Research on high security G function algorithm

The differential frequency hopping (DFH) overcomes the limitation of frequency hopping and improves the ability to resist tracking interference.The G function determines the DFH sequence and directly affects the performance of DFH communication systems.However,with the complication of wireless commu...

Full description

Saved in:
Bibliographic Details
Main Authors: Rui CHEN, Zan LI, Jia SHI, Lei GUAN
Format: Article
Language:zho
Published: China InfoCom Media Group 2019-06-01
Series:物联网学报
Subjects:
Online Access:http://www.wlwxb.com.cn/zh/article/doi/10.11959/j.issn.2096-3750.2019.00100/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1850091108594352128
author Rui CHEN
Zan LI
Jia SHI
Lei GUAN
author_facet Rui CHEN
Zan LI
Jia SHI
Lei GUAN
author_sort Rui CHEN
collection DOAJ
description The differential frequency hopping (DFH) overcomes the limitation of frequency hopping and improves the ability to resist tracking interference.The G function determines the DFH sequence and directly affects the performance of DFH communication systems.However,with the complication of wireless communication system such as large capacity DFH network,which poses huge challenges to the use of the number theory based and chaos theory assisted sequence.As a result,in order to improve the security of the system,the novel G function construction was proposed with the aid of hybrid encryption algorithm and the security of hybrid algorithm was analyzed.Moreover,the equivalence principle of G function algorithm and the encryption algorithm was proved.The simulation results show that the DFH sequence generated by the new G function has excellent performance and the performance of the DFH systems is improved greatly.
format Article
id doaj-art-8e7be195f4aa44448b1e61330be7486b
institution DOAJ
issn 2096-3750
language zho
publishDate 2019-06-01
publisher China InfoCom Media Group
record_format Article
series 物联网学报
spelling doaj-art-8e7be195f4aa44448b1e61330be7486b2025-08-20T02:42:27ZzhoChina InfoCom Media Group物联网学报2096-37502019-06-013727959644558Research on high security G function algorithmRui CHENZan LIJia SHILei GUANThe differential frequency hopping (DFH) overcomes the limitation of frequency hopping and improves the ability to resist tracking interference.The G function determines the DFH sequence and directly affects the performance of DFH communication systems.However,with the complication of wireless communication system such as large capacity DFH network,which poses huge challenges to the use of the number theory based and chaos theory assisted sequence.As a result,in order to improve the security of the system,the novel G function construction was proposed with the aid of hybrid encryption algorithm and the security of hybrid algorithm was analyzed.Moreover,the equivalence principle of G function algorithm and the encryption algorithm was proved.The simulation results show that the DFH sequence generated by the new G function has excellent performance and the performance of the DFH systems is improved greatly.http://www.wlwxb.com.cn/zh/article/doi/10.11959/j.issn.2096-3750.2019.00100/differential frequency-hopping sequencecryptographic algorithmsecurityrandomnesscomplexity
spellingShingle Rui CHEN
Zan LI
Jia SHI
Lei GUAN
Research on high security G function algorithm
物联网学报
differential frequency-hopping sequence
cryptographic algorithm
security
randomness
complexity
title Research on high security G function algorithm
title_full Research on high security G function algorithm
title_fullStr Research on high security G function algorithm
title_full_unstemmed Research on high security G function algorithm
title_short Research on high security G function algorithm
title_sort research on high security g function algorithm
topic differential frequency-hopping sequence
cryptographic algorithm
security
randomness
complexity
url http://www.wlwxb.com.cn/zh/article/doi/10.11959/j.issn.2096-3750.2019.00100/
work_keys_str_mv AT ruichen researchonhighsecuritygfunctionalgorithm
AT zanli researchonhighsecuritygfunctionalgorithm
AT jiashi researchonhighsecuritygfunctionalgorithm
AT leiguan researchonhighsecuritygfunctionalgorithm