scholarly journals Multistage Synchronous Secure Communication Method

2018 ◽  
Vol 1087 ◽  
pp. 032011
Author(s):  
Wei Sun ◽  
Jun He ◽  
Lei Quan
2016 ◽  
Vol 62 (1) ◽  
pp. 7-13 ◽  
Author(s):  
Grzegorz J. Blinowski

Abstract Visible light communication (VLC) has been recently proposed as an alternative standard to radio-based wireless networks. Originally developed as a physical media for PANs (Personal area Networks) it evolved into universal WLAN technology with a capability to transport internet suite of network and application level protocols. Because of its physical characteristics, and in line with the slogan "what you see is what you send", VLC is considered a secure communication method. In this work we focus on security aspects of VLC communication, starting from basic physical characteristics of the communication channel. We analyze the risks of signal jamming, data snooping and data modification. We also discuss MAC-level security mechanisms as defined in the IEEE 802.15.7 standard. This paper is an extension of work originally reported in Proceedings of the 13th IFAC and IEEE Conference on Programmable Devices and Embedded Systems - PDES 2015


2019 ◽  
Vol 2019 ◽  
pp. 1-12
Author(s):  
Fang Liu

In this study, to solve the hidden limitation of conventional weighted fractional Fourier transform (WFRFT), a random modulation order parameter pool is established by applying chaos technology. Further, a WFRFT secure communication method based on the chaotic parameter pool (CPP) is proposed. Based on the effective characteristics of tent mapping and the sequence output range, the parameter pool constructor is established by parameter transformation. Furthermore, for each parameter selection period, the information can be processed by WFRFT using different modulation orders. The modeling and simulation demonstrate that this method can significantly increase the bit error rate and processing time of unauthorized receivers. This indicates that it can greatly increase the scanning difficulty of unauthorized users and improve the concealment and security of the original information transmission.


Sign in / Sign up

Export Citation Format

Share Document