CN110278560A - A kind of convert communication system based on IEEE 802.11a - Google Patents

A kind of convert communication system based on IEEE 802.11a Download PDF

Info

Publication number
CN110278560A
CN110278560A CN201910490891.6A CN201910490891A CN110278560A CN 110278560 A CN110278560 A CN 110278560A CN 201910490891 A CN201910490891 A CN 201910490891A CN 110278560 A CN110278560 A CN 110278560A
Authority
CN
China
Prior art keywords
communication system
subcarrier
symbol
ieee
ofdm
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910490891.6A
Other languages
Chinese (zh)
Other versions
CN110278560B (en
Inventor
徐志江
金文兵
程文锋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Institute of Mechanical and Electrical Engineering Co Ltd
Original Assignee
Zhejiang Institute of Mechanical and Electrical Engineering Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Institute of Mechanical and Electrical Engineering Co Ltd filed Critical Zhejiang Institute of Mechanical and Electrical Engineering Co Ltd
Priority to CN201910490891.6A priority Critical patent/CN110278560B/en
Publication of CN110278560A publication Critical patent/CN110278560A/en
Application granted granted Critical
Publication of CN110278560B publication Critical patent/CN110278560B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B1/00Details of transmission systems, not covered by a single one of groups H04B3/00 - H04B13/00; Details of transmission systems not characterised by the medium used for transmission
    • H04B1/69Spread spectrum techniques
    • H04B1/707Spread spectrum techniques using direct sequence modulation
    • H04B1/7073Synchronisation aspects
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L27/00Modulated-carrier systems
    • H04L27/26Systems using multi-frequency codes
    • H04L27/2601Multicarrier modulation systems
    • H04L27/2626Arrangements specific to the transmitter only
    • H04L27/2627Modulators
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L27/00Modulated-carrier systems
    • H04L27/26Systems using multi-frequency codes
    • H04L27/2601Multicarrier modulation systems
    • H04L27/2647Arrangements specific to the receiver only
    • H04L27/2655Synchronisation arrangements
    • H04L27/2662Symbol synchronisation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L27/00Modulated-carrier systems
    • H04L27/26Systems using multi-frequency codes
    • H04L27/2601Multicarrier modulation systems
    • H04L27/2647Arrangements specific to the receiver only
    • H04L27/2655Synchronisation arrangements
    • H04L27/2689Link with other circuits, i.e. special connections between synchronisation arrangements and other circuits for achieving synchronisation
    • H04L27/2695Link with other circuits, i.e. special connections between synchronisation arrangements and other circuits for achieving synchronisation with channel estimation, e.g. determination of delay spread, derivative or peak tracking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]

Abstract

A kind of convert communication system based on IEEE 802.11a, the covert communications of confidential information are realized using the null subcarrier in the wireless communication system of IEEE802.11a standard, by secret bit by baseband modulation and after spreading, in the null subcarrier for re-mapping host's transmitter OFDM, transmitted after OFDM is modulated;Null subcarrier modulation symbol is extracted from host's receiver, de-spreading operation is first done, then by hard decision, to recover the secret bit of transmission.The present invention allows the transmission power on these null subcarriers to make an uproar the bottom of lower than, on the one hand reduces the influence to host system, on the other hand reduce the perception probability of listener-in due to having made spread spectrum and despreading processing.Meanwhile spreading code, code length and null subcarrier randomly select, further increase listener-in cracks difficulty.

