CN110213009B - Safe communication method based on power mixing - Google Patents

Safe communication method based on power mixing Download PDF

Info

Publication number
CN110213009B
CN110213009B CN201910664396.2A CN201910664396A CN110213009B CN 110213009 B CN110213009 B CN 110213009B CN 201910664396 A CN201910664396 A CN 201910664396A CN 110213009 B CN110213009 B CN 110213009B
Authority
CN
China
Prior art keywords
user
signal
symbol
symbols
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910664396.2A
Other languages
Chinese (zh)
Other versions
CN110213009A (en
Inventor
刘轶伦
朱立东
袁帅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
University of Electronic Science and Technology of China
Original Assignee
University of Electronic Science and Technology of China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by University of Electronic Science and Technology of China filed Critical University of Electronic Science and Technology of China
Priority to CN201910664396.2A priority Critical patent/CN110213009B/en
Publication of CN110213009A publication Critical patent/CN110213009A/en
Application granted granted Critical
Publication of CN110213009B publication Critical patent/CN110213009B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K1/00Secret communication
    • H04K1/02Secret communication by adding a second signal to make the desired signal unintelligible

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Radio Relay Systems (AREA)

Abstract

The invention provides a safe communication method based on power mixing, which relates to the technical field of satellite communication, and is characterized in that military information to be encrypted and other auxiliary information are mixed according to different powers for transmission, and in the process, if a non-receiving party wants to obtain the information to be encrypted, the information to be encrypted can be obtained only on the premise of obtaining other information serving as the auxiliary information; in addition, the auxiliary information is selected from signals in common civil communication and reaches the satellite through other transmission paths, so that the effective utilization of the information is realized, and the safety in the communication process is improved.

Description

Safe communication method based on power mixing
Technical Field
The invention relates to the technical field of satellite communication, in particular to a safe communication method based on power mixing.
Background
With the rapid development of communication countermeasure technology, the concealment of information in military communication has become a non-negligible problem. The future battlefield is a digital battlefield, the information control right becomes a new high point for competition between the two parties of warfare after the sea control right and the air control right, the communication is an important component of the information control right, and the digital battlefield faces severe reconnaissance and stealing and electronic interference environments. Whether the communication system and the communication network have good anti-interception capability or not is a first condition for obtaining communication electronic victory or not.
Satellite communication has the advantages of wide coverage, large capacity, high transmission rate and the like, can be used in various complex communication environments, and is widely applied to military communication. However, due to the openness of the satellite channel, communication information is easy to leak, and communication concealment is poor. With the continuous development and upgrading of information war, the research on electronic reconnaissance and anti-reconnaissance, and secret stealing and anti-secret stealing technologies is receiving much attention, so how to enhance the concealment performance of satellite communication and further improve the confidentiality of communication gradually becomes a hot point of research of various countries. The wide area communication characteristic of military satellite communication brings the advantage of long communication distance, and simultaneously, satellite communication signals are easier to be received and deciphered by an interception party.
Spread spectrum technology is the mainstream technology of military anti-interference communication at present. Direct Sequence Spread Spectrum (DSSS) modulates information data to be transmitted by a high-rate spread spectrum code to realize spectrum spreading, and related despreading is carried out by the same spread spectrum code at a receiving end to recover original data. However, with the rapid development of spectrum detection technology and the reasons of the primitive polynomial disclosure of many spreading code sequences, the traditional spread spectrum communication becomes no longer secure, and the spreading sequences have the possibility of being decoded, so the research of a new covert communication system has become very important to ensure the security of military communication.
Disclosure of Invention
The embodiment of the invention aims to solve the problem that a spread spectrum sequence is easy to detect and crack in the traditional spread spectrum communication technology, and provides a safe communication method based on power mixing, which can alleviate the problem.
To alleviate the above-mentioned problems; the technical scheme adopted by the embodiment of the invention is as follows:
the invention provides a safe communication method based on power mixing, which comprises the following steps:
s1, assuming Z ═ { Z ═ Z1,z2,...,znZ is a symbol sequence, n is the number of symbols in the sequence, x1=z2k+1For symbols to be encrypted, x2=z2k+2A symbol selected from signals in civil communication is used as an auxiliary signal, and k is 0,1, 2; the structural expression of the transmission signal is as in equation (1)
Figure BDA0002139607040000021
Wherein, y1Is a symbol, y, sent from the base station to user 12Is a symbol transmitted from the base station to user 2, user 1 representing military equipment, user 2 representing civilian equipment, y1The two symbols of (2) are allocated different powers x1Is set to a, x2Is set to b, a, b are time-varying values, and a + b is 1, a>0,b>0;
S2, adopting BPSK modulation mode to modulate x1And x2,y2Passing frequency f2To user 2, y1Pass frequencyRate f1Y sent to user 1 and sent to user 11Higher than y sent to user 22Secret class of f2≠f1
S3, the receiving end of user 2 is divided into two paths, one path receives y2And demodulates, the demodulated signal is used by user 2, the other path is y2As a key signal to user 1, let user 1 receive a signal from user 2 as y2';
S4, receiving end y of user 12' and demodulate and then reconstruct x from the amplitude estimates2To y for1Interference cancellation is performed followed by demodulation of x1And (4) finishing.
The technical effect of the technical scheme is as follows: on one hand, military information to be encrypted and other auxiliary information are mixed according to different powers for transmission, and in the process, if a non-receiving party wants to obtain the information to be encrypted, the information to be encrypted can be obtained only on the premise that other information serving as the auxiliary information is obtained; on the other hand, the auxiliary information is selected from signals in common civil communication and reaches the satellite through other transmission paths, so that the effective utilization of the information is realized, and the safety in the communication process is improved.
As an alternative to this patent, x in step S11And x2Is determined by the values of the carrier amplitude a and b, and only if x1=x2When y is1Instantaneous power of and y2Are equal.
The technical effect of the technical scheme is as follows: the requirement that a + b is 1, a is greater than 0, b is greater than 0, and because the values of a and b change along with time, the carrier amplitude values a and b have various combination modes, thereby greatly increasing the difficulty of a non-receiving party in obtaining the information to be encrypted.
As a technical solution selected by this patent, in step S3, y received by user 22Has two practical meanings, one is that the demodulated signal is needed by the user 2, and the other is used as a key signal y2', to user 1.
The technical effect of the technical scheme is as follows: in the traditional encryption transmission mode, an information sequence without practical significance is additionally generated to serve as key information and then transmitted to the user 1 through the civil equipment, the civil equipment in the space is occupied, resource waste is caused, auxiliary information in the technical method is selected from common civil signals, and information resources are saved.
As one solution selected in this patent, in step S4, x is reconstructed2Is of the formula
r=x2*b*α (2)
Wherein r is a symbol for interference cancellation, and α is y1The fading coefficient through the channel.
The technical effect of the technical scheme is as follows: y is1Is sent directly from the ground station to the user 1, y2The ground station is transmitted to the user 1 through the user 2, and the two stations experience different transmission paths, so the signal fading degree is different, and the y is required to be matched1Is estimated to make the reconstructed r more accurate.
As a technical solution selected by this patent, a method for calculating the fading coefficient α is:
user 1 receiving end respectively receives y1And demodulate, to y1The N symbols are sorted from large to small according to absolute values, and the values of the first N/2 symbols are selected to be averaged to obtain alpha.
In order to make the aforementioned objects, features and advantages of the present invention comprehensible, embodiments accompanied with figures are described in detail below.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present invention and therefore should not be considered as limiting the scope, and for those skilled in the art, other related drawings can be obtained according to the drawings without inventive efforts.
FIG. 1 is a schematic illustration of a power mixing based secure communication method of the present invention;
fig. 2 is a schematic diagram of signal parameter allocation in the power mixing-based secure communication method according to the present invention;
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. The components of embodiments of the present invention generally described and illustrated in the figures herein may be arranged and designed in a wide variety of different configurations.
Thus, the following detailed description of the embodiments of the present invention, presented in the figures, is not intended to limit the scope of the invention, as claimed, but is merely representative of selected embodiments of the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Examples
Referring to fig. 1 and fig. 2, a secure communication method based on power mixing according to an embodiment of the present invention includes the following steps:
step one, assuming that Z ═ Z1,z2,...,znZ is a symbol sequence, n is the number of symbols in the sequence, x1=z2k+1For symbols to be encrypted, x2=z2k+2A symbol selected from signals in civil communication is used as an auxiliary signal, and k is 0,1, 2; the structural expression of the transmission signal is as in equation (1)
Figure BDA0002139607040000041
Wherein, y1Is a symbol, y, sent from the base station to user 12Is a symbol transmitted from the base station to user 2, user 1 representing military equipment, user 2 representing civilian equipment, y1The two paths of symbols are distributed with different powers, and the signal power is determined by the amplitude of the carrier waveImplementation, total power limited, x1Is set to a, x2Is set to b, a, b are time-varying values, see fig. 2, and a + b is 1, a>0,b>0。
Step two, adopting BPSK modulation mode to modulate x1And x2,y2Passing frequency f2To user 2, y1Passing frequency f1Sent to user 1 and user 1 has a higher security level than user 2, f2≠f1
Step three, the receiving end of the user 2 is divided into two paths, and one path receives y2And demodulates, the demodulated information is used by user 2, and the other path is used for y2Forwarding to user 1, and setting y as the signal received by user 1 from user 22';
I.e. y received by user 22Has two practical meanings, one is that the demodulated signal is needed by the user 2, and the other is used as a key signal y2', to user 1.
Step four, receiving y by user 1 receiving terminal2' and demodulate and then reconstruct the signal x by amplitude estimation2To y for1Interference cancellation is performed followed by demodulation of x1Then the method is finished;
reconstruction of a signal x2Is of the formula
r=x2*b*α (2)
Where r is the sign of the interference cancellation and α is the signal y1A fading coefficient through the channel;
the method for calculating the fading coefficient alpha comprises the following steps:
user 1 receiving end respectively receives y1And demodulate, to y1The N symbols are sorted from large to small according to absolute values, and the values of the first N/2 symbols are selected to be averaged to obtain alpha.
The invention relates to a safe communication method based on power mixing, which has the following principle: the base station encrypts the symbol x to be encrypted1And an auxiliary symbol x2Mixing the signals according to different powers and transmitting the mixture to a user 1, wherein in the transmission process, if a non-receiving party wants to break the symbol x to be encrypted1Only at the time of learning assistanceSymbol x2Can be carried out on the premise of the following steps; in addition, an auxiliary symbol x2The method selects signals in common civil communication and transmits the signals to a satellite through civil equipment, so that the information is effectively utilized, and the safety in the communication process is improved.
FIG. 2 is a schematic diagram of signal parameter assignment according to the present invention, in which a lightly filled portion represents the symbol x2The deep-filled part represents the symbol x1。y2By carrier wave f2Is sent out, y1By carrier wave f1And sending out. t is t0At the moment, x2Is set to 1, y2=x2. Another signal y1In (1), x2Is set to b, x1Is set to a, y1=ax1+bx2;t1At the moment, x2Is set to 1, y2=x2. Another signal y1In (1), x2Is set to b', x1Is set to a', y1=a'x1+b'x2. Considering that the sign has positive and negative values, y is obtained after power mixing1And y2The total power is less than or equal to 1.
The above description is only a preferred embodiment of the present invention and is not intended to limit the present invention, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (3)

