[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN116669022A - Data safety transmission method for wireless communication system - Google Patents

Data safety transmission method for wireless communication system Download PDF

Info

Publication number
CN116669022A
CN116669022A CN202310713520.6A CN202310713520A CN116669022A CN 116669022 A CN116669022 A CN 116669022A CN 202310713520 A CN202310713520 A CN 202310713520A CN 116669022 A CN116669022 A CN 116669022A
Authority
CN
China
Prior art keywords
data
sub
receiving end
sequence
transmitting
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN202310713520.6A
Other languages
Chinese (zh)
Inventor
黄印君
赵英
蒋雨辰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiujiang Vocational and Technical College
Original Assignee
Jiujiang Vocational and Technical College
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiujiang Vocational and Technical College filed Critical Jiujiang Vocational and Technical College
Priority to CN202310713520.6A priority Critical patent/CN116669022A/en
Publication of CN116669022A publication Critical patent/CN116669022A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • H04W12/033Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/001Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/041Key generation or derivation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/34Encoding or coding, e.g. Huffman coding or error correction
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention is suitable for the technical field of wireless communication, and provides a data security transmission method of a wireless communication system, which comprises the steps that a transmitting end and a receiving end are respectively provided with self-adaptive chaotic systems with the same structure and parameters, and a wireless channel is used as a coupling medium; the method comprises the steps that a sending end and a receiving end generate a chaotic sequence by using a self-adaptive chaotic system, perform synchronous verification and generate a key sequence by using the chaotic sequence; the transmitting end and the receiving end generate information entropy values by utilizing wireless channel characteristics and carry out synchronous verification; the sending end encrypts data to be sent by utilizing a key sequence, encodes the encrypted data by utilizing an information entropy value, and sends the encoded data to the receiving end through a wireless channel; and the receiving end decodes the received data by utilizing the information entropy value, and decrypts the decoded data by utilizing the key sequence to obtain the data to be transmitted. The method provided by the invention solves the problem of low safety and efficiency of the existing wireless communication system.

