Font Size: a A A

Research On Physical Layer Security Techniques For Wireless Spoofing And Wireless Eavesdropping

Posted on:2022-10-03Degree:MasterType:Thesis
Country:ChinaCandidate:X H WangFull Text:PDF
GTID:2518306341451794Subject:Electronics and Communications Engineering
Abstract/Summary:PDF Full Text Request
In order to meet people's increasing demand for wireless communication,the fifth generation(5G)mobile communication system introduces many new technologies to improve information transmission capabilities.However,due to the openness of wireless channel,wireless communication faces a wide range of threats such as spoofing,eavesdropping,and interference.In addition,the use of new wireless technologies such as unmanned aerial vehicle(UAV)communication and intelligent reflecting surface(IRS)has further exacerbated the security risks of wireless network.Physical layer security is an important measure to ensure wireless communication security.It can directly and effectively solve wireless spoofing and eavesdropping from the bottom layer,and it's an important issues that has attracted much attention in recent years.Based on the theory of physical layer security,it is expected that new wireless technologies can be used to solve their potential security problems.Therefore,this paper focuses on typical wireless security problems such as illegal communication,wireless spoofing,wireless eavesdropping,etc.,and studies the corresponding physical layer security solutions,respectively,as follows:1.Research on wireless spoofing methods based on spatial modulation in cooperative communicationAiming at the problem of illegal communication in wireless networks,a three-dimensional symbol-level spoofing method based on the idea of cooperative spatial modulation is proposed,which can fake or tamper illegal communication content.Based on probability theory and maximum likelihood judgment criteria,the closed expression of the spoofing symbol success rate is derived.The expression describes the impact of key parameters such as the transmit power of spoofing node,number of antennas,and symbol modulation order on spoofing performance.Simulation analysis finds that compared with random spoofing method and constellation two-dimensional symbol-level spoofing method,the proposed method has a higher spoofing symbol success rate.When the transmit power of the spoofing node is 10-1.4W,the spoofing success rate can be as high as 90%,increase more than 60%.2.Research on Anti-Spoofing Method Based on RSS Multipoint Detection in UAV CommunicationAiming at the problem of the pseudo ground base station node(Malicious Attacker,MA)spoofing UAV in the UAV communication network,using the certainty of the UAV flight trajectory and the correlation of the channel attributes between adjacent positions,a method for multi-point joint detection of MA based on Received Signal Strength(RSS)is proposed.Based on probability theory,the false alarm rate and missed detection rate of the proposed method are analyzed.Simulation finds that when the MA is 6.5 meters away from the legal ground base station,the missed detection rate of the proposed scheme can be less than 0.1%,which is more than 70%lower than the traditional multi-point independent detection method,and it can effectively detect short-range attack nodes.3.Research on IRS-Assisted OFDM Systems Anti-Eavesdropping MethodAiming at the problem of wireless eavesdropping in wireless communication systems,an IRS-enhanced Orthogonal Frequency Division Multiplexing(OFDM)systems anti-eavesdropping method is proposed.Based on the classical optimization theory,using the method of block coordinate descent,the phase shift of IRS,sub-carrier allocation and power allocation are jointly designed,and an element-level block coordinate descent algorithm is proposed to maximize the security capacity of OFDM systems.The simulation finds that compared with the random configuration scheme of IRS phase shift,when the number of IRS phase shifters is 10,the number of subcarriers is 8,and the transmit power is 8W,the proposed scheme can increase the security capacity more than three times,and the more the number of IRS phase shifters,the better the security capacity improved.
Keywords/Search Tags:spatial modulation, unmanned aerial vehicle, received signal strength, intelligent reflecting surface, orthogonal frequency division multiplexing
PDF Full Text Request
Related items