CGAN BeiDou Satellite Short-Message-Encryption Scheme Using Ship PVT

نویسندگان

چکیده

The transmission standard and format of short-message communication in the BeiDou satellite-navigation-system are open, civilian channel adopts a direct-transmission plaintext mechanism, content short messages is at risk data leaks. Aiming addressing problem safely transmitting messages, this study proposes CGAN satellite short-message-encryption scheme, using ship PVT (position, speed, time). Various commands with position, or time employed as input. two communicating parties use (conditional generative adversarial network) confrontation mechanism to encrypt decrypt ship-PVT information generate symmetrically encrypted key, while receiver parses only sender within specified PVT-range. Additionally, because system has positioning error delay, considering mobility, concept dynamic tolerance region introduced receiver, improve scheme’s decryption success-rate. Finally, proposed scheme verified, simulation experiments. algorithm achieves good security, acceptable efficiency. Furthermore, experimental platform built by used prove feasibility applied encryption decryption.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The BeiDou Navigation Message

The article provides an overview of the BeiDou navigation message contents and highlights its specific communalities and differences with respect to other GNSS constellations. Making use of data collected by multi-GNSS monitoring stations of the MGEX and CONGO networks, the quality of BeiDou broadcast ephemerides is assessed through the analysis of satellite laser ranging measurements, comparis...

متن کامل

A new convertible authenticated encryption scheme with message linkages

In this article, we present an authenticated encryption scheme with message linkages used to deliver a large message. To protect the receiver’s benefit, the receiver can easily convert the signature into an ordinary one that can be verified by anyone. Several feasible attacks will be discussed, and the security analysis will prove that none of them can successfully break the proposed scheme. 20...

متن کامل

A Secure and Efficient Convertible Authenticated Encryption Scheme with Message Linkages Using Elliptic Curve Cryptosystem

A convertible authenticated encryption scheme is very useful for transmitting a confidential message in insecure communication networks. This paper proposes a convertible authenticated encryption scheme with message linkages for message flows using Elliptic Curve Cryptography (ECC). The proposed scheme has the following advantages. (1) It can provide non-repudiation when the signer repudiates h...

متن کامل

An Enhanced Static Data Compression Scheme Of Bengali Short Message

This paper concerns a modified approach of compressing Short Bengali Text Message for small devices. The prime objective of this research technique is to establish a lowcomplexity compression scheme suitable for small devices having small memory and relatively lower processing speed. The basic aim is not to compress text of any size up to its maximum level without having any constraint on space...

متن کامل

A Searchable Symmetric Encryption Scheme using BlockChain

At present, the cloud storage used in searchable symmetric encryption schemes (SSE) is provided in a private way, which cannot be seen as a true cloud. Moreover, the cloud server is thought to be credible, because it always returns the search result to the user, even they are not correct. In order to really resist this malicious adversary and accelerate the usage of the data, it is necessary to...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Remote Sensing

سال: 2022

ISSN: ['2072-4292']

DOI: https://doi.org/10.3390/rs15010171