This application is based upon and claims priority to Chinese Patent Application No. 202010010737.7, filed on Jan. 6, 2020, the entire contents of which are incorporated herein by reference.
The present invention relates to the field of information security, and more particularly, to a method for physical layer secure transmission against an arbitrary number of eavesdropping antennas.
With the rapid development of wireless networks, such as 5G, :Internet of Things (IoT), wireless communication security is gradually growing as a prerequisite for various applications. Compared with traditional wired networks, wireless communications face serious threat of eavesdropping attacks, due to its broadcast nature. In wireless communication networks, cryptographic techniques are typically used at the network layer above the physical layer to ensure communication security.
Conventional cryptographic mechanisms employ pre-shared keys to encrypt/decrypt the confidential information. While the eavesdropper (Eve) is assumed to be with limited computational resources and it is computationally infeasible to decipher the encrypted information without knowledge of pre-shared keys. However, the future wireless networks support ultra-high speed and ultra-low latency communications among massive source-constrained devices, which makes cryptographic key distribution and management highly challenging. Second, massive number of wireless nodes, e.g., the sensor nodes or IoT devices, typically operate with low power consumption under unattended setting and have extremely limited computational resources. As a result, highly complex encryption technique is insufficient to adapt to such kinds of applications in future wireless mobile networks. Moreover, with the rapid development of quantum computers, current cryptographic mechanisms can be compromised. Under this case, physical layer secure communication (PLS) that exploits physical characteristics of wireless channel to secure the communication, but regardless of eavesdroppers' computational power, has attracted considerable research attentions.
The security of PLS transmission schemes depends on the advantage of received signal quality of the legitimate channel comparing to that of eavesdropping channel, such as the instantaneous/average received SNRs (signal-to-noise ratio) of the signals that bear the confidential information. Such advantages can be measured by the so called secrecy capacity, which is the maximum achievable secrecy rate, under which the legitimate transmitter (Alice) is able to send confidential information to the legitimate receiver (Bob) with both security and reliability.
Currently, mainstream techniques for physical layer secure transmission include multi-antenna beamforming and precoding, artificial noise, cooperative interference and others. However, current PLS communication schemes cannot defend against a. passive eavesdropper (Eve) with arbitrary number of antennas. This is due to the fact that when Eve keeps increasing the number of antennas, and if the antenna number of Eve is far more than the total antenna number of Alice and Bob, Eve can achieve the higher reception quality by jointly combining the received signals at each antenna. As a result, the channel advantages of Bob comparing to that of Eve are gradually decreasing. Especially, when a stronger Eve equips with much more antennas than Alice and Bob, the advantages of the legitimate channels are vanished, Which results in the unachievability of secure communication.
In the real communications, a passive Eve would never inform Alice and Bob about her number of antennas to expose her ability. Moreover, with the rapid development of SG massive multiple-input multiple-output (MIMO) and distributed MIMO, an eavesdropper with rich antenna resources is able to deploy a large number of antennas or distributed antennas for eavesdropping, But in real applications, it is impossible for both Alice and Bob to know how many antennas are specifically deployed by the eavesdropper. In this regard, it is difficult for Alice and Bob to use more antennas to defend against the eavesdropper. Current techniques for physical layer secure communications cannot defend against eavesdropper with more antennas than the total number of antennas of legitimate transmitter and receiver. Hence, the present invention proposes a method for physical layer secure communication to defend against eavesdroppers with arbitrary number of eavesdropping antennas, which has strong practicability.
In view of the above-mentioned issues, an objective of the present invention is to provide a method for physical layer secure communication against an eavesdropper with arbitrary number of eavesdropping antennas. The invention is applied in a typical TDD (time division multiplexing) communication system.
In the proposed scheme, a legitimate transmitter Alice and a legitimate receiver Bob apply a protected zone with a radius R to surround themselves to prevent an eavesdropper Eve from entering the protected zone for eavesdropping, The method includes the following steps:
S1: The legitimate transmitter Alice and the legitimate receiver Bob confirm communication parameters;
S2: First, Alice independently generates random bits bk to encrypt (exclusive-OR: XOR) the binary confidential information b to obtain b, Alice maps the key bit bk into the key symbol K, and modulate bs=(bs,1, bs,2, . . . , bs,N) to modulated symbols (s1, s2, . . . , sN);
S3: Bob transmits a pilot sequence to Alice. Alice estimates channel HAB and process it to get a preceding weights space matrix W. According to K, Alice constructs the precoding matrix W(e). Then Alice transmits s=(s1, . . . , sN) by multiplying precoding W(e);
S4: Bob measures the received signal pule noise strength (SPN) of each receive antenna to obtain the antenna index vector, and inversely mapping the antenna index vector to obtain key symbols K and key bits bk . Bob demodulates the received modulated symbol at each activated antenna;
S5: Bob performs XOR on the observed key bits bk and the demodulated bits bs=(bs,1, bs,2, . . . , bs,N) to obtain the confidential information bits b; and
S6: repeating steps S2-S5.
