data transmission lines
    • H04L25/03Shaping networks in transmitter or receiver, e.g. adaptive shaping networks
    • H04L25/03006Arrangements for removing intersymbol interference
    • H04L25/03821Inter-carrier interference cancellation [ICI]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L25/00Baseband systems
    • H04L25/02Details ; arrangements for supplying electrical power along data transmission lines
    • H04L25/0202Channel estimation
    • H04L25/0224Channel estimation using sounding signals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The present invention discloses a kind of blind authentication method of physical layer of time-varying fading channels based on smoothing technique, it is characterized in that, including transmitting terminal to wireless channel launching carrier signal, carrier signal includes authentication signal, pilot signal and information signal, authentication signal is added to pilot signal, and wireless channel is time-varying fading channels;Receiving terminal received vector signal carries out carrier signal blind known disturbances elimination (BKIC) processing and differential signal processing to obtain target authentication signal, in BKIC processing, using adjacent symbol, pilot signal is eliminated by smoothing technique;In the receiving end, reference signal is obtained based on key and pilot signal, differential signal processing is carried out to reference signal and refers to authentication signal to obtain, and calculates target authentication signal and the correlation with reference to authentication signal, obtains test statistics;And test statistics and defined threshold are compared, so that it is determined that whether carrier signal can pass through certification.

Description

The blind authentication method of physical layer and system of time-varying fading channels based on smoothing technique
Technical field
The present invention relates to wireless communication technology fields, and in particular to a kind of object of the time-varying fading channels based on smoothing technique Manage the blind authentication method of layer and system.
Background technology
There are mainly three types of current physical layer authentication techniques, the first authentication techniques is spread spectrum (Auth-SS), basic to think Think it is to use traditional Direct Sequence Spread Spectrum or frequency modulation technology, since different pulses employs different frequencies, this Kind technology realizes that certification needs to sacrifice certain bandwidth.In addition, a crucial limitation of Auth-SS technologies is only to allow to understand The user of spread spectrum correlation priori participates in communication.Therefore the scope of application of this technology is narrow.
Second is based on time division multiplexing authentication techniques (Auth-TDM), and basic thought is that transmitting terminal periodically replaces Send information signal and authentication signal.Receiving terminal directly extracts the certification that desired authentication information realizes signal after receiving signal Purpose.Auth-TDM be Development of Wireless Communications early stage propose authentication techniques, it the advantages of be it is easy to operate, emit signal before It does not need to pre-process authentication signal and information and (may be encrypted for security consideration).Authentication signal is independently of Information signal send, it is therefore desirable to occupy certain bandwidth, with wireless messages quantity be continuously increased and user is to information The continuous enhancing further improved with adverse party attack technology of privacy, the safety of this authentication techniques are greatly chosen War, can not meet the needs of users.
The third authentication techniques is certification superimposing technique (Auth-SUP), and basic thought is that authentication signal is superimposed upon information On signal (mode of superposition can be arbitrary, is determined by key), then launched simultaneously by transmitting terminal, receiving terminal receives signal It is extracted later using the authentication signal in key pair superposed signal, achievees the purpose that signal authentication.
Compared with the Auth-TDM technologies of early stage, Auth-SUP authentication techniques are needed before signal transmitting to authentication signal and letter Information signal is handled, and certain requirement is proposed to the signal handling capacity of transmitting terminal, is implemented than Auth-TDM technology More complex, authentication signal and information signal are sent simultaneously, therefore will not occupy additional bandwidth.At this point, due to will Authentication signal is superimposed upon in information signal, and receiving terminal needs to extract information after receiving signal, and signal processing difficulty will It is higher than Auth-TDM technology, but the concealment of authentication information is compared with Auth-TDM high.Further, since authentication signal is for information signal Extraction for be equivalent to the effect for playing noise so that the SNR of receiving terminal is accordingly reduced, and the extraction of information signal is brought Adverse effect.
Existing Auth-TDM and Auth-SUP authentication techniques also transmit another in addition to transmitting information signal and authentication signal One pilot signal.This is because, both authentication techniques are required for receiving terminal to be carried out after receiving signal to channel parameter Estimate and carry out symbol recovery, authentication signal could be extracted later, the signal handling capacity of receiving terminal is also carried at this time Certain requirement is gone out, in some specific occasions, these signal processing technologies are possible and infeasible, and estimate to channel parameter Estimation error is easily caused during meter and symbol recovery, adverse effect will be brought to the extraction of final authentication signal.
In addition, Auth-TDM, Auth-SS and Auth-SUP be comprising the fact that authentication information being exposed, Middle Auth-SS and Auth-TDM technologies easily cause other users in scene compared to the normal signal not comprising authentication information Especially hostile user's note that hostile user analyzes signal, palms off or distorts, legitimate receipt end will be unable to the phase Signal is hoped to be authenticated.In contrast, the concealment of Auth-SUP authentication techniques will be apparently higher than Auth-SS and Auth-TDM. However, this superiority be the computing capability based on hostile user have certain restrictions under the premise of, once hostile user count Calculation ability improves, and is likely to extraction and even destroys authentication information.
Have to be mentioned that, existing Auth-SS technologies and Auth-SUP the technologies performance under time-varying fading channels scene Fail terribly.And reality is, with being continuously increased for wireless communication user quantity, communication environment also can more sophisticated, quilt The possibility of interference is increasing, and with the increase of urban district communication user number and the continuous development in city, constant when simple Fading channel has been not enough to portray current communication environment.Therefore it has to take into account that based on the channel radio under time-varying fading channels Believe physical layer authentication techniques, to improve the safety of wireless communication, meet the communications security requirement of user.
Invention content
The present invention is proposed in view of above-mentioned situation, does not need to occupy additional letter its purpose is to provide a kind of Number bandwidth and authentication signal does not become the noise for influencing that information signal extracts in carrier signal, does not influence the system of receiving terminal noise Count the blind authentication method of physical layer and system of the time-varying fading channels based on smoothing technique of characteristic.
For this purpose, the first aspect of the present invention provides, a kind of physical layer of the time-varying fading channels based on smoothing technique is blind to recognize Card method, is the physical layer authentication method of the wireless communication of the wireless communication system with transmitting terminal and receiving terminal, and feature exists In, including:The transmitting terminal to wireless channel launching carrier signal, the carrier signal include authentication signal, pilot signal and Information signal, the authentication signal are added to the pilot signal, and the wireless channel is time-varying fading channels;The receiving terminal The carrier signal is received, blind known disturbances elimination (Blind Known Interference are carried out to the carrier signal Cancellation, abbreviation BKIC) it handles with differential signal processing to obtain target authentication signal, in BKIC processing, Using adjacent symbol, the pilot signal is eliminated by smoothing technique;In the receiving terminal, based on key and the pilot tone Signal obtains reference signal, and differential signal processing is carried out to the reference signal and refers to authentication signal to obtain, and described in calculating Target authentication signal and the correlation with reference to authentication signal, obtain test statistics;And by the test statistics with Defined threshold is compared, so that it is determined that whether the carrier signal can pass through certification.
In the present invention, the authentication signal is added to the pilot signal.Thus, it is possible to the letter for not influencing receiving terminal is done It makes an uproar ratio.The BKIC processing utilizes adjacent symbol, and the pilot signal is eliminated by smoothing technique.In this case, energy Enough in the case where avoiding estimation channel situation, pilot signal is eliminated.
In the blind authentication method of physical layer involved by first aspect present invention, the carrier signal is in the form of data block Piecemeal emits.It is convenient for operating data as a result,.
It is described in every piece of carrier signal in the blind authentication method of physical layer involved by first aspect present invention The signal length of pilot signal and the signal length of described information signal and the signal length equal to the carrier signal.
In addition, in the blind authentication method of physical layer involved by first aspect present invention, using Hash matrix, based on described Key and the pilot signal obtain the reference signal.Reference signal is obtained by processing with reference to authentication signal as a result, can be with According to the correlation with reference to authentication signal and target authentication signal, determine whether target authentication signal passes through certification.
In the blind authentication method of physical layer involved by first aspect present invention, if the test statistics is not less than described Defined threshold, then the carrier signal pass through certification.
In the blind authentication method of physical layer involved by first aspect present invention, the defined threshold is believed based on the pilot tone Number statistical property and the preset false-alarm probability upper limit obtain.
The blind certification of physical layer that the second aspect of the present invention provides a kind of time-varying fading channels based on smoothing technique is set It is standby, including processor, the computer program of the memory storage is performed to realize physical layer described in any one of the above embodiments Blind authentication method;And memory.
