PCM/FM telemetering system-based data security communication method

A technology of data security and communication method, which is applied in the field of telemetry information, can solve the problems of not seeing the application of combined clock-controlled key stream data encryption, data encryption methods are rare, etc., to achieve enhanced security, data protection, and good Effects of Linear Complexity

Inactive Publication Date: 2011-06-01
HANGZHOU DIANZI UNIV
View PDF2 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the application of re-entry telemetry system, there are few publicly published literatures on the research and technical implementation of data encryption methods, and there are no literatures on the application of combined clock-controlled key streams for data encryption

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • PCM/FM telemetering system-based data security communication method
  • PCM/FM telemetering system-based data security communication method
  • PCM/FM telemetering system-based data security communication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] The present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0020] The present invention is based on the principle of the data encryption method of PCM / FM telemetry system as figure 1 As shown, the clocked key stream generator in the figure is composed of three linear feedback shift registers (LFSR), in which the control LFSR is 31 levels, the controlled LFSR is 47 levels and 53 levels respectively, and the tap position of the controlled LFSR And the initial state of the control LFSR is set by the system (secrecy); the key to determine the clocked key stream generator is the initial state of the shift register, this initial state is called the seed key. After receiving the ciphertext and seed key, the receiver starts the same clock-controlled key generator to generate the same decryption key as the encryption key, thereby recovering the plaintext. In this scheme, the period of the pseudo-random sequence generat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a pulse code modulation (PCM) / frequency modulation (FM) telemetering system-based data security communication method. The method comprises the following steps of: assigning a cipher key until an initial key generator generates an initial key; generating a key stream through a clock-controlled key stream generator, and generating a next group of data cipher keys; generating ciphertext from data to be transmitted and key stream exclusive OR, packaging into a frame, and performing Turbo encoding on the packaged data frame; and finally, performing signal sampling on the data subjected to the Turbo encoding, performing preset filtering on the sampled data, feeding the data into a channel through FM modulation, wherein a receiving end receives and synchronizes the signal, and at the receiving end, the signal is processed in an inverted sequence in turn and is successively subjected to coherent demodulation, data sampling, Turbo code decoding and decryption through the FM so as to obtain the needed data finally. The method has high linear complexity, can effectively protect the data, and improves security of the PCM / FM telemetering system.

Description

technical field [0001] The invention belongs to the technical field of telemetry information, and relates to a data security communication method based on a PCM / FM telemetry system. Background technique [0002] The data in the reentry telemetry system contains a lot of important information, including reconnaissance information in electronic warfare, flight status information of aircraft and so on. To prevent third parties from intercepting or using this information, it is required to effectively encrypt the wirelessly transmitted telemetry data. Encryption of telemetry data requires simple encryption and decryption operations while ensuring high encryption strength, and small error and information diffusion. It also requires a reasonable combination of error correction codes and encryption and decryption. [0003] PCM / FM is one of the time-division system standard telemetry systems, and it is also a widely used telemetry system coding and modulation method at present. It ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/22
Inventor 赵泽茂戴绍港陈集炜
Owner HANGZHOU DIANZI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products