• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

基于极化码和从无线信道特性生成的密钥的加密编码技术,用于无线通信系统。

Crypto-coding technique based on polar code and secret key generated from wireless channel characteristics for wireless communication systems.

作者信息

Van Linh Dinh, Van Yem Vu, Thi Phuong Thao Hoang

机构信息

Hanoi University of Science and Technology, Hanoi, Vietnam.

Academy of Cryptography Techniques, Hanoi, Vietnam.

出版信息

PLoS One. 2025 Feb 25;20(2):e0318110. doi: 10.1371/journal.pone.0318110. eCollection 2025.

DOI:10.1371/journal.pone.0318110
PMID:39999197
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC12072636/
Abstract

The crypto-coding technique is essential for modern digital wireless communications systems, allowing data encryption and channel coding to be performed in only one step without requiring additional hardware. This work proposes a crypto-coding technique combining polar codes with a secret key, which is derived from wireless channel characteristics, to boost the security and reliability characteristics of the systems. The secret key is divided into two parts, one is assigned to the frozen bits, and the other is XORed with the information bits. A simulation with different key lengths and code lengths is carried out in Additive white Gaussian noise (AWGN) that helps us to evaluate this technique by the error correction and security performance, computational complexity. The key benefit is that it achieves the same bit error rate (BER) performance and computational complexity as traditional polar codes and existing methods despite only taking one step. Meanwhile, it ensures completely degraded decoding effectiveness at eavesdroppers, thus it is effective against passive eavesdropping attacks. Furthermore, this method does not require additional hardware overhead for key management and distribution.

摘要

加密编码技术对于现代数字无线通信系统至关重要,它允许在仅一步操作中执行数据加密和信道编码,而无需额外的硬件。这项工作提出了一种将极化码与从无线信道特性导出的秘密密钥相结合的加密编码技术,以提高系统的安全性和可靠性。秘密密钥分为两部分,一部分分配给冻结比特,另一部分与信息比特进行异或运算。在加性高斯白噪声(AWGN)中进行了不同密钥长度和码长的仿真,这有助于我们通过纠错和安全性能、计算复杂度来评估该技术。关键优势在于,尽管只进行一步操作,但它实现了与传统极化码和现有方法相同的误码率(BER)性能和计算复杂度。同时,它确保在窃听者处解码有效性完全降低,因此对被动窃听攻击有效。此外,该方法在密钥管理和分发方面不需要额外的硬件开销。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d962/12072636/a5100690c0f3/pone.0318110.g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d962/12072636/9ae6cff25be6/pone.0318110.g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d962/12072636/0062efd2878c/pone.0318110.g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d962/12072636/4341c2c6714e/pone.0318110.g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d962/12072636/c931a578d47a/pone.0318110.g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d962/12072636/236486f2ddd6/pone.0318110.g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d962/12072636/f3e37561c86f/pone.0318110.g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d962/12072636/3264ff506187/pone.0318110.g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d962/12072636/1599afbf104a/pone.0318110.g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d962/12072636/9e54ef4639f1/pone.0318110.g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d962/12072636/a3480f3e6e8d/pone.0318110.g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d962/12072636/a5100690c0f3/pone.0318110.g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d962/12072636/9ae6cff25be6/pone.0318110.g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d962/12072636/0062efd2878c/pone.0318110.g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d962/12072636/4341c2c6714e/pone.0318110.g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d962/12072636/c931a578d47a/pone.0318110.g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d962/12072636/236486f2ddd6/pone.0318110.g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d962/12072636/f3e37561c86f/pone.0318110.g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d962/12072636/3264ff506187/pone.0318110.g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d962/12072636/1599afbf104a/pone.0318110.g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d962/12072636/9e54ef4639f1/pone.0318110.g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d962/12072636/a3480f3e6e8d/pone.0318110.g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d962/12072636/a5100690c0f3/pone.0318110.g011.jpg

相似文献

1
Crypto-coding technique based on polar code and secret key generated from wireless channel characteristics for wireless communication systems.基于极化码和从无线信道特性生成的密钥的加密编码技术,用于无线通信系统。
PLoS One. 2025 Feb 25;20(2):e0318110. doi: 10.1371/journal.pone.0318110. eCollection 2025.
2
Analog hardware trojan design and detection in OFDM based wireless cryptographic ICs.基于 OFDM 的无线加密 IC 中的模拟硬件木马设计与检测。
PLoS One. 2021 Jul 29;16(7):e0254903. doi: 10.1371/journal.pone.0254903. eCollection 2021.
3
Multiuser communication scheme based on binary phase-shift keying and chaos for telemedicine.基于二进制相移键控和混沌的远程医疗多用户通信方案。
Comput Methods Programs Biomed. 2018 Aug;162:165-175. doi: 10.1016/j.cmpb.2018.05.021. Epub 2018 May 17.
4
A multihop key agreement scheme for wireless ad hoc networks based on channel characteristics.一种基于信道特性的无线自组织网络多跳密钥协商方案。
ScientificWorldJournal. 2013 May 20;2013:935604. doi: 10.1155/2013/935604. Print 2013.
5
Cooperative MIMO communication at wireless sensor network: an error correcting code approach.无线传感器网络中的协作 MIMO 通信:一种纠错码方法。
Sensors (Basel). 2011;11(10):9887-903. doi: 10.3390/s111009887. Epub 2011 Oct 20.
6
Location-aware dynamic session-key management for grid-based Wireless Sensor Networks.基于网格的无线传感器网络中的位置感知动态会话密钥管理。
Sensors (Basel). 2010;10(8):7347-70. doi: 10.3390/s100807347. Epub 2010 Aug 4.
7
Enhancement of the performance of wireless sensor networks using the multihop multiantenna power beacon path selection method in intelligent structures.利用多跳多天线功率信标路径选择方法增强智能结构中的无线传感器网络性能。
PLoS One. 2022 Nov 7;17(11):e0276940. doi: 10.1371/journal.pone.0276940. eCollection 2022.
8
Secure Data Aggregation with Fully Homomorphic Encryption in Large-Scale Wireless Sensor Networks.大规模无线传感器网络中基于全同态加密的安全数据聚合
Sensors (Basel). 2015 Jul 3;15(7):15952-73. doi: 10.3390/s150715952.
9
How to Construct Polar Codes for Ring-LWE-Based Public Key Encryption.如何为基于环学习错误(Ring-LWE)的公钥加密构造极化码
Entropy (Basel). 2021 Jul 23;23(8):938. doi: 10.3390/e23080938.
10
Machine Learning for Wireless Sensor Networks Security: An Overview of Challenges and Issues.机器学习在无线传感器网络安全中的应用:挑战与问题概述。
Sensors (Basel). 2022 Jun 23;22(13):4730. doi: 10.3390/s22134730.

本文引用的文献

1
Cryptographic Algorithms with Data Shorter than the Encryption Key, Based on LZW and Huffman Coding.基于LZW和哈夫曼编码的加密密钥短于数据的加密算法。
Sensors (Basel). 2023 Aug 25;23(17):7408. doi: 10.3390/s23177408.
2
Security- and Reliability-Guaranteed Transmission Control of Time-Sensitive Physical Layer Security Systems.具有安全和可靠性保证的时敏物理层安全系统的传输控制
Entropy (Basel). 2023 Jul 11;25(7):1040. doi: 10.3390/e25071040.
3
The large key space image encryption algorithm based on modulus synchronization between real and complex fractional-order dynamical systems.
基于实分数阶与复分数阶动力系统模同步的大密钥空间图像加密算法。
Multimed Tools Appl. 2023;82(12):17801-17825. doi: 10.1007/s11042-022-14074-6. Epub 2022 Oct 18.
4
One-time pad scheme based on polar code and OFDM for MMW-RoF system at W-band.基于极化码和正交频分复用的W波段毫米波-射频光纤系统一次性填充方案
Opt Express. 2022 Jan 31;30(3):4412-4423. doi: 10.1364/OE.450878.