Description

Data safety transmission method for wireless communication system
Technical Field
The invention belongs to the technical field of wireless communication, and particularly relates to a data security transmission method of a wireless communication system.
Background
The wireless communication system is a communication system for transmitting information in space by utilizing radio waves or other electromagnetic waves, has the advantages of wide coverage, flexible deployment, low cost and the like, and is widely applied to the fields of mobile communication, satellite communication, wireless local area network and the like. With the rapid development of wireless communication technology, wireless communication systems carry more and more sensitive information and important data, such as personal privacy, business confidentiality, military instructions, etc. Therefore, future mobile communication systems should have strong security and confidentiality.
However, wireless communication is an open physical system that uses radio frequency methods for network connection and transmission, and can be accessed at any point within a range with sufficient signal strength, and is more vulnerable to eavesdropping, fraud, and the like than a fixed access point of a wired network. Currently, wireless communication systems mainly employ security mechanisms based on cryptography to protect confidentiality and integrity of data, such as WEP, WPA, WPA, WPA3 and other encryption algorithms. These algorithms are all encryption and decryption of data at the data link layer or network layer, depending on pre-shared keys or keys generated by negotiations. However, these algorithms have the following drawbacks:
(1) The cryptographic algorithm depends on the generation, distribution and management of the secret key, and needs to consume more computing resources and bandwidth resources, so that the efficiency and performance of the wireless communication system are reduced;
(2) Cryptographic algorithms rely on key management mechanisms, which can lead to a threat to the security of the overall system if the key is compromised or broken;
(3) Cryptographic algorithms are difficult to adapt to dynamic changes in the wireless communication environment, such as user movements, network topology changes, interference changes, etc.
Therefore, a new method for securely transmitting data in a wireless communication system is needed, which can overcome the above-mentioned drawbacks and improve the security and efficiency of the wireless communication system.
Disclosure of Invention
The embodiment of the invention aims to provide a data security transmission method of a wireless communication system, which aims to solve the problem of low security and efficiency of the existing wireless communication system.
The embodiment of the invention is realized in such a way that the data security transmission method of the wireless communication system comprises the following steps:
the transmitting end and the receiving end are respectively provided with the self-adaptive chaotic systems with the same structure and parameters, and a wireless channel is used as a coupling medium, so that the self-adaptive chaotic systems of the transmitting end and the receiving end are kept synchronous;
The transmitting end and the receiving end respectively generate the same chaotic sequence by using the synchronized self-adaptive chaotic system, carry out synchronous verification and respectively generate respective key sequences by using the generated chaotic sequences;
the transmitting end and the receiving end respectively generate the same information entropy value by utilizing the characteristics of the wireless channel and carry out synchronous verification;
the transmitting end encrypts data to be transmitted by utilizing a key sequence of the transmitting end, encodes the encrypted data by utilizing an information entropy value of the transmitting end, and transmits the encoded data to the receiving end through a wireless channel;
the receiving end decodes the received data by utilizing the information entropy value of the receiving end, and decrypts the decoded data by utilizing the key sequence of the receiving end to obtain the data to be transmitted.
Further, the step of setting the adaptive chaotic system with the same structure and parameters by the transmitting end and the receiving end respectively includes:
the transmitting end and the receiving end respectively determine characteristic parameters of the wireless channel according to the wireless channel environment;
the transmitting end and the receiving end respectively adjust the parameters and initial conditions of the self-adaptive chaotic system according to the characteristic parameters of the wireless channel, and update the state equation of the self-adaptive chaotic system;
The receiving end calculates a synchronization error between the self-adaptive chaotic system of the receiving end and the self-adaptive chaotic system of the transmitting end according to the state variable quantity of the self-adaptive chaotic system;
the receiving end optimizes the parameters and initial conditions of the self-adaptive chaotic system according to the synchronous error so as to keep synchronous with the self-adaptive chaotic system of the transmitting end.
Further, the step of generating the same chaotic sequence and performing synchronization verification by the transmitting end and the receiving end by using the synchronized adaptive chaotic system respectively includes:
the transmitting end and the receiving end respectively generate the same or related chaotic sequence by using the synchronized self-adaptive chaotic system;
the method comprises the steps that a sending end and a receiving end divide respective chaotic sequences into a plurality of sequence sub-blocks with the same length, check calculation is conducted on each sequence sub-block to obtain check data, and the calculated check data are added to the sequence sub-blocks to form an extension sub-block;
the transmitting end transmits the expansion sub-block to the receiving end through a wireless channel;
the receiving end compares the received expansion sub-block with the expansion sub-block calculated and generated by the receiving end, and when the comparison is consistent, the synchronous verification of the chaotic sequence generated by the transmitting end and the receiving end is completed.
Further, the step of generating the same information entropy value by the transmitting end and the receiving end by using the wireless channel characteristics and performing synchronization verification includes:
the transmitting end and the receiving end respectively generate the same or related information entropy values by utilizing the characteristics of the wireless channel;
the transmitting end encrypts the information entropy value of the transmitting end by using a public key to obtain encrypted data, and transmits the encrypted data to the receiving end through a wireless channel;
the receiving end decrypts the received encrypted data by using the private key, compares the decrypted data with the information entropy value generated by the receiving end, and completes synchronous verification of the information entropy values generated by the sending end and the receiving end when the comparison is consistent.
Further, the step of generating the same or related information entropy value by the transmitting end and the receiving end respectively using the wireless channel characteristics includes:
the transmitting end and the receiving end respectively process according to the acquired wireless channel state information to obtain wireless channel characteristic vectors;
the transmitting end and the receiving end respectively encode the wireless channel characteristic vector to obtain wireless channel characteristic codes;
the transmitting end and the receiving end respectively calculate according to the wireless channel characteristic codes to obtain the same or related information entropy values.
Further, the step of encrypting the data to be transmitted by the transmitting end by using the key sequence of the transmitting end and encoding the encrypted data by using the information entropy value of the transmitting end includes:
the method comprises the steps that a sending end divides data to be sent to obtain a plurality of sub-data blocks, and encrypts each sub-data block with a key sequence of the sending end to obtain each encrypted sub-data block;
the transmitting end respectively encodes each encrypted sub-data block by utilizing the information entropy value of the transmitting end to obtain each encoded data;
the step of decoding the received data by the receiving end by utilizing the information entropy value of the receiving end and decrypting the decoded data by utilizing the key sequence of the receiving end to obtain the data to be transmitted comprises the following steps:
the receiving end decodes each received data by utilizing the information entropy value of the receiving end to obtain each encrypted sub-data block;
the receiving end decrypts each encrypted sub-data block by utilizing the key sequence of the receiving end to obtain each sub-data block, and combines each sub-data block to obtain data to be transmitted.
Further, the step of dividing the data to be transmitted by the transmitting end to obtain a plurality of sub-data blocks includes:
the transmitting end divides data to be transmitted to obtain a plurality of sub-data blocks which are arranged in sequence, and respectively configures first unique identifiers which are named in sequence for each sub-data block which is arranged in sequence;
The step of merging each sub data block to obtain data to be sent comprises the following steps:
and the receiving end sequentially arranges the sub-data blocks according to the first unique identifiers configured by the sub-data blocks and combines the sub-data blocks to obtain data to be transmitted.
Further, the step of dividing the data to be transmitted by the transmitting end to obtain a plurality of sub-data blocks includes:
the transmitting end divides data to be transmitted to obtain a plurality of sub data blocks which are arranged in sequence, and the data quantity of each sub data block which is arranged in sequence and obtained by division is changed in sequence;
the step of merging each sub data block to obtain data to be sent comprises the following steps:
and the receiving end sequentially arranges and merges the sub-data blocks according to the data quantity of the sub-data blocks to obtain the data to be transmitted.
Further, the step of dividing the data to be transmitted by the transmitting end to obtain a plurality of sub data blocks, and encrypting each sub data block with its own key sequence to obtain each encrypted sub data block includes:
the sending end divides the data to be sent according to the sequence number in the key sequence to obtain sub-data blocks with the number corresponding to the sequence number, encrypts each sub-data block and sequence elements with the corresponding sequence in the key sequence of the sending end in sequence to obtain each encrypted sub-data block, and configures second unique identifiers for each encrypted sub-data block in sequence;
The step that the receiving terminal decrypts each encrypted sub-data block by utilizing the key sequence of the receiving terminal to obtain each sub-data block comprises the following steps:
and the receiving end correspondingly and sequentially arranges the encrypted sub-data blocks according to the second unique identifiers configured by the decoded encrypted sub-data blocks, and decrypts the sequentially arranged encrypted sub-data blocks by utilizing the sequentially arranged sequence elements in the key sequence of the receiving end to obtain the sub-data blocks.
Further, the step of dividing the data to be transmitted by the transmitting end to obtain a plurality of sub data blocks, and encrypting each sub data block with its own key sequence to obtain each encrypted sub data block includes:
the method comprises the steps that a sending end divides data to be sent according to the sequence number in a key sequence to obtain sub-data blocks with the number corresponding to the sequence number, and sequentially encrypts each sub-data block and sequence elements with the corresponding sequence in the key sequence of the sending end to obtain each encrypted sub-data block, wherein the data amount of each sub-data block which is arranged in sequence and obtained by division sequentially changes;
the step that the receiving terminal decrypts each encrypted sub-data block by utilizing the key sequence of the receiving terminal to obtain each sub-data block comprises the following steps:
The receiving end sequentially arranges the encrypted sub-data blocks according to the data quantity of the decoded encrypted sub-data blocks, and decrypts the sequentially arranged encrypted sub-data blocks by utilizing the sequentially arranged sequence elements in the key sequence of the receiving end to obtain the sub-data blocks.
According to the data security transmission method of the wireless communication system, the self-adaptive chaotic systems with the same structure and parameters are respectively arranged at the transmitting end and the receiving end, so that the synchronism and stability of the self-adaptive chaotic systems of the transmitting end and the receiving end are guaranteed, the consistency or correlation of a chaotic sequence and an information entropy value generated by the transmitting end and the receiving end later is guaranteed, the self-adaptive chaotic system is utilized to generate the chaotic sequence and a key sequence is generated according to the chaotic sequence, the quality and efficiency of key sequence generation are improved, compared with the generation, distribution and management of the existing key, computational resources and bandwidth resources can be effectively reduced, the efficiency and performance of the wireless communication system are improved, the security of data to be transmitted can be guaranteed by encrypting the data to be transmitted by utilizing the key sequence, and the security capacity can be further improved or the eavesdropping rate can be reduced by encoding the data encrypted by utilizing the information entropy value, so that the security and the security of the existing wireless communication system are further improved.
Drawings
Fig. 1 is a flowchart of a method for securely transmitting data in a wireless communication system according to an embodiment of the present invention.
Detailed Description
The present invention will be described in further detail with reference to the drawings and examples, in order to make the objects, technical solutions and advantages of the present invention more apparent. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention.
In the present invention, unless explicitly specified and limited otherwise, the terms "mounted," "connected," "secured," and the like are to be construed broadly and may be, for example, fixedly connected, detachably connected, or integrally connected; can be mechanically or electrically connected; can be directly connected or indirectly connected through an intermediate medium, and can be communication between two elements. The specific meaning of the above terms in the present invention can be understood by those of ordinary skill in the art according to the specific circumstances. The term "and/or" as used herein includes any and all combinations of one or more of the associated listed items.
Example 1
Referring to fig. 1, a flowchart of a method for securely transmitting data in a wireless communication system according to a first embodiment of the present invention is shown, for convenience of explanation, only a portion related to the embodiment of the present invention is shown, and the method includes:
Step S10, the transmitting end and the receiving end are respectively provided with the self-adaptive chaotic systems with the same structure and parameters, and a wireless channel is used as a coupling medium to keep synchronization between the self-adaptive chaotic systems of the transmitting end and the receiving end;
in one embodiment of the invention, the method is used for realizing the safe data transmission between the sending end and the receiving end, and for this purpose, the self-adaptive chaotic systems with the same structure and parameters are respectively arranged in the sending end and the receiving end, and a wireless channel is used as a coupling medium to realize the synchronization between the self-adaptive chaotic systems.
Specifically, the chaotic system is a dynamic system with characteristics of certainty, nonlinearity, sensitivity, initial condition dependence and the like, and has complex dynamic behavior and high randomness. The chaotic system can be used for generating a chaotic sequence, and the chaotic sequence has statistical characteristics similar to a random sequence, such as uniform distribution, broadband flatness, zero autocorrelation and the like, so the chaotic system can be used for encryption, spread spectrum, modulation and the like in a communication system to improve the safety and efficiency of communication. The chaotic system can adopt any dynamic system with chaotic characteristics, such as a lorentz system, a basil system, a Chenopff system and the like. The self-adaptive chaotic system is a mode that when the synchronization or control of the chaotic system is realized, the self-adaptive control law is utilized to adjust the parameters under the condition that the parameters are unknown or uncertain, so that the parameters meet a certain self-adaptive law to adjust, the driving system and the response system achieve synchronization or tracking, and the self-adaptive technology can overcome the uncertainty and external interference of the system and improve the robustness and stability of the system.
Further, the synchronization between chaotic systems, i.e. the tracks of one system will converge to the same value of the tracks of the other system, always keeps pace between them, and this synchronization is pace stable. In order to achieve synchronization of the chaotic system at this time, two conditions are generally required: 1. both systems have the same or similar dynamic structure and parameters; 2. there is some coupling or driving relationship between the two systems. Meanwhile, according to different coupling modes, the synchronization of the chaotic system can be divided into the following types: 1. completely synchronous, i.e. the state variables of the two systems are completely equal; 2. phase synchronization, i.e. the phase difference of the state variables of the two systems remains constant; 3. generalized synchronization, i.e., the existence of a certain functional relationship between the state variables of two systems; 4. hysteresis synchronization, i.e., the relationship of two system state variables having a time delay; 5. array synchronization, i.e. an array structure is formed between multiple systems, each system is only coupled to adjacent systems, and finally a synchronous state is achieved. The same chaotic sequence is generated by the synchronization between the chaotic systems, and one common method is to use a master-slave structure, namely one chaotic system is used as a master system, the other chaotic system is used as a slave system, and the output of the master system is used as the input of the slave system in a certain way, so that the slave system can follow the track of the master system.
Specifically, in one embodiment of the present invention, in order to achieve synchronization between chaotic systems, a transmitting end and a receiving end respectively set lorentz systems with the same structure and parameters, and use a wireless channel as a coupling medium. Specifically, a main Lorentz system and a sub Lorentz system are arranged at the transmitting end, and a response Lorentz system is arranged at the receiving end. The main Lorentz system and the auxiliary Lorentz system are synchronous through bidirectional coupling, and the auxiliary Lorentz system and the response Lorentz system are synchronous through unidirectional coupling. The bidirectional coupling may be bidirectional linear coupling or bidirectional nonlinear coupling, and the unidirectional coupling may be unidirectional linear coupling or unidirectional nonlinear coupling. It can be appreciated that in other embodiments of the present invention, other manners of chaotic systems may be further provided, so that the chaotic systems between the transmitting end and the receiving end are synchronized, which is not limited herein specifically.
Further, in an embodiment of the present invention, the adaptive chaotic system in which the transmitting end and the receiving end are respectively provided with the same structure and parameters may be implemented by the following steps:
the transmitting end and the receiving end respectively determine characteristic parameters of the wireless channel according to the wireless channel environment;
The transmitting end and the receiving end respectively adjust the parameters and initial conditions of the self-adaptive chaotic system according to the characteristic parameters of the wireless channel, and update the state equation of the self-adaptive chaotic system;
the receiving end calculates a synchronization error between the self-adaptive chaotic system of the receiving end and the self-adaptive chaotic system of the transmitting end according to the state variable quantity of the self-adaptive chaotic system;
the receiving end optimizes the parameters and initial conditions of the self-adaptive chaotic system according to the synchronous error so as to keep synchronous with the self-adaptive chaotic system of the transmitting end.
Specifically, the wireless channel environment refers to various conditions and influencing factors faced by a communication mode that electromagnetic waves transmit information through spatial propagation in wireless communication, and a large number of phenomena such as obstacles, noise, fading and the like exist in the wireless channel environment, so that signals are transmitted along a plurality of different paths, and effects such as time delay expansion, frequency expansion, angle expansion and the like are caused. At this time, the transmitting end and the receiving end can estimate some characteristic parameters of the wireless channel, such as signal-to-noise ratio, multipath fading, phase offset, and the like, according to the wireless channel environment. Then, the transmitting end and the receiving end design an adaptive controller, such as an adaptive sliding mode controller, an adaptive feedback controller, an adaptive neural network controller and the like, according to the characteristic parameters of the wireless channel to adjust the parameters and initial conditions of the respective adaptive chaotic systems. Then, the receiving end needs to update the state equation of the self-adaptive chaotic system in real time according to the output of the self-adaptive controller, so that the state equation can follow the change of the channel environment. Finally, the receiving end needs to calculate the synchronous error of the self-adaptive chaotic system with the sending end according to the state variable of the self-adaptive chaotic system, and uses the synchronous error as the input of the self-adaptive controller to further optimize the parameters and the initial conditions of the self-adaptive chaotic system, so that the self-adaptive chaotic systems of the sending end and the receiving end can keep synchronous.
At this time, the transmitting end and the receiving end can dynamically adjust parameters and initial conditions of the adaptive chaotic system according to the wireless channel environment, namely dynamically change state equations, control laws, initial values and the like of the adaptive chaotic system according to the characteristics and changes of the wireless channel, so that the chaotic sequence can adapt to the requirements of the wireless channel, and the quality and performance of communication are ensured. The self-adaptive chaotic system between the two communication parties of the transmitting end and the receiving end can achieve parameter consistency, state synchronization, dynamic consistency and the like under the influence of a wireless channel, and the synchronism and the stability of the chaotic system are ensured, so that the consistency or the correlation of a chaotic sequence or an information entropy value is ensured. Meanwhile, the chaotic system can adaptively adjust parameters or structures according to the change of a wireless channel so as to adapt to different wireless channel environments, such as multipath fading, multi-user interference, dynamic change and the like, so that the chaotic sequence has higher randomness and unpredictability, the quality or efficiency of the chaotic sequence or an information entropy value is ensured, an eavesdropper is prevented from cracking the chaotic sequence or the information entropy value by utilizing an active attack or passive monitoring means, the cracking difficulty and the cracking cost of the eavesdropper are increased, and the security of secret communication can be ensured.
Step S20, the transmitting end and the receiving end respectively generate the same chaotic sequence by using the synchronized self-adaptive chaotic system and carry out synchronous verification, and generate respective key sequences by using the generated chaotic sequences;
in one embodiment of the present invention, in order to generate the chaotic sequence, the transmitting end and the receiving end respectively use the state variables of the synchronized auxiliary lorentz system and the response lorentz system to convert the continuous state variables into discrete binary sequences through a threshold decision or quantization method. Specifically, a threshold T is set at the transmitting end S When the state variable x of the auxiliary lorentz system S Greater than T S Outputting 1 when the current is low, otherwise outputting 0; setting a threshold T at the receiving end R When responding to state variable x of lorentz system R Greater than T R When outputting 1, otherwise outputting 0. Because the synchronization is realized between the auxiliary lorentz system and the response lorentz system, the chaotic sequences generated by the transmitting end and the receiving end have the same or highly relevant characteristics.
