期刊文献+

基于Turbo码模型的汽车PEPS系统加密算法 被引量:1

Encryption algorithm of automobile PEPS system based on Turbo code model
下载PDF
导出
摘要 针对传统汽车无钥匙进入与启动系统的安全性能和识别能力不足,提出一种基于Turbo码前向纠错三次重传的无钥匙进入与启动系统的加密算法。构建无钥匙进入与启动系统的Turbo码模型,设计无钥匙进入与启动系统的加密传输协议,采用Turbo码前向纠错三次重传方法数据加密方案的编码结构优化设计,得到加密和解密的输入输出模型。仿真结果表明,采用该加密算法提高了无钥匙进入与启动系统的安全性和识别能力。 Passive entry and passive start(PEPS)system of the traditional car is unsafe and unrecognizable,based on forward error correction Turbo code three times of retransmission,PEPS system encryption algorithm is proposed.PEPS system of Turbo code model is built,PEPS system encryption transmission protocol is designed,Turbo code forward error correction three retransmission coding structure is optimized,data encryption and decryption scheme of the input and output model is obtained.The simulation results show that this encryption algorithm can improve safety and recognition of PEPS system.
作者 王成辉 许勇
出处 《桂林电子科技大学学报》 2017年第1期49-53,共5页 Journal of Guilin University of Electronic Technology
关键词 无钥匙进入与启动 加密算法 TURBO码 PEPS encryption algorithm Turbo code
  • 相关文献

参考文献8

二级参考文献94

  • 1余顺争.Web负载流的宏观模式与识别[J].模式识别与人工智能,2005,18(1):31-37. 被引量:2
  • 2孙红杰,方滨兴,张宏莉.基于链路特征的DDoS攻击检测方法[J].通信学报,2007,28(2):88-93. 被引量:11
  • 3彭翔,汤红乔,田劲东.双随机相位编码光学加密系统的唯密文攻击[J].物理学报,2007,56(5):2629-2636. 被引量:42
  • 4林闯,雷蕾.下一代互联网体系结构研究[J].计算机学报,2007,30(5):693-711. 被引量:64
  • 5Mirkovic J, Reiher P. A Taxonomy of DDoS attack and DDoS defense mechanisms. ACM Sigcomm Computer Communications Review, 2004,34(2):39-53. [doi: 10.1145/997150.997156].
  • 6Sun ZX, Jiang JL, Jiao L. DDOS attack detecting and defending model. Journal of Software, 2007,18(9):2245-2258 (in Chinese with English abstract), http://www,jos.org.cn/1000-9825/18/2245.htm Idol: 10.1360/jos 182245].
  • 7Anderson T, Roscoe T, Wetherall D. Preventing Internet denial of service with capabilities. In: Proc. of the HotNets-II. 2003. 39-44. [doi: 10.1145/972374.972382].
  • 8Yang XW, Wetherall D, Anderson T. A DoS-limiting network architecture. In: Proc. of the ACM SIGCOMM 2005, Vol.35. 2005. 241-252. [doi: 10.1145/1080091.1080120].
  • 9Argyraki K, Cheriton DR. Scalable network-layer defense against Internet bandwidth-flooding attacks. IEEE/ACM Trans. on Networking, 2009,17(4): 1284-1297. [doi: 10.1109/TNET.2008.2007431 ].
  • 10Beaumont-Gay M. A comparison of SYN flood detection algorithms. In: Proc. of the 2nd Int'l Conf. on Internet Monitoring and Protection. 2007. [doi: 10.1109/ICIMP.2007.1].

共引文献145

同被引文献8

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部