The third aspect of the present invention provides a kind of computer readable storage medium.The computer readable storage medium is deposited At least one instruction is contained, at least one instruction realizes above-mentioned first aspect any one of them object when being executed by processor Manage the blind authentication method of layer.
The fourth aspect of the present invention provides a kind of blind certification system of the physical layer of the time-varying fading channels based on smoothing technique System, including emitter, to wireless channel launching carrier signal, the carrier signal includes authentication signal, pilot signal And information signal, the authentication signal are added to the pilot signal, the wireless channel is time-varying fading channels;Reception device Including first processing module, Second processing module and determination module, the first processing module receives the carrier signal, to institute It states carrier signal and carries out blind known disturbances elimination (BKIC) processing and differential signal processing to obtain target authentication signal, described In BKIC processing, using adjacent symbol, the pilot signal is eliminated by smoothing technique.The Second processing module is based on close Key and the pilot signal obtain reference signal, and differential signal processing is carried out to the reference signal and refers to certification letter to obtain Number, and the target authentication signal and the correlation with reference to authentication signal are calculated, obtain test statistics, the judgement mould The test statistics is compared by block with defined threshold, so that it is determined that whether the carrier signal can pass through certification.
In the present invention, authentication signal is added to pilot signal by the emitter of the blind Verification System of physical layer.As a result, can Enough it is not take up additional transmitted bandwidth resource.The reception device BKIC processing of the blind Verification System of physical layer utilizes adjacent symbol, leads to It crosses smoothing technique and eliminates the pilot signal.In this case, reception device can be eliminated in the case where avoiding estimation channel situation Pilot signal.
In the blind Verification System of physical layer involved by fourth aspect present invention, the Second processing module utilizes Hash Matrix obtains the reference signal based on the key and the pilot signal.Reference signal is referred to by processing as a result, Authentication signal can determine whether target authentication signal passes through according to the correlation with reference to authentication signal and target authentication signal Certification.
In the blind Verification System of physical layer involved by fourth aspect present invention, defined threshold described in the determination module Statistical property and the preset false-alarm probability upper limit based on the pilot signal obtain.
Compared with prior art, embodiment of the present invention has following advantageous effect:
Compared with existing Auth-SS, Auth-SUP, Auth-TDM, the present invention realizes the certification of wireless communication physical layer It does not need to occupy additional signal bandwidth, authentication signal does not become the noise for influencing to receive signal extraction, do not influence receiving terminal and make an uproar The statistical property of sound.Blind authentication techniques processing proposed by the present invention is time-varying fading channels, is adaptive to practical communication field Wireless communications environment complicated and changeable in scape.Further, since in the present invention, authentication signal is superimposed upon in pilot signal, such as The entirety of signal after authentication signal and pilot superimposition is treated as pilot signal by fruit, for carrying out channel estimation, moreover it is possible to improve letter The accuracy of road estimation.
Description of the drawings
Fig. 1 is the signal transmission schematic diagram for showing the blind authentication method of physical layer involved by embodiments of the present invention.
Fig. 2 is the blind authentication method flow diagram of physical layer shown involved by embodiments of the present invention.
Fig. 3 is the knot for showing the blind authentication method transmitting terminal transmitting signal of physical layer involved by embodiments of the present invention Structure schematic diagram.
Fig. 4 is to show that the blind blind known disturbances of authentication method receiving terminal of physical layer involved by embodiments of the present invention disappear Except (BKIC) process flow schematic diagram.
Fig. 5 is the blind Verification System transmitting terminal signal processing module of physical layer shown involved by embodiments of the present invention Schematic diagram.
Fig. 6 is the blind Verification System receiving end signal processing module of physical layer shown involved by embodiments of the present invention Schematic diagram.
Fig. 7 is the structure diagram for showing the blind authenticating device of a kind of physical layer involved by embodiments of the present invention.
Specific embodiment
Hereinafter, refer to the attached drawing, explains the preferred embodiment of the present invention in detail.In the following description, for identical Component assign identical symbol, the repetitive description thereof will be omitted.Scheme in addition, attached drawing is only schematical, the mutual ruler of component Very little ratio or the shape of component etc. can be with practical differences.
It should be noted that term " first " in description and claims of this specification and above-mentioned attached drawing, " Two ", " third " and " the 4th " etc. are for distinguishing different objects rather than for describing particular order.In addition, term " comprising " " having " and their any deformations, it is intended that cover non-exclusive include.Such as contain series of steps or unit Process, method, system, product or equipment the step of being not limited to list or unit, but optionally further including does not have The step of listing or unit are optionally further included for the intrinsic other steps of these processes, method, product or equipment or list Member.
Present embodiment discloses the blind authentication methods of physical layer of the time-varying fading channels based on smoothing technique, equipment and is System is physical layer authentication method, equipment and the system of the wireless communication of the wireless communication system with transmitting terminal and receiving terminal. I.e. present embodiment disclose the wireless communication blind authentication method of physical layer of time-varying fading channels based on smoothing technique, equipment and System.It can be more accurately to carrying out physical layer certification.It is described in detail below in conjunction with attached drawing.
Fig. 1 is the signal transmission schematic diagram for showing the blind authentication method of physical layer involved by embodiments of the present invention.
In the present embodiment, as shown in Figure 1, the physical layer of the wireless communication time-varying fading channels based on smoothing technique is blind Authentication method is based on a general signal transmission model.In this signal transmission model, altogether comprising 4 users, wherein sending out Side's of sending (transmitting terminal) is legitimate sender, and transmitting terminal transmits signals to legitimate receipt side, i.e. receiving terminal, other two recipient point It Wei not monitoring users and hostile user in system.Hostile user once has found may there is certification letter in the signal that transmitting terminal is sent out Breath, will analyze the signal and attempt to extract, destroy, even distort authentication information.But present embodiment is without being limited thereto, hair It can be two or more to penetrate end, and legitimate receipt side can be two or more, monitoring users and hostile user Can be two or more respectively.
In the present embodiment, it is assumed that transmitting terminal and receiving terminal co-own the key for certification so that receiving terminal can To extract authentication information from the signal that transmitting terminal emits using the key.Authentication signal includes authentication information.In this implementation In mode, carrier signal includes authentication signal, and normal signal does not include authentication signal.Monitoring users are for authentication method one without institute Know, although can receive and restore the signal of transmitting terminal transmission, deep analysis will not be carried out to signal, does not influence certification Process.The characteristics of hostile user passes through signal Analysis can perceive the presence of authentication signal, and be intended to destroy authentication signal.
In the present embodiment, the transmitting terminal in above-mentioned signal model can include base station or user equipment.Base station (example Such as access point) can refer to the accession in net in the air on interface by one or more sectors and the equipment of wireless terminal communications. Base station can be used for by the air frame received and IP grouping is mutually converted, as wireless terminal with access net rest part it Between router, wherein, accessing the rest part of net may include Internet protocol (IP) network.Base station can also coordinate to connecing in the air The attribute management of mouth.For example, base station can be the base station (BTS, Base Transceiver Station) in GSM or CDMA, Can also be the base station (NodeB) in WCDMA, can also be in LTE evolved base station (NodeB or eNB or e-NodeB, Evolutional Node B), present embodiment does not limit.
