Research on high security G function algorithm
The differential frequency hopping (DFH) overcomes the limitation of frequency hopping and improves the ability to resist tracking interference.The G function determines the DFH sequence and directly affects the performance of DFH communication systems.However,with the complication of wireless commu...
Saved in:
| Main Authors: | , , , |
|---|---|
| Format: | Article |
| Language: | zho |
| Published: |
China InfoCom Media Group
2019-06-01
|
| Series: | 物联网学报 |
| Subjects: | |
| Online Access: | http://www.wlwxb.com.cn/zh/article/doi/10.11959/j.issn.2096-3750.2019.00100/ |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1850091108594352128 |
|---|---|
| author | Rui CHEN Zan LI Jia SHI Lei GUAN |
| author_facet | Rui CHEN Zan LI Jia SHI Lei GUAN |
| author_sort | Rui CHEN |
| collection | DOAJ |
| description | The differential frequency hopping (DFH) overcomes the limitation of frequency hopping and improves the ability to resist tracking interference.The G function determines the DFH sequence and directly affects the performance of DFH communication systems.However,with the complication of wireless communication system such as large capacity DFH network,which poses huge challenges to the use of the number theory based and chaos theory assisted sequence.As a result,in order to improve the security of the system,the novel G function construction was proposed with the aid of hybrid encryption algorithm and the security of hybrid algorithm was analyzed.Moreover,the equivalence principle of G function algorithm and the encryption algorithm was proved.The simulation results show that the DFH sequence generated by the new G function has excellent performance and the performance of the DFH systems is improved greatly. |
| format | Article |
| id | doaj-art-8e7be195f4aa44448b1e61330be7486b |
| institution | DOAJ |
| issn | 2096-3750 |
| language | zho |
| publishDate | 2019-06-01 |
| publisher | China InfoCom Media Group |
| record_format | Article |
| series | 物联网学报 |
| spelling | doaj-art-8e7be195f4aa44448b1e61330be7486b2025-08-20T02:42:27ZzhoChina InfoCom Media Group物联网学报2096-37502019-06-013727959644558Research on high security G function algorithmRui CHENZan LIJia SHILei GUANThe differential frequency hopping (DFH) overcomes the limitation of frequency hopping and improves the ability to resist tracking interference.The G function determines the DFH sequence and directly affects the performance of DFH communication systems.However,with the complication of wireless communication system such as large capacity DFH network,which poses huge challenges to the use of the number theory based and chaos theory assisted sequence.As a result,in order to improve the security of the system,the novel G function construction was proposed with the aid of hybrid encryption algorithm and the security of hybrid algorithm was analyzed.Moreover,the equivalence principle of G function algorithm and the encryption algorithm was proved.The simulation results show that the DFH sequence generated by the new G function has excellent performance and the performance of the DFH systems is improved greatly.http://www.wlwxb.com.cn/zh/article/doi/10.11959/j.issn.2096-3750.2019.00100/differential frequency-hopping sequencecryptographic algorithmsecurityrandomnesscomplexity |
| spellingShingle | Rui CHEN Zan LI Jia SHI Lei GUAN Research on high security G function algorithm 物联网学报 differential frequency-hopping sequence cryptographic algorithm security randomness complexity |
| title | Research on high security G function algorithm |
| title_full | Research on high security G function algorithm |
| title_fullStr | Research on high security G function algorithm |
| title_full_unstemmed | Research on high security G function algorithm |
| title_short | Research on high security G function algorithm |
| title_sort | research on high security g function algorithm |
| topic | differential frequency-hopping sequence cryptographic algorithm security randomness complexity |
| url | http://www.wlwxb.com.cn/zh/article/doi/10.11959/j.issn.2096-3750.2019.00100/ |
| work_keys_str_mv | AT ruichen researchonhighsecuritygfunctionalgorithm AT zanli researchonhighsecuritygfunctionalgorithm AT jiashi researchonhighsecuritygfunctionalgorithm AT leiguan researchonhighsecuritygfunctionalgorithm |