Further, step S1 includes the following steps:
S11: Alice presents the confidential bits as b=(b1, b2, . . . , bN), where each bi, i=1, 2, . . . , N, contains MS=log2 M independent bits (MS and M denote the modulation order and the total number of constellation symbols in the modulation set); and
S12: Alice and Bob confirming parameters: the number of symbol streams N and receive antennas NB, such that
Where MS denotes the order of a constellation signal of the modulation type used by the communication.
Further, in Step S2, Alice obtains bs as follows:
b
s=(bs,1, bs,2, . . . , bs,N)=(b1 ⊕ bk, b2 ⊕ bk, . . . , bN ⊕ bk).
Further, step S3 includes the following steps:
After receiving the pilot sequence, Alice estimates an uplink channel HBA and transposes the uplink channel HBA to obtain a downlink channel HAB=HB4T; and the precoding weights space W is calculated as follows:
Further, according to the value of K, Alice selects the (K+1)-th column in E. It is selected as e=E(:, K+1), which is used as a selection criterion for constructing the precoding. Further, Alice selects N column vectors from W corresponding to the subscript position of the N non-zero elements in e to construct W(e). Further in Step S3, Alice transmits the symbol streams s=(s1, . . . , sN) by using the precoding W(e), and the received signals, which are expressed as:
where I (e) denotes the subscript position of the non-zero elements in e=E(:, k+1).
Further, step S4 includes:
The number of the receive antennas of Bob is NB; after receiving a signal y ∈ CN
S41: Bob Obtains the indexes of N maximum values of αi
S42: Bob obtains the observed key symbols {circumflex over (K)} and key bits {circumflex over (b)}k according to the observed ê;
S43: Bob independently demodulating the symbols ŝ at the activated antennas corresponding to N non-zero elements in the observed ê to obtain bits {circumflex over (b)}s; wherein ŝi=arg mins
Further in Step S5, an XOR is performed by Bob on the observed key bits {circumflex over (b)}k and the decrypted bits {circumflex over (b)}s to obtain the confidential bit transmitted by Alice as:
{circumflex over (b)}=({circumflex over (b)}s,1 ⊕ {circumflex over (b)}k, {circumflex over (b)}s,2 ⊕{circumflex over (b)}k, . . . , {circumflex over (b)}s,N ⊕ {circumflex over (b)}k).
Further, the radius R of the protected zone is larger than the uncorrelated distance of the wireless channel, and the radius R is determined by the channel propagation environment and carrier frequency.
The advantages of the present invention are as follows. The method of the present invention can defend against eavesdroppers with an arbitrary number of eavesdropping antennas without the use of any pre-shared keys by legitimate transmitter and receiver. In this way, regardless of how many antennas the eavesdropper uses for eavesdropping, the lower bound of bit error rate (BER) is always guaranteed to be 0.5 at eavesdroppers, while the BER of legitimate receiver trends to zero, thus realizing high-intensity physical layer secure and reliable communication simultaneously, which is a superiority that cannot be achieved by existing physical layer secure transmission methods.
This method has the advantages such as low power consumption, low complexity, and low interference, and is capable of realizing physical layer secure communication to defend against eavesdroppers with an arbitrary number of antennas without any additional artificial noise or cooperative interference, which will not add extra power consumption to the network or cause unnecessary interference to other users.
In order to facilitate a clearer understanding of the technical features, objectives and effects of the present invention, the specific embodiments of the present invention will be described hereinafter with reference to the drawings,
In order to facilitate a deeper understanding of the present invention, the physical layer where the method is implemented is explained below. Those skilled in the art should understand that the scope of protection of the present invention is not limited thereto.
The legitimate transmitter Alice and receiver Bob each employs a protected zone with a radius R to surround themselves, The radius R of the protected zone must be greater than the uncorrelated distance of the channel to prevent eavesdropper Eve from entering the protected zone for eavesdropping. Namely, the distances from Eve to Alice and Bob are both larger than R, thereby ensuring that Eve's channel is independent from the channel of Alice and the channel of Bob, respectively. The radius R is determined by the channel propagation environment and carrier frequency, and is generally 10 cm-100 cm in a rich scattering environment.
The legitimate transmitter Alice and the legitimate receiver Bob each need to be equipped with at least 2 antennas. NA and NB below denote the number of antennas of Alice and the number of antennas of Bob, respectively, where NA>NB>1. A downlink communication is taken as an example for illustration, where Alice transmits confidential binary information b=(b1, b2, . . . ), (bi ∈ {0,1}) to Bob, and the eavesdropper Eve eavesdrops from her received signals. The eavesdropper Eve employs arbitrary number of receive antennas as NE.
As shown in
As shown in
S1: The legitimate transmitter Alice and the legitimate receiver Bob confirm communication parameters. The parameters include N, which is the stream number of the transmitted symbols where 1≤N≤NB−1. The modulation order MS and the total number of constellation symbols M.
S2: First, Alice independently generates random bits bk to encrypt (exclusive-OR: XOR) the binary confidential information b to obtain bs. Alice modulate bs=(bs,1, bs,2, . . . , bs,N) to modulated symbols (s1, s2, . . . , sN), si denotes the specific constellation symbol. Alice maps the key bits bk into the key symbol K.
S3: Bob transmits a pilot sequence to Alice, Alice estimates channel HAB, and processes it to get a precoding weights space matrix W. According to K, Alice obtains the corresponding antenna index vector e. According to e, Alice chooses different column vectors from W to construct the precoding matrix W(e). Then Alice transmits s=(s1, . . . , sN) by multiplying precoding W(e);
S4: Bob measures the received signal plus noise strength (SPN) of each receive antenna, estimates the antenna index vector, inversely mapping the antenna index vector to obtain key symbols K and key bits bk. Bob demodulates the received modulated symbol s=(s1, . . . , sN) at each activated antenna to obtain bs=(bs,1, bs,2, . . . , bs,N);
S5: Bob performs XOR. on the observed key bits bk and the demodulated bits bs=(bs,1, bs,2, . . . , bs,N) to obtain the confidential information bits b; and
S6: repeating steps S2-S5.
Further, step S1 includes the following steps:
S11: Alice presents the confidential bits as b=(b1, b2, . . . , bN), where each bi, i=1, 2, . . . , N, contains MS=log2 M independent bits (MS and M denote the modulation order and the total number of constellation symbols in the modulation set); and
S12: Alice and Bob confirm parameters: the number of symbol streams N and receive antennas NB, such that
Where MS denotes the order of a constellation signal of the modulation type used by the communication. For example, for binary phase-shift keying (BPSK), MS =1.
Further, in Step S2, Alice obtains bs as
b
s=(bs,1, bs,2, . . . , bs,N)=(b1 ⊕ bk, b2, ⊕ bk, . . . , bN ⊕ bk).
Further in Step S2, each key symbol K corresponds to different receive antennas
K={0, 1., 2, . . ., Nk−1}.
As shown in
wherein. “1” in the first column vector e1 of E denotes Bob's first antenna that is activated, “0” in the first column vector e1 of E denotes Bob's second antenna that is non-activated, and so on.
Further, according to the value of K, Alice selects the (K+1)-th column in E as e=E(:, K+1) and used it as a selection criterion for constructing the precoding. Further, Alice selects N column vectors from W corresponding to the subscript position of N non-zero elements in e to construct precoding W(e) to transmit s=(s1, . . . , sN).
Further, step S3 includes the following steps:
After receiving the pilot sequence, Alice estimates an uplink channel HBA and transposes the uplink channel HBA to obtain a downlink channel HAB=HBAT; and the precoding weights space W is calculated as follows:
Further in Step S3, Alice transmits s=(1, . . . , sN) by multiplying the precoding W(e), and the received signals are expressed as:
wherein I (e) denotes the subscript position of a non-zero element in e=E(:, K+1).
Step S4 includes the following sub steps:
Further, the number of the receive antennas of Bob is NB; after receiving a signal y ∈N
αi=|yi|2, i=1, 2, . . . NB.
S41: Bob selects N maximum values of αi, wherein the subscript of αi denotes the position corresponding to the non-zero elements in e and then obtaining the observed e according to the subscripts,
For example, when N=1,
S42: Bob accordingly obtains his own observed ê, and then obtains the observed key symbols {circumflex over (K)} and key bits {circumflex over (b)}k according to the observed; and
In Step S5 Bob independently demodulates the symbols ŝ at the activated antennas corresponding to N non-zero elements in the observed e to obtain the demodulated bits {circumflex over (b)}s; wherein ŝi=arg mins, ∈S ∥yi−s1∥2, i=1, 2, . . . N.
Further in Step S5, an XOR is performed by Bob on the observed key bits {circumflex over (v)}k and the decrypted bits {circumflex over (b)}s to obtain the confidential bit information transmitted by Alice:
{circumflex over (b)}=({circumflex over (b)}s,1 ⊕{circumflex over (b)}k, {circumflex over (b)}s,2 ⊕ {circumflex over (b)}k, . . . {circumflex over (b)}s,N ⊕ {circumflex over (b)}k).
Steps S2 to S5 are repeated to securely transmit confidential information between legitimate transmitter and receiver.
The basic principles and main features and advantages of the present invention have been shown and described above. Those skilled in the art should understand that the present invention is not limited by the foregoing embodiments. The foregoing embodiments and the description in the specification only illustrate the principle of the present invention. The present invention may have various changes and improvements without departing from the spirit and scope of the present invention, and these changes and improvements shall fall within the scope claimed by the present invention. The scope of protection claimed by the present invention is defined by the appended claims.
Number | Date | Country | Kind |
---|---|---|---|
201911377731.7 | Dec 2019 | CN | national |
202010010737.7 | Jan 2020 | CN | national |