CGAN BeiDou Satellite Short-Message-Encryption Scheme Using Ship PVT
نویسندگان
چکیده
The transmission standard and format of short-message communication in the BeiDou satellite-navigation-system are open, civilian channel adopts a direct-transmission plaintext mechanism, content short messages is at risk data leaks. Aiming addressing problem safely transmitting messages, this study proposes CGAN satellite short-message-encryption scheme, using ship PVT (position, speed, time). Various commands with position, or time employed as input. two communicating parties use (conditional generative adversarial network) confrontation mechanism to encrypt decrypt ship-PVT information generate symmetrically encrypted key, while receiver parses only sender within specified PVT-range. Additionally, because system has positioning error delay, considering mobility, concept dynamic tolerance region introduced receiver, improve scheme’s decryption success-rate. Finally, proposed scheme verified, simulation experiments. algorithm achieves good security, acceptable efficiency. Furthermore, experimental platform built by used prove feasibility applied encryption decryption.
منابع مشابه
The BeiDou Navigation Message
The article provides an overview of the BeiDou navigation message contents and highlights its specific communalities and differences with respect to other GNSS constellations. Making use of data collected by multi-GNSS monitoring stations of the MGEX and CONGO networks, the quality of BeiDou broadcast ephemerides is assessed through the analysis of satellite laser ranging measurements, comparis...
متن کاملA new convertible authenticated encryption scheme with message linkages
In this article, we present an authenticated encryption scheme with message linkages used to deliver a large message. To protect the receiver’s benefit, the receiver can easily convert the signature into an ordinary one that can be verified by anyone. Several feasible attacks will be discussed, and the security analysis will prove that none of them can successfully break the proposed scheme. 20...
متن کاملA Secure and Efficient Convertible Authenticated Encryption Scheme with Message Linkages Using Elliptic Curve Cryptosystem
A convertible authenticated encryption scheme is very useful for transmitting a confidential message in insecure communication networks. This paper proposes a convertible authenticated encryption scheme with message linkages for message flows using Elliptic Curve Cryptography (ECC). The proposed scheme has the following advantages. (1) It can provide non-repudiation when the signer repudiates h...
متن کاملAn Enhanced Static Data Compression Scheme Of Bengali Short Message
This paper concerns a modified approach of compressing Short Bengali Text Message for small devices. The prime objective of this research technique is to establish a lowcomplexity compression scheme suitable for small devices having small memory and relatively lower processing speed. The basic aim is not to compress text of any size up to its maximum level without having any constraint on space...
متن کاملA Searchable Symmetric Encryption Scheme using BlockChain
At present, the cloud storage used in searchable symmetric encryption schemes (SSE) is provided in a private way, which cannot be seen as a true cloud. Moreover, the cloud server is thought to be credible, because it always returns the search result to the user, even they are not correct. In order to really resist this malicious adversary and accelerate the usage of the data, it is necessary to...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Remote Sensing
سال: 2022
ISSN: ['2072-4292']
DOI: https://doi.org/10.3390/rs15010171