浏览全部资源
扫码关注微信
1. 西安电子科技大学综合业务网理论及关键技术国家重点实验室,陕西 西安 710071
2. 西安中电科西电科大雷达技术协同创新研究院有限公司,陕西 西安 710071
[ "陈芮(1988- ),男,湖北宜昌人,西安电子科技大学博士生,主要研究方向为跳频序列设计、物理层安全。" ]
[ "李赞(1975- ),女,陕西西安人,西安电子科技大学教授、博士生导师,教育部“长江学者特聘教授”,主要研究方向为突发通信、数字信号处理、无线通信系统等。" ]
[ "石嘉(1987- ),男,陕西西安人,西安电子科技大学副教授,主要研究方向为无线系统资源分配、多载波通信、毫米波通信、隐蔽通信、物理层安全、认知无线电等。" ]
[ "关磊(1986- ),男,陕西渭南人,西安电子科技大学讲师,主要研究方向为跳频序列设计、跳频通信、频谱感知网络等。" ]
纸质出版日期:2019-06-30,
网络出版日期:2019-06,
移动端阅览
陈芮, 李赞, 石嘉, 等. 高安全G函数算法研究[J]. 物联网学报, 2019,3(2):72-79.
RUI CHEN, ZAN LI, JIA SHI, et al. Research on high security G function algorithm. [J]. Chinese journal on internet of things, 2019, 3(2): 72-79.
陈芮, 李赞, 石嘉, 等. 高安全G函数算法研究[J]. 物联网学报, 2019,3(2):72-79. DOI: 10.11959/j.issn.2096-3750.2019.00100.
RUI CHEN, ZAN LI, JIA SHI, et al. Research on high security G function algorithm. [J]. Chinese journal on internet of things, 2019, 3(2): 72-79. DOI: 10.11959/j.issn.2096-3750.2019.00100.
差分跳频技术克服了传统跳频抗跟踪干扰能力较弱的问题。G函数算法决定了差分跳频序列的性能,也直接影响差分跳频系统的性能。然而随着无线系统的复杂化,如大容量的差分跳频系统,传统序列的应用受到严重挑战。因此,为了提升系统的安全性,提出了一种基于混合加密算法的 G 函数构造,证明了加密算法和 G 函数的等价性并分析了混合算法的安全性。仿真结果表明,新的G函数生成的序列性能优异,可以大幅度提升系统性能。
The differential frequency hopping (DFH) overcomes the limitation of frequency hopping and improves the ability to resist tracking interference.The G function determines the DFH sequence and directly affects the performance of DFH communication systems.However
with the complication of wireless communication system such as large capacity DFH network
which poses huge challenges to the use of the number theory based and chaos theory assisted sequence.As a result
in order to improve the security of the system
the novel G function construction was proposed with the aid of hybrid encryption algorithm and the security of hybrid algorithm was analyzed.Moreover
the equivalence principle of G function algorithm and the encryption algorithm was proved.The simulation results show that the DFH sequence generated by the new G function has excellent performance and the performance of the DFH systems is improved greatly.
差分跳频序列密码算法安全性随机性复杂度
differential frequency-hopping sequencecryptographic algorithmsecurityrandomnesscomplexity
LI J, CHENG Q, ZHANG X X ,et al. Secure beamforming design for SWIPT in cooperative D2D communications[J]. China Communications, 2017,14(1): 20-33.
SUN G C, HAN Z, JIAO J B ,et al. Physical layer security in MIMO wiretap channels with antenna correlation[J]. China Communications, 2017,14(8): 149-156.
HANNON M, FENG S, KWON H ,et al. Jamming statistics dependent frequency hopping[C]// IEEE Military Communications Conference. IEEE, 2016: 138-143.
LI Z, CHANG Y L, JIN L J ,et al. Analysis of FHMA performance on block cipher based frequency-hopping sequences[J]. IEEE Communication Letter, 2004,8(7): 434-436.
WANG D Y, ZHANG N, LI Z ,et al. Leveraging high order cumulants for spectrum sensing and power recognition in cognitive radio networks[J]. IEEE Transactions on Wireless Communications, 2018,17(2): 1298-1310.
HERRICK D L, LEE P K . Chess a new reliable high speed HF radio[C]// IEEE Military Communications Conference. IEEE, 1996: 684-690.
HERRICK D L, LEE P K, LEDLOW L L . Correlated frequency hopping—an improved approach to HF spread spectrum communications[C]// Tactical Communications Conference. IEEE, 1996: 319-324.
DONG B H, TANG P, DU Y ,et al. Performance of a compressed spectrum differential frequency hopping signal over Rician fading channel[J]. Journal of Electronics and Information Technology, 2015,37(4): 836-840.
ZHU W, YI B S, GAN L C ,et al. Anti-jamming performance of fountain coded differential frequency hopping systems in AWGN[J]. China Communications, 2014,11(14): 53-60.
CHEN Z, SONG Y, DONG B H . Performance of a compressed spectrum differential frequency hopping system over Rayleigh fading channels[C]// IEEE Military Communications Conference. IEEE, 2013: 781-785.
CHEN Y, ZHAO H S . Study of DFH G function algorithm used for DFH systems[J]. Journal on Communications, 2006,27(10): 100-105.
YANG Y L, HE Z W, KUANG J M . Research on the transition function of differential frequency hopping[J]. Journal on Communications, 2002,23(4): 103-108.
ZHOU Z, LI S, CHENG Y . Designing frequency transition function of differential frequency hopping system[C]// International Conference on Communications and Mobile Computing. IEEE, 2010: 296-300.
GAN L C, WU S Y . A kind of shortwave frequency hopping code based on DFH transform function[J]. Journal of Electronics and Information Technology, 2005,27(2): 218-220.
ZHU W, YI B S, GAN L C . Performance research of fountain-DFH concatenated coding systems over AWGN with partial-band noise jamming[J]. Systems Engineering and Electronics, 2016,38(3): 665-671.
BAO Z Q, WANG B, GAO F . A new differential frequency hopping scheme based on encryption algorithm[J]. Study on Optical Communications, 2017,202(4): 74-78.
CHENG L, ZHOU J R . Differential frequency hopping G function algorithm based on advanced encryption standard[J]. Ship Electronic Engineering, 2008,28(6): 107-109.
YI D J, YANG Q L . Study of DFH frequency transition function based on the principle of affine cipher[J]. Journal of Air Force Engineering University, 2005,6(3): 50-52.
LIANG F L, LUO W X, ZHANG S L . Differential frequency hopping G function algorithm based on reversible integer hash function[J]. Transactions of Beijing Institute of Technology, 2004,24(3): 254-257.
GUAN L, LI Z, SI J B ,et al. Generation and characteristics analysis of cognitive-based high performance wide-gap FH sequences[J]. IEEE Transactions on Vehicular Technology, 2015,64(11): 5056-5069.
SCHNEIER B . Applied cryptography:protocols,algorithms and source code in C[M]. USA: WileyPress, 1996.
RIVEST A, ADLEMAN L . A method for obtaining digital signatures and public-key cryptosystems[J]. Communications of the ACM, 1978,21(2): 120-126.
LEHMANN L E, ROMANO J P . Testing statistical hypotheses[M]. Germany: Springer-VerlagPress, 2005.
WALD A, WOLFOWITZ J . On a test whether two samples are from the same population[J]. The Annals of Mathematical Statistics, 1940,11(2): 147-162.
LEMPEL A, ZIV J . On the complexity of finite sequences[J]. IEEE Transactions on Information Theory, 1976,22(1): 75-81.
0
浏览量
228
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构