User equipment can include but is not limited to smart mobile phone, laptop, personal computer (Personal Computer, PC), personal digital assistant (Personal Digital Assistant, PDA), mobile internet device (Mobile Internet Device, MID), wearable device (such as smartwatch, Intelligent bracelet, intelligent glasses) each electron-like Equipment, wherein, the operating system of the user equipment may include but be not limited to Android operation system, IOS operating system, Symbian (Saipan) operating system, Black Berry (blackberry, blueberry) operating system, Windows Phone8 operating systems etc., this Embodiment does not limit.
In the present embodiment, the transmitting terminal in above-mentioned signal model sends signal and reaches reception by wireless channel End, wherein, receiving terminal can include base station.Base station (such as access point) can be referred to the accession in net in the air on interface by one A or multiple sectors and the equipment of wireless terminal communications.Base station can be used for mutually being turned the air frame received and IP groupings Change, as wireless terminal and access net rest part between router, wherein, access the rest part of net may include it is internet Agreement (IP) network.Base station can also coordinate the attribute management to air interface.For example, base station can be in GSM or CDMA Base station (NodeB) in base station (BTS, Base Transceiver Station) or WCDMA, can also be in LTE Evolved base station (NodeB or eNB or e-NodeB, evolutional Node B), present embodiment does not limit.
Receiving terminal can also include user equipment, user equipment can include but is not limited to smart mobile phone, laptop, Personal computer (Personal Computer, PC), personal digital assistant (Personal Digital Assistant, PDA), mobile internet device (Mobile Intemet Device, MID), wearable device (such as smartwatch, Intelligent bracelet, Intelligent glasses) etc. each class of electronic devices, wherein, the operating system of the user equipment may include but be not limited to Android operations system System, IOS operating system, Symbian (Saipan) operating system, Black Berry (blackberry, blueberry) operating system, Windows Phone8 Operating system etc., present embodiment do not limit.
Present embodiment discloses a kind of blind authenticating party of physical layer of the wireless communication time-varying fading channels based on smoothing technique Method.Fig. 2 is the blind authentication method flow diagram of physical layer shown involved by embodiments of the present invention.Fig. 3 is to show The structure diagram of the blind authentication method transmitting terminal transmitting signal of physical layer involved by embodiments of the present invention.
In the present embodiment, the blind authentication method of physical layer of the wireless communication time-varying fading channels based on smoothing technique is The physical layer authentication method of the wireless communication of wireless communication system with transmitting terminal and receiving terminal.Based on above-mentioned signal transmission Model, as shown in Fig. 2, transmitting terminal is to wireless channel launching carrier signal.Carrier signal includes authentication signal, pilot signal and letter Information signal.Authentication signal is added to pilot signal.Wireless channel is time-varying fading channels (step S101).
In step S101, as shown in figure 3, carrier signal includes authentication signal, pilot signal and information signal, certification letter It number is added in pilot signal.The signal length of authentication signal is equal to the signal length of pilot signal.Authentication signal is superimposed as a result, It can be to avoid the additional signal bandwidth of occupancy to pilot signal.
In the present embodiment, information signal includes the transmitting information to be transmitted of end subscriber.The carrier that transmitting terminal is sent Signal is that piecemeal emits in the form of data block.Every piece of carrier signal includes pilot portion and message part.Pilot portion packet Include authentication signal and pilot signal.Message part includes information signal.In addition, carrier signal piecemeal in the form of data block is sent out It penetrates, is conducive to operate data.
In the present embodiment, the signal length of authentication signal or pilot signal is the first length, the signal of information signal Length is the second length, and the length of every piece of carrier signal is the signal length and information of total length, authentication signal or pilot signal The signal length of signal and the length equal to every piece of carrier signal, i.e. the first length and the second length and equal to total length.
In the present embodiment, authentication signal is obtained namely pilot signal and key by pilot signal and key Authentication signal has been obtained using Hash matrix.Obtained authentication signal is added in pilot signal, has obtained every piece of carrier letter Number pilot portion, the signal expression of pilot portion is as follows:
mispitti (1)
In the signal expression (1) of above-mentioned pilot portion,WithFor the power distribution of pilot frequency information and authentication signal because Son.Assuming that authentication signal and pilot signal are independent from each other, then have
In the present embodiment, the information signal of the signal of pilot portion and message part is combined, constituted Every piece of carrier signal.
In addition, in the present embodiment, the transmission channel of carrier signal is wireless channel, and is time-varying fading channels. Carrier signal expression is as follows after time-varying fading channels:
yiL+k=hiL+kxiL+k+niL+k (2)
In the present embodiment, the channel response h of time-varying fading channelsiL+k, obey0Mean variance isMultiple Gauss point Cloth.In addition, hiL+kDynamic characteristic be portrayed as single order Gauss markoff process, the expression of single order Gauss markoff process Formula is as follows:
hiL+k=ahiL+k-1+ωiL+k (3)
Under normal circumstances, a ∈ [0,1] in expression formula (3) are decline related coefficients, by channel Doppler spread and transmitting Bandwidth is determined.Particularly, rapid fading is represented when a values are smaller, a values represent slow fading when larger.In the scene of many types, The value of a can be obtained in receiving terminal.And in practical wireless systems scene, the value range of a is in a very small area In, such as a ∈ [0.9,1].
In the present embodiment, the blind authentication method of physical layer further includes receiving terminal received vector signal, to carrier signal into The blind known disturbances of row eliminate (BKIC) processing and differential signal processing to obtain target authentication signal.In BKIC processing, utilize Adjacent symbol eliminates pilot signal (step S102) by smoothing technique.
In the present embodiment, receiving terminal received vector signal.Pilot portion and message part are included in carrier signal.This The blind authentication method of physical layer involved by embodiment is handled in receiving terminal primarily directed to the pilot portion of carrier signal. The expression formula of the pilot portion for the carrier signal that receiving terminal receives is as follows:
yk=hkspkttk)+nk, iL≤k≤iL+L1 (4)
In the present embodiment, following processing for carrier signal refer to the place of the pilot portion for carrier signal Reason.
In step S102, receiving terminal received vector signal carries out blind known disturbances elimination (BKIC) to carrier signal and handles To obtain echo signal.Wherein, it is using adjacent symbol that blind known disturbances, which eliminate (BKIC) processing, is eliminated by smoothing technique Pilot signal in carrier signal.The pilot signal in carrier signal is usually eliminated the need for into estimation channel situation, if channel is rung Cannot should effectively it be estimated, the pilot signal in carrier signal is difficult to eliminate.Blind known disturbances removing method can avoid Estimate under channel situation, eliminate pilot signal.
In the present embodiment, the carrier signal that receiving terminal receives may include authentication signal, it is also possible to not comprising recognizing Demonstrate,prove signal.If it is first condition that carrier signal, which includes authentication information, if it is second condition that carrier signal, which does not include authentication signal,.
Fig. 4 is to show that the blind blind known disturbances of authentication method receiving terminal of physical layer involved by embodiments of the present invention disappear Except (BKIC) process flow schematic diagram.
In the present embodiment, as shown in figure 4, BKIC processing includes determining the expression formula of each code element under different condition (step S401) and the expression formula using symbol, estimation echo signal (step S402).
In step S401, the expression formula of each code element under different condition is determined.
Wherein, in the first condition, the expression formula of each code element is as follows:
K ∈ { 1,2 ..., L1-1}
Under a second condition, the expression formula of each code element is as follows:
From above-mentioned formula as can be seen that there are correlated noise between adjacent symbol, the correlated noise in expression formula (5) It cannot be corrected with common noise-whitening techniques, need to eliminate correlated noise by step S402, estimate hkρttk+nk
In step S402, using the expression formula of symbol, echo signal is estimated.Above-mentioned expression formula (5) is represented as follows:
It is as follows can to obtain estimation result:
Wherein, ε in expression formula (10)kIt is since BKIC modules carry out the residue signal generated in interference cancellation process, εkIt can To be modeled as Gaussian Profile.For slow fading, (a → 1), εkVariance very little, therefore can be by ykIn εkRemoval, The h estimatedkρttk+nkNamely it obtains estimating the echo signal without pilot signal.
