-
公开(公告)号:US20210204117A1
公开(公告)日:2021-07-01
申请号:US17134475
申请日:2020-12-27
Applicant: University of Electronic Science and Technology of China , Science & Technology Department of Sichuan Province
Inventor: Jie Tang , Liang Chen , Hong Wen , Xinchen Xu , Huanhuan Song , Kaiyu Qin
IPC: H04W12/033 , H04L9/06 , H04W12/122
Abstract: A method for physical layer secure transmission against an arbitrary number of eavesdropping antennas includes: S1: communication between legitimate transmitter Alice and legitimate receiver Bob is confirmed; S2: Alice randomly generates a key bit bk with MS bits, maps the key bit bk into a key symbol K, and performs an XOR on the key bit bk and to-be-transmitted confidential information b to obtain an encrypted bits bs; S3: Bob transmits a pilot sequence to Alice, and Alice calculates a candidate precoding space W and transmits modulated symbol streams s=(s1, . . , sN) by using precoding W(e); S4: Bob measures received signal strength of each antenna, estimates the corresponding antenna vector e, inversely maps the vector e to obtain key symbols and key bits, and demodulates the received symbol streams in sequence at each activated antenna to obtain demodulated ciphertext bits; S5: Bob performs an XOR on observed key bits and the demodulated ciphertext bits to obtain the confidential information.
-
公开(公告)号:US10251058B2
公开(公告)日:2019-04-02
申请号:US15310780
申请日:2015-08-24
Inventor: Hong Wen , Jinling Zhang , Runfa Liao , Jie Tang , Fei Pan
Abstract: A cross layer authentication method based on radio frequency fingerprint, it includes the following steps: S1. In the first time slot, the legitimate transmitter A sends the first packet to the legitimate receiver B, and then B identifies the first data packet by the upper layer authentication; S2. The legitimate recipient B extracts the RF fingerprint eigenvector of the legitimate sender A, and stores it in the memory of the legitimate receiver B; S3. In the next time slot, the sender X sends the second packet to the legitimate receiver B, and the legitimate recipient B extracts the RF fingerprint eigenvector of the sender X; S4. Set sample of the RF fingerprint eigenvector; S5. legitimate receiver B estimates the similarity between the RF fingerprint eigenvector of the sender X and sample of the RF fingerprint eigenvector. This invention is in advantage of low computational complexity, small delay and high precision.
-
公开(公告)号:US09985986B2
公开(公告)日:2018-05-29
申请号:US15306094
申请日:2015-06-26
Inventor: Hong Wen , Jie Tang , Da Xiang , Huanhuan Song
IPC: H04L29/06 , H04B7/06 , H04B7/0456
CPC classification number: H04L63/1475 , H04B7/0456 , H04B7/0617 , H04L1/06 , H04L9/0875 , H04L63/0428 , H04W12/12
Abstract: The present invention discloses an unconditional secure communication method based on beam-forming and security code, which comprises the following steps of: Legitimate users send to the signal pie-encoded and modulated, meanwhile eavesdropper receives signals and calculates the bit error rate; computing security coding parameters, legitimate received users send pilot sequence, and legitimate sending users estimate legitimate channel, and extract information on legal channel coding and modulating signal was SVD pre-coding and sending; the signal was decoded, that will be judgment and demodulation then the signal after decoding do security code is transmitted to message or tapping, due to lack of legal channel information, eavesdropper cannot lift pre-coding processing of the received signal with the high bit error rate. This method can establish advantages channel of the wiretap model channel and to ensure that legitimate users can receive signals at the lower bit error rate.
-
公开(公告)号:US11483704B2
公开(公告)日:2022-10-25
申请号:US17134475
申请日:2020-12-27
Applicant: University of Electronic Science and Technology of China , Science & Technology Department of Sichuan Province
Inventor: Jie Tang , Liang Chen , Hong Wen , Xinchen Xu , Huanhuan Song , Kaiyu Qin
IPC: H04W12/03 , H04W12/033 , H04W12/122 , H04L9/06
Abstract: A method for physical layer secure transmission against an arbitrary number of eavesdropping antennas includes: S1: communication between legitimate transmitter Alice and legitimate receiver Bob is confirmed; S2: Alice randomly generates a key bit bk with MS bits, maps the key bit bk into a key symbol K, and performs an XOR on the key bit bk and to-be-transmitted confidential information b to obtain an encrypted bits bs; S3: Bob transmits a pilot sequence to Alice, and Alice calculates a candidate precoding space W and transmits modulated symbol streams s=(s1, . . , sN) by using precoding W(e); S4: Bob measures received signal strength of each antenna, estimates the corresponding antenna vector e, inversely maps the vector e to obtain key symbols and key bits, and demodulates the received symbol streams in sequence at each activated antenna to obtain demodulated ciphertext bits; S5: Bob performs an XOR on observed key bits and the demodulated ciphertext bits to obtain the confidential information.
-
公开(公告)号:US11374969B2
公开(公告)日:2022-06-28
申请号:US17298610
申请日:2019-12-27
Inventor: Jie Tang , Hong Wen , Huanhuan Song , Feiyi Xie , Yi Chen
Abstract: A quantitative method for the security access strategy selection of the edge computing terminals includes the following steps: S1. Quantifying and ranking the security risks according to the terminals and data application requirements under the edge computing system. S1. Quantifying and ranking the security risks according to the terminals and data application requirements under the edge computing system. S2. Calculating the security quantification value of terminal and data application. S3. Giving the weight coefficients for the security risk protection of the security access strategies for the terminal and data in the edge computing side. S4. Give the corresponding value of each security strategy to the corresponding terminal and data security protection. S5. Select the corresponding algorithm according to the data set in S4 to select the security strategies.
-
-
-
-