1. A method for secure communication based on power mixing, comprising the steps of:
s1, symbol sequence Z ═ Z1,z2,...,znN is the number of symbols in the sequence, x1=z2k+1For symbols to be encrypted, x2=z2k+2The symbol selected from the signal in civil communication is used as an auxiliary signal, and k is a natural number; the structural expression of the transmission signal is as follows(1) Comprises the following steps:
Figure FDA0003166319010000011
wherein, y1Is a symbol, y, sent from the base station to user 12Is a symbol transmitted from the base station to user 2, user 1 representing military equipment, user 2 representing civilian equipment, y1The two symbols of (2) are allocated different powers x1Is set to alpha, x2Is set to b, a, b are time-varying values, and a + b is 1, a >0, b > 0;
s2, adopting BPSK modulation mode to modulate x1And x2,y2Passing frequency f2To user 2, y1Passing frequency f1Y sent to user 1 and sent to user 11Higher than y sent to user 22Secret class of f2≠f1
S3, the receiving end of user 2 is divided into two paths, one path receives y2And demodulates, the demodulated signal is used by user 2, the other path is y2Forwarded to user 1 as a key signal, user 1 receives a signal y from user 22′;
S4, receiving end y of user 12' and demodulate and then reconstruct x from the amplitude estimates2To y for1Interference cancellation is performed followed by demodulation of x1Then the method is finished;
in step S4, x is reconstructed2Is of the formula
r=x2*b*α
Wherein r is a symbol for interference cancellation, and α is y1A fading coefficient through the channel;
the method for calculating the fading coefficient alpha comprises the following steps:
user 1 receiving end receives y1And demodulate, to y1The N symbols are sorted from large to small according to absolute values, and the values of the first N/2 symbols are selected to be averaged to obtain alpha.
2. The power-mixing-based secure communication method according to claim 1, wherein x in step S11And x2Is determined by the values of the carrier amplitude a and b, and only if x1=x2When y is1Instantaneous power of and y2Are equal.
3. The power-mixing-based secure communication method of claim 1, wherein y received by the user 2 in step S32Has two practical meanings, one is that the demodulated signal is needed by the user 2, and the other is used as a key signal y2And sent to the user 1.
CN201910664396.2A 2019-07-23 2019-07-23 Safe communication method based on power mixing Active CN110213009B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910664396.2A CN110213009B (en) 2019-07-23 2019-07-23 Safe communication method based on power mixing

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910664396.2A CN110213009B (en) 2019-07-23 2019-07-23 Safe communication method based on power mixing

Publications (2)

Publication Number Publication Date
CN110213009A CN110213009A (en) 2019-09-06
CN110213009B true CN110213009B (en) 2021-08-31