At this time, the chaotic sequences generated by the transmitting end and the receiving end have the same or highly correlated characteristics, but the chaotic sequences generated by the transmitting end and the receiving end may not be completely the same, so that in order to eliminate errors possibly existing in the chaotic sequences and increase randomness of the chaotic sequences, the transmitting end and the receiving end also need to perform synchronous verification on the chaotic sequences to eliminate the errors and generate keys to randomly enhance the errors. Specifically, in one embodiment of the present invention, the steps of generating the same chaotic sequence and performing synchronization verification by the transmitting end and the receiving end by using the synchronized adaptive chaotic system respectively include:
The transmitting end and the receiving end respectively generate the same or related chaotic sequence by using the synchronized self-adaptive chaotic system;
the method comprises the steps that a sending end and a receiving end divide respective chaotic sequences into a plurality of sequence sub-blocks with the same length, check calculation is conducted on each sequence sub-block to obtain check data, and the calculated check data are added to the sequence sub-blocks to form an extension sub-block;
the transmitting end transmits the expansion sub-block to the receiving end through a wireless channel;
the receiving end compares the received expansion sub-block with the expansion sub-block calculated and generated by the receiving end, and when the comparison is consistent, the synchronous verification of the chaotic sequence generated by the transmitting end and the receiving end is completed.
Specifically, in the error elimination stage, the transmitting end and the receiving end divide the chaotic sequence into a plurality of sequence sub-blocks with the same length respectively, calculate parity check bits or cyclic redundancy check codes for each sequence sub-block, and append the check bits or the check codes obtained by the check calculation to the back of the corresponding sequence sub-block, thereby forming an extended sub-block. Then, the transmitting end transmits the extended sub-block to the receiving end through a wireless channel, the receiving end compares the received extended sub-block with the extended sub-block generated by the receiving end, and if the received extended sub-block and the extended sub-block are the same, the sequence sub-block is described as error-free; if the two are different, the sequence sub-blocks are proved to have errors, and can be corrected or discarded according to check bits or check codes, and when all the extended sub-blocks corresponding to the sequence sub-blocks are checked without errors, the synchronous check of the chaotic sequence is completed. In the random enhancing stage, the transmitting end and the receiving end synchronously utilize a consistent hash function, a random number generator, an iterative error compensation method, a nonlinear noise cancellation method and the like to carry out random enhancing treatment on the chaotic sequence, so that the randomness and the complexity of the chaotic sequence are increased, and a final key sequence is obtained. Therefore, the self-adaptive chaotic system between the transmitting end and the receiving end keeps synchronous, so that consistency or correlation of a chaotic sequence or an information entropy value is ensured, the chaotic sequence is directly generated through the self-adaptive chaotic system, and a key sequence with higher randomness and complexity is obtained after the random enhancement of the chaotic sequence, so that the quality and efficiency of the key sequence generation are improved, and compared with the generation, distribution and management of the existing keys, the computing resources and bandwidth resources can be effectively reduced, and the efficiency and performance of the wireless communication system are improved.
Further, the receiving end receives the extended sub-block through the wireless channel generally by first using the adaptive chaotic system synchronized with the transmitting end; then, the receiving end carries out preprocessing, such as denoising, filtering, synchronization and the like, on the signals received from the wireless channel so as to improve the signal-to-noise ratio and the signal quality; then, the receiving end extracts data from the received signal by using one of specific demodulation methods, wherein the demodulation methods include phase demodulation, frequency demodulation, amplitude demodulation, and the like. It should be noted that, in other embodiments of the present invention, the transmitting end and the receiving end may sequentially attach the verification data calculated and obtained by each sequence sub-block to the sequence sub-block to form each extended sub-block, and then each extended sub-block is combined to obtain a complete target data, so that the above-mentioned multiple-transmission extended sub-block is not required, and efficiency of synchronous verification of the chaotic sequence is effectively improved.
Step S30, the transmitting end and the receiving end respectively generate the same information entropy value by utilizing the characteristics of the wireless channel and carry out synchronous verification;
in one embodiment of the present invention, the characteristics of the wireless channel refer to some physical properties of the wireless channel during the transmission process, such as channel gain, phase, multipath effect, etc., and these characteristics may reflect the quality or state of the wireless channel and may also be used to distinguish different wireless channels. The characteristics of the wireless channel generally refer to parameters such as delay spread, angle spread, doppler spread and the like of the wireless channel, and are used for reflecting time-varying property, space-varying property and frequency-varying property of the wireless channel. The characteristics of the wireless channel are not identical in the transmitting end and the receiving end, because the wireless channel is a random process and is affected by various factors, such as multipath effect, shielding effect, movement effect and the like. There may be some difference in the characteristics of the wireless channel observed by the transmitting end and the receiving end. Although the characteristics of the wireless channel are not completely the same at the transmitting end and the receiving end, because the wireless channel is a bidirectional transmission medium, the uplink and downlink signals pass through the same or similar physical environment, so that the wireless channel has certain reciprocity, namely the uplink and downlink channel characteristics have correlation, namely the transmitting end and the receiving end obtain the same or approximately the same wireless channel state information by measuring the signal strength.
In one embodiment of the present invention, the steps of generating the same information entropy value by the transmitting end and the receiving end respectively using the wireless channel characteristics and performing synchronization verification include:
the transmitting end and the receiving end respectively generate the same or related information entropy values by utilizing the characteristics of the wireless channel;
the transmitting end encrypts the information entropy value of the transmitting end by using a public key to obtain encrypted data, and transmits the encrypted data to the receiving end through a wireless channel;
the receiving end decrypts the received encrypted data by using the private key, compares the decrypted data with the information entropy value generated by the receiving end, and completes synchronous verification of the information entropy values generated by the sending end and the receiving end when the comparison is consistent.
Specifically, the transmitting end and the receiving end respectively generate the same or related information entropy values by utilizing wireless channel characteristics, and then synchronously check the generated information entropy values, wherein the information entropy is an index for measuring information quantity or uncertainty, is related to probability distribution of an information source or information source (such as characters, images, sounds and the like) and reflects the uncertainty or diversity of the information source or the information source. The larger the entropy value of the information, the more abundant or unpredictable or disordered the information representing the information source; the smaller the entropy value of the information, the more regular or deterministic the information representing the source. Further, before the process of synchronous verification of the information entropy values generated by the sending end and the receiving end, the sending end and the receiving end respectively negotiate and exchange a pair of secret key pairs through a wireless channel, after the sending end and the receiving end respectively generate the information entropy values, the sending end encrypts the information entropy values generated by the sending end by utilizing a public key in the secret key pairs to obtain encrypted data, then the encrypted data are sent to the receiving end, the receiving end decrypts the encrypted data by utilizing a private key in the secret key pairs to obtain the information entropy values generated by the sending end, then the receiving end compares the encrypted data with the information entropy values generated by the receiving end, if the encrypted data are consistent, the information entropy values generated by the sending end and the receiving end are determined to be identical, synchronous verification is achieved, if the information entropy values generated by the sending end and the receiving end are inconsistent, the sending end carries out communication negotiation, generates the information entropy values respectively again based on the characteristics of the wireless channel, and continues synchronous verification. At this time, the transmitting end and the receiving end can generate an information entropy value according to the wireless channel characteristics, so that the information entropy value has higher randomness and unpredictability, and the quality or efficiency of the information entropy value is ensured; and the sending end and the receiving end carry out encryption verification on the information entropy value, so that the safety of the information entropy value during transmission verification of a wireless channel can be ensured, and the information entropy value is prevented from being cracked by an eavesdropper.
It should be noted that, the transmitting end and the receiving end are not completely fixed single ends, and are mainly determined by respective states of the transmitting end and the receiving end when data is transmitted and received, for example, when a first terminal transmits a data to a second terminal, the first terminal is used as the transmitting end, and the second terminal is used as the receiving end; when the second terminal sends data to the first terminal, the second terminal is correspondingly used as a sending end, and the first terminal is used as a receiving end. Therefore, in the embodiment of the present invention, only the sender encrypts the information entropy value with the public key and the receiver decrypts the encrypted data with the private key, but in practical application, the sender may encrypt the first terminal and decrypt the second terminal, and may encrypt the first terminal and decrypt the second terminal, which is not limited herein.
In other embodiments of the present invention, the manner in which the sending end and the receiving end perform the synchronization check on the respective generated information entropy values may be: the method comprises the steps that a sending end calculates a hash value of an information entropy value generated by the sending end, then the sending end utilizes a private key in a key pair to conduct signature encryption on the hash value to obtain signature data, then the sending end utilizes a wireless channel to send the signature data to a receiving end, the receiving end utilizes a public key in the key pair to conduct decryption and signature verification on the received signature data, meanwhile, the receiving end conducts hash value calculation on the information entropy value generated by the receiving end to obtain the hash value, then the receiving end compares the hash value obtained by the calculation with the hash value obtained by decryption and signature verification, if the hash value is consistent with the hash value obtained by decryption and signature verification, it is determined that the information entropy values generated by the sending end and the receiving end are identical to achieve synchronous verification, if the hash value is inconsistent, the sending end and the receiving end conduct communication negotiation, generate respective information entropy values again based on the characteristics of the wireless channel, and continue synchronous verification.
Further, in an embodiment of the present invention, the step of generating the same or related information entropy values by the transmitting end and the receiving end respectively using the wireless channel characteristics includes:
the transmitting end and the receiving end respectively process according to the acquired wireless channel state information to obtain wireless channel characteristic vectors;
the transmitting end and the receiving end respectively encode the wireless channel characteristic vector to obtain wireless channel characteristic codes;
the transmitting end and the receiving end respectively calculate according to the wireless channel characteristic codes to obtain the same or related information entropy values.
Wherein the transmitting end and the receiving end can select proper wireless channel characteristics such as channel gain, phase and the like. It should be noted that these features should have a certain stability and reciprocity, that is, not change too much over a period of time, and the transmitting end and the receiving end can observe the same or similar values. Then the sending end and the receiving end conduct feature extraction and coding on the wireless channel features, the wireless channel features are converted into a string of binary digits, the process ensures that the information entropy after coding can reflect the uncertainty of the wireless channel features, and the sending end and the receiving end can use the same or interchangeable coding method. Finally, the sending end and the receiving end synchronously check the entropy values of the information generated by themselves, if the entropy values are the same or highly correlated, the entropy values indicate that the sending end and the receiving end observe the same wireless channel, and if the entropy values are different or highly correlated, the entropy values indicate that the sending end and the receiving end observe different wireless channels. Therefore, the sending end and the receiving end can generate the same information entropy value by utilizing the wireless channel characteristics, so that the information entropy value can be used for realizing physical layer security.
Specifically, the transmitting end and the receiving end respectively acquire wireless channel state information, such as characteristic information with certain stability and reciprocity, such as channel gain, phase, multipath effect and the like, by using a wireless channel measurement technology, and perform operations such as preprocessing, normalization, dimension reduction and the like on the wireless channel state information to obtain wireless channel characteristic vectors, such as power spectrum, singular value spectrum, energy spectrum and the like, wherein the preprocessing comprises operations such as denoising, filtering, synchronization and the like. The transmitting end and the receiving end respectively encode the wireless channel feature vector obtained by the feature extraction by a preset encoding method, for example, by an entropy encoding method and the like, so as to obtain the wireless channel feature code, namely, the wireless channel feature vector is converted into a series of binary digits, wherein the entropy encoding comprises a power spectrum entropy, a singular spectrum entropy, an energy entropy and the like. And finally, calculating a probability density function of the signal according to the wireless channel characteristic code (namely binary digits after coding), and then carrying the probability density function into an information entropy formula to obtain an information entropy value. For example, when power spectrum entropy is adopted, the probability density function is obtained mainly by calculating the energy distribution of signals in the frequency domain space, and then the probability density function is brought into an information entropy formula to obtain an information entropy value; when adopting singular spectrum entropy, the singular value spectrum is obtained mainly by carrying out phase space reconstruction and singular value decomposition on signals, then the singular value duty ratio is calculated to obtain a probability density function, and then the probability density function is brought into an information entropy formula to obtain an information entropy value; when the energy entropy is adopted, signals are decomposed by using a certain method (such as EMD (Empirical Mode Decomposition, empirical mode decomposition), CEEMD (Complementary Ensemble Empirical Mode Decomposition, complementary set empirical mode decomposition), VMD (Variational Modal Decomposition, variation modal decomposition), wavelet decomposition and the like), then the energy value of each component is calculated to obtain a probability density function, and then the probability density function is brought into an information entropy formula to obtain an information entropy value. Since the wireless channel has characteristics such as spatial selectivity and time variability, the wireless channel characteristic codes generated by the transmitting end and the receiving end have the same or highly correlated characteristics, and can be used as information entropy values for encoding or decoding information.
Step S40, the sending end encrypts data to be sent by utilizing a key sequence of the sending end, encodes the encrypted data by utilizing an information entropy value of the sending end, and sends the encoded data to the receiving end through a wireless channel;
in one embodiment of the invention, after the sending end and the receiving end respectively generate and synchronously check the same consistent key sequence and information entropy value, the sending end encrypts the whole data to be sent by using the key sequence to obtain encrypted data, so that the safety of the data to be sent can be ensured, then the encrypted data is encoded by using the information entropy value, so that the efficiency and the reliability of data transmission are convenient, the computer processing is adapted, and then the encoded data is sent to the receiving end through a wireless channel. At this time, the synchronization and stability of the self-adaptive chaotic system of the transmitting end and the receiving end are ensured, the self-adaptive chaotic system adapts to different wireless channel environments, and meanwhile, the quality and efficiency of generating the key sequence and the information entropy value are improved, so that an eavesdropper can be prevented from obtaining the coding mode determined by the key sequence or the information entropy value by cracking the chaotic sequence or the information entropy value by utilizing an active attack or passive monitoring method, the eavesdropping risk in the existing key distribution process is avoided, and the advantages of low cost, low complexity, high efficiency, high reliability and the like can be realized. And the sending end utilizes the information entropy value to carry out proper encoding or modulation on the data, and the receiving end utilizes the information entropy value to carry out proper decoding or demodulation on the information, so that the secret capacity can be further improved or the eavesdropping rate can be reduced under the condition that any secret key or a shorter secret key is not used, the safety and the confidentiality of data transmission are improved, and the advantages of low delay, low cost, high compatibility and the like can be realized.
Specifically, when transmitting data in wireless communication, the data generally needs to be encoded and then transmitted. And encoding is a process of converting the symbols of a source into another form (e.g., binary code) for the purpose of facilitating storage, transmission, or processing. The purposes of the encoding are as follows: 1. the transmission reliability of the data is improved, and errors introduced in the channel can be detected and corrected by adding redundancy bits or check bits. 2. The transmission efficiency of data is improved, and the bandwidth or the number of symbols required for transmission can be reduced by compression or mapping. 3. The method is suitable for the processing mode of the computer, and can facilitate the storage and processing of the computer by converting the heterogeneous signals into binary bit streams.
In the embodiment of the invention, the information entropy value is mainly adopted for encoding, and a proper entropy encoding algorithm, such as shannon encoding, huffman encoding, arithmetic encoding, travel encoding and the like, is specifically selected to compress the encrypted information to obtain binary data, wherein the principle of the entropy encoding algorithm is to allocate codes with different lengths according to the occurrence probability of the source symbols, so that the average encoding length is as close to the information entropy of the source as possible, shorter codes are allocated to symbols with higher probability, longer codes are allocated to symbols with lower probability, and the number of bits required by each symbol is reduced. Therefore, the information can be converted into binary data through an entropy coding algorithm, and the transmitting end does not need to additionally transmit any auxiliary information such as a symbol table or probability distribution and the like because the entropy coding is lossless compression, and directly transmits the coded binary data to the receiving end through a wireless channel.
In one embodiment of the present invention, the step of the transmitting end encrypting the data to be transmitted by using its own key sequence and encoding the encrypted data by using its own information entropy value includes:
the method comprises the steps that a sending end divides data to be sent to obtain a plurality of sub-data blocks, and encrypts each sub-data block with a key sequence of the sending end to obtain each encrypted sub-data block;
the transmitting end respectively encodes each encrypted sub-data block by utilizing the information entropy value of the transmitting end to obtain each encoded data.
Specifically, in addition to the above-mentioned integral encryption of the data to be sent, the embodiment may further divide the data to be sent to obtain a plurality of sub data blocks, and then encrypt each sub data block by using an encryption sequence, so as to ensure the security of each sub data block, further increase the difficulty of tampering and destroying the encrypted data, and ensure the integral security of the data to be sent when encrypting. In the embodiment of the present invention, the transmitting end divides the data to be transmitted to obtain a plurality of sub-data blocks, and the dividing modes have a plurality of dividing modes, which are one of the following dividing modes:
The transmitting end divides data to be transmitted to obtain a plurality of sub-data blocks which are arranged in sequence, and respectively configures first unique identifiers which are named in sequence for each sub-data block which is arranged in sequence;
in a computer system, a data file is essentially a binary stream consisting of two bits, 0 and 1, and for dividing the data file, the data file can be implemented by reading binary data with a preset value from the data file. Therefore, the file header of the data to be sent can be used as the current segmentation starting point to be segmented sequentially, and of course, in other embodiments of the present invention, the segmentation can be performed from any position of the data to be sent according to preset rules. Further, when the division is performed, the data amount read each time is a preset value, and when the data to be transmitted is to be divided, the data amount of the data which is not divided may be less than or equal to the preset value, and then the data which is not divided may be used as the last sub-data block. Further, when each sub data block is obtained by dividing, a first unique identifier is configured for the corresponding sub data block, and the names of the first unique identifiers are sequentially changed, for example, the data to be sent a is divided into a first sub data block, a second sub data block, a third sub data block … and a last sub data block, and at this time, the first unique identifiers sequentially named by A1, A2, A3 … and An are sequentially configured for each sub data, so that the specific arrangement sequence of each sub data block can be correspondingly determined according to the first unique identifier. Alternatively, the configuration of the sub data blocks with a first unique identifier may be achieved by adding a synchronization header for identifying the sequence number of the sub data blocks to each sub data block, where the receiving end may determine the sequence of the sub data blocks by detecting the synchronization header. Wherein the synchronization header is a special code for identifying the beginning and end of a data packet that helps the receiving end find the boundaries of the data packet in the received data stream and synchronize and align. The synchronous head can be placed in front of or behind the data packet, or can be divided into two parts which are respectively placed in front of and behind the data packet. The length and content of the synchronization header depends on the particular coding and modulation scheme.
The other implementation way of dividing the data to be transmitted by the transmitting end to obtain a plurality of sub-data blocks is as follows:
the transmitting end divides data to be transmitted to obtain a plurality of sub-data blocks which are arranged in sequence, and the data quantity of each sub-data block which is arranged in sequence and obtained by division is changed in sequence.
Specifically, when the header of the data to be sent is used as the current start point of segmentation to start the sequential segmentation, the data amount of each sub-data block may not be segmented according to the same data amount, so that the data amount of each sub-data block may be different, and each segmented sub-data block is configured according to a changing sequence, for example, the data to be sent is segmented into a first sub-data block, a second sub-data block, a third sub-data block … and a last sub-data block, and at this time, the data amounts of the first sub-data block, the second sub-data block, the third sub-data block … and the last sub-data block may be sequentially reduced, that is, the data amount of the first sub-data block is the largest, and the data amount of the last sub-data block is the smallest, so that the sequential ordering of each sub-data block may be realized according to the data amount of each sub-data block, and the combined data caused by the ordering error when the subsequent receiving end performs the combination on each sub-data block is avoided.
Further, in the first implementation manner of dividing, the step that the transmitting end divides the data to be transmitted to obtain a plurality of sub data blocks, and encrypts each sub data block with its own key sequence to obtain each encrypted sub data block further includes:
the sending end divides the data to be sent according to the sequence number in the key sequence to obtain sub-data blocks with the number corresponding to the sequence number, encrypts each sub-data block and sequence elements with the corresponding sequence in the key sequence of the sending end in sequence to obtain each encrypted sub-data block, and configures second unique identifiers for each encrypted sub-data block in sequence;
specifically, in addition to the above-mentioned encryption of each piece of sub data by using the encryption sequence, the embodiment may further divide the data to be sent according to the number of sequences in the key sequence, so that the division obtains a number of sub data blocks corresponding to the number of sequences, for example, the chaotic sequence generated by the adaptive chaotic system is specifically '101010110001011010', at this time, the number of sequences of the chaotic sequence is 18 bits, then a randomly enhanced key sequence is generated according to the chaotic sequence, at this time, the number of sequences of the key sequence is the same as the number of sequences of the chaotic sequence, the sequence elements are randomly enhanced, then the data to be sent is divided according to the number of sequences in the key sequence to obtain 18 sub data blocks, then each sub data block and the sequence elements corresponding to the number of sequences in the key sequence are sequentially encrypted to obtain each encrypted sub data block, that is, the first sub data block and the first bit sequence element in the key sequence are encrypted by using an encryption algorithm, where the encryption algorithm may be an operation, a substitution operation, etc., so that the encrypted data maintains the original size without changing the total amount of data, and at the same time, the last encrypted sub data block is sequentially configured with the first unique sub data block, and the last encrypted sub data block is encrypted by the last named, and the last encrypted data block is obtained.
Further, in the second implementation manner of division, the step that the transmitting end divides the data to be transmitted to obtain a plurality of sub data blocks, and encrypts each sub data block with its own key sequence to obtain each encrypted sub data block further includes:
the transmitting end divides data to be transmitted according to the sequence number in the key sequence to obtain sub-data blocks with the number corresponding to the sequence number, and sequentially encrypts each sub-data block and sequence elements with the corresponding sequence in the key sequence of the transmitting end to obtain each encrypted sub-data block, wherein the data amount of each sub-data block which is arranged in sequence and obtained by division is changed in sequence. The specific implementation process is generally described above, and will not be repeated herein.
Step S50, the receiving end decodes the received data by utilizing the information entropy value of the receiving end, and decrypts the decoded data by utilizing the key sequence of the receiving end to obtain data to be transmitted;
in one embodiment of the present invention, after the transmitting end transmits data through the wireless channel, the receiving end may receive the data, decode the received data by using the information entropy value, and then decrypt the decoded data by using the key sequence, so that the data to be transmitted may be obtained.
Specifically, the receiving end decodes the received binary data by using the information entropy value according to the same entropy coding algorithm. The decoding process is to scan the data stream from left to right according to the binary code corresponding to each symbol, find the matched symbol, and restore it to the original information. Since entropy coding is lossless compression, the original information can be completely restored after decoding, namely the encrypted data generated by the sending end can be obtained, so that preliminary data secret transmission of the sending end and the receiving end is realized. And then further decrypting the decoded data by utilizing the secret key sequence synchronously checked by the self so as to obtain the data to be transmitted.
In one embodiment of the present invention, referring to the foregoing, when the transmitting end divides the data to be transmitted into a plurality of sub-data blocks for data encryption, the step of decoding, by the receiving end, the received data by using the entropy value of the information of the receiving end, and decrypting the decoded data by using the key sequence of the receiving end to obtain the data to be transmitted includes:
the receiving end decodes each received data by utilizing the information entropy value of the receiving end to obtain each encrypted sub-data block;
The receiving end decrypts each encrypted sub-data block by utilizing the key sequence of the receiving end to obtain each sub-data block, and combines each sub-data block to obtain data to be transmitted.
Specifically, the merging of each sub data block to obtain the data to be sent may be implemented in various manners, and in the present invention, two implementation manners corresponding to the above-mentioned splitting manner are specifically proposed, which are specifically as follows:
according to the first mode, the receiving end arranges the sub-data blocks in sequence according to the first unique identifiers configured by the sub-data blocks and combines the sub-data blocks to obtain data to be transmitted.
And secondly, the receiving end sequentially arranges and merges the sub-data blocks according to the data quantity of the sub-data blocks to obtain data to be transmitted.
Further, in the first merging implementation manner, the step of dividing the data to be sent by the sending end indicated in the step S40 to obtain a plurality of sub-data blocks, and encrypting each sub-data block with its own key sequence to obtain each encrypted sub-data block, where in the embodiment of the present invention, the step of decrypting each decoded encrypted sub-data block by the receiving end using its own key sequence to obtain each sub-data block includes:
And the receiving end correspondingly and sequentially arranges the encrypted sub-data blocks according to the second unique identifiers configured by the decoded encrypted sub-data blocks, and decrypts the sequentially arranged encrypted sub-data blocks by utilizing the sequentially arranged sequence elements in the key sequence of the receiving end to obtain the sub-data blocks.
Specifically, after receiving each encrypted sub-data block and decoding the encrypted sub-data block, the receiving end sequentially arranges each encrypted sub-data block according to the second unique identifier configured by each encrypted sub-data block, that is, sequentially arranges the 18 encrypted sub-data blocks according to the second unique identifier, and the receiving end generates a key sequence synchronously checked with the transmitting end, for example, the receiving end decrypts the first bit sequence element in the key sequence and the first encrypted sub-data block by using a decryption algorithm to obtain the first sub-data block, and then decrypts the last bit sequence element in the key sequence and the last encrypted sub-data block to obtain the last sub-data block, and then sequentially arranges each sub-data block according to the first unique identifier configured by each sub-data block by referring to the above, and combines to obtain data to be transmitted.
Further, in the second merging implementation manner, the step of dividing the data to be sent by the sending end indicated in the step S40 to obtain a plurality of sub-data blocks, and encrypting each sub-data block with its own key sequence to obtain each encrypted sub-data block, where in the embodiment of the present invention, the step of decrypting each decoded encrypted sub-data block by the receiving end using its own key sequence to obtain each sub-data block includes:
the step of decrypting each encrypted sub-data block by the receiving end by utilizing the key sequence of the receiving end to obtain each sub-data block comprises the following steps:
the receiving end sequentially arranges the encrypted sub-data blocks according to the data quantity of the decoded encrypted sub-data blocks, and decrypts the sequentially arranged encrypted sub-data blocks by utilizing the sequentially arranged sequence elements in the key sequence of the receiving end to obtain the sub-data blocks. The specific implementation process is generally described above, and will not be repeated herein.
In this embodiment, by setting the adaptive chaotic systems with the same structure and parameters on the transmitting end and the receiving end respectively, the synchronization and stability between the adaptive chaotic systems of the transmitting end and the receiving end are ensured, so that the consistency or correlation of the chaotic sequences and the information entropy values generated by the transmitting end and the receiving end subsequently is ensured, the quality and efficiency of the generation of the key sequences are improved by generating the chaotic sequences by using the adaptive chaotic systems and generating the key sequences according to the chaotic sequences, compared with the generation, distribution and management of the existing keys, the computing resources and bandwidth resources are effectively reduced, the efficiency and performance of the wireless communication system are improved, the security of the data to be transmitted can be ensured by encrypting the data to be transmitted by using the key sequences, the security capacity can be further improved or the hearing rate is reduced by encoding the data encrypted by using the information entropy values, and the security and confidentiality of the data transmission are further improved, thereby the security and confidentiality of the existing wireless communication system are further solved.
In the description of the present specification, a description referring to terms "one embodiment," "some embodiments," "examples," "specific examples," or "some examples," etc., means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the present invention. In this specification, schematic representations of the above terms do not necessarily refer to the same embodiments or examples. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
The above examples merely represent a few embodiments of the present invention, which are described in more detail and are not to be construed as limiting the scope of the present invention. It should be noted that it will be apparent to those skilled in the art that several variations and modifications can be made without departing from the spirit of the invention, which are all within the scope of the invention. Accordingly, the scope of the invention should be assessed as that of the appended claims.

Claims (10)

1. A method for securely transmitting data in a wireless communication system, the method comprising:
The transmitting end and the receiving end are respectively provided with the self-adaptive chaotic systems with the same structure and parameters, and a wireless channel is used as a coupling medium, so that the self-adaptive chaotic systems of the transmitting end and the receiving end are kept synchronous;
the transmitting end and the receiving end respectively generate the same chaotic sequence by using the synchronized self-adaptive chaotic system, carry out synchronous verification and respectively generate respective key sequences by using the generated chaotic sequences;
the transmitting end and the receiving end respectively generate the same information entropy value by utilizing the characteristics of the wireless channel and carry out synchronous verification;
the transmitting end encrypts data to be transmitted by utilizing a key sequence of the transmitting end, encodes the encrypted data by utilizing an information entropy value of the transmitting end, and transmits the encoded data to the receiving end through a wireless channel;
the receiving end decodes the received data by utilizing the information entropy value of the receiving end, and decrypts the decoded data by utilizing the key sequence of the receiving end to obtain the data to be transmitted.
2. The method for securely transmitting data in a wireless communication system according to claim 1, wherein the step of setting the adaptive chaotic system of the same structure and parameters at the transmitting end and the receiving end, respectively, comprises:
The transmitting end and the receiving end respectively determine characteristic parameters of the wireless channel according to the wireless channel environment;
the transmitting end and the receiving end respectively adjust the parameters and initial conditions of the self-adaptive chaotic system according to the characteristic parameters of the wireless channel, and update the state equation of the self-adaptive chaotic system;
the receiving end calculates a synchronization error between the self-adaptive chaotic system of the receiving end and the self-adaptive chaotic system of the transmitting end according to the state variable quantity of the self-adaptive chaotic system;
the receiving end optimizes the parameters and initial conditions of the self-adaptive chaotic system according to the synchronous error so as to keep synchronous with the self-adaptive chaotic system of the transmitting end.
3. The method for securely transmitting data in a wireless communication system according to claim 1, wherein the step of generating the same chaotic sequence and performing the synchronization check by the transmitting terminal and the receiving terminal using the synchronized adaptive chaotic system, respectively, comprises:
the transmitting end and the receiving end respectively generate the same or related chaotic sequence by using the synchronized self-adaptive chaotic system;
the method comprises the steps that a sending end and a receiving end divide respective chaotic sequences into a plurality of sequence sub-blocks with the same length, check calculation is conducted on each sequence sub-block to obtain check data, and the calculated check data are added to the sequence sub-blocks to form an extension sub-block;
The transmitting end transmits the expansion sub-block to the receiving end through a wireless channel;
the receiving end compares the received expansion sub-block with the expansion sub-block calculated and generated by the receiving end, and when the comparison is consistent, the synchronous verification of the chaotic sequence generated by the transmitting end and the receiving end is completed.
4. The method for securely transmitting data in a wireless communication system according to claim 1, wherein the step of generating the same entropy value of information and performing synchronization verification by the transmitting terminal and the receiving terminal by using characteristics of wireless channels, respectively, comprises:
the transmitting end and the receiving end respectively generate the same or related information entropy values by utilizing the characteristics of the wireless channel;
the transmitting end encrypts the information entropy value of the transmitting end by using a public key to obtain encrypted data, and transmits the encrypted data to the receiving end through a wireless channel;
the receiving end decrypts the received encrypted data by using the private key, compares the decrypted data with the information entropy value generated by the receiving end, and completes synchronous verification of the information entropy values generated by the sending end and the receiving end when the comparison is consistent.
5. The method for securely transmitting data in a wireless communication system according to claim 4, wherein the step of generating the same or related entropy values of information by the transmitting end and the receiving end using characteristics of the wireless channel, respectively, comprises:
The transmitting end and the receiving end respectively process according to the acquired wireless channel state information to obtain wireless channel characteristic vectors;
the transmitting end and the receiving end respectively encode the wireless channel characteristic vector to obtain wireless channel characteristic codes;
the transmitting end and the receiving end respectively calculate according to the wireless channel characteristic codes to obtain the same or related information entropy values.
6. The method for securely transmitting data in a wireless communication system according to claim 1, wherein the step of the transmitting end encrypting data to be transmitted using its own key sequence and encoding the encrypted data using its own information entropy value comprises:
the method comprises the steps that a sending end divides data to be sent to obtain a plurality of sub-data blocks, and encrypts each sub-data block with a key sequence of the sending end to obtain each encrypted sub-data block;
the transmitting end respectively encodes each encrypted sub-data block by utilizing the information entropy value of the transmitting end to obtain each encoded data;
the step of decoding the received data by the receiving end by utilizing the information entropy value of the receiving end and decrypting the decoded data by utilizing the key sequence of the receiving end to obtain the data to be transmitted comprises the following steps:
The receiving end decodes each received data by utilizing the information entropy value of the receiving end to obtain each encrypted sub-data block;
the receiving end decrypts each encrypted sub-data block by utilizing the key sequence of the receiving end to obtain each sub-data block, and combines each sub-data block to obtain data to be transmitted.
7. The method for securely transmitting data in a wireless communication system according to claim 6, wherein the step of dividing the data to be transmitted by the transmitting terminal into a plurality of sub-data blocks comprises:
the transmitting end divides data to be transmitted to obtain a plurality of sub-data blocks which are arranged in sequence, and respectively configures first unique identifiers which are named in sequence for each sub-data block which is arranged in sequence;
the step of merging each sub data block to obtain data to be sent comprises the following steps:
and the receiving end sequentially arranges the sub-data blocks according to the first unique identifiers configured by the sub-data blocks and combines the sub-data blocks to obtain data to be transmitted.
8. The method for securely transmitting data in a wireless communication system according to claim 6, wherein the step of dividing the data to be transmitted by the transmitting terminal into a plurality of sub-data blocks comprises:
The transmitting end divides data to be transmitted to obtain a plurality of sub data blocks which are arranged in sequence, and the data quantity of each sub data block which is arranged in sequence and obtained by division is changed in sequence;
the step of merging each sub data block to obtain data to be sent comprises the following steps:
and the receiving end sequentially arranges and merges the sub-data blocks according to the data quantity of the sub-data blocks to obtain the data to be transmitted.
9. The method for securely transmitting data in a wireless communication system according to claim 6 or 7, wherein the step of dividing the data to be transmitted by the transmitting terminal into a plurality of sub-data blocks, and encrypting each sub-data block with its own key sequence to obtain each encrypted sub-data block comprises:
the sending end divides the data to be sent according to the sequence number in the key sequence to obtain sub-data blocks with the number corresponding to the sequence number, encrypts each sub-data block and sequence elements with the corresponding sequence in the key sequence of the sending end in sequence to obtain each encrypted sub-data block, and configures second unique identifiers for each encrypted sub-data block in sequence;
the step that the receiving terminal decrypts each encrypted sub-data block by utilizing the key sequence of the receiving terminal to obtain each sub-data block comprises the following steps:
And the receiving end correspondingly and sequentially arranges the encrypted sub-data blocks according to the second unique identifiers configured by the decoded encrypted sub-data blocks, and decrypts the sequentially arranged encrypted sub-data blocks by utilizing the sequentially arranged sequence elements in the key sequence of the receiving end to obtain the sub-data blocks.
10. The method for securely transmitting data in a wireless communication system according to claim 6 or 8, wherein the step of dividing the data to be transmitted by the transmitting terminal into a plurality of sub-data blocks, and encrypting each sub-data block with its own key sequence to obtain each encrypted sub-data block comprises:
the method comprises the steps that a sending end divides data to be sent according to the sequence number in a key sequence to obtain sub-data blocks with the number corresponding to the sequence number, and sequentially encrypts each sub-data block and sequence elements with the corresponding sequence in the key sequence of the sending end to obtain each encrypted sub-data block, wherein the data amount of each sub-data block which is arranged in sequence and obtained by division sequentially changes;
the step that the receiving terminal decrypts each encrypted sub-data block by utilizing the key sequence of the receiving terminal to obtain each sub-data block comprises the following steps:
The receiving end sequentially arranges the encrypted sub-data blocks according to the data quantity of the decoded encrypted sub-data blocks, and decrypts the sequentially arranged encrypted sub-data blocks by utilizing the sequentially arranged sequence elements in the key sequence of the receiving end to obtain the sub-data blocks.
CN202310713520.6A 2023-06-15 2023-06-15 Data safety transmission method for wireless communication system Withdrawn CN116669022A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310713520.6A CN116669022A (en) 2023-06-15 2023-06-15 Data safety transmission method for wireless communication system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310713520.6A CN116669022A (en) 2023-06-15 2023-06-15 Data safety transmission method for wireless communication system

