CN110278537A - A kind of incoherent transmission plan of safety for move vehicle system - Google Patents
A kind of incoherent transmission plan of safety for move vehicle system Download PDFInfo
- Publication number
- CN110278537A CN110278537A CN201910625327.0A CN201910625327A CN110278537A CN 110278537 A CN110278537 A CN 110278537A CN 201910625327 A CN201910625327 A CN 201910625327A CN 110278537 A CN110278537 A CN 110278537A
- Authority
- CN
- China
- Prior art keywords
- matrix
- legitimate
- sender
- signal
- linear transformation
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/009—Security arrangements; Authentication; Protecting privacy or anonymity specially adapted for networks, e.g. wireless sensor networks, ad-hoc networks, RFID networks or cloud networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/30—Services specially adapted for particular environments, situations or purposes
- H04W4/40—Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The present invention proposes a kind of noncoherent safe transmission scheme for move vehicle system.The present invention includes, and within coherence time, first sends a random signal matrix from legitimate receipt side (Alice) to legitimate sender (Bob), the signal that sender is received is channel matrix and the random signal Matrix Products.The inverse matrix of sender's signal does linear transformation to the data matrix of quasi- transmission, and transformed matrix is passed through transmission.After recipient receives signal, the random matrix caused by it does linear transformation, so as to solve the data of the quasi- transmission of sender.Due to the time variation and randomness of channel, simultaneously because without pilot tone or training sequence in the present invention, therefore either legal receiving-transmitting sides, other eavesdropping sides being still potentially present of, it is not possible that the channel matrix of known main channel.This, which will lead to eavesdropping side (Eve), can not crack the data information transmitted in main channel.The encryption method complexity that the present invention illustrates is low, highly-safe.
Description
1. application field
The present invention relates to the safety of physical layer problems in secure wireless communication, and the invention proposes one kind to be directed to move vehicle
Noncoherent safe transmission scheme of system, it can be achieved that legitimate user Data Encryption Transmission.
2. background technique
Move vehicle system (V2X) is mainly used for improving road safety and improves traffic administration, is the following intelligent transportation
The key technology of system (ITS) can be realized being in communication with each other between vehicle and vehicle, between vehicle and road side facility, vehicle and internet,
To obtain a series of traffic informations such as real-time road, road information, pedestrian information, drive safety is improved, congestion is reduced, mentions
High traffic efficiency.In V2X system, legitimate sender and legitimate receipt side only maintain a stable letter within coherence time
Road, channel will change later.For channel conditions for legitimate sender, legitimate receipt side and listener-in are unknown.With
The continuous development of V2X application, people increasingly pay close attention to the safe transmission of information.
In a wireless communication system, the opening of the broadcast characteristic and wireless channel propagated due to electromagnetic signal, signal are logical
It crosses radio wave arbitrarily to propagate in space, loses the constraint of " wired ", so that the receiver arbitrarily in coverage area
It does not need that the information that transmitter is emitted can be received, the communication information is easily by legal expectation user using any line
Other illegal users in addition obtain.In this sense, wireless communication system has bigger peace than conventional wired systems
Full hidden danger.Therefore in wireless communications, how to ensure the safety of information, prevent the wireless leakage of information, also become increasingly to weigh
It wants.
In the development process of wireless communication, the encryption technology that people constantly design various complexity protects information
Shield.But other than tradition is based on the safety method of key, in recent years academia also increasingly concern based on physical layer characteristic come
The problem of realizing safe transmission.Safety of physical layer (physical-layer secrecy) be Wyner from information theory view for the first time
It proposes.It realizes safety of physical layer, mainly utilizes reciprocity, uniqueness, quick time variation and the unpredictability of channel.It encloses
Around safety of physical layer, there are many research achievements, wherein being much all based on multiple antennas, main includes being based on precoding, people
The methods of work noise.
Using V2X to be commonly configured with mutiple antennas in the modern move vehicle system of representative, form its communication link
One mimo channel.Since terminal is under moving condition always, the characteristic of channel is caused also to change over time.To the receipts of communication
For sending out both sides, channel state information (CSI, Channel State Information) is not usually to predict in advance, is needed
It is obtained by technologies such as channel estimations.In order to reduce channel estimation bring complexity, incoherent transmission is also a kind of common
Option.
3. summary of the invention and feature
The present invention proposes a kind of noncoherent safe transmission scheme for move vehicle system.
As shown in Figure 1, normal communication both sides are sender and legitimate receipt side, configure more antennas, non-in the present invention
Method third party, that is, listener-in is also equipped with mutiple antennas.As shown, indicating legitimate sender with Alice herein, Bob is indicated
Legitimate receipt side, Eve indicate eavesdropping side.In addition, note sender, recipient, eavesdropping side antenna number be N respectivelya,Nb,Ne。
Assuming that the channel matrix of main channel is H.Assuming that coherence time TcInterior, H is basically unchanged.For in move vehicle system
Communication, usually H is to change at random at any time, and cannot predict in advance.Present invention assumes that legitimate sender, legal connecing
Debit, eavesdropping Fang Jun cannot previously known channel matrix Hs.
Concrete operations of the invention are as follows:
1) time shaft is divided into time slot, and slot length is less than the coherence time T of channelc, so that channel in each time slot
Approximate matrix is constant.Also assume that channel has reciprocity.
2) as shown in Figure 2.Time slot is divided into two parts, in first part,
A) a signal matrix P is first sent by Bob, size is Nb×Na.P is randomly generated by Bob, and Alice and Eve are only
Know the size of matrix P, but be unaware of the element value of P, is also unaware of the random distribution that Bob generates P.
B) signal that Alice is received within the time period is matrix Y=HTP, size Na×Na。
3) second part of time slot
A) it is N that N number of data symbol of quasi- transmission is expressed as size by AliceaThe information matrix of × K.The matrix is made into line
Property convert to obtain and send signal S=(YT)-1U。
B) Bob will receive Yb=HS=H (YT)-1U=(PT)-1U, the P that then Bob is generated before this with it to receive signal into
Row linear transformation, obtains PT(PT)-1U=U
Within above-mentioned two period, Eve is possible to intercept and capture P or S.But since H is unknown, cause it that can not solve U.
Under certain occasional cases, if Eve will be made to know H because other reasons cause U to divulge a secret.But in locomotive
In system, channel H changes at random in each time slot.Therefore, Eve accidentally knows the H of some time slot, cannot make him
Have the ability to crack the data of other time slots.Based on this, the present invention realizes what the not stolen hearer of the information comprising sender intercepted and captured
Purpose.
The present invention is compared with currently used safety of physical layer technology and encryption technology, and method is simple, and complexity is very low,
Meanwhile the randomness that legitimate receipt side's transmission signal generates ensure that safety.In addition, the present invention can also have with current
Some technologies be overlapped and use, such as man made noise's technology in safety of physical layer etc..
4. Detailed description of the invention
(1) Fig. 1 is schematic diagram of a scenario of the invention.
(2) Fig. 2 is that time slot of the invention divides schematic diagram.
(3) Fig. 3 is the flow diagram of the method for the present invention.
5. specific implementation method is illustrated
An implementation example is given below in implementation method in order to further illustrate the present invention.This example is only indicated to this
The schematic illustration of invention does not represent any restrictions of the invention.
Assuming that certain sender is Alice, there are 3 antennas, recipient Bob there are 5 antennas.The then letter of Alice to Bob
Road matrix H has 5 rows 3 column, and the channel matrix of Bob to Alice has 3 rows 5 column.Sender Alice wants will
010011101100010011101100 24 binary messages are sent to recipient Bob by wireless channel.According to this hair
It is bright, specific practice is described as follows with reference to Fig. 3:
S001 is according to hypothesis it is found that Alice sends out the information matrix U that 24 binary messages sent are represented by 3*8.By
This, is divided into two parts for time slot, separately includes 3 chronomeres, 8 chronomeres.
S002Bob its 5 antennas, the generation that matrix P, P that size is 5*3 are generated and sent in 3 chronomeres
Mode is any.
S003Alice its 3 antennas receive altogether 3*3 signal Y in 3 chronomeres.
Information matrix U is done linear transformation and obtains S=(Y by S004AliceT)-1U utilizes 8 chronomeres, 3 transmission days
Line sends the matrix signal S that size is 3*8.
S005Bob receives 5*8 signal by its 5 antennas within 8 times, forms the matrix Y of a 5*8b。
The signal P sent before S006Bob use is to the matrix Y receivedbLinear transformation is carried out,I.e.
It obtains sending out the information U sent, group information transmission is completed.
Claims (7)
1. a kind of incoherent transmission plan of safety for move vehicle system, legitimate sender, legitimate receipt side and listener-in
Multiple antennas is configured, legitimate sender and legitimate receipt side transmit data by means of the present invention, can prevent the intercepting and capturing of the side of eavesdropping
Legal information.The present invention is characterized in that following steps:
1) time shaft is divided into time slot, and slot length is less than the coherence time of channel.
2) time slot merotomizes, a part of wherein,
A) a signal matrix P is first sent by legitimate receipt side.
B) signal that legitimate sender receives within the time period is matrix Y=HTP。
3) another part of time slot
A) legitimate sender carries out linear transformation to the data matrix U containing legal information with Y and obtains S, sends signal matrix S.
B) legitimate receipt side receives signal matrix Yb=HS, the P that then Bob is generated with it carry out linear transformation to signal is received, obtain
To U.
2. the method according to claim 1, wherein the legitimate sender, legitimate receipt side, eavesdropping side, are
Refer to the equipment that can be wirelessly transferred or vehicle or other people, object using the equipment.
3. the method according to claim 1, wherein the legal information, refers to that legitimate sender is quasi- and sends to
The information of legitimate receipt side.
4. the method according to claim 1, wherein the transmission signal matrix P, can be and arbitrarily connect by legal
The matrix that debit is determined, which can be randomly generated by legitimate receipt side, pseudorandom is generated or otherwise generated.
5. the method according to claim 1, wherein the data matrix U, element can be binary system, more
System or other any forms, such as can be binary zero, 1, it is also possible to the M kind difference range value of MASK.
6. the method according to claim 1, wherein the linear transformation of the legitimate sender, can be matrix
Inverse, pseudoinverse, the linear transformations such as the MMSE matrix of a linear transformation.
7. the method according to claim 1, wherein the linear transformation of the legitimate receipt side, can be P transposition
Or other are based on P and are formed by linear transformation.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910625327.0A CN110278537A (en) | 2019-07-11 | 2019-07-11 | A kind of incoherent transmission plan of safety for move vehicle system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910625327.0A CN110278537A (en) | 2019-07-11 | 2019-07-11 | A kind of incoherent transmission plan of safety for move vehicle system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110278537A true CN110278537A (en) | 2019-09-24 |
Family
ID=67964265
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910625327.0A Pending CN110278537A (en) | 2019-07-11 | 2019-07-11 | A kind of incoherent transmission plan of safety for move vehicle system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110278537A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111614648A (en) * | 2020-05-14 | 2020-09-01 | 西安交通大学 | Industrial Internet of things active eavesdropping resistant physical layer secure transmission method |
CN112887068A (en) * | 2019-11-30 | 2021-06-01 | 华为技术有限公司 | Data transmission method, transmitting device and receiving device |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103986545A (en) * | 2014-05-09 | 2014-08-13 | 西安交通大学 | Physical layer safety transmission method used for SIMO wireless communication system |
CN105007578A (en) * | 2015-06-05 | 2015-10-28 | 西安交通大学 | Uplink secure transmission method based on downlink auxiliary feedback in 5G communication system |
CN105323060A (en) * | 2015-11-05 | 2016-02-10 | 同济大学 | Encryption method for secure communication based on joint channel and user identification code |
US20160212616A1 (en) * | 2015-01-20 | 2016-07-21 | Commscope Technologies Llc | Secure Transmissions Of Narrowband Digital Signals |
CN106102052A (en) * | 2016-03-01 | 2016-11-09 | 南京邮电大学 | A kind of two dimensional wireless physical layer key generation method of combined channel amplitude and phase place |
-
2019
- 2019-07-11 CN CN201910625327.0A patent/CN110278537A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103986545A (en) * | 2014-05-09 | 2014-08-13 | 西安交通大学 | Physical layer safety transmission method used for SIMO wireless communication system |
US20160212616A1 (en) * | 2015-01-20 | 2016-07-21 | Commscope Technologies Llc | Secure Transmissions Of Narrowband Digital Signals |
CN105007578A (en) * | 2015-06-05 | 2015-10-28 | 西安交通大学 | Uplink secure transmission method based on downlink auxiliary feedback in 5G communication system |
CN105323060A (en) * | 2015-11-05 | 2016-02-10 | 同济大学 | Encryption method for secure communication based on joint channel and user identification code |
CN106102052A (en) * | 2016-03-01 | 2016-11-09 | 南京邮电大学 | A kind of two dimensional wireless physical layer key generation method of combined channel amplitude and phase place |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112887068A (en) * | 2019-11-30 | 2021-06-01 | 华为技术有限公司 | Data transmission method, transmitting device and receiving device |
WO2021104020A1 (en) * | 2019-11-30 | 2021-06-03 | 华为技术有限公司 | Data transmission method, sending device and receiving device |
CN112887068B (en) * | 2019-11-30 | 2022-02-25 | 华为技术有限公司 | Data transmission method, transmitting device and receiving device |
CN111614648A (en) * | 2020-05-14 | 2020-09-01 | 西安交通大学 | Industrial Internet of things active eavesdropping resistant physical layer secure transmission method |
CN111614648B (en) * | 2020-05-14 | 2021-10-15 | 西安交通大学 | Industrial Internet of things active eavesdropping resistant physical layer secure transmission method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103402200B (en) | Key generation method based on radio channel characteristic in a kind of frequency division duplex system | |
US10680807B2 (en) | Quantum self-authenticating timing system | |
US10608999B2 (en) | Establishing a secure uplink channel by transmitting a secret word over a secure downlink channel | |
Rahim et al. | Study of three pass protocol on data security | |
US8688996B2 (en) | Multipad encryption | |
CN108683443B (en) | A kind of spatial modulation safe transmission method of physical layer based on kernel | |
CN105792190B (en) | Data encryption, decryption and transmission method in communication system | |
CN110267266B (en) | Improved train control system safety data interaction method | |
Saez et al. | Securing vehicle communication systems by the KLJN key exchange protocol | |
CN106549939A (en) | Intelligent access control system data processing method and device | |
CN110278537A (en) | A kind of incoherent transmission plan of safety for move vehicle system | |
US20220294618A1 (en) | Improvements to qkd methods | |
CN111600661B (en) | Three-dimensional encryption OFDM optical system based on real-time updated chaotic key distribution | |
KR20180096189A (en) | LPWA Module performing Encrypted Communication and method thereof | |
CN105847001A (en) | Device, system and method for digital microwave communication based on quantum encryption | |
CN111641500B (en) | Encryption and decryption method for wireless video transmission safety of unmanned aerial vehicle | |
CN104284330A (en) | Physical layer encryption technique based on unreliable wireless channel | |
CN104270750A (en) | Password negotiation technology based on packet loss difference | |
CN111934863B (en) | Key sharing method based on artificial noise and security coding in edge calculation | |
KR100796438B1 (en) | Apparatus and method for RFID Authentication Protocol | |
CN110113344A (en) | A kind of marine multiple mobile platforms personal identification method based on distributed cryptographic | |
CN107124270B (en) | Wireless communication-oriented shared random source generation method | |
WO2017128746A1 (en) | Secure microwave communication apparatus and method | |
CN110380812A (en) | A kind of effective scrambling method improving tapping channel safety of physical layer | |
EP3883178A1 (en) | Encryption system and method employing permutation group-based encryption technology |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190924 |