Family

ID=67797943

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910664396.2A Active CN110213009B (en) 2019-07-23 2019-07-23 Safe communication method based on power mixing

Country Status (1)

Country Link
CN (1) CN110213009B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101771530A (en) * 2010-01-26 2010-07-07 哈尔滨工业大学 Covert communication method for concealing weighted signal by using common signal sequence
CN104079380A (en) * 2014-07-07 2014-10-01 西安电子科技大学 Distributed type combined information source-channel superposition coding and combined decoding method
CN107276932A (en) * 2017-03-29 2017-10-20 电子科技大学 A kind of method and device of blind source signal separation
CN108989816A (en) * 2018-09-03 2018-12-11 广州海格通信集团股份有限公司 A kind of coded channel information hidden method based on wavelet transformation

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE19961777A1 (en) * 1999-12-21 2001-07-12 Rudolf Bannasch Methods and devices for transmitting information
US7587191B2 (en) * 2005-03-25 2009-09-08 The Mitre Corporation High-quality detection based on sequential interference cancellation techniques
US8891687B1 (en) * 2013-06-26 2014-11-18 Topcon Positioning Systems, Inc. Digital system and method of estimating non-energy parameters of signal carrier
CN103905085B (en) * 2014-03-28 2015-12-02 哈尔滨工程大学 One is burst hybrid spread spectrum underwater sound concealed communication method
CN109412641A (en) * 2018-09-27 2019-03-01 南京凯瑞得信息科技有限公司 A kind of carrier wave superposition multiple access method and system based on Direct Sequence Spread Spectrum
CN109782304B (en) * 2019-01-29 2021-02-09 西安北斗星导航技术有限公司 GNSS deception jamming detection method and system in signal capture stage

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101771530A (en) * 2010-01-26 2010-07-07 哈尔滨工业大学 Covert communication method for concealing weighted signal by using common signal sequence
CN104079380A (en) * 2014-07-07 2014-10-01 西安电子科技大学 Distributed type combined information source-channel superposition coding and combined decoding method
CN107276932A (en) * 2017-03-29 2017-10-20 电子科技大学 A kind of method and device of blind source signal separation
CN108989816A (en) * 2018-09-03 2018-12-11 广州海格通信集团股份有限公司 A kind of coded channel information hidden method based on wavelet transformation

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
一种基于变换域通信系统的卫星隐蔽通信系统;谢铁城 等;《信息与控制》;20141231;第524-528页 *

Also Published As

Publication number Publication date
CN110213009A (en) 2019-09-06

Similar Documents

Publication Publication Date Title
Zhang et al. Anti-jamming message-driven frequency hopping—Part I: System design
US7558191B2 (en) Method of OFDM communication using superposition coding
Xiang et al. Secure transmission for NOMA systems with imperfect SIC
Lemayian et al. A novel small-scale nonorthogonal communication technique using auxiliary signal superposition with enhanced security for future wireless networks
Letafati et al. A new frequency hopping-aided secure communication in the presence of an adversary jammer and an untrusted relay
WO2016169414A1 (en) Multiuser information processing method and apparatus
Xu et al. High-throughput, cyber-secure multiuser superposition covert avionics system
Fu et al. The modulation technology of chaotic multi-tone and its application in covert communication system
CN110909321B (en) Physical layer digital watermarking method for 4G communication
Sadique et al. Uav-aided transceiver design for secure downlink ow-dfts-ofdm system: A multi-user mmwave application
CN112187694B (en) DMRS-based mobile phone terminal signal shielding method and system
CN110213009B (en) Safe communication method based on power mixing
CN110011980B (en) Method and system for positioning legal user and eavesdropping user
Zheng et al. Secure NOMA based cooperative networks with rate-splitting source and full-duplex relay
CN113115305B (en) Interference management and safe transmission method and system based on immune coding
Ma et al. A Secure Communicating While Jamming Approach for End-to-End Multi-Hop Wireless Communication Network
Latif et al. Improving DSSS transmission security using Barker code along binary compliments (CBC12-DSSS)
Xu et al. Achieving secure communication through random phase rotation technique
Cheng et al. Secure spatial modulation based on dynamic multi-parameter WFRFT
Kaittan et al. Implementing and designing a secure information system based on the DSSS gold sequence using MATLAB
Khan et al. Securing Wireless Signals using Artificial Phase Noise
Choi et al. Practical LPI communication with noise-shaped signaling
Zhao et al. Wireless Communication Network Security System Based on Big Data Information Transmission Technology
Liu et al. Demonstrating high security subcarrier shifting chaotic OFDM cognitive radio system using USRP
Anjos et al. A Method Exploiting the Channel-Training Phase to Achieve Secrecy in a Fading Broadcast Channel

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant