CN106888067A - The wire communication method and topological structure of a kind of unconditional security - Google Patents
The wire communication method and topological structure of a kind of unconditional security Download PDFInfo
- Publication number
- CN106888067A CN106888067A CN201510932348.9A CN201510932348A CN106888067A CN 106888067 A CN106888067 A CN 106888067A CN 201510932348 A CN201510932348 A CN 201510932348A CN 106888067 A CN106888067 A CN 106888067A
- Authority
- CN
- China
- Prior art keywords
- communication
- man made
- made noise
- interference
- module
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000004891 communication Methods 0.000 title claims abstract description 50
- 238000000034 method Methods 0.000 title claims abstract description 23
- 238000007599 discharging Methods 0.000 claims abstract 2
- 230000005540 biological transmission Effects 0.000 claims description 5
- 230000008030 elimination Effects 0.000 claims description 2
- 238000003379 elimination reaction Methods 0.000 claims description 2
- 230000006855 networking Effects 0.000 claims 1
- 239000013307 optical fiber Substances 0.000 claims 1
- 238000006424 Flood reaction Methods 0.000 abstract 1
- 238000007796 conventional method Methods 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04K—SECRET COMMUNICATION; JAMMING OF COMMUNICATION
- H04K3/00—Jamming of communication; Counter-measures
- H04K3/20—Countermeasures against jamming
- H04K3/22—Countermeasures against jamming including jamming detection and monitoring
- H04K3/224—Countermeasures against jamming including jamming detection and monitoring with countermeasures at transmission and/or reception of the jammed signal, e.g. stopping operation of transmitter or receiver, nulling or enhancing transmitted power in direction of or at frequency of jammer
- H04K3/228—Elimination in the received signal of jamming or of data corrupted by jamming
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04K—SECRET COMMUNICATION; JAMMING OF COMMUNICATION
- H04K1/00—Secret communication
- H04K1/02—Secret communication by adding a second signal to make the desired signal unintelligible
Landscapes
- Engineering & Computer Science (AREA)
- Radar, Positioning & Navigation (AREA)
- Remote Sensing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Noise Elimination (AREA)
- Cable Transmission Systems, Equalization Of Radio And Reduction Of Echo (AREA)
Abstract
So far, unconditional security communication means only has quantum communications a kind of, and electromagnetic wave secret communication then needs to use encrypted code.Comparatively, what the latter's communication information can be decoded by supercomputing in principle.The present invention proposes a kind of wire communication method with security performance identical with quantum communications, it is based on the method for discharging man made noise in a network, so that signal of communication floods completely, and at communication control processor, disturbed arrester is completely eliminated this man made noise, therefore practical communication signal quality is unaffected.The topological structure of above-mentioned man made noise's emitter, the module of interference eliminator two and circuit link is the key of the present invention.According to Shannon information theory:The method causes that signal of communication is to decode.
Description
Technical field
The invention belongs to secret and safe field in communication system, it is related to safety of physical layer method.The method can thoroughly prevent
Only signal is decrypted eavesdropping on the line in wire communication.
Background technology
Man made noise is discharged in wire communication the present invention relates to one kind, this realizes that unconditional security is communication objective accordingly.
In conventional wired networks, listener-in typically uses contact or non-contact method, on direct wiretap
The signal of transmission, and further decode information.Lack personnel's post because communication line is more long, for a long time may be caused
It is insoluble problem to give away secrets.Conventional method implementation information protection by the way of information password.But, this method for
The decoding of supercomputer will be entirely ineffective.
General principle of the present invention based on communication physical layer safety, i.e.,:When the detection signal to noise ratio of transmission information is less than one
Threshold value, then any method can not possibly decode be submerged in noise signal carry information.Accordingly, the present invention according to by
The method that man made noise is discharged on communication line so that the signal to noise ratio of listener-in is less than above-mentioned threshold value, so as to cannot steal at all
Win the confidence breath.And to communication stay of two nights side, this man made noise can be what is be completely eliminated, therefore normally entering for communication can be ensured
OK.
The content of the invention
Basic ideas of the invention are, at traditional communication receiver, to communication line (i.e.:Wiretap) release is manually
Noise, and in preposition one artificial noise jamming arrester of communication control processor, this man made noise is eliminated in real time, so that logical
Letter signal is not influenceed and is normally carried out by this man made noise, and the program is as shown in Figure 1.
Technical solutions according to the invention are as follows:
Below by invention book brief description of the drawings:
1st, jamming transmitter and interference characteristic
It is being coupled between traditional communication emitter (information source) and receiver (stay of two nights) on circuit, at receiver, is adding
One jamming transmitter, its emission interface (interface 1) is coupled the circuit that may be eavesdropped, and discharges man made noise, its system
Meter feature has randomness.
2nd, jamming transmitter power controller
The artifact power of emission interface (interface 1) transmitting of jamming transmitter can adjust:The circuit of secret communication
More long, the transmission power of man made noise is bigger, it is characterized in that transmission power is associated with line length.
3rd, interference eliminator
Interference eliminator is used to eliminate influence of the man made noise to communication control processor, and it has two input interfaces and an output
Interface, is expressed as input interface 1 and input interface 2, and output interface 1.Bind mode is as follows:
Interference eliminator input interface 1 is coupled jamming transmitter emission interface 2, unknown man made noise is changed into interference and is disappeared
Except the known disturbances of device so that interference elimination is carried out.
Interference eliminator input interface 2 is coupled communication line, with UNICOM's communication signal receiver and jamming transmitter circuit.
Interference eliminator eliminates the man made noise in its interface 2 using the man made noise of input interface 1 so that output connects
The output of mouth 1 is free of this noise.This output coupled communication control processor, to provide the pure signal from emitter.
In said process, we have ignored the influence of people's noise so that patent description of the present invention is more succinct, but does not influence
The basic effect of patent of the present invention.
4th, information protection
Because listener-in cannot be directly accessed the circuit between communication control processor and interference eliminator, so the electromagnetism of eavesdropping
Source is man made noise and signal of communication sum, in noise power and signal power ratio more than a threshold value, then any
Method is impossible to decode the information that signal is carried (eavesdropping point is shown in Fig. 1).
Implementation example example:
1st, the state that communication starts
While emitter launches signal of communication, interference hair machine launches random man made noise, and communication line is discharged
Man made noise, and its " interface 1 " power output is adjusted according to line length.
2nd, the method for work of interference eliminator
" input 2 " of the device that disappears is disturbed to receive the signal mixed with man made noise by signal of communication, its " input 1 " receives pure
Pure man made noise, then adjust this pure man made noise so that man made noise's amplitude is identical, and phase with " input 1 " for its amplitude
Position is conversely, last utilization adds computing thoroughly to eliminate man made noise so that " output interface of interference eliminator " is output as being free of
The signal of communication of man made noise.
3rd, receive and state
Communication control processor is coupled " interference eliminator output interface ", obtains the signal from communication transmitter so that communication
Carried out.
Embodiment of above is merely to illustrate the present invention, and not limitation of the present invention, about the common of technical field
Technical staff, without departing from the spirit and scope of the present invention, can also make a variety of changes and modification, therefore all
Equivalent technical scheme falls within scope of the invention, and scope of patent protection of the invention should be defined by the claims.
Brief description of the drawings
Fig. 1 is unconditional security communication system schematic diagram.
Claims (8)
1. realize a kind of unconditional security secrecy wire communication method, it is characterised in that transmitter terminal by wired mode to
In receiver transmission signal system, at receiver end, man made noise is discharged to circuit, so that the signal of communication on circuit
It is submerged among man made noise;This man made noise is eliminated at the receiver of receiving terminal, so that safeguards system communication quality is simultaneously
The method for preventing information monitored.
2. method according to claim 1, it is characterised in that man made noise's hair is set at the receiver of communication line
Machine is penetrated, for discharging man made noise to communication line.
3. method according to claim 1, man made noise can be with the man made noise of Gauss feature, or other
The interference signal or spoofed signal of form.
4. method according to claim 1, interference eliminator with jamming transmitter is coupled or wireless connections side by wired
Formula, is changed into unknown man made noise to be disturbed known to interference eliminator, thoroughly to eliminate this interference using algorithm.
5. method according to claim 1, manual's noise release circuit and line combination mode, including multiple emitters
With the networking mode of multiple receivers.
6. according to claim 1-5 methods describeds, the similar node that secure communication is realized by applying man made noise, its feature
It is, including sending module, receiver module, wherein interference generation module and interference cancellation module, sending module and receiver module
It is communication module in traditional sense, interference occurs module and interference elimination belongs to guarantee unconditional security module, including will be above-mentioned
There is module and interference cancellation block and become one the receiver with above-mentioned functions in receiver module, interference.
7. method according to claim 1, is applied to the wire communication lines such as twisted-pair feeder, coaxial wire, optical fiber cable.
8. method according to claim 1, is applied to the repeater of communication link.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510932348.9A CN106888067A (en) | 2015-12-16 | 2015-12-16 | The wire communication method and topological structure of a kind of unconditional security |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510932348.9A CN106888067A (en) | 2015-12-16 | 2015-12-16 | The wire communication method and topological structure of a kind of unconditional security |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106888067A true CN106888067A (en) | 2017-06-23 |
Family
ID=59173459
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510932348.9A Pending CN106888067A (en) | 2015-12-16 | 2015-12-16 | The wire communication method and topological structure of a kind of unconditional security |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106888067A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107276713A (en) * | 2017-06-27 | 2017-10-20 | 电子科技大学 | A kind of 3D region electromagnetic spectrum umbrella cover system and its construction method |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103067147A (en) * | 2011-10-19 | 2013-04-24 | 通用电气公司 | Wired communication system with improved capacity and security |
CN104539337A (en) * | 2014-12-26 | 2015-04-22 | 东南大学 | Limited feedback transmission method based on channel estimation in multi-antenna safety communication system |
CN104955035A (en) * | 2015-06-16 | 2015-09-30 | 熊绵朝 | Artificial baseband noise symmetric encryption method based on digital baseband signal |
-
2015
- 2015-12-16 CN CN201510932348.9A patent/CN106888067A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103067147A (en) * | 2011-10-19 | 2013-04-24 | 通用电气公司 | Wired communication system with improved capacity and security |
CN104539337A (en) * | 2014-12-26 | 2015-04-22 | 东南大学 | Limited feedback transmission method based on channel estimation in multi-antenna safety communication system |
CN104955035A (en) * | 2015-06-16 | 2015-09-30 | 熊绵朝 | Artificial baseband noise symmetric encryption method based on digital baseband signal |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107276713A (en) * | 2017-06-27 | 2017-10-20 | 电子科技大学 | A kind of 3D region electromagnetic spectrum umbrella cover system and its construction method |
CN107276713B (en) * | 2017-06-27 | 2019-04-12 | 电子科技大学 | A kind of 3D region electromagnetic spectrum umbrella cover system and its construction method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Zou et al. | Intercept behavior analysis of industrial wireless sensor networks in the presence of eavesdropping attack | |
CN108834113B (en) | D2D covert communication system facing 5G cellular network physical layer security and communication method thereof | |
CN106992836B (en) | A full-duplex scrambled transmission method in an untrusted relay network | |
CN106506138A (en) | Cross-layer encryption method and system for space optical communication system | |
CN106789015A (en) | A kind of intelligent distribution network communication security system | |
CN106160877B (en) | The cross-layer encryption method and system of fibre-optic transmission system (FOTS) | |
CN108881215A (en) | The half Quantum Secure Direct Communication agreement based on Bell state | |
CN107086891A (en) | Phase Compensation Realization Method of Continuous Variable Quantum Key Distribution System | |
WO2020024439A1 (en) | Physical layer security enhancement method for free-space optical network | |
CN108848107A (en) | A kind of method of secure transmission web information | |
CN109756328A (en) | Key generation method and client based on adaptive adjustment of bit error rate parameters | |
CN109995528A (en) | Two-way identity authentication and a semi-quantum secure direct communication method against channel noise | |
CN108964898A (en) | It is a kind of that electricity consumption cryptographic communication system and method are matched based on Quantum Secure Communication | |
CN110278068B (en) | LoRa communication encryption system based on chaotic sequence | |
CN106888067A (en) | The wire communication method and topological structure of a kind of unconditional security | |
CN108155996B (en) | Smart home security communication method based on family channel | |
Li et al. | The Security Analysis of Quantum SAGR04 Protocol in Collective‐Rotation Noise Channel | |
CN104734846B (en) | Quantum-key distribution control device and method | |
CN112738097A (en) | Method and system for realizing covert communication based on binary phase shift keying repeated coding | |
Sharma et al. | Physical layer security of ami data transmission in smart grid environment | |
CN116886208B (en) | Information encryption transmission method, device, terminal equipment and storage medium | |
CN110337094B (en) | A secure transmission system and method for D2D content sharing | |
CN103441851A (en) | Method for allowing terminal equipment to have access to VPN equipment | |
CN117614549A (en) | Medium-voltage high-speed analog optical fiber intelligent communication terminal with anti-communication interference function | |
CN107171775A (en) | The mixing duplex transmission method of safety of physical layer is lifted in a kind of cognitive junction network |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20170623 |