In addition, in step s 102, carrier signal obtains echo signal after BKIC is handled, echo signal carries out difference Signal processing obtains target authentication signal.
In the present embodiment, the method for differential signal processing is as follows:
Under first condition, the expression formula of differential signal processing is as follows:
Wherein ΔkFor residue signal, can be by 0 mean variance of approximate modelingGaussian random variable.
Under a second condition, the expression formula of differential signal processing is as follows:
WhereinFor zero-mean complex Gaussian stochastic variable.
In the present embodiment, the blind authentication method of physical layer further includes in the receiving end, is obtained based on key and pilot signal Reference signal, to reference signal carry out differential signal processing with obtain refer to authentication signal, and calculate target authentication signal and With reference to the correlation of authentication signal, test statistics (step S103) is obtained.
In step s 103, reference signal is obtained based on key and pilot signal to refer to using Hash matrix, by key and Pilot signal obtains reference signal.Reference signal is obtained by processing with reference to authentication signal as a result, can be believed according to reference to certification Correlation number with target authentication signal, determines whether target authentication signal passes through certification.
In step s 103, differential signal processing is carried out to reference signal and refers to authentication signal to obtain, calculated target and recognize Signal and the correlation with reference to authentication signal are demonstrate,proved, obtains test statistics, can be carried out in next step according to the value of test statistics Judge.
In the present embodiment, differential signal processing is carried out to reference signal and refers to authentication signal to obtain.Differential signal The method of processing is identical with the difference processing method in above-mentioned steps S102.
In above-mentioned steps S102, the carrier signal that receiving terminal receives may include authentication signal, if carrier signal packet It is first condition containing authentication information, if it is second condition that carrier signal, which does not include authentication signal,.
Wherein, in receiving terminal, carrier signal eliminates (BKIC) processing by blind known disturbances and differential signal handles to obtain Target authentication signal.In receiving terminal, reference signal is obtained based on key and pilot signal.Reference signal passes through difference (DP) signal It is obtained after processing with reference to authentication signal.Hash matrix, key and the pilot signal of receiving terminal generate the rule and hair of reference signal The rule of the Hash matrix of sending end, key and pilot signal generation authentication signal is identical, can regard the as with reference to authentication signal Authentication signal in one condition, target authentication signal can regard the carrier signal in first condition as.First condition can as a result, Included with being expressed as target authentication signal with reference to authentication signal;Second condition can be expressed as not including in target authentication signal With reference to authentication signal.
In the present embodiment, the blind authentication method of physical layer, which further includes, is compared test statistics and defined threshold, So that it is determined that whether carrier signal can pass through certification (step S104).
In step S104, if test statistics is not less than defined threshold, judge that carrier signal passes through certification;If it examines Statistic is less than defined threshold, then judges carrier signal not over certification.
In the present embodiment, it if test statistics is not less than defined threshold, includes in carrier signal and believes with reference to certification Number, i.e., carrier signal passes through certification;If test statistics is less than defined threshold, does not include in carrier signal and believe with reference to certification Number, i.e., carrier signal is not over certification.
In addition, in the present embodiment, it is specified that threshold value is by assuming that verification condition obtains, above-mentioned first condition and Second condition assumes that the first condition H of verification condition respectively1With second condition H0
In the present embodiment, first condition H1Under, the expression formula of test statistics is as follows:
Second condition H0Under, the expression formula of test statistics is as follows:
Wherein,It is for 0 mean varianceGaussian random variable.φiIt is 0 mean value Variance isGaussian random variable.
In addition, defined thresholdBy (τi|H0) the relevant false-alarm probability ε of distributionFAIt determines, represents as follows:
Wherein (τi|H0) be the test statistics namely pilot signal obtained under a second condition statistical property.As a result, Defined threshold can be based on pilot signal statistical property and the preset false-alarm probability upper limit obtain.
In addition, in the present embodiment, if after the identity of transmitting terminal is certified, authentication signal can be treated as additionally Pilot signal restores signal.Thus, it is possible to the performance and the estimation performance to channel response that improve signal element recovery.
In addition, in the present embodiment, authentication signal is added to pilot signal, avoids and the extraction of normal signal is brought Adverse effect.Avoid reducing the Signal to Interference plus Noise Ratio (SINR) of receiving terminal as a result,.
In present embodiment, the blind authentication method of physical layer of the wireless communication time-varying fading channels based on smoothing technique is not required to Occupy additional signal bandwidth.In addition, in receiving terminal, when carrying out information signal extraction to carrier signal, authentication signal will not As the noise of information signal, authentication authorization and accounting signal does not interfere with the extraction of information signal.Authentication signal does not influence receiving terminal noise Statistical property.
In the present embodiment, the blind authentication method processing of physical layer is time-varying fading channels, is adaptive to practical logical Believe wireless communications environment complicated and changeable in scene.In addition, authentication signal is superimposed upon in pilot signal, if certification believed Number with the entirety of the signal after pilot superimposition as pilot signal, for carrying out channel estimation, moreover it is possible to improve the standard of channel estimation True property.
Present embodiment discloses a kind of blind certification system of physical layer of the wireless communication time-varying fading channels based on smoothing technique System.Fig. 5 is the blind Verification System transmitting terminal signal processing module signal of physical layer shown involved by embodiments of the present invention Figure.Fig. 6 is the blind Verification System receiving end signal processing module signal of physical layer shown involved by embodiments of the present invention Figure.
In the present embodiment, as shown in figure 5, the blind Verification System of physical layer includes emitter 20.Emitter 20 wraps Include the first generation module 201, the second generation module 202 and synthesis module 203.
In the present embodiment, as shown in figure 5, the first generation module 201 generation authentication signal namely key and pilot tone letter Number the first generation module of process 201 generates authentication signal.Hash matrix is included in first generation module 201.Authentication signal is close What key and pilot signal were obtained using Hash matrix.Wherein, the authentication signal obtained is identical with the signal length of pilot signal.
In the present embodiment, as shown in figure 5, the second generation module 202 generates the pilot portion of carrier signal.Namely Authentication signal is loaded by the second generation module 202 in pilot signal, generates the pilot portion of carrier signal.Carrier signal The expression formula of pilot portion be formula (1), in addition, the length of the pilot portion of carrier signal for authentication signal signal length or The signal length of pilot signal.
In the present embodiment, as shown in figure 5, synthesis module 203 generates the pilot tone of carrier signal namely carrier signal Part and message part are combined by synthesis module 203, generate carrier signal.The message part of carrier signal is information Signal.
In the present embodiment, carrier signal is sent by data block piecemeal, and every piece of carrier signal includes pilot portion And message part, the signal length of the signal length and information signal of authentication signal or pilot signal and equal to every piece carrier signal Length.In addition, carrier signal is that piecemeal transmitting is conducive to operate data in the form of data block.
In the present embodiment, the carrier signal that the emitter 20 of transmitting terminal generates reaches receiving terminal by wireless channel Reception device 30.In addition, wireless channel is time-varying fading channels.
In the present embodiment, the blind Verification System of physical layer further includes reception device 30, and reception device 30 is included at first Manage module, Second processing module and determination module.
In the present embodiment, first processing module includes blind known disturbances elimination (BKIC) module 301.Carrier signal passes through After crossing blind known disturbances elimination (BKIC) module 301, the pilot signal in carrier signal is eliminated.
