LoRa communication encryption system based on chaotic sequence and implementation method thereof
A chaotic sequence and encryption system technology, applied in the direction of secure communication, transmission system, wireless communication through chaotic signals, can solve the problems of being unable to resist malicious congestion attacks, retransmission attacks, etc., and achieve the effect of improving security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0067] like figure 1 Shown, based on the LoRa communication encryption system of chaotic sequence, comprise sending end 1 and receiving end 2, described sending end 1 comprises data generation module 11, chaotic sequence generator, encryption module 12 and first wireless communication module 13; The receiving end 2 includes a second wireless communication module 21, a decryption module 22 and a data processing module 23; wherein:
[0068] Described data generation module 11, chaotic sequence generator are all connected with described encryption module 12 input ends;
[0069] The output end of the encryption module 12 is connected to the first wireless communication module 13;
[0070] The first wireless communication module 13 is wirelessly connected to the second wireless communication module 21;
[0071] The second wireless communication module 21 is connected to the input end of the decryption module 22;
[0072] The output end of the decryption module 22 is connected to...
Embodiment 2
[0097] More specifically, on the basis of Example 1, such as Figure 5 Shown, the realization method of the LoRa communication encryption system based on chaotic sequence comprises the following steps:
[0098] S1: generate raw data;
[0099] S2: Encrypt and send the original data;
[0100] S3: Receive the encrypted data and decrypt it to obtain the original data;
[0101] S4: Process the original data.
[0102] More specifically, in the step S1, the original data is generated by the data generation module 11 .
[0103] More specifically, such as Figure 6 As shown, the step S2 specifically includes the following steps:
[0104] S21: the chaotic sequence generated by the chaotic sequence generator generates the first key and the second key, and the chaotic sequence and the original data realize chaotic interleaving in the chaotic interleaving unit 121;
[0105] S22: cutting and grouping the chaotically interleaved data in the data cutting and grouping unit 122;
[0106]...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


