Unlock instant, AI-driven research and patent intelligence for your innovation.

Safe transmission method based on interference of fountain code key encoding symbol

A coded symbol and safe transmission technology, applied in the field of safe transmission based on fountain code key coded symbol interference, can solve problems such as low safety and reliability, coded symbol interference, etc., achieve strong adaptability and practicability, and improve security Performance, Adaptable Effects

Active Publication Date: 2018-10-30
PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] Aiming at the low efficiency of the existing physical layer security transmission method to ensure security and reliability at the same time, the present invention considers combining the existing noise interference technology and coding technology in the physical layer security, and proposes a fountain-based Secure Transmission Method of Code-Key Encoding Symbol Interference

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safe transmission method based on interference of fountain code key encoding symbol
  • Safe transmission method based on interference of fountain code key encoding symbol
  • Safe transmission method based on interference of fountain code key encoding symbol

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0041] Such as figure 1 as shown, figure 1 It shows a flow chart of a secure transmission method based on fountain code key code symbol interference provided by Embodiment 1 of the present invention. The secure transmission method specifically includes the following steps:

[0042] Step S101, the sending end initializes the encoding and decoding parameters, including the number of original symbols, degree distribution, etc.;

[0043] Step S102, the sending end designs a judgment mechanism for key coded symbols;

[0044] In step S103, the encoder at the sending end continuously generates encoding symbols according to the originally input encoding and decoding parameters, and makes a key judgment on the generated encoding symbols according to the judgment mechanism in step S102;

[0045] Step S104, the transmission system modulates, transmits, and demodulates the coded symbols, and performs noise interference on the key coded symbols judged in step S103;

[0046] In step S105...

Embodiment 2

[0049] Such as figure 2 as shown, figure 2 It shows a flow chart of a secure transmission method based on fountain code key code symbol interference provided by Embodiment 2 of the present invention. The secure transmission method specifically includes the following steps:

[0050] Step S201, the sending end initializes the encoding and decoding parameters, including the number of original symbols, degree distribution, etc.;

[0051] Step S202, the sending end designs a decision mechanism for key coded symbols;

[0052] The specific implementation process of the step S202 is as follows:

[0053] In step S2021, the transmission system analyzes the real-time decoding process of the classic fountain code, that is, analyzes the change of the decoding symbol at the receiving end after receiving a certain coded symbol;

[0054] In step S2022, the system establishes the correlation between the degree value of the encoded symbol and the decoding result according to the analysis r...

Embodiment 3

[0066] Such as image 3 as shown, image 3 A schematic diagram showing the application of a fountain code key coding symbol interference-based secure transmission method provided by Embodiment 3 of the present invention in an actual communication scenario is shown. The figure shows a classic three-point eavesdropping channel model. The sending end sends private information to the legal receiving end. Because of the openness of the wireless channel, the eavesdropper can easily intervene in the legal channel to eavesdrop. The invention utilizes the independence characteristic of the coding symbols of the fountain code and combines the existing noise interference method to carry out focused interference reception on the key coding symbols of the fountain code, thereby ensuring the safety and reliability of communication. The method includes the following steps:

[0067] Step S301, the sending end initializes the encoding and decoding parameters, including the number of original...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of communication, relates to a safe transmission method utilizing a fountain code and particularly relates to a safe transmission method based on the interference of a fountain code key encoding symbol. According to the safe transmission method, key encoding symbols are emphatically interfered by utilizing the characteristic that key encoding symbols have different significances to the decoding process, so that the symbols can be correctly received by legal users and cannot be normally received by eavesdroppers. Compared with a traditional method for realizing the safe transmission through noise interference, the safe transmission method has the advantage that the utilization efficiency of energy is relatively high, namely that the energy required for realizing the safety performance indexes is relatively low.

Description

technical field [0001] The invention belongs to the technical field of communication, and relates to a safe transmission method using fountain codes, in particular to a safe transmission method based on key code symbol interference of fountain codes. Background technique [0002] Under the background of the current new generation of mobile communications, the number of various devices continues to increase, and the amount of data transmission in various environments grows infinitely. The secure transmission scheme based on fountain codes can adapt to complex and changeable external environments, and is safe and reliable in large-scale data transmission. is of great significance. Fountain codes are introduced into secure transmission applications due to their performance and characteristics that are highly compatible with physical layer secure transmission. Under this encoding and decoding mechanism, the receiving end receives coded symbols on demand, and the legal receiving ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L1/00
CPCH04L1/0057
Inventor 易鸣黄开枝汪立康彭建华金梁楼洋明钟州周游马克明靳彦青张帅
Owner PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU