Research on Modulation Algorithm Based on Physical Layer Encryption

被引:0
|
作者
Li, Xiang [1 ]
Zhang, Yueyong [1 ]
机构
[1] Tianjin Normal Univ, Coll Comp & Informat Engn, Tianjin 300387, Peoples R China
关键词
Wireless communication; Communication security; Information theory security; Physical layer encryption; Modulation;
D O I
10.1007/978-981-13-6508-9_127
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Communication has become a very important part of people's work and life. Wireless communication technology has the characteristics of low cost, good scalability, and easy use, but it is vulnerable to eavesdropping and other security threats, and eavesdroppers illegally receive through wireless channels. Traditional wireless communication system security methods need to be implemented at the upper layer through authentication and cryptographic techniques. In recent years, as an important complement to traditional security mechanisms, information theory security principles, transmission signal security technologies, spread spectrum and frequency hopping encryption technologies, and channel coding Research on physical layer security technologies such as encryption technology and modulation encryption can effectively protect information during wireless transmission and prevent eavesdroppers from illegally receiving information.
引用
收藏
页码:1046 / 1054
页数:9
相关论文
共 50 条
  • [31] Physical layer encryption based on digital chaos in THz wireless communication
    Chen, Qinghui
    Peng, Cong
    Zhao, Li
    You, Weihao
    Wen, Hong
    Li, Jianshe
    OPTICAL FIBER TECHNOLOGY, 2025, 90
  • [32] DFT-Based Physical Layer Encryption for Achieving Perfect Secrecy
    Bi, Suzhi
    Yuan, Xiaojun
    Zhang, Ying Jun
    2013 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2013,
  • [33] Performance analysis of the encryption method based on compressed sensing at the physical layer
    Huang, Yu
    Jin, Liang
    Huang, Kaizhi
    Liu, Lu
    Kang, Xiaolei
    2016 19TH INTERNATIONAL SYMPOSIUM ON WIRELESS PERSONAL MULTIMEDIA COMMUNICATIONS (WPMC), 2016,
  • [34] Efficient Polar Code-Based Physical Layer Encryption Scheme
    Hooshmand, Reza
    Aref, Mohammad Reza
    IEEE WIRELESS COMMUNICATIONS LETTERS, 2017, 6 (06) : 710 - 713
  • [35] Three Layer Encryption Protocol: an Approach of Super Encryption Algorithm
    Fadlan, Muhammad
    Haryansyah
    Rosmini
    3RD INTERNATIONAL CONFERENCE ON CYBERNETICS AND INTELLIGENT SYSTEMS (ICORIS 2021), 2021, : 267 - 271
  • [36] The research of image encryption algorithm based on chaos cellular automata
    Zhang, Shuiping
    Luo, Huijune
    Journal of Multimedia, 2012, 7 (01): : 66 - 73
  • [37] Research of Database Encryption Based on Fast AES Algorithm Implementation
    Li, Nan
    ADVANCES IN COMPUTER SCIENCE, ENVIRONMENT, ECOINFORMATICS, AND EDUCATION, PT III, 2011, 216 : 31 - 35
  • [38] The Fountain-codes-based Encryption and Decryption Algorithm Research
    Hu, Ming
    Li, Wen
    Yu, Fagao
    Hu, Xinrong
    PROCEEDINGS OF THE 2017 2ND INTERNATIONAL CONFERENCE ON CONTROL, AUTOMATION AND ARTIFICIAL INTELLIGENCE (CAAI 2017), 2017, 134 : 386 - 389
  • [39] CHAOTIC IMAGE ENCRYPTION ALGORITHM RESEARCH BASED ON CONTOURLET TRANSFORMATION
    Zhang, Huiben
    Liu, Shi Min
    Gao, Min
    Zhang, Mengmeng
    2015 12TH INTERNATIONAL COMPUTER CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (ICCWAMTIP), 2015, : 303 - 306
  • [40] The IC card data encryption research based on the AES algorithm
    Yu, Yang
    Wang, Shimin
    ADVANCES IN MANUFACTURING TECHNOLOGY, PTS 1-4, 2012, 220-223 : 2698 - +