期刊文献+

基于反向训练模型的网络通信安全传输研究 被引量:4

Research on Secure Transmission of Network Communication Based on Reverse Training Model
下载PDF
导出
摘要 针对正向训练模式下的0/1式跳空收发技术在无线网络通信传输信息泄露后存在的安全隐患,论文提出了权值反馈型反向训练技术。该技术通过在发射方和目标用户之间进行反向训练,使目标用户获得与正向训练模式下一致的权值,而侦听方即便窃取了无线网络通信传输信息,由于无线网络信道差异性,仍然无法正确解调,这一点完全不同于传统的跳频扩频方案。反向训练技术以从根源上解决无线网络通信安全问题为出发点,充分利用了无线网络信号丰富的时空谱资源,保证了物理层安全传输。仿真结果表明,在无线网络通信传输信息和反馈的权值都泄露的情况下,侦听方的误符号率始终极高,根本无法侦听信息。 ince 0/1 space hopping technique in forward training mode has security problems after the leak of network communication transmission information,the backward training technique with weight-feedback is proposed. Through backward training between the transmitter and the target user,the target user can obtain the weights equivalent with that from forward training,while the eavesdropper cannot demodulate correctly because of the diversity of the wireless channel even if she steals the network communication transmission information,which is completely different from traditional frequency hopping spread spectrum technique. The proposed technique,which aims at solving the problem of secure wireless communications fundamentally,makes full use of the abundant space-time spectrum resources of the wireless signals and ensures the secure physical layer transmission. Simulation results show that even when both the network communication transmission information and the feedback weights are leaked,the eavesdropper keeps a high symbol error rate and cannot intercept information.
出处 《计算机与数字工程》 2018年第2期313-317,共5页 Computer & Digital Engineering
基金 国家自然科学基金项目(编号:51607042)资助
关键词 反向训练 无线网络 网络通信 安全传输 跳空技术 reverse training wireless network network communication secure transmission gap technology
  • 相关文献

参考文献17

二级参考文献76

  • 1钱眺,茅玉龙,查荣.IFF信号的分析与识别研究[J].雷达与对抗,2008,28(3):45-48. 被引量:14
  • 2朱永松,张海勇,汲万峰.跳频通信抗干扰性能分析[J].现代防御技术,2005,33(5):37-41. 被引量:18
  • 3王剑,陈皇卿,张权,唐朝京.多方控制的量子安全直接通信协议[J].物理学报,2007,56(2):673-677. 被引量:22
  • 4徐明光,肖立民,姚彦.一种无线信道模型的特征分析[J].微计算机信息,2007,23(03X):89-90. 被引量:4
  • 5宋继勋.无线小型自组织网络协议分析与实现[D].北京:北京交通大学,2009:47-49.
  • 6Texas Instruments.Application Note:SimpliciTl Frequency Agility[A].Texas instruments,2007(1):4-13.
  • 7ERWIYANTO E. Synchronous space hopping on hy brid frequency-time division duplex: a new multiple ac cess technique proposed for beyond 3G evolution [C] //Proceedings of International Conference on Wireless Networks, Communications and Mobile Computing. Piscataway, NJ, USA: IEEE, 2005: 445-451.
  • 8ISHIIT S, HOSHIKUKIZ A, KOHNOT R. Space hopping scheme under short range Rician multipath fa- ding environment [C] //Proceedings of 52nd IEEE VTS-Fall VTC. Piscataway, NJ, USA: IEEE, 2000: 99-104.
  • 9LANDWEHR E, GOLDSCHLAG D M. Security is- sues in networks with internet access [J]. Proceedings of IEEE, 1997, 85(12): 2034-2051.
  • 10JOHNSON D H, DUDGEON D E. Array signal pro- cessing, concepts and techniques [M]. Upper Saddle Rover, NJ, USA: Prentice Hall, 1993.

共引文献87

同被引文献22

引证文献4

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部