Abstract: A method for physical layer secure transmission against an arbitrary number of eavesdropping antennas includes: S1: communication between legitimate transmitter Alice and legitimate receiver Bob is confirmed; S2: Alice randomly generates a key bit bk with MS bits, maps the key bit bk into a key symbol K, and performs an XOR on the key bit bk and to-be-transmitted confidential information b to obtain an encrypted bits bs; S3: Bob transmits a pilot sequence to Alice, and Alice calculates a candidate precoding space W and transmits modulated symbol streams s=(s1, . . , sN) by using precoding W(e); S4: Bob measures received signal strength of each antenna, estimates the corresponding antenna vector e, inversely maps the vector e to obtain key symbols and key bits, and demodulates the received symbol streams in sequence at each activated antenna to obtain demodulated ciphertext bits; S5: Bob performs an XOR on observed key bits and the demodulated ciphertext bits to obtain the confidential information.
Type:
Grant
Filed:
December 27, 2020
Date of Patent:
October 25, 2022
Assignees:
University of Electronic Science and Technology of China, Science & Technology Department of Sichuan Province
Inventors:
Jie Tang, Liang Chen, Hong Wen, Xinchen Xu, Huanhuan Song, Kaiyu Qin
Abstract: A method for physical layer secure transmission against an arbitrary number of eavesdropping antennas includes: S1: communication between legitimate transmitter Alice and legitimate receiver Bob is confirmed; S2: Alice randomly generates a key bit bk with MS bits, maps the key bit bk into a key symbol K, and performs an XOR on the key bit bk and to-be-transmitted confidential information b to obtain an encrypted bits bs; S3: Bob transmits a pilot sequence to Alice, and Alice calculates a candidate precoding space W and transmits modulated symbol streams s=(s1, . . , sN) by using precoding W(e); S4: Bob measures received signal strength of each antenna, estimates the corresponding antenna vector e, inversely maps the vector e to obtain key symbols and key bits, and demodulates the received symbol streams in sequence at each activated antenna to obtain demodulated ciphertext bits; S5: Bob performs an XOR on observed key bits and the demodulated ciphertext bits to obtain the confidential information.
Type:
Application
Filed:
December 27, 2020
Publication date:
July 1, 2021
Applicants:
University of Electronic Science and Technology of China, Science & Technology Department of Sichuan Province
Inventors:
Jie Tang, Liang Chen, Hong Wen, Xinchen Xu, Huanhuan Song, Kaiyu Qin