• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

一种安全电话通信的原型。

A prototype of secure telephone communication.

作者信息

Lin Lifeng, Zhou Zijian, Jiang Peihe, Liu Sanjun, Wei Lai, Jiao Bingli

机构信息

Shandong Vocational College of Industry, Zibo, 256414, China.

School of Electronics, Peking University, Beijing, 100871, China.

出版信息

Sci Rep. 2025 Jul 28;15(1):27421. doi: 10.1038/s41598-025-12882-y.

DOI:10.1038/s41598-025-12882-y
PMID:40721482
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC12304307/
Abstract

This paper investigates a secure wireline telephone communication system that implements physical layer security (PLS) through artificial noise (AN) injection. The PLS-based telephone system strategically superimposes AN onto transmitted signals to prevent potential eavesdropping attempts along the twisted-pair line while enabling clean signal recovery at legitimate receivers through coordinated AN cancellation. Experimental results demonstrate its effectiveness against wiretapping, with implemented prototype circuits confirming the practical feasibility of our AN-based security approach while maintaining communication quality.

摘要

本文研究了一种通过注入人工噪声(AN)来实现物理层安全(PLS)的安全有线电话通信系统。基于PLS的电话系统策略性地将AN叠加到传输信号上,以防止沿双绞线线路的潜在窃听企图,同时通过协调的AN消除使合法接收端能够进行干净的信号恢复。实验结果证明了其对窃听的有效性,所实现的原型电路证实了我们基于AN的安全方法在保持通信质量的同时具有实际可行性。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3c1b/12304307/3928bdf7b639/41598_2025_12882_Fig7_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3c1b/12304307/1408bc87db35/41598_2025_12882_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3c1b/12304307/85c63bec7cd0/41598_2025_12882_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3c1b/12304307/55a54d08d290/41598_2025_12882_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3c1b/12304307/05d06887a37e/41598_2025_12882_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3c1b/12304307/5aacad54642a/41598_2025_12882_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3c1b/12304307/e06625bb77ca/41598_2025_12882_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3c1b/12304307/3928bdf7b639/41598_2025_12882_Fig7_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3c1b/12304307/1408bc87db35/41598_2025_12882_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3c1b/12304307/85c63bec7cd0/41598_2025_12882_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3c1b/12304307/55a54d08d290/41598_2025_12882_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3c1b/12304307/05d06887a37e/41598_2025_12882_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3c1b/12304307/5aacad54642a/41598_2025_12882_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3c1b/12304307/e06625bb77ca/41598_2025_12882_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3c1b/12304307/3928bdf7b639/41598_2025_12882_Fig7_HTML.jpg

相似文献

1
A prototype of secure telephone communication.一种安全电话通信的原型。
Sci Rep. 2025 Jul 28;15(1):27421. doi: 10.1038/s41598-025-12882-y.
2
Chaotic information metasurface for direct physical-layer secure communication.用于直接物理层安全通信的混沌信息超表面
Nat Commun. 2025 Jul 1;16(1):5853. doi: 10.1038/s41467-025-60725-1.
3
Designing A Blockchain-Empowered Telehealth Artifact for Decentralized Identity Management and Trustworthy Communication: Interdisciplinary Approach.设计一个基于区块链的远程医疗工具,用于去中心化身份管理和可信通信:跨学科方法。
J Med Internet Res. 2024 Sep 25;26:e46556. doi: 10.2196/46556.
4
A dual layer secure and energy-efficient model for border surveillance using sea lion inspired strategy in wireless sensor networks.一种在无线传感器网络中使用受海狮启发的策略进行边界监测的双层安全且节能模型。
Sci Rep. 2025 Jul 10;15(1):24974. doi: 10.1038/s41598-025-07999-z.
5
Accreditation through the eyes of nurse managers: an infinite staircase or a phenomenon that evaporates like water.护士长眼中的认证:是无尽的阶梯还是如流水般消逝的现象。
J Health Organ Manag. 2025 Jun 30. doi: 10.1108/JHOM-01-2025-0029.
6
Programmable DNA Hairpin Locker: Dual-Layer Encrypted Carrier Communication.可编程DNA发夹锁:双层加密载体通信
ACS Nano. 2025 Jul 15;19(27):24763-24772. doi: 10.1021/acsnano.5c01802. Epub 2025 Jul 4.
7
Intelligent reflecting surface backscatter-enabled physical layer security enhancement deep reinforcement learning.基于智能反射面反向散射的物理层安全增强深度强化学习
PeerJ Comput Sci. 2025 Jun 9;11:e2902. doi: 10.7717/peerj-cs.2902. eCollection 2025.
8
Hybrid closed-loop systems for managing blood glucose levels in type 1 diabetes: a systematic review and economic modelling.用于管理1型糖尿病患者血糖水平的混合闭环系统:系统评价与经济建模
Health Technol Assess. 2024 Dec;28(80):1-190. doi: 10.3310/JYPL3536.
9
Networked Behaviors Associated With a Large-Scale Secure Messaging Network: Cross-Sectional Secondary Data Analysis.与大规模安全消息网络相关的网络行为:横断面二次数据分析
JMIR Med Inform. 2025 Jul 10;13:e66544. doi: 10.2196/66544.
10
Interventions targeted at women to encourage the uptake of cervical screening.针对女性的干预措施,以鼓励她们接受宫颈癌筛查。
Cochrane Database Syst Rev. 2021 Sep 6;9(9):CD002834. doi: 10.1002/14651858.CD002834.pub3.

本文引用的文献

1
Wireless physical layer security.无线物理层安全
Proc Natl Acad Sci U S A. 2017 Jan 3;114(1):19-26. doi: 10.1073/pnas.1618130114. Epub 2016 Dec 27.