浏览全部资源
扫码关注微信
1. 海南大学南海海洋资源利用国家重点实验室,海南 海口 570228
2. 海南大学信息科学技术学院,海南 海口 570228
[ "曹春杰(1977-),男,河北衡水人,海南大学信息科学技术学院教授、硕士生导师,主要研究方向为无线网络安全、信息对抗。" ]
[ "孙敬张(1993-),男,海南海口人,海南大学硕士生,主要研究方向为数据库安全、搜索加密。" ]
[ "张智强(1992-),男,安徽铜陵人,海南大学硕士生,主要研究方向为视频监控系统漏洞分析。" ]
[ "王隆娟(1976-),女,海南东方人,海南大学讲师,主要研究方向为信息安全、计算机应用。" ]
[ "黄梦醒(1973-),男,河南信阳人,海南大学教授、博士生导师,主要研究方向为数据与知识工程、个性化服务、电子商务与电子政务、云计算、智能信息处理。" ]
网络出版日期:2016-10,
纸质出版日期:2016-10-25
移动端阅览
曹春杰, 孙敬张, 张智强, 等. 基于相似度的伪随机序列中超长稀疏特征分析[J]. 通信学报, 2016,37(Z1):25-29.
Chun-jie CAO, Jing-zhang SUN, Zhi-qiang ZHANG, et al. Analysis of super-long and sparse feature in pseudo-random sequence based on similarity[J]. Journal on communications, 2016, 37(Z1): 25-29.
曹春杰, 孙敬张, 张智强, 等. 基于相似度的伪随机序列中超长稀疏特征分析[J]. 通信学报, 2016,37(Z1):25-29. DOI: 10.11959/j.issn.1000-436x.2016243.
Chun-jie CAO, Jing-zhang SUN, Zhi-qiang ZHANG, et al. Analysis of super-long and sparse feature in pseudo-random sequence based on similarity[J]. Journal on communications, 2016, 37(Z1): 25-29. DOI: 10.11959/j.issn.1000-436x.2016243.
无线通信网络中的伪随机序列相似性分析是信息对抗领域中的研究热点。针对无线网络序列相似度分析中存在的序列超长、特征极其稀疏、无法在工程应用中实时处理等难点问题,提出了在一定可容忍误判概率下的序列相似度分析方法。首先对真随机序列相似度概率分布进行了理论分析;然后根据NIST SP 800-22评估标准对伪随机比特流进行了随机性分析,并对其随机性进行了有效性判定;最后结合实际无线通信网络中的超长伪随机序列进行了相似度分析和验证。结果表明:在误判概率约为1%时,相似度下界为0.62。上述结果对于协议分析、流量分析、入侵检测等网络安全领域有重要的借鉴意义和理论价值。
Similarity analysis of pseudo-random sequence in wireless communication networks is a research hotspot problem in the domain of information warfare.Based on the difficulties in super-long sequence
extremely sparse feature
and futilities in engineering application for real-time processing exist in similarity analysis of sequence in wireless net-work
a method of similarity analysis of sequence in a certain margin of misacceptance probability was proposed.Firstly
the similarity probability distribution of real-random sequence was theoretically analyzed.Secondly
according to the standard of NIST SP 800-22
the randomness of pseudo-bitstream was analyzed and the validity of pseudo-bitstream was judged.Finally
similarity was analyzed and verified by combining super-long pseudo-random sequence in real wireless communication networks.The results indicate that the lower bound of similarity value is 0.62 when misacceptance prob-ability uncertainty at about 1%.Above conclusion is considerable importance from the significance and theoretical values in network security domains
such as protocol analysis
traffic analysis
intrusion detection and others.
WANG F , HUANG Z T , ZHOU Y . A new method for m-sequence and gold-sequence generator polynomial estimation[C]//International Symposium on Microwave,Antenna,Propagation and Emc Technolo-gies for Wireless Communications . 2007 : 1039 - 1044 .
杨忠立 , 刘玉君 . 自同步扰乱序列的综合算法研究 [J ] . 信息技术 , 2005 ( 2 ): 30 - 32 .
YANG Z L , LIU Y J . Algorithm research of self-synchronizing scrambler sequence [J ] . Information Technology , 2005 ( 2 ): 30 - 32 .
廖红舒 , 袁叶 , 甘露 . 自同步扰码的盲识别方法 [J ] . 通信学报 , 2013 ( 1 ): 136 - 143 .
LIAO H S , YUAN Y , GAN L . Novel blinal recognition method for self-synchronized scrambler [J ] . Journal on Communications , 2013 ( 1 ): 136 - 143 .
杨学军 , 苏金树 . 关于我国网络电磁空间安全战略的思考 [J ] . 国防科技 , 2010 , 31 ( 4 ): 1 - 3 .
YANG X J , SU J S . Security strategy of network and electromagnet-ism in China:perspectives and suggestions [J ] . National Defense Sci-ence and Technology , 2010 , 31 ( 4 ): 1 - 3 .
SDONG G , JIAN P . Sequence data mining [J ] . Advances in Database Systems , 2007 , 33 ( 2 ): 800 .
肖国震 . 伪随机序列及其应用 [M ] . 北京 : 国防工业出版社 , 1985 .
XIAO G Z . Pseudo random sequence and its applications [M ] . Beijing : National Defence Industry Press , 1985 .
SCHNEIER B . Secrets and lies:digital security in a networked world [J ] . Info , 2003 , 5 ( 1 ): 163 - 165 .
翁贻方 , 郑德玲 , 王云雄 . 基于混沌序列密码的网络信息加密系统 [J ] . 微计算机信息 , 2007 , 23 ( 30 ): 94 - 95 .
WENG Y F , ZHENG D L , WANG Y X . Research and implementation of the chaotic stream cipher-based network information cryptography system [J ] . Microcomputer Information , 2007 , 23 ( 30 ): 94 - 95 .
SPRING M , WESTERMEYER J , HALCON L , et al . Technique for processing encoded information in a wireless communication ner-work [J ] . Journal of Nervous & Mental Disease , 2015 , 191 ( 12 ): 813 - 819 .
MCELIECE R J . he theory of information and coding [J ] . Mathe-matical Gazette , 2002 .
张进 , 黄清杉 , 赵文栋 , 等 . 面向骨干网流量分析与管理的计数器结构 [J ] . 软件学报 , 2013 , 24 ( 9 ): 2165 - 2181 .
ZHANG J , HUANG Q S , ZHAO W D , et al . Statistics counter archi-tecture for backbone network traffic analysis and management [J ] . Journal of Software , 2013 , 24 ( 9 ): 2165 - 2181 .
蒋建春 , 马恒太 . 网络安全入侵检测:研究综述 [J ] . 软件学报 , 2000 , 11 ( 11 ): 1460 - 1466 .
JIANG J C , MA H T . A survey of intrusion detection research on network security [J ] . Journal of Software , 2000 , 11 ( 11 ): 1460 - 1466 .
BERNDT D J , CLIFFORD J . Using dynamic time warping to find patterns in time series[C]// Working Notes of the Knowledge Discov-ery in Databases Workshop . 1994 : 359 - 370 .
KEOGH E , LIN J , FU A . HOT SAX:efficiently finding the most unusual time series subsequence[C]//5th IEEE International Confer-ence on Data Mining . 2005 .
KEOGH E , CHAKRABARTI K , PAZZANI M , et al . Dimensionality reduction for fast similarity search in large time series databases [J ] . Knowledge & Information Systems , 2001 , 3 ( 3 ): 263 - 286 .
PERNG C S , WANG H , ZHANG S R , et al . Landmarks:a new model for similarity-based pattern querying in time series databases [J ] . Icde , 2000 , 93 ( 7 ): 33 - 42 .
董晓莉 , 顾成奎 , 王正欧 . 基于形态的时间序列相似性度量研究 [J ] . 电子与信息学报 , 2007 , 29 ( 5 ): 1228 - 1231 .
DONG X L , GU C K , WANG Z O . Research on shape-based time se-ries similarity measure [J ] . Journal of Electoral of Electronics Informa-tion Technology , 2007 , 29 ( 5 ): 1228 - 1231 .
RUKHIN A , SOTO J , NECHVATAL J . A statistical test suite for random and pseudorandom number generators for cryptographic applications [S ] . NIST Special Publication 800-22 , 2013 .
SCHNEIER B P . Applied cryptography:protocols,algorithms,and source code in C [J ] . Government Information Quarterly , 1994 , 13 ( 3 ): 336 .
王新梅 , 肖国镇 . 纠错码原理与方法 [M ] . 西安 : 西安电子科技大学出版社 , 1996 .
WANG X M , XIAO G Z . Theory and method of error-correcting codes [M ] . Xi'an : Xidian University Press , 1996 .
盛骤 . 概率论与数理统计(第四版) [M ] . 北京 : 高等教育出版社 , 2008 .
SHENG Z . Probability and mathematical statistics (4thed) [M ] . Beijing : Higher Education Press , 2008 .
RUKHIN A , SOTO J , NECHVATAL J , et al . A statistical test suite for random and pseudorandom number generators for cryptographic applications [J ] . Research Gate , 2010 .
0
浏览量
749
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构