Chinese Journal on Internet of Things ›› 2019, Vol. 3 ›› Issue (2): 72-79.doi: 10.11959/j.issn.2096-3750.2019.00100
• Theory and Technology • Previous Articles Next Articles
Rui CHEN1,Zan LI1,2,Jia SHI1,Lei GUAN1
Revised:
2018-10-29
Online:
2019-06-30
Published:
2019-07-17
Supported by:
CLC Number:
Rui CHEN,Zan LI,Jia SHI,Lei GUAN. Research on high security G function algorithm[J]. Chinese Journal on Internet of Things, 2019, 3(2): 72-79.
[1] | LI J , CHENG Q , ZHANG X X ,et al. Secure beamforming design for SWIPT in cooperative D2D communications[J]. China Communications, 2017,14(1): 20-33. |
[2] | SUN G C , HAN Z , JIAO J B ,et al. Physical layer security in MIMO wiretap channels with antenna correlation[J]. China Communications, 2017,14(8): 149-156. |
[3] | HANNON M , FENG S , KWON H ,et al. Jamming statistics dependent frequency hopping[C]// IEEE Military Communications Conference. IEEE, 2016: 138-143. |
[4] | LI Z , CHANG Y L , JIN L J ,et al. Analysis of FHMA performance on block cipher based frequency-hopping sequences[J]. IEEE Communication Letter, 2004,8(7): 434-436. |
[5] | WANG D Y , ZHANG N , LI Z ,et al. Leveraging high order cumulants for spectrum sensing and power recognition in cognitive radio networks[J]. IEEE Transactions on Wireless Communications, 2018,17(2): 1298-1310. |
[6] | HERRICK D L , LEE P K . Chess a new reliable high speed HF radio[C]// IEEE Military Communications Conference. IEEE, 1996: 684-690. |
[7] | HERRICK D L , LEE P K , LEDLOW L L . Correlated frequency hopping—an improved approach to HF spread spectrum communications[C]// Tactical Communications Conference. IEEE, 1996: 319-324. |
[8] | DONG B H , TANG P , DU Y ,et al. Performance of a compressed spectrum differential frequency hopping signal over Rician fading channel[J]. Journal of Electronics and Information Technology, 2015,37(4): 836-840. |
[9] | ZHU W , YI B S , GAN L C ,et al. Anti-jamming performance of fountain coded differential frequency hopping systems in AWGN[J]. China Communications, 2014,11(14): 53-60. |
[10] | CHEN Z , SONG Y , DONG B H . Performance of a compressed spectrum differential frequency hopping system over Rayleigh fading channels[C]// IEEE Military Communications Conference. IEEE, 2013: 781-785. |
[11] | CHEN Y , ZHAO H S . Study of DFH G function algorithm used for DFH systems[J]. Journal on Communications, 2006,27(10): 100-105. |
[12] | YANG Y L , HE Z W , KUANG J M . Research on the transition function of differential frequency hopping[J]. Journal on Communications, 2002,23(4): 103-108. |
[13] | ZHOU Z , LI S , CHENG Y . Designing frequency transition function of differential frequency hopping system[C]// International Conference on Communications and Mobile Computing. IEEE, 2010: 296-300. |
[14] | GAN L C , WU S Y . A kind of shortwave frequency hopping code based on DFH transform function[J]. Journal of Electronics and Information Technology, 2005,27(2): 218-220. |
[15] | ZHU W , YI B S , GAN L C . Performance research of fountain-DFH concatenated coding systems over AWGN with partial-band noise jamming[J]. Systems Engineering and Electronics, 2016,38(3): 665-671. |
[16] | BAO Z Q , WANG B , GAO F . A new differential frequency hopping scheme based on encryption algorithm[J]. Study on Optical Communications, 2017,202(4): 74-78. |
[17] | CHENG L , ZHOU J R . Differential frequency hopping G function algorithm based on advanced encryption standard[J]. Ship Electronic Engineering, 2008,28(6): 107-109. |
[18] | YI D J , YANG Q L . Study of DFH frequency transition function based on the principle of affine cipher[J]. Journal of Air Force Engineering University, 2005,6(3): 50-52. |
[19] | LIANG F L , LUO W X , ZHANG S L . Differential frequency hopping G function algorithm based on reversible integer hash function[J]. Transactions of Beijing Institute of Technology, 2004,24(3): 254-257. |
