浏览全部资源
扫码关注微信
1. 国防科技大学电子科学学院,湖南 长沙 410000
2. 国防科技大学第63研究所,江苏 南京 210007
[ "鲁信金(1994- ),女,安徽滁州人,国防科技大学博士生,主要研究方向为信息论、索引调制、polar 码、物理层安全、无线通信技术等" ]
[ "雷菁(1968- ),女,陕西西安人,博士,国防科技大学教授、博士生导师,主要研究方向为信息论、LDPC、空时编码、先进的多址技术、物理层安全、无线通信技术等" ]
[ "施育鑫(1995- ),男,福建泉州人,国防科技大学博士生,主要研究方向为索引调制、抗干扰通信等" ]
网络出版日期:2021-12,
纸质出版日期:2021-12-25
移动端阅览
鲁信金, 雷菁, 施育鑫. 基于旋转置乱的索引跳频抗干扰加密方法[J]. 通信学报, 2021,42(12):27-34.
Xinjin LU, Jing LEI, Yuxin SHI. Index modulation aided frequency hopping anti-jamming and encryption method based on rotation scrambling[J]. Journal on communications, 2021, 42(12): 27-34.
鲁信金, 雷菁, 施育鑫. 基于旋转置乱的索引跳频抗干扰加密方法[J]. 通信学报, 2021,42(12):27-34. DOI: 10.11959/j.issn.1000-436x.2021239.
Xinjin LU, Jing LEI, Yuxin SHI. Index modulation aided frequency hopping anti-jamming and encryption method based on rotation scrambling[J]. Journal on communications, 2021, 42(12): 27-34. DOI: 10.11959/j.issn.1000-436x.2021239.
为了提升无线通信系统的抗干扰能力和安全性,设计了一种基于旋转置乱的索引跳频抗干扰加密方法,简称加密的索引跳频(EIM-FHSS)方法。首先,通过无线密钥产生多路正交的跳频图案确定当前时刻的可用频点,并利用活跃频点(调制符号的频点)的位置索引传输比特信息。其次,在信息与索引的映射表上,采用无线密钥对映射表进行置乱加密,以保证索引比特的安全性。最后,对活跃频点上传输的符号使用星座旋转加密,使符号比特也具有安全性。理论分析和仿真结果表明,EIM-FHSS方法与传统的索引跳频方法相比具有更强的安全性和抗干扰能力。
In order to improve the anti-jamming ability and security of the wireless communication system, an index frequency-hopping anti-interference encryption method based on rotation scrambling was designed, which could be simply called encrypted index modulation frequency hopping spread spectrum (EIM-FHSS).Firstly, the wireless secret key was used to control multiple orthogonal frequency hopping patterns to determine the available frequencies at the current moment.The index of the active frequency (the frequency point with the modulation symbol) was used to transmit the bit information.Secondly, the secret key was used to employ scrambling encryption on the mapping table between information bits and the indexes, to ensure the security of the index bits.Finally, constellation rotation encryption was used on the symbols transmitted on the active frequency in the scheme, which ensured the security of symbol bits.Theoretical analysis and simulation results show that the proposed EIM-FHSS method has stronger security and anti-jamming abilities than the traditional IM-FHSS methods.
HAMAMREH J M , FURQAN H M , ARSLAN H . Classifications and applications of physical layer security techniques for confidentiality:a comprehensive survey [J ] . IEEE Communications Surveys & Tutorials , 2019 , 21 ( 2 ): 1773 - 1828 .
ZHANG J Q , HE B , DUONG T Q , et al . On the key generation from correlated wireless channels [J ] . IEEE Communications Letters , 2017 , 21 ( 4 ): 961 - 964 .
EPIPHANIOU G , KARADIMAS P , ISMAIL D K B , et al . Non-reciprocity compensation combined with turbo codes for secret key generation in vehicular ad hoc social IoT networks [J ] . IEEE Internet of Things Journal , 2018 , 5 ( 4 ): 2496 - 2505 .
AMAN W , IJAZ A , RAHMAN M M U , et al . Shared secret key generation via carrier frequency offsets [C ] // Proceedings of 2019 IEEE 89th Vehicular Technology Conference (VTC2019-Spring) . Piscataway:IEEE Press , 2019 : 1 - 5 .
HUANG Y , LI W , LEI J . Concatenated physical layer encryption scheme based on rateless codes [J ] . IET Communications , 2018 , 12 ( 12 ): 1491 - 1497 .
LU X J , SHI Y X , LI W , et al . A joint physical layer encryption and PAPR reduction scheme based on polar codes and chaotic sequences in OFDM system [J ] . IEEE Access , 2019 , 7 : 73036 - 73045 .
WANG S X , LI W , LEI J . Physical-layer encryption in massive MIMO systems with spatial modulation [J ] . China Communications , 2018 , 15 ( 10 ): 159 - 171 .
SHA Y P , GAO M Y , WANG L , et al . Physical encryption based on chaotic sequence-assisted pseudo QAM systems [C ] // Proceedings of 2019 18th International Conference on Optical Communications and Networks (ICOCN) . Piscataway:IEEE Press , 2019 : 1 - 3 .
ZEWAIL A A , YENER A . Multi-terminal two-hop untrusted-relay networks with hierarchical security guarantees [J ] . IEEE Transactions on Information Forensics and Security , 2017 , 12 ( 9 ): 2052 - 2066 .
HUA G . Over-complete-dictionary-based improved spread spectrum watermarking security [J ] . IEEE Signal Processing Letters , 2020 , 27 : 770 - 774 .
PROAKIS J G , SALEHI M . Digital Communications [M ] . 5th ed . New York : McGraw-Hill , 2008 .
AMURU S , DHILLON H S , BUEHRER R M . On jamming against wireless networks [J ] . IEEE Transactions on Wireless Communications , 2017 , 16 ( 1 ): 412 - 428 .
ZOU Y L , ZHU J , WANG X B , et al . A survey on wireless security:technical challenges,recent advances,and future trends [C ] // Proceedings of the IEEE . Piscataway:IEEE Press , 2016 : 1727 - 1765 .
SIMON R M K , OMURA J K , LEVITT B K . Spread spectrum communications handbook [M ] . New York : McGraw-Hill , 1994 .
STRASSER M , POPPER C , CAPKUN S , et al . Jamming-resistant key establishment using uncoordinated frequency hopping [C ] // Proceedings of 2008 IEEE Symposium on Security and Privacy . Piscataway:IEEE Press , 2008 : 64 - 78 .
YAZICIGIL R T , NADEAU P , RICHMAN D , et al . Ultra-fast bit-level frequency-hopping transmitter for securing low-power wireless devices [C ] // Proceedings of 2018 IEEE Radio Frequency Integrated Circuits Symposium (RFIC) . Piscataway:IEEE Press , 2018 : 176 - 179 .
SHI Y X , AN K , LI Y S . Index modulation based frequency hopping:anti-jamming design and analysis [J ] . IEEE Transactions on Vehicular Technology , 2021 , 70 ( 7 ): 6930 - 6942 .
戴峤 , 金梁 , 黄开枝 . 基于信道特征量化的自适应密钥生成方案设计 [J ] . 通信学报 , 2014 , 35 ( 1 ): 191 - 197 .
DAI Q , JIN L , HUANG K Z . Adaptive key distillation from channel characteristics [J ] . Journal on Communications , 2014 , 35 ( 1 ): 191 - 197 .
赖凤麟 , 姜永广 , 咸立文 , 等 . 一种OFDM系统信道密钥生成方法 [J ] . 电讯技术 , 2018 , 58 ( 3 ): 313 - 319 .
LAI F L , JIANG Y G , XIAN L W , et al . A channel frequency response based secret key generation method in OFDM systems [J ] . Telecommunication Engineering , 2018 , 58 ( 3 ): 313 - 319 .
WILHELM M , MARTINOVIC I , SCHMITT J B , et al . Short paper:reactive jamming in wireless networks:how realistic is the threat? [C ] // Proceedings of the Fourth ACM Conference on Wireless Network Security . New York:ACM Press , 2011 : 47 - 52 .
0
浏览量
440
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构