Description

A kind of convert communication system based on IEEE 802.11a
Technical field
The present invention relates to wireless communication and field of information security technology, and in particular to one kind is embedded into IEEE 802.11a mark The convert communication system of quasi- agreement.
Background technique
Cryptographic technique is that the cleartext information that will be transmitted is encrypted, and will become in plain text unrecognizable ciphertext, Encrypted information is set to become difficult to understand.But another problem that brings is done so, encryption technology will be encrypted to one in plain text Heap messy code is easy the desire that excitation unauthorized person cracks confidential information.In the case where burning desire and demand drive, tasted by various Examination, it is most likely that the safety of decryption, information transmission can also substantially reduce therewith.
Covert communications are that one kind can carry out secret information hided transmission technology during normal data communications.The present invention Purpose, in existing, disclosed IEEE 802.11a standard agreement, have little influence on original system communication on the basis of, Confidential information is transmitted using null subcarrier, to realize a kind of convert communication system.
Summary of the invention
In order to allow legitimate user to realize the hided transmission of confidential information, the invention proposes one kind to be embedded into IEEE In 802.11a standard, spread spectrum convert communication system, it is a kind of IEEE used by means of disclosed, broad sense The convert communication system of 802.11a standard, due to its host's communication system be it is disclosed, be not easy to cause the note of malice listener-in Meaning, and the covert communications scheme proposed has very low transmission power (making an uproar the bottom of lower than), is not easy to be intercepted, is that one kind has The very covert communications means of Johnson & Johnson's sustainability.
The invention provides the following technical scheme:
A kind of convert communication system based on IEEE 802.11a, utilizes the wireless communication system of IEEE802.11a standard In null subcarrier come to realize the covert communications of confidential information, the wireless communication system be host's communication system, the place Main communication system refers to the wireless communication system implemented according to IEEE802.11a standard, and structure is as follows:
1-1: frame structure: IEEE 802.11a standard defines physical layer protocol data unit (Physical Protocol Data Unit, PPDU) frame structure, this is also the data structure generated required for baseband transmission processor;
1-2: timing synchronization, Nonlinear Transformation in Frequency Offset Estimation and the channel estimation of receiver are completed with two training symbols , training symbol is by 10 short training symbols (Short Training Symbol, STS) and training symbol (Long 2 long Training Symbol, LST) composition;
The convert communication system includes:
Hidden transmitter: secret bit by baseband modulation and spread spectrum and then is first mapped to IEEE 802.11a system It in the null subcarrier of system, is transmitted after OFDM is modulated, since transmission power is well below being used for transmission the other of data Subcarrier, so these null subcarriers as protection interval, do not interfere with the normal transmitting-receiving of host system;
Lobe-on-receive machine: after host's receiver completes timing synchronization, Nonlinear Transformation in Frequency Offset Estimation and channel estimation function, These null subcarriers are first done despreading processing, the hidden bit sent is then obtained by hard decision again;Due to made spread spectrum and Despreading processing, allows the transmission power on these null subcarriers to make an uproar the bottom of lower than, on the one hand reduces the shadow to host system It rings, on the other hand improves concealment.
Further, host's receiver utilizes these training symbols, to complete timing synchronization, Nonlinear Transformation in Frequency Offset Estimation and letter The functions such as road estimation are prepared for the transmission of subsequent data;In the OFDM of data frame, 64 subcarriers are shared, wherein 48 sons Carrier wave is used for transmission normal data.
Further, the OFDM modulation for being used for transmission data uses 64 points of IFFT, the i.e. son that OFDM is used Carrier number is 64, and corresponding IFFT input terminal number is 0~63.Regulation is used for transmission the son of data in IEEE 802.11a standard Carrier number is 48;4 pilot tones;The subcarrier that number is 0 is DC component, it is necessary to be 0;Other 11 carry for protection interval Wave is 0 in a standard.When carrying out IFFT operation, subcarrier -26~-1 is mapped to the IFFT input that number is 38~63 End, subcarrier 1~26 are mapped to the IFFT input terminal of the 1~26 of identical number, and other IFFT input terminals are 0 value.It is such to reflect The relationship of penetrating is to be able to guarantee that the subcarrier spectrum of 802.11a system is concentrated;It (is not added by the modulated output of OFDM Cyclic prefix) are as follows:
Here N=64 is subcarrier number, { XkBe k-th of subcarrier data symbol, T be the OFDM symbol time,For subcarrier bandwidth.
The treatment process of the hidden transmitter is as follows:
