共查询到20条相似文献,搜索用时 15 毫秒
1.
2.
随着信息技术的飞速发展,混沌由于其一系列的独特性质,而成为保密通信和信息安全领域的研究热点之一,并取得了重大进展,大致分为三大类:直接利用混沌的保密通信、利用同步的保密通信和混沌编码保密通信。目前研究的方案大多是低维混沌系统,存在着被预测法攻击而失去保密的可能,而具有多个Lyapunov指数的超混沌系统在工程上难以实现同步。本文从Lorenz模型出发,在其垂直方向上的“蝴蝶”吸引子中设置一定数目的“扑克面”,利用混沌系统对初值的敏感性,随机地选择不同的扑克区域,产生密钥序列。并将这一思想推广到n维混沌系统中的“扑克球”… 相似文献
3.
《量子电子学报》2014,(1)
正A quantum secure direct communication is to communicate important messages directly without first establishing a random key to encrypt them.A QSDC must satisfy two requirements:1)secret message is read out directly by the legitimate user without additional classical information transmission except those for eavesdropping check.2)the secret messages will not leak when an eavesdropper gets hold of channel.In this talk,the fundamental basis of QSDC is described,some typical QSDC protocol is reviewed,including the two-step QSDC protocol and the quantum one-time-pad QSDC protocol.Recent development of QSDC,including studies on security proof and experimental demonstration are also discussed. 相似文献
4.
Sathyan T. Kirubarajan T. 《IEEE transactions on circuits and systems. I, Regular papers》2006,53(7):1597-1609
In this paper, a new Markov-jump-system (MJS)-based secure chaotic communication technique is proposed. An MJS evolves by switching from one state evolution model to another according to a finite state Markov chain. The transmitter in the proposed communication system is an MJS consisting of multiple transmission maps, that is, the transmitter switches from one chaotic map to another during the transmission of data. This switching feature makes it difficult to identify and follow the transmission without knowing the transmitter parameters, i.e., to eavesdrop, thereby increasing the security offered by the inherently secure chaotic communication system. If the chaotic maps used at the transmitter, and the corresponding Markov transition probability matrix of the MJS are known to the (authorized) receiver, then a multiple model estimator can be used to track the MJS transmitter. In this paper, the use of the interacting multiple model (IMM) estimator is proposed as part of the receiver to follow the switching transmitter. The effectiveness of the IMM-estimator-based receiver to follow the switching transmitter is evaluated by means of simulations. A new modulation technique that uses the MJS transmitter is also introduced. Further, it is shown that the same receiver framework, when used as a receiver for chaotic parameter modulation, provides significant performance improvement in terms of bit-error rate compared to a receiver that uses extended Kalman filter. In addition, the seemingly more complex IMM-estimator-based receiver is shown to significantly reduce the computational complexity per transmitted bit, thus resulting in increased data rate. 相似文献
5.
6.
The introduction and rapid spread of pulse code modulation must be examined in the framework of overall capability, efficiency, and cost. However, apart from television, the only field of application that can presently justify a massive investment in a new transmission system is telephony, because it represents the dominant communication market. Other communication services?such as data and facsimile transmission, telegraphy, broadcast sound, and closed-circuit television?must in general travel as passengers on telephony networks if they are to be economically feasible. Hence, the most fruitful approach to an examination of digital communication is to begin by studying PCM telephony and then to see how other services can be coordinated with it. 相似文献
7.
8.
Physical layer security is attracting more and more attention due to its inherent channel properties, while the increasing computing ability is not the obstacle for the traditional encryption any longer. In this paper, we study the base station (BS) and relay station (RS) placement problem in a cooperative secure communication system. Moreover, the system energy consumption problem also has been considered, and an energy-aware infrastructure placement for secure communications (EIPSC) scheme is proposed. Based on the analysis results of different candidate position of the security performance, location of the BS is determined and some imperative RSs are placed to guarantee the eavesdropped subscribers' secure communication. To decrease the system energy consumption, we propose a conception of sharing set of RS in order to place the RS as few as possible. During the BS and RS placing as well as adjusting procedure, renewable energy is also been considered to reduce dirty-energy consumption. Through computational experiments, we show our proposed algorithm can get better performance than the traditional placement algorithm not only at the system security guarantee but also at the system energy saving. 相似文献
9.
Zhengguo Li Kun Li Changyun Wen Yeng Chai Soh 《Communications, IEEE Transactions on》2003,51(8):1306-1312
The paper proposes a digital chaotic secure communication by introducing a magnifying glass concept, which is used to enlarge and observe minor parameter mismatch so as to increase the sensitivity of the system. The encryption method is based on a one-time pad encryption scheme, where the random key sequence is replaced by a chaotic sequence generated via a Chua's circuit. We make use of an impulsive control strategy to synchronize two identical chaotic systems embedded in the encryptor and the decryptor, respectively. The lengths of impulsive intervals are piecewise constant and, as a result, the security of the system is further improved. Moreover, with the given parameters of the chaotic system and the impulsive control law, an estimate of the synchronization time is derived. The proposed cryptosystem is shown to be very sensitive to parameter mismatch and hence the security of the chaotic secure communication system is greatly enhanced. 相似文献
10.
基于超混沌的保密通信系统 总被引:5,自引:1,他引:5
建立一种基于变型蔡氏电路的超混沌语音保密通信方案,在发端,利用变型氏电路对发送信号进行调,在收端对其进行逆变换解调出原信号。根据单向耦合法实现收发系统之间的同步,分析了同步的收敛特性。在此基础上设计硬件实验电路,进行传送语音信号的硬件实验研究,给出了实验结果。 相似文献
11.
Scalable secure group communication over IP multicast 总被引:3,自引:0,他引:3
Banerjee S. Bhattacharjee B. 《Selected Areas in Communications, IEEE Journal on》2002,20(8):1511-1527
We introduce and analyze a scalable rekeying scheme for implementing secure group communications Internet protocol multicast. We show that our scheme incurs constant processing, message, and storage overhead for a rekey operation when a single member joins or leaves the group, and logarithmic overhead for bulk simultaneous changes to the group membership. These bounds hold even when group dynamics are not known a priori. Our rekeying algorithm requires a particular clustering of the members of the secure multicast group. We describe a protocol to achieve such clustering and show that it is feasible to efficiently cluster members over realistic Internet-like topologies. We evaluate the overhead of our own rekeying scheme and also of previously published schemes via simulation over an Internet topology map containing over 280 000 routers. Through analysis and detailed simulations, we show that this rekeying scheme performs better than previous schemes for a single change to group membership. Further, for bulk group changes, our algorithm outperforms all previously known schemes by several orders of magnitude in terms of actual bandwidth usage, processing costs, and storage requirements. 相似文献
12.
《光电子快报》2005,1(3)
Due totheincreasing need of privacyin variousinfor-mation exchange situations ,the study on secure com-municationis currently meeting a growinginterest .It isno surprise that optical fibers have been touted as themost affordable and efficient mediumin the field of se-cure communications due to its electrical isolation,itsi mmunitytointerference,anditsi mprovedsignal secur-ity. However ,it has now been shown that fibers leaklight when it is bent to small radius ,and such bendshave been used as … 相似文献
13.
14.
Chia-Ju Wu Yung-Cheng Lee 《Electronics letters》2000,36(22):1842-1843
An application of chaotic systems in secure communication is described. In which an observer is used to achieve synchronisation between the encrypter and the decrypter. A major advantage is that the proposed method can be applied to all kinds of chaotic systems. For illustration, text and sound messages are transmitted 相似文献
15.
Bee Yan Hiew Andrew Beng Jin Teoh Ooi Shih Yin 《Journal of Visual Communication and Image Representation》2010,21(3):219-231
Contemporary fingerprint system uses solid flat sensor which requires contact of the finger on a platen surface. This often results in several problems such as image deformation, durability weakening in the sensor, latent fingerprint issues which can lead to forgery and hygienic problems. On the other hand, biometric characteristics cannot be changed; therefore, the loss of privacy is permanent if they are ever compromised. Coupled with template protection mechanism, a touch-less fingerprint verification system is further provoked. In this issue, a secure end-to-end touch-less fingerprint verification system is presented. The fingerprint image captured with a digital camera is first pre-processed via the proposed pre-processing algorithm to reduce the problems appear in the image. Then, Multiple Random Projections-Support Vector Machine (MRP-SVM) is proposed to secure fingerprint template while improving system performance. 相似文献
16.
We propose a new service for digital mobile communication systems. The service enables two or more users to hold a secure conference. Two requirements must be considered: privacy and authentication. Privacy involves ensuring that an eavesdropper cannot intercept the conversations of the parties holding the conference. Authentication involves ensuring that service is not obtained fraudulently in order to avoid usage charges. We present two new conference key distribution schemes for digital mobile communication systems. In these schemes, a group of users can generate a common secret keg over a public channel so that they may hold a secure conference 相似文献
17.
The principles of a proposed equalising system for digital data communication are explained, and its operation described for binary signalling. This technique can achieve a comparatively high performance/equipment-complexity ratio. Computer simulation results for a typical line-transmission channel are presented. 相似文献
18.
Recent years the Session Initiation Protocol (SIP) is commonly used in establishing Voice over IP (VoIP) calls and has become the centerpiece for most VoIP architecture. As wireless and mobile all-IP networks become prosperous, free VoIP applications are utilized in all places. Consequently, the security VoIP is a crucial requirements for its adoption. Many authentication and key agreement schemes are proposed to protect the SIP messages, however, lacking concrete implementations. The performance of VoIP is critical for users’ impressions. In view of this, this paper studies the performance impact of using key agreements, elliptic curve Diffie–Hellman and elliptic curve Menezes–Qu–Vanstone, for making a SIP-based VoIP call. We evaluate the key agreement cost using spongycastle.jce.provider package in Java running on android-based mobile phones, the effect of using different elliptic curves and analyze the security of both key agreements. Furthermore, we design a practical and efficient authentication mechanism to deploy our VoIP architecture and show that a VoIP call can be established in an acceptable interval. As a result, this paper provides a concrete and feasible architecture to secure a VoIP call. 相似文献
20.
We present a tutorial review of adaptive signal processing applied to a digital communication receiver operating in a nonstationary environment. The topics covered include feedforward and recurrent neural networks and their applications to communication systems. The article also includes a discussion of turbo decoding, which involves a form of recurrent learning. It concludes with a discussion of the various aspects of adaptive signal processing as they relate to digital communication receivers. 相似文献