期刊文献+

基于旋转置乱的索引跳频抗干扰加密方法 被引量:4

Index modulation aided frequency hopping anti-jamming and encryption method based on rotation scrambling
下载PDF
导出
摘要 为了提升无线通信系统的抗干扰能力和安全性,设计了一种基于旋转置乱的索引跳频抗干扰加密方法,简称加密的索引跳频(EIM-FHSS)方法。首先,通过无线密钥产生多路正交的跳频图案确定当前时刻的可用频点,并利用活跃频点(调制符号的频点)的位置索引传输比特信息。其次,在信息与索引的映射表上,采用无线密钥对映射表进行置乱加密,以保证索引比特的安全性。最后,对活跃频点上传输的符号使用星座旋转加密,使符号比特也具有安全性。理论分析和仿真结果表明,EIM-FHSS方法与传统的索引跳频方法相比具有更强的安全性和抗干扰能力。 In order to improve the anti-jamming ability and security of the wireless communication system,an index frequency-hopping anti-interference encryption method based on rotation scrambling was designed,which could be simply called encrypted index modulation frequency hopping spread spectrum(EIM-FHSS).Firstly,the wireless secret key was used to control multiple orthogonal frequency hopping patterns to determine the available frequencies at the current moment.The index of the active frequency(the frequency point with the modulation symbol)was used to transmit the bit information.Secondly,the secret key was used to employ scrambling encryption on the mapping table between information bits and the indexes,to ensure the security of the index bits.Finally,constellation rotation encryption was used on the symbols transmitted on the active frequency in the scheme,which ensured the security of symbol bits.Theoretical analysis and simulation results show that the proposed EIM-FHSS method has stronger security and anti-jamming abilities than the traditional IM-FHSS methods.
作者 鲁信金 雷菁 施育鑫 LU Xinjin;LEI Jing;SHI Yuxin(College of Electronic Science and Technology,National University of Defense Technology,Changsha 410000,China;The Sixty-third Research Institute,National University of Defense Technology,Nanjing 210007,China)
出处 《通信学报》 EI CSCD 北大核心 2021年第12期27-34,共8页 Journal on Communications
基金 国家自然科学基金资助项目(No.61502518,No.61702536)。
关键词 抗干扰 安全性 无线密钥 索引跳频 映射置乱 星座旋转 anti-jamming security wireless secret key IM-FHSS mapping scrambling constellation rotation
  • 相关文献

参考文献3

二级参考文献16

  • 1AHLSWEDE R,CSISZAR I. Common randomness in information theory and cryptography secret sharing[J].{H}IEEE Transactions on Information Theory,1993,(04):1121-1132. 被引量:1
  • 2MAURER U M. Secret key agreement by public discussion from common information[J].{H}IEEE Transactions on Information Theory,1993,(03):733-742. 被引量:1
  • 3HERSHEY J E,HASSAN A A,YARLAGADDA R. Unconventional cryptographic keying variable management[J].IEEE Trans on Com-munication,1995,(01):3-6. 被引量:1
  • 4MATHUR S,TRAPPER W,MANDAYAM N. Radio-telepathy:extracting a secret key from an unauthenticated wireless channel[A].San Francisco,USA,2008.128-139. 被引量:1
  • 5AONO T,HIGUCHI K,OHIRA T. Wireless secret key genera-tion exploiting reactance domain scalar response of multipath fading channels[J].{H}IEEE Transactions on Antennas and Propagation,2005,(11):3776-3784. 被引量:1
  • 6JANA S;PREMNATH N S;CLARK M.On the effectiveness of secret key extraction from wireless signal strength in real environ-ments[A]{H}北京,2009321-332. 被引量:1
  • 7WILSON R,TSE D,SCHOLTZ R A. Channel identification:secret sharing using reciprocity in UWB channels[J].IEEE Trans on Infor-mation Forensics and Security,2007,(03):17-30. 被引量:1
  • 8YE C,MATHUR S,REZNIK A. Information-theoretically secret key generation for fading wireless channels[J].IEEE Trans on Infor-mation Forensics and Security,2010,(02):240-254. 被引量:1
  • 9SASAOKA H,IWAI H. Securing Wireless Communications at the Physical Layer[M].Springer Publishing Company,2010.261-280. 被引量:1
  • 10HAMIDA S,PIERROT J,CASTELLUCCIA C. An adaptive quantiza-tion algorithm for secret key generation using radio channel measure-ment[A].Cairo,Egypt,2009.1-5. 被引量:1

共引文献10

同被引文献18

引证文献4

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部