In the present embodiment, blind known disturbances are eliminated (BKIC) module 301 and have been used in step S102 using adjacent Symbol eliminates the BKIC processing methods of pilot signal by smoothing technique.Specific steps are as shown in figure 4, BKIC processing is included really The expression formula (step S401) and the expression formula using symbol for determining each code element under different condition, estimate echo signal (step S402)。
In the present embodiment, as shown in fig. 6, first processing module further includes difference (DP) processing module 302.DP processing Module 302 has used differential signal processing method in step S102.DP processing modules 302 carry out at differential signal echo signal Reason, obtains target authentication signal.H in target authentication signal is eliminated as a result,kInfluence namely eliminate channel to carrier signal Influence.
In DP processing modules 302, under first condition, the expression formula of differential signal processing is formula (11), wherein ΔkFor Residue signal can be by 0 mean variance of approximate modelingGaussian random variable.Under a second condition, differential signal is handled Expression formula for formula (12), whereinFor zero-mean complex Gaussian stochastic variable.
In the present embodiment, as shown in fig. 6, Second processing module further includes Hash matrix disposal module 303.Pilot tone is believed Number and key reference signal is obtained by Hash matrix disposal module 303.Hash matrix disposal module 303 has used step S103 The method of middle production reference signal, Hash matrix disposal module 303 include Hash matrix.
In the present embodiment, as shown in fig. 6, Second processing module further includes difference (DP) processing module 304.Difference (DP) processing module 304 carries out differential signal processing to reference signal, obtains with reference to authentication signal.DP processing modules 304 are used Differential signal processing method in step S103.
In the present embodiment, as shown in fig. 6, Second processing module further includes computing module 305.Computing module 305 is used To calculate target authentication signal and the test statistics with reference to authentication signal.Computing module 305 with computational methods be step Computational methods in S103.
In the present embodiment, as shown in fig. 6, Second processing module further includes determination module 306.Determination module 306 is logical Cross comparing check statistic and defined threshold, determine target authentication signal whether by certification namely determining carrier signal whether Certification can be passed through.
In the present embodiment, the defined threshold in determination module 306 is statistical property based on pilot signal and pre- If the false-alarm probability upper limit obtain.The computational methods of defined threshold are the threshold value calculation method in step S103.
Present embodiment discloses a kind of blind certification of physical layer of the wireless communication time-varying fading channels based on smoothing technique and sets Standby 50.Fig. 7 is the structure diagram for showing a kind of blind authenticating device of base physical layer involved by embodiments of the present invention. In present embodiment, transmitting terminal and receiving terminal all include authenticating device 50 as shown in Figure 7.
In the present embodiment, as shown in fig. 7, authenticating device 50 includes processor 501 and memory 502.Wherein, it handles Device 501 and memory 502 distinguish connection communication bus.Memory 502 can be high-speed RAM memory or it is non-easily The memory (non-volatile memory) for the property lost.It will be understood by those skilled in the art that the authenticating device shown in Fig. 7 50 structure does not form limitation of the invention, it can also be wrapped either busbar network or hub-and-spoke configuration It includes and either combines certain components or different components arrangement than more or fewer components shown in Fig. 7.
Wherein, processor 501 is the control centre of authenticating device 50, can be central processing unit (Central Processing Unit, CPU), processor 501 utilizes the various pieces of various interfaces and the entire authenticating device 50 of connection, It is stored in memory 502 by running or performing the software program being stored in memory 502 and/or module and call The program code of storage, for performing the following operations:
Transmitting terminal includes authentication signal, pilot signal and information signal to wireless channel launching carrier signal, carrier signal, Authentication signal is added to pilot signal, and wireless channel is time-varying fading channels (being performed by the authenticating device 50 of transmitting terminal).
Receiving terminal received vector signal carries out carrier signal at blind known disturbances elimination (BKIC) processing and differential signal In BKIC processing, using adjacent symbol, pilot signal is eliminated by smoothing technique to obtain target authentication signal for reason; In receiving terminal, reference signal is obtained based on key and pilot signal, differential signal processing is carried out to reference signal to obtain reference Authentication signal, and target authentication signal and the correlation with reference to authentication signal are calculated, obtain test statistics;And it unites examining Metering is compared with defined threshold, so that it is determined that whether carrier signal can be by certification (by the authenticating device 50 of receiving terminal It performs).
In the present embodiment, it is operated below the also execution of the processor 501 of the authenticating device 50 of transmitting terminal:Carrier signal Piecemeal emits in the form of data block.
In the present embodiment, it is operated below the also execution of the processor 501 of the authenticating device 50 of transmitting terminal:In every piece of load In body signal, the signal length of pilot signal and the signal length of information signal and the signal length equal to carrier signal.
In the present embodiment, it is operated below the also execution of the processor 501 of the authenticating device 50 of receiving terminal:Utilize Hash Matrix obtains reference signal based on key and pilot signal.
In the present embodiment, it is operated below the also execution of the processor 501 of the authenticating device 50 of receiving terminal:If examine system Metering passes through certification not less than defined threshold, then carrier signal.
In the present embodiment, it is operated below the also execution of the processor 501 of the authenticating device 50 of receiving terminal:Defined threshold Statistical property and the preset false-alarm probability upper limit based on pilot signal obtain.
In the present embodiment, it should be understood that disclosed equipment can be realized by another way.More than for example, Described equipment embodiment is only schematical, such as the division of the unit, only a kind of division of logic function, There can be other dividing mode in actual implementation, such as multiple units or component may be combined or can be integrated into another System or some features can be ignored or does not perform.Another point, shown or discussed mutual coupling or direct coupling Conjunction or communication connection can be by some interfaces, the INDIRECT COUPLING or communication connection of device or unit, can be electrical or its Its form.
The unit illustrated as separating component may or may not be physically separate, be shown as unit Component may or may not be physical unit, you can be located at a place or can also be distributed to multiple networks On unit.Some or all of unit therein can be selected according to the actual needs to realize the purpose of this embodiment scheme.
In addition, each functional unit in embodiments of the present invention can be integrated in a processing unit or Each unit is individually physically present, can also two or more units integrate in a unit.Above-mentioned integrated unit Both the form that hardware may be used is realized, can also be realized in the form of SFU software functional unit.
If the integrated unit is realized in the form of SFU software functional unit and is independent product sale or uses When, it can be stored in a computer-readable access to memory.Based on such understanding, technical scheme of the present invention substantially or Person say the part contribute to the prior art or the technical solution all or part can in the form of software product body Reveal and, which is stored in a memory, is used including some instructions so that a computer equipment (can be personal computer, server or network equipment etc.) performs all or part of each embodiment the method for the present invention Step.And aforementioned memory includes:USB flash disk, read-only memory (ROM, Read-Only Memory), random access memory The various media that can store program code such as (RAM, Random Access Memory), mobile hard disk, magnetic disc or CD.
Present embodiment discloses a kind of computer readable storage medium, one of ordinary skill in the art will appreciate that above-mentioned reality It is that can instruct correlation by program (instruction) to apply all or part of step in the blind authentication method of various physical layers of mode Hardware complete, which can be stored in computer-readable memory (storage medium), memory can wrap It includes:Flash disk, read-only memory (English:Read-Only Memory, referred to as:ROM), random access device (English:Random Access Memory, referred to as:RAM), disk or CD etc..
Although being illustrated above in association with drawings and examples to the present invention, it will be appreciated that above description The invention is not limited in any way.Those skilled in the art without departing from the true spirit and scope of the present invention may be used To be deformed and be changed to the present invention as needed, these deformations and variation are within the scope of the present invention.

