Unlock instant, AI-driven research and patent intelligence for your innovation.

Secret communication method adopting fractional-order Fourier transform

A fractional Fourier, secure communication technology, applied in wireless communication, electrical components, security devices, etc., can solve problems such as inability to "secrecy", achieve a wide range of applications, a wide range of applications, and improve security performance.

Inactive Publication Date: 2016-11-09
赵京磊
View PDF5 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] However, the above-mentioned patents or articles only use the fractional Fourier transform itself, and its application method is the same as that of space-time coding, UWB, and LDPC coding to realize secure communication, that is, it cannot fundamentally realize true "secrecy"

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secret communication method adopting fractional-order Fourier transform
  • Secret communication method adopting fractional-order Fourier transform
  • Secret communication method adopting fractional-order Fourier transform

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0038] "A secure communication method using fractional Fourier transform" in this embodiment, its flow is as follows figure 1 As shown, the specific implementation steps are as follows:

[0039] Step 1. Modulate and group the data to be transmitted to obtain parallel N sets of data, denoted as: D i , i∈[1, N], and then perform interpolation and serial-to-parallel conversion;

[0040] In this embodiment, N=2, that is, perform modulation and grouping to obtain two sets of data in parallel; it can also be divided into one group without grouping, or be divided into more groups; the more groups, the more complex, the better the performance;

[0041] Step 2, determining the order of the fractional Fourier transform of each path according to the estimated receiving channel impulse response coefficient;

[0042] In this embodiment, the receive channel impulse response coefficient is determined to be [0.80.2];

[0043] Step 3, using the 0.8 and 0.2 orders in the above step 2 to carr...

Embodiment 2

[0052] The flow chart of the present invention "a secure communication method using fractional Fourier transform" can also be combined with a typical communication system. The flow chart is as follows figure 2 As shown, the specific implementation steps are as follows:

[0053] Step 1. Generate randomly distributed bit streams;

[0054] The preferred distribution can choose uniform distribution, binomial Poisson distribution, Gaussian distribution, etc.;

[0055] Step 2, performing channel coding on the output of step 1;

[0056] Preferred channel coding is convolutional coding, Hamming coding, LDPC coding, tail-biting convolutional code, etc.;

[0057] Step 3, interleaving the output of step 2;

[0058] The preferred interleaving method can be matrix interleaving, pseudo-random interleaving, bit interleaving, prime-code interleaving, square prime-code interleaving, etc.;

[0059] Step 4, digitally modulating the output of step 3;

[0060]The preferred digital modulation...

Embodiment 3

[0073] Taking some steps in Embodiment 2 to form a new embodiment also has the effect of communication and is also protected by the present invention.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a secret communication method adopting fractional-order Fourier transform. The secret communication method comprises the following steps of: (1), performing modulation grouping, interpolation and serial-parallel conversion of data to be transmitted to form multi-group data; (2), determining orders of various fractional-order Fourier transform according to an estimated impulse response coefficient of a receiving channel; (3), performing inverse fractional-order Fourier transform; (4), adding a cyclic prefix after various inverse fractional-order Fourier transform; (5), determining various weighting coefficients and weighting according to the gain of the receiving channel; (6), performing up-conversion summation of various signals to input a channel; (7), performing down-conversion and de-weighting of various received information; (8), removing the cyclic prefix of various obtained data; (9), performing fractional-order Fourier transform by taking a channel impulse response numerical value obtained according to the channel reciprocity as the order value; and (10), performing extraction, parallel-serial conversion and demodulation of various obtained data. By means of the secret communication method disclosed by the invention, the safety performance of the existing secret communication system is improved more effectively; and thus, the traditional wireless secret mechanism is effectively supplied.

Description

technical field [0001] The application relates to a secure communication method using fractional Fourier transform, which belongs to the technical field of wireless communication and secure communication. Background technique [0002] The traditional secure communication mechanism uses the encryption technology of the upper layer network protocol, based on the private key and public key between communication nodes to ensure reliable secure communication. However, it is difficult for this secure communication mechanism to overcome the loss of information leakage caused by the untimely update of the key and the cracking or theft of other keys. In recent years, various physical layer secure communication mechanisms, such as: user-independent randomness based on wireless multipath channels, using physical layer LDPC codes combined with interleaving for secure communication, space coding and OFDM mechanism for secure communication. [0003] However, after searching, domestic and...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/02
CPCH04W12/02
Inventor 赵京磊郇浩
Owner 赵京磊
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More