The IFFT input node that number is 27~37 is null subcarrier, these subcarriers play the role of protection interval, 0 is all set in IEEE 802.11a standard, covert communications transmitter is some or all of to utilize these null subcarriers, comes Secret bit is transmitted, is by modulated symbol s by secret bit c
In formula, P is the power of symbol, and selection length is that M (M value is even number) spreading code W is
W=1, -1,1, -1 ..., 1, -1
Symbol s is multiplied with W namely Direct-Spread operation, then using M symbol after spread spectrum as M null subcarrier Symbol, not used null subcarrier, data subcarrier, pilot sub-carrier and direct current subcarrier with host's communication system, one The input node as IFFT is played, through OFDM modulate emission to channel.
The treatment process of the lobe-on-receive machine is as follows:
M null subcarrier symbol of host's receiver is extracted, the spreading code completely the same with transmitter is multiplied, namely despreading Operation, the symbol after being de-spreadFor
N is the noise of channel in formula,<,>accorded with for inner product operation, then pass through hard decision, recovers secret bit EstimationThe rule of hard decision is
In formulaIt is expressed as plural numberPhase.
The length M of spreading code W be it is variable, several adjacent OFDM frames are combined into the null subcarrier of M, for hidden logical Letter system;The combination of M null subcarrier is chosen, and increase listener-in cracks difficulty, chooses biggish M value, chooses lower The transmission power level P of null subcarrier to reduce influence of the concealment system to host system, while also reducing stolen hearer's perception A possibility that.
Spreading code W is optional, the good pseudo-random sequence (such as m-sequence and Gold sequence) of optional autocorrelation, The good coding (such as Walsh code) of cross correlation, the spreading code as concealment system may be selected;According to the certain data of host system The bit combination of subcarrier, as the spreading code of concealment system, further increases randomness to select different spreading codes, improves Listener-in's cracks difficulty.
Technical concept of the invention are as follows: IEEE 802.11a is disclosed, common WLAN physical layer protocol, under the agreement Communication system use OFDM technology, we analyze the subcarrier situation in OFDM, having little influence on host communication Under conditions of system, secret bit is first done into spread processing, re-modulation to null subcarrier, other sub- loads with host's communication system Wave is modulated to time domain together, by OFDM;Lobe-on-receive end handles the null subcarrier of host's receiver by despreading, using Hard decision estimates secret bit.Due to having used spread spectrum, the power on null subcarrier is made an uproar the bottom of lower than, is eavesdropped Person perceives less than the presence for having hidden information, to achieve the purpose that covert communications.
The invention has the benefit that utilizing existing, disclosed, standard IEEE 802.11a wireless communication system Confidential information is passed through the covert communications by being embedded into the convert communication system of host's communication system by (host's communication system) System transmission, has good concealment.
Detailed description of the invention
Fig. 1 show the frame structure of IEEE 802.11a system.
Fig. 2 show the detailed annotation of PPDU frame structure.
Fig. 3 show subcarrier and IFFT serial number mapping relations.
Fig. 4 show convert communication system entire block diagram.
Fig. 5 show the relationship of 802.11a system bit error rate Yu hidden subcarrier number.
Fig. 6 is shown under conditions of null subcarrier number 8, the relationship of hidden bit error rate and signal-to-noise ratio.
Specific embodiment
The present invention will be further explained below with reference to the attached drawings.
As shown in Figure 1, PDU frame structure includes PLCP header (Header), PSDU, tail bit (Tail) and filling bit (Pad).Wherein PLCP header includes rate position (Rate), reserved bit (Reserved), length position (Length), parity check bit (Parity), tail bit (Tail) and service digit (Service).As can be seen from Figure 11 OFDM of signal segment (Signal) Symbol is made of rate position, reserved bit, length, parity check bit, tail bit and service digit, and data segment (Data) is It is made of service digit, PSDU, tail bit and filling bit.
As shown in Fig. 2, the frame structure of PPUD is described in detail.It can be seen from the figure that the symbol in receiver section is fixed When synchronous, Nonlinear Transformation in Frequency Offset Estimation and channel estimation completed with two training symbols.Training symbol is accorded with by 10 Short Trainings Number (Short Training Symbol, STS) and 2 long training symbol (Long Training Symbol, LST) composition.Its In each short training symbols time span be 0.8us, be the 1/4 of normal OFDM symbol length, the time of long training symbol is long Degree is then identical as normal OFDM symbol, and total training time length is 16us.It is the domain Signal after training symbol, length is normal OFDM symbol length, including important informations such as data modulation type, code rate and data lengths.
64 points of IFFT is used in Fig. 3, in OFDM, i.e. OFDM available subcarrier is 64, corresponding IFFT Input terminal number is 0~63.The subcarrier that data are transmitted in IEEE 802.11a standard is 52, i.e., in positive frequency section, volume Number be 1,2 ..., 26 subcarrier and in negative frequency section, number be -1, -2 ..., -26 subcarrier, including 48 numbers According to subcarrier, 4 pilot tones;The subcarrier that number is 0 is DC component, it is necessary to be 0;Other 11 are protection interval subcarrier, It is in a standard 0.When carrying out IFFT operation, subcarrier -26~-1 is mapped to the IFFT input terminal that number is 38~63, Subcarrier 1~26 is mapped to the IFFT input terminal of the 1~26 of identical number, and other IFFT input terminals are 0 value.Such mapping is closed System is to be able to guarantee that the subcarrier spectrum of 802.11a system is concentrated.(circulation is not added by the modulated output of OFDM Prefix) are as follows:
Here N=64 is subcarrier number, { XkBe k-th of subcarrier data symbol, T be the OFDM symbol time,For subcarrier bandwidth.
In Fig. 3, by the relationship of analysis 802.11a subcarrier and IFFT serial number it can be found that it can be found that IFFT point 27~37 be sky, i.e. subcarrier -31~-27 and 27~32, these subcarriers play the role of protection interval, in IEEE 802.11a being all set to 0 in standard.Therefore, we are according to this feature, propose it is as shown in Figure 4, be embedded in host system Convert communication system in system.
As shown in figure 4, being by modulated symbol s by secret bit c in the transmitter of concealment system
In formula, P is the power of symbol.It is assumed that length is that M (M value is even number) spreading code W is
W=1, -1,1, -1 ..., 1, -1
Symbol s is multiplied with W namely Direct-Spread operation passes then M symbol after spread spectrum in conjunction with host system Transmission of data, together as the input of OFDM modulation.
As shown in figure 4, M null subcarrier symbol is extracted from host's receiver, with transmitting in the receiver of concealment system The completely the same spreading code of machine is multiplied namely de-spreading operation, the symbol after being de-spreadFor
N is the noise of channel in formula,<,>accorded with for inner product operation.Then pass through hard decision, recover secret bit EstimationThe rule of hard decision is
In formulaIt is expressed as plural numberPhase.
Herein, spread code length M, and can be described as spreading factor.In order to reduce the influence to host system, and raising The concealment of concealment system can choose bigger M value.As M > 11, then the gap chosen in adjacent OFDM symbol carries Wave forms the null subcarrier group that a length is M.For example, M=16, then can choose adjacent 2 OFDM symbols, each OFDM Symbol takes 8 null subcarriers (IFFT number 27~30,34~37).Further, when M value is larger, lower power can be chosen Value P to reduce influence of the concealment system to host system, while also reducing a possibility that stolen hearer perceives.
Further, it if listener-in has grasped the structure of the convert communication system proposed, but does not get correctly Spreading code W, such as obtained the spreading code W orthogonal with transmitting terminal1, then obtained symbol after listener-in's despreadingFor
SymbolIn there is no any information comprising the modulation symbol s after hidden bit modulation, therefore be unable to estimate out hidden Bit.
Shown in Fig. 5 and Fig. 6, be respectively host system using Matlab software to proposition based on IEEE802.11a and Bit error rate of concealment system under the conditions of different signal-to-noise ratio.In emulation, convolutional encoding is used as channel coding, coding effect Rate is 1/2, constraint length 7, and generator matrix is (133,171);Receiving end carries out convolutional code using Viterbi decoding algorithm Decoding;The subcarrier of each transmission data all uses BPSK to modulate;The digital modulation mode of concealment system also uses BPSK tune System, the regulation for following 802.11a agreement of OFDM modulating part.
In Fig. 5, SNR indicates that the ratio of transmitting total power signal and interchannel noise, BER indicate bit error rate.In order to Influence of the concealment system to host system is evaluated, the sub-carrier power of concealment system and the subcarrier function of host system are specially set Rate is equally big.N indicates N number of null subcarrier in host system in figure, transmits secret bit for concealment system.It can be with from figure Find out, when the timing of SNR mono-, the bit error rate of host system can increase with the increase of N, this is because using more hidden Subcarrier occupies power, and the power of host system is caused to be declined, and signal-to-noise ratio reduces, but general impacts are little.Into one Step can substantially reduce the influence to host system if reducing the transmission power of concealment system subcarrier.
As shown in fig. 6, the relationship of hidden bit bit error rate and signal-to-noise ratio when hidden sub-carrier number is 8.Here Signal-to-noise ratio is defined as the power of concealment system subcarrier and the additive white Gaussian noise power ratio of channel.It can from figure Out, when spreading factor is larger, although transmission power is lower than channel noise power, but still there is sufficiently low bit error rate.Into One step in order to reduce the transmission power of concealment system to reduce the influence to host system, while enhancing concealment, reduces stolen A possibility that hearer perceives can realize this purpose by increasing the method for spreading factor.