Publications (1)

Publication Number Publication Date
CN116669022A true CN116669022A (en) 2023-08-29

Family

ID=87720535

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310713520.6A Withdrawn CN116669022A (en) 2023-06-15 2023-06-15 Data safety transmission method for wireless communication system

Country Status (1)

Country Link
CN (1) CN116669022A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117278439A (en) * 2023-11-23 2023-12-22 广东广宇科技发展有限公司 Communication quick verification method based on compression algorithm
CN117580124A (en) * 2024-01-17 2024-02-20 深圳市腾远智拓电子有限公司 Routing protocol system and method for wireless ad hoc network

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117278439A (en) * 2023-11-23 2023-12-22 广东广宇科技发展有限公司 Communication quick verification method based on compression algorithm
CN117278439B (en) * 2023-11-23 2024-02-09 广东广宇科技发展有限公司 Communication quick verification method based on compression algorithm
CN117580124A (en) * 2024-01-17 2024-02-20 深圳市腾远智拓电子有限公司 Routing protocol system and method for wireless ad hoc network
CN117580124B (en) * 2024-01-17 2024-04-26 深圳市腾远智拓电子有限公司 Routing protocol system and method for wireless ad hoc network

Similar Documents

Publication Publication Date Title
US8934633B2 (en) Encrypted communication system, transmitter and receiver using same
JP4906732B2 (en) Data transmission device, data reception device, and data communication device
CN116669022A (en) Data safety transmission method for wireless communication system
CN112788599B (en) Physical layer key generation method based on channel state information
CN108366370B (en) A kind of information transferring method quantifying privately owned asymmetric key based on radio channel characteristic
CN111566990A (en) Secure key agreement with untrusted devices
CN107148015B (en) Continuous encryption physical layer secure transmission method based on polarization code structure
CN110086616B (en) Forward one-time pad secret communication method based on wireless channel
CN104468097A (en) Security data communication achieving method based on quantum key distribution
CN107222307A (en) A kind of controlled quantum safety direct communication method based on four Particle Cluster states
JP2014509094A (en) System and method for securing wireless communication
Lu et al. Physical layer encryption algorithm based on polar codes and chaotic sequences
CN105120453A (en) Secret key generation method
CN111641500B (en) Encryption and decryption method for wireless video transmission safety of unmanned aerial vehicle
JPWO2020059535A1 (en) Transmitter and transmit method, and receiver and receive method
Ghane et al. A network steganographic approach to overlay cognitive radio systems utilizing systematic coding
Han et al. FLoRa: Sequential fuzzy extractor based physical layer key generation for LPWAN
CN108768443B (en) Spectrum spreading parameter agility method based on random signal
Kumar et al. Secret key generation schemes for physical layer security
CN113810126B (en) Dynamic security encryption method for diffraction-free vortex electromagnetic wave channel characteristics
Chen et al. Adaptive Quantization for Key Generation in Low-Power Wide-Area Networks
Sun et al. Approaching Shannon's One-Time Pad: Metrics, Architectures, and Enabling Technologies
Fernando et al. Reed solomon codes for the reconciliation of wireless phy layer based secret keys
Hu et al. A scrambling scheme based on random wireless channel characteristics for secure transmission
Kaveri et al. A Novel Approach for Secure Communication Networks: Dual Key Extraction-based NOMA Technique

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20230829

WW01 Invention patent application withdrawn after publication