Claims (11)

1. a kind of blind authentication method of physical layer of time-varying fading channels based on smoothing technique, has transmitting terminal and receiving terminal The physical layer authentication method of the wireless communication of wireless communication system, which is characterized in that
Including:
The transmitting terminal includes authentication signal, pilot signal and information to wireless channel launching carrier signal, the carrier signal Signal, the authentication signal are added to the pilot signal, and the wireless channel is time-varying fading channels;
The receiving terminal receives the carrier signal, the blind known disturbances elimination (BKIC) of carrier signal progress is handled and poor Sub-signal processing obtains target authentication signal, and in BKIC processing, using adjacent symbol, institute is eliminated by smoothing technique State pilot signal;
In the receiving terminal, reference signal is obtained based on key and the pilot signal, difference is carried out to the reference signal Signal processing refers to authentication signal to obtain, and calculates the target authentication signal and the correlation with reference to authentication signal, Obtain test statistics;And
The test statistics is compared with defined threshold, so that it is determined that whether the carrier signal can pass through certification.
2. the blind authentication method of physical layer according to claim 1, it is characterised in that:
Carrier signal piecemeal in the form of data block emits.
3. the blind authentication method of physical layer according to claim 2, which is characterized in that
In every piece of carrier signal, the signal length of the pilot signal and the signal length of described information signal and it is equal to The signal length of the carrier signal.
4. the blind authentication method of physical layer according to claim 1, which is characterized in that
Using Hash matrix, the reference signal is obtained based on the key and the pilot signal.
5. the blind authentication method of physical layer according to claim 1, which is characterized in that
If the test statistics is not less than the defined threshold, the carrier signal passes through certification.
6. the blind authentication method of physical layer according to claim 1, which is characterized in that
Statistical property and the preset false-alarm probability upper limit of the defined threshold based on the pilot signal obtain.
7. a kind of blind authenticating device of physical layer of time-varying fading channels based on smoothing technique, which is characterized in that
Including:
Processor performs the computer program of the memory storage to realize such as claim 1 to 6 any one of them object Manage the blind authentication method of layer;And
Memory.
8. a kind of computer readable storage medium, which is characterized in that
The computer-readable recording medium storage has at least one instruction, and at least one instruction is real when being executed by processor Now such as the blind authentication method of claim 1 to 6 any one of them physical layer.
9. a kind of blind Verification System of physical layer of time-varying fading channels based on smoothing technique, which is characterized in that
Emitter, to wireless channel launching carrier signal, the carrier signal includes authentication signal, pilot signal and information Signal, the authentication signal are added to the pilot signal, and the wireless channel is time-varying fading channels;And
Reception device, including:First processing module receives the carrier signal, the carrier signal is carried out blind known Interference eliminates (BKIC) processing and differential signal processing to obtain target authentication signal, and in BKIC processing, utilization is adjacent Symbol, the pilot signal is eliminated by smoothing technique;Second processing module is obtained based on key and the pilot signal Reference signal carries out the reference signal differential signal processing and refers to authentication signal, and calculate the target authentication to obtain Signal and the correlation with reference to authentication signal by differential signal processing, obtain test statistics;And determination module, The test statistics is compared by it with defined threshold, so that it is determined that whether the carrier signal can pass through certification.
10. the blind Verification System of physical layer according to claim 9, which is characterized in that
The Second processing module is based on the key using Hash matrix and the pilot signal obtains the reference signal.
11. the blind Verification System of physical layer according to claim 9, which is characterized in that
In the determination module, in statistical property and preset false-alarm probability of the defined threshold based on the pilot signal Limit obtains.
CN201711347201.9A 2017-12-13 2017-12-13 Physical layer blind authentication method and system of time-varying fading channel based on smoothing technology Active CN108173791B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711347201.9A CN108173791B (en) 2017-12-13 2017-12-13 Physical layer blind authentication method and system of time-varying fading channel based on smoothing technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711347201.9A CN108173791B (en) 2017-12-13 2017-12-13 Physical layer blind authentication method and system of time-varying fading channel based on smoothing technology