[20] | GUAN L , LI Z , SI J B ,et al. Generation and characteristics analysis of cognitive-based high performance wide-gap FH sequences[J]. IEEE Transactions on Vehicular Technology, 2015,64(11): 5056-5069. |
[21] | SCHNEIER B . Applied cryptography:protocols,algorithms and source code in C[M]. USA: WileyPress, 1996. |
[22] | RIVEST A , ADLEMAN L . A method for obtaining digital signatures and public-key cryptosystems[J]. Communications of the ACM, 1978,21(2): 120-126. |
[23] | LEHMANN L E , ROMANO J P . Testing statistical hypotheses[M]. Germany: Springer-VerlagPress, 2005. |
[24] | WALD A , WOLFOWITZ J . On a test whether two samples are from the same population[J]. The Annals of Mathematical Statistics, 1940,11(2): 147-162. |
[25] | LEMPEL A , ZIV J . On the complexity of finite sequences[J]. IEEE Transactions on Information Theory, 1976,22(1): 75-81. |
[1] | Lin HU, Jiabing FAN, Hong WEN, Jie TANG, Qianbin CHEN. Interference alignment based secure transmission scheme in multi-user interference networks [J]. Chinese Journal on Internet of Things, 2023, 7(2): 98-108. |
[2] | Ya YU, Yusun FU. Research on trust measurement method for initial access of industrial internet edge terminals [J]. Chinese Journal on Internet of Things, 2022, 6(4): 149-157. |
[3] | Weijin JIANG, Tiantian LUO, Ying YANG, En LI, Wenying ZHOU. Private data access control model based on block chain technology in the internet of things environment [J]. Chinese Journal on Internet of Things, 2022, 6(4): 169-182. |
[4] | Yangqun LI, Dengyin ZHANG. Research and application of Web of things resource management framework [J]. Chinese Journal on Internet of Things, 2022, 6(2): 50-64. |
[5] | Wei WANG, Renqian GU, Li3 PENG, Jijun ZHAO, Zhongcheng WEI, Cunxi CHANG. Robust optimization of air based relay for internet of things based on UAV [J]. Chinese Journal on Internet of Things, 2022, 6(1): 101-112. |
[6] | Yu JIANG, Siqing CHEN, Wen SUN. Research on LoRa network security schemes based on RF fingerprint [J]. Chinese Journal on Internet of Things, 2021, 5(4): 17-25. |
[7] | Manzhu WANG, Ziqi LI, Yifei CHEN, Gaofeng HONG, Wei SU. Research and implementation of safety authentication technology in Internet of vehicles [J]. Chinese Journal on Internet of Things, 2021, 5(3): 106-114. |
[8] | Meng LI,Chengxiang SI,Liehuang ZHU. Secure vehicular digital forensics system based on blockchain [J]. Chinese Journal on Internet of Things, 2020, 4(2): 49-57. |
[9] | Shipeng CHEN,Bin CHEN,Mingjun DAI,Hui WANG. Blockchain-based IoT architecture [J]. Chinese Journal on Internet of Things, 2020, 4(2): 78-83. |
[10] | Yijie XUN,Jiajia LIU,Jing ZHAO. Research on security threat of intelligent connected vehicle [J]. Chinese Journal on Internet of Things, 2019, 3(4): 72-81. |
[11] | Yangzhao LI,Changxiang SHEN,Nan TIAN. Guiding the security protection of critical information infrastructure with scientific network security concept [J]. Chinese Journal on Internet of Things, 2019, 3(3): 1-4. |
[12] | Hongyi ZHU,Xiaoyuan LU,Yi LI. Research on distributed multi-access edge computing based on mimic defense theory [J]. Chinese Journal on Internet of Things, 2019, 3(3): 76-83. |
[13] | Qiuping ZHANG,Xizao WANG,Siyuan SHEN,Shiyu ZHANG,Lei BU,Xuandong LI. Automated configuration,simulation and verification platform for event-driven home automation IoT system [J]. Chinese Journal on Internet of Things, 2019, 3(3): 90-101. |
[14] | Yong WANG,Mu ZHOU,Zengshan TIAN,Jinjun WU. Secure communication approach for Internet of things based on C-RAN fronthaul compression [J]. Chinese Journal on Internet of Things, 2018, 2(3): 51-60. |
[15] | Guangnan NI. Security of the industrial Internet of things and localization of the core technology [J]. Chinese Journal on Internet of Things, 2018, 2(2): 1-7. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|