Claims (9)

1. a kind of convert communication system based on IEEE 802.11a, it is characterised in that: utilize the wireless of IEEE802.11a standard Null subcarrier in communication system realizes the covert communications of confidential information, and the wireless communication system is host's communication system, Host's communication system refers to the wireless communication system implemented according to IEEE 802.11a standard, and structure is as follows:
1-1: frame structure: IEEE 802.11a standard defines physical layer protocol data unit (Physical ProtocolData Unit, PPDU) frame structure, this is also the data structure generated required for baseband transmission processor;
1-2: timing synchronization, Nonlinear Transformation in Frequency Offset Estimation and the channel estimation of receiver are completed with two training symbols, Training symbol is by 10 short training symbols (Short Training Symbol, STS) and training symbol (Long 2 long Training Symbol, LST) composition;
The convert communication system includes:
Hidden transmitter: secret bit is passed through into baseband modulation and spread spectrum and then the gap for being mapped to host's transmitter OFDM In carrier wave, transmitted after OFDM is modulated;
Lobe-on-receive machine: hidden after host's receiver completes the functions such as timing synchronization, Nonlinear Transformation in Frequency Offset Estimation and channel estimation It covers receiver and extracts null subcarrier modulation symbol in the OFDM frame of transmission data, first do de-spreading operation, then pass through hard decision, To recover the secret bit of transmission.
2. a kind of convert communication system based on IEEE 802.11a as described in claim 1, it is characterised in that: host receives Machine utilizes these training symbols, is subsequent data to complete timing synchronization, Nonlinear Transformation in Frequency Offset Estimation and channel estimation function Transmission is prepared;In the OFDM of data frame, 64 subcarriers are shared, wherein 48 subcarriers are used for transmission normal data.
3. a kind of convert communication system based on IEEE 802.11a as claimed in claim 2, it is characterised in that: the use 64 points of IFFT is used in the OFDM modulation of transmission data, i.e. the sub-carrier number that OFDM is used is 64, corresponding IFFT input End number is that the sub-carrier number that regulation is used for transmission data in 0~63, IEEE 802.11a standard is 48;4 pilot tones;Number Subcarrier for 0 is DC component, it is necessary to be 0;Other 11 are protection interval subcarrier, are in a standard 0;Carry out When IFFT operation, subcarrier -26~-1 is mapped to the IFFT input terminal that number is 38~63, and subcarrier 1~26 is mapped to phase With 1~26 IFFT input terminal of number, other IFFT input terminals are 0 value, and such mapping relations are to be able to guarantee 802.11a the subcarrier spectrum of system is concentrated;By the modulated output of OFDM are as follows:
Here N=64 is subcarrier number, { XkBe k-th of subcarrier data symbol, T be the OFDM symbol time, For subcarrier bandwidth.
4. a kind of convert communication system based on IEEE 802.11a as described in one of claims 1 to 3, it is characterised in that: The treatment process of the hidden transmitter is as follows:
The IFFT input node that number is 27~37 is null subcarrier, these subcarriers play the role of protection interval, in IEEE 0 is all set in 802.11a standard, covert communications transmitter is some or all of to utilize these null subcarriers, carrys out conveyer Secret bit c is by close bit by modulated symbol s
In formula, P is the power of symbol, chooses the spreading code W that length is M are as follows:
W=1, -1,1, -1 ..., 1-1
M value is even number;Symbol s is multiplied with W namely Direct-Spread operation, then using M symbol after spread spectrum as M The symbol of null subcarrier, not used null subcarrier, data subcarrier, pilot sub-carrier and direct current with host's communication system Carrier wave, together as the input node of IFFT, through OFDM modulate emission to channel.
5. a kind of convert communication system based on IEEE 802.11a as described in one of claims 1 to 3, it is characterised in that: The treatment process of the lobe-on-receive machine is as follows:
M null subcarrier symbol of host's receiver is extracted, the spreading code completely the same with transmitter is multiplied, namely despreading behaviour Make, the symbol after being de-spreadFor
N is the noise of channel in formula,<,>accorded with for inner product operation, then pass through hard decision, recovers the estimation of secret bitThe rule of hard decision is
In formulaIt is expressed as plural numberPhase.
6. a kind of convert communication system based on IEEE 802.11a as claimed in claim 4, it is characterised in that: spreading code W Length M be it is variable, several adjacent OFDM frames are combined into the null subcarrier of M, be used for convert communication system;M gap carries The combination of wave is chosen, and increase listener-in cracks difficulty, chooses biggish M value, chooses the transmitting function of lower null subcarrier Rate value P.
7. a kind of convert communication system based on IEEE 802.11a as claimed in claim 5, it is characterised in that: spreading code W Length M be it is variable, several adjacent OFDM frames are combined into the null subcarrier of M, be used for convert communication system;M gap carries The combination of wave is chosen, and increase listener-in cracks difficulty, chooses biggish M value, chooses the transmitting function of lower null subcarrier Rate value P.
8. a kind of convert communication system based on IEEE 802.11a as claimed in claim 4, it is characterised in that: spreading code W It is pseudo-random sequence that is optional, selecting autocorrelation good, also or the good coding of selection cross correlation, as concealment system Spreading code;According to the bit combination of the certain data subcarriers of host system, to select different spreading codes, as concealment system Spreading code.
9. a kind of convert communication system based on IEEE 802.11a as claimed in claim 5, it is characterised in that: spreading code W It is pseudo-random sequence that is optional, selecting autocorrelation good, also or the good coding of selection cross correlation, as concealment system Spreading code;According to the bit combination of the certain data subcarriers of host system, to select different spreading codes, as concealment system Spreading code.
CN201910490891.6A 2019-06-06 2019-06-06 Concealed communication system based on IEEE802.11a Active CN110278560B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910490891.6A CN110278560B (en) 2019-06-06 2019-06-06 Concealed communication system based on IEEE802.11a

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910490891.6A CN110278560B (en) 2019-06-06 2019-06-06 Concealed communication system based on IEEE802.11a

Publications (2)

Publication Number Publication Date
CN110278560A true CN110278560A (en) 2019-09-24
CN110278560B CN110278560B (en) 2022-10-18

Family

ID=67960514

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910490891.6A Active CN110278560B (en) 2019-06-06 2019-06-06 Concealed communication system based on IEEE802.11a

Country Status (1)

Country Link
CN (1) CN110278560B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111130594A (en) * 2019-12-30 2020-05-08 华南理工大学 Direct sequence spread spectrum-based heat hidden channel communication method
CN111181597A (en) * 2019-12-30 2020-05-19 华南理工大学 Anti-interference heat hidden channel communication method in multi-core system

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101675637A (en) * 2007-05-04 2010-03-17 Nxp股份有限公司 Fft spreading among selected OFDM sub-carriers
CN105814929A (en) * 2013-12-11 2016-07-27 高通股份有限公司 Apparatus and methods for cellular communications over unused unlicenced spectrum
CN106535177A (en) * 2016-11-22 2017-03-22 浙江工业大学 Autoregressive artificial noise-based covert communication method
CN108347260A (en) * 2017-12-21 2018-07-31 上海微波技术研究所(中国电子科技集团公司第五十研究所) The despreading frequency method of Wireless OFDM System
CN108632255A (en) * 2018-04-08 2018-10-09 浙江警察学院 A kind of convert communication system based on random noise modulation
CN108923818A (en) * 2018-07-04 2018-11-30 苏州工业园区服务外包职业学院 A kind of concealed communication method, device, communication terminal and storage medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101675637A (en) * 2007-05-04 2010-03-17 Nxp股份有限公司 Fft spreading among selected OFDM sub-carriers
CN105814929A (en) * 2013-12-11 2016-07-27 高通股份有限公司 Apparatus and methods for cellular communications over unused unlicenced spectrum
CN106535177A (en) * 2016-11-22 2017-03-22 浙江工业大学 Autoregressive artificial noise-based covert communication method
CN108347260A (en) * 2017-12-21 2018-07-31 上海微波技术研究所(中国电子科技集团公司第五十研究所) The despreading frequency method of Wireless OFDM System
CN108632255A (en) * 2018-04-08 2018-10-09 浙江警察学院 A kind of convert communication system based on random noise modulation
CN108923818A (en) * 2018-07-04 2018-11-30 苏州工业园区服务外包职业学院 A kind of concealed communication method, device, communication terminal and storage medium

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111130594A (en) * 2019-12-30 2020-05-08 华南理工大学 Direct sequence spread spectrum-based heat hidden channel communication method
CN111181597A (en) * 2019-12-30 2020-05-19 华南理工大学 Anti-interference heat hidden channel communication method in multi-core system
CN111181597B (en) * 2019-12-30 2021-09-21 华南理工大学 Anti-interference heat hidden channel communication method in multi-core system

Also Published As

Publication number Publication date
CN110278560B (en) 2022-10-18

Similar Documents

Publication Publication Date Title
Chen et al. TwinBee: Reliable physical-layer cross-technology communication with symbol-level coding
TWI305092B (en) Orthogonal frequency division multiplexing (ofdm) method and apparatus for protecting and authenticating wirelessly transmitted digital information
RU2268547C2 (en) Method and device for transmitting and receiving additional information from series transferred in portions via communication system
KR101024427B1 (en) Hierarchical modulating method, hierarchical de-modulating method, transmitter performing hierarchical modulation and receiver performing hierarchical de-modulation
AU2016340834B2 (en) Method and apparatus for communicating data in a digital chaos cooperative network
JP4393522B2 (en) Watermark / Signature for wireless communication
US20110161673A1 (en) Method and apparatus for enhancing security of wireless communications
US10103918B2 (en) Method and apparatus for range and coverage extension in a heterogeneous digital chaos cooperative network
US20070121939A1 (en) Watermarks for wireless communications
US6683955B1 (en) Method for receiving a secured transmission of information through a plurality of frequency orthogonal subchannels
Kang et al. A survey of security mechanisms with direct sequence spread spectrum signals
Hasan et al. Design and analysis of an OFDM-based orthogonal chaotic vector shift keying communication system
CN108833341A (en) A kind of safe transmission method of physical layer based on subcarrier sequence and XOR operation in ofdm system
Yang et al. Blind joint soft-detection assisted slow frequency-hopping multicarrier DS-CDMA
CN110909321B (en) Physical layer digital watermarking method for 4G communication
Rahbari et al. Full frame encryption and modulation obfuscation using channel-independent preamble identifier
CN110278560A (en) A kind of convert communication system based on IEEE 802.11a
Huang et al. Reliable and secure constellation shifting aided differential radio frequency watermark design for NB-IoT systems
CN109743155B (en) Physical layer secure transmission method based on antenna selection differential chaos keying
Zhang et al. ZCNET: Achieving high capacity in low power wide area networks
WO2008011834A1 (en) A sending and receiving method, device based on ofdm
Zielinska et al. Direct sequence spread spectrum steganographic scheme for IEEE 802.15. 4
US6501841B1 (en) Method for providing security for a transmission of information through a plurality of frequency orthogonal subchannels
Kumar et al. Transmitter authentication using hierarchical modulation in dynamic spectrum sharing
CN110958104B (en) Communication method based on 16QAM partial position embedded signal watermark

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant