期刊文献+

基于CR-WFRFT的物理层安全认证方法 被引量:4

Research on Physical Layer Security Authentication Method Based on CR-WFRFT
下载PDF
导出
摘要 作为安全认证的重点研究方向,物理层认证能够节省上层的认证资源,对提高有限资源的利用具有重要意义。针对物理层认证过程安全性不高的问题,提出了一种加权分数傅里叶变换(WFRFT)与星座图旋转角度相结合的物理层认证方法。利用WFRFT的低截获性,基于星座图旋转角度的加权分数傅里叶变换物理层认证系统,能够在不对信号传输过程造成影响的前提下,通过提高计算复杂度降低认证信号的被识别概率。仿真结果表明:经过CR-WFRFT系统输出的信号被识别概率可无限接近于0,且误码率能够与原QPSK理论值相近。CR-WFRFT系统的物理层认证安全性得到了极大提高,进一步保证了信息的有效传输。 As the key of security authentication,physical layer authentication can save the authentication resources of the upper layer to play an important role in improving the utilization of limited resources.In view of solving the problem of low security in the process of physical layer authentication,a physical layer authentication method based on weighted-type fractional Fourier transform and rotation angle of constellation is proposed.With the low interception of WFRFT,weighted fractional Fourier transform physical layer authentication system based on rotation angle of constellation can reduce the recognition probability of authentication signal by increasing the computational complexity without affecting the signal transmission process.The simulation results show that the recognition probability of the signal outputted through the CR-WFRFT system can be infinitely close to 0,and the BER can be close to the theoretical value of the original QPSK.The physical layer authentication security of CR-WFRFT system is greatly improved,and further the effective transmission of information is ensured.
作者 吴佳隆 任清华 李明 WU Jialong;REN Qinghua;LI Ming(Information and Navigation College,Air Force Engineering University,Xi’an 710077,China)
出处 《空军工程大学学报(自然科学版)》 CSCD 北大核心 2020年第3期93-98,共6页 Journal of Air Force Engineering University(Natural Science Edition)
基金 国家重点实验室合作基金(KX162600022)。
关键词 CR-WFRFT 物理层认证 调制水印 信号星座图 CR-WFRFT physical layer authentication modulation watermarking signal constellation
  • 相关文献

参考文献5

二级参考文献26

  • 1Mathur S, Reznik A, Ve C, et al. Exploiting the physical layer for enhanced security[J]. Wireless Communications, IEEE, 2010, 17(5): 63-70.
  • 2A. D. Wyner, The wiretap channel[J].Beil Sys. Tech. J., vol, 54, no. 8pp. 1355-1387, May 1975.
  • 3Csiszar I, Korner J. Broadcast channels with confidential messages[J]. Information Theory, IEEE Transactions on, 1978,24(3): 339-348.
  • 4Leung-Van-Cheong S, Hellman M E. The Gaussian wire-tap channel[J]. Information Theory, IEEE Transactions on, 1978, 24(4): 451-456.
  • 5Gau R H. Transmission policies for improving physical layer secrecy throughput in wireless networks[J]. Communications Letters, IEEE, 2012,16(12): 1972-1975.
  • 6Li X, Hwu J, Ratazzi E P. Using antenna array redundancy and channel diversity for secure wireless transmissions[J]. Journal of Communications, 2007, 2(3): 24-32.
  • 7Goel S, Negi R. Guaranteeing secrecy using artificial noise[J]. Wireless Communications, IEEE Transactions on, 2008, 7(6): 21BO-2189.
  • 8Li W, Ghogho M, Chen B, et al. Secure communication via sending artificial noise by the receiver: outage secrecy capacity/region analysis[J]. Communications Letters, IEEE, 2012, 16(10): 1628-1631.
  • 9Mei L, Sha X J, Zhang N T. The Approach to Carrier Scheme Convergence Based on 4-Weighted Fractional Fourier Transform[J]. IEEE Communications Letters, 2010,14(6): 503-505.
  • 10Sha X J, Qiu X, and Mei L, "Hybrid carrier CDMA communication system based on weighted-type fractional fourier transform," IEEE Commun. Lett., vol. 16, no. 4, pp. 432-435, Apr. 2012.

共引文献48

同被引文献24

引证文献4

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部