Publications (2)

Publication Number Publication Date
CN108173791A true CN108173791A (en) 2018-06-15
CN108173791B CN108173791B (en) 2020-06-26

Family

ID=62522263

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711347201.9A Active CN108173791B (en) 2017-12-13 2017-12-13 Physical layer blind authentication method and system of time-varying fading channel based on smoothing technology

Country Status (1)

Country Link
CN (1) CN108173791B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108769987A (en) * 2018-07-09 2018-11-06 深圳大学 Physical layer information hidden method, device and terminal based on range information estimation
CN109168166A (en) * 2018-11-22 2019-01-08 深圳大学 The safety detecting method of physical layer Verification System
WO2019113866A1 (en) * 2017-12-13 2019-06-20 深圳大学 Smoothing-technology-based physical layer blind authentication method and system for time-varying fading channel

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105635125A (en) * 2015-12-25 2016-06-01 电子科技大学 Physical layer combined authentication method based on RF fingerprint and channel information
US9538040B2 (en) * 2011-12-16 2017-01-03 University Of Maryland, College Park Active sensing for dynamic spectrum access
CN107046468A (en) * 2017-06-14 2017-08-15 电子科技大学 A kind of physical layer certification thresholding determines method and system
CN107196920A (en) * 2017-04-28 2017-09-22 中国人民解放军信息工程大学 A kind of key towards wireless communication system produces distribution method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9538040B2 (en) * 2011-12-16 2017-01-03 University Of Maryland, College Park Active sensing for dynamic spectrum access
CN105635125A (en) * 2015-12-25 2016-06-01 电子科技大学 Physical layer combined authentication method based on RF fingerprint and channel information
CN107196920A (en) * 2017-04-28 2017-09-22 中国人民解放军信息工程大学 A kind of key towards wireless communication system produces distribution method
CN107046468A (en) * 2017-06-14 2017-08-15 电子科技大学 A kind of physical layer certification thresholding determines method and system

Non-Patent Citations (5)

* Cited by examiner, † Cited by third party
Title
JINLING ZHANG等: "Using Basis Expansion Model for Physical Layer Authentication in Time-Variant System", 《2016 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS)》 *
LIANG XIAO等: "Using the physical layer for wireless authentication in time-variant channels", 《IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS》 *
PAUL L. YU: "MIMO Authentication via Deliberate Fingerprinting at the Physical Layer", 《IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY》 *
WEIKUN HOU等: "Physical layer authentication in OFDM systems based on hypothesis testing of CFO estimates", 《2012 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC)》 *
季新生等: "基于哈希方法的物理层认证和机制", 《电子与信息学报》 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019113866A1 (en) * 2017-12-13 2019-06-20 深圳大学 Smoothing-technology-based physical layer blind authentication method and system for time-varying fading channel
US11510055B2 (en) 2017-12-13 2022-11-22 Shenzhen University Smoothing-technology-based physical layer blind authentication method and system for time-varying fading channel
CN108769987A (en) * 2018-07-09 2018-11-06 深圳大学 Physical layer information hidden method, device and terminal based on range information estimation
CN109168166A (en) * 2018-11-22 2019-01-08 深圳大学 The safety detecting method of physical layer Verification System
CN109168166B (en) * 2018-11-22 2020-08-18 深圳大学 Safety detection method of physical layer authentication system

Also Published As

Publication number Publication date
CN108173791B (en) 2020-06-26

Similar Documents

Publication Publication Date Title
Zhou et al. Design of a robust RF fingerprint generation and classification scheme for practical device identification
CN109309644B (en) Network watermarking method and system based on biorthogonal carrier
CN108206795A (en) Blind authentication method and system based on the frequency selective fading channels that confidence is transmitted
CN107872290A (en) A kind of mark UE method, network side equipment, UE and system
CN110381510B (en) Non-orthogonal multiple access authentication system based on superimposed physical layer authentication label
CN108173791A (en) The blind authentication method of physical layer and system of time-varying fading channels based on smoothing technique
CN112261021B (en) DDoS attack detection method under software defined Internet of things
CN109511116A (en) Consider the safety detecting method of the physical layer Verification System of hostile end computing capability
Abhishek et al. Detecting RSU misbehavior in vehicular edge computing
CN108156102A (en) The blind authentication method and system of frequency selective fading channels based on smoothing technique
CN109348477A (en) Wireless internet of things physical layer authentication method based on service network
CN108199991A (en) The blind authentication method of physical layer and system based on the time-varying fading channels that confidence is transmitted
CN110392371B (en) Optimization method of non-orthogonal multiple access authentication system based on time division multiplexing authentication label
US11412378B2 (en) Smoothing technology-based blind authentication method and system for frequency selective fading channel
CN109600742B (en) Hidden wireless communication physical layer slope authentication method and device
Nalam et al. Detecting selective modification in vehicular edge computing
CN108966223A (en) Physical layer authentication method and system based on single-bit concealment agreement
Chen et al. On physical-layer authentication via triple pool convolutional neural network
An et al. MAC Spoofing Attack Detection based on EVM in 802.11 WLAN
CN111683363A (en) Physical layer authentication method and system in spatial domain modulation system
US11510055B2 (en) Smoothing-technology-based physical layer blind authentication method and system for time-varying fading channel
Tayebi et al. Performance analysis of chaos based WSNs under jamming attack
US10924318B2 (en) Belief propagation-based blind authentication method and system for frequency selective fading channel
CN108966211B (en) Secure wireless communication physical layer slope authentication method and device
US11395140B2 (en) Belief propagation-based physical layer blind authentication method and system for time-varying fading channels

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant