Research on Modulation Algorithm Based on Physical Layer Encryption

被引:0
|
作者
Li, Xiang [1 ]
Zhang, Yueyong [1 ]
机构
[1] Tianjin Normal Univ, Coll Comp & Informat Engn, Tianjin 300387, Peoples R China
关键词
Wireless communication; Communication security; Information theory security; Physical layer encryption; Modulation;
D O I
10.1007/978-981-13-6508-9_127
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Communication has become a very important part of people's work and life. Wireless communication technology has the characteristics of low cost, good scalability, and easy use, but it is vulnerable to eavesdropping and other security threats, and eavesdroppers illegally receive through wireless channels. Traditional wireless communication system security methods need to be implemented at the upper layer through authentication and cryptographic techniques. In recent years, as an important complement to traditional security mechanisms, information theory security principles, transmission signal security technologies, spread spectrum and frequency hopping encryption technologies, and channel coding Research on physical layer security technologies such as encryption technology and modulation encryption can effectively protect information during wireless transmission and prevent eavesdroppers from illegally receiving information.
引用
收藏
页码:1046 / 1054
页数:9
相关论文
共 50 条
  • [21] Physical Layer Encryption Scheme Based on Dynamic Constellation Rotation
    Hou, Yujie
    Li, Guyue
    Dang, Shuping
    Hu, Lei
    Hu, Aiqun
    2022 IEEE 96TH VEHICULAR TECHNOLOGY CONFERENCE (VTC2022-FALL), 2022,
  • [22] ENCRYPTION SCHEME OF PHYSICAL LAYER BASED ON IRREGULAR LDPC CODES
    Xu, Chengxin
    Chang, Yongyu
    Wang, Haibo
    Zhang, Xin
    PROCEEDINGS OF THE 2010 INTERNATIONAL CONFERENCE ON ADVANCED INTELLIGENCE AND AWARENESS INTERNET, AIAI2010, 2010, : 305 - 308
  • [23] Research on Improved Data Encryption Algorithm Based on AES
    Chen, Rumeng
    Cheng, Xiaohui
    ICIIP'18: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION PROCESSING, 2018, : 198 - 201
  • [24] Research of chaos encryption algorithm based on logistic mapping
    Luo, Jinhong
    Shi, Haiyi
    IIH-MSP: 2006 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Proceedings, 2006, : 381 - 383
  • [25] Research on Wireless Data Encryption Based on Hash Algorithm
    Gao Hongtao
    2011 INTERNATIONAL CONFERENCE ON COMPUTERS, COMMUNICATIONS, CONTROL AND AUTOMATION (CCCA 2011), VOL II, 2010, : 377 - 380
  • [26] Research on medical image encryption based on DES algorithm
    Wang, Rui
    Wang, Jinguo
    Wang, Na
    Proceedings of the 2016 International Conference on Engineering and Advanced Technology, 2016, 82 : 253 - 256
  • [27] Research on encryption algorithm based on the Chebyshev neural network
    Liu Feng
    Luo Li
    Liu Jin-zhou
    NANOTECHNOLOGY AND PRECISION ENGINEERING, PTS 1 AND 2, 2013, 662 : 884 - 886
  • [28] Physical Layer Authentication Algorithm Based on SVM
    Dai, Chuping
    Yang, Jianxi
    Qin, Yongning
    Liu, Jing
    2016 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2016, : 1597 - 1601
  • [29] A Physical Layer Security Algorithm Based on Constellation
    Mao Xiang-ning
    Lin Kai-jia
    Liu Hao
    2017 17TH IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT 2017), 2017, : 50 - 53
  • [30] The Research of Dynamic Encryption Algorithm
    Xue, Hongwei
    Shen, Shiqun
    Zhu, Lina
    Guo, Zhi
    AUTOMATIC MANUFACTURING SYSTEMS II, PTS 1 AND 2, 2012, 542-543 : 1447 - 1450