|Table of Contents|

[1] Shen Fei, Song Tiecheng, Ye Zhihui, Liu Tong, et al. Novel method of enhancing the key amount for FH systems [J]. Journal of Southeast University (English Edition), 2004, 20 (4): 412-417. [doi:10.3969/j.issn.1003-7985.2004.04.004]
Copy

Novel method of enhancing the key amount for FH systems()
Share:

Journal of Southeast University (English Edition)[ISSN:1003-7985/CN:32-1325/N]

Volumn:
20
Issue:
2004 4
Page:
412-417
Research Field:
Information and Communication Engineering
Publishing date:
2004-12-30

Info

Title:
Novel method of enhancing the key amount for FH systems
Author(s):
Shen Fei Song Tiecheng Ye Zhihui Liu Tong Xia Weiwei
National Mobile Communications Research Laboratory, Southeast University, Nanjing 210096, China
Keywords:
frequency-hopping system key amount security of information unequal-interval carriers frequency-shift filter
PACS:
TN914;TN925
DOI:
10.3969/j.issn.1003-7985.2004.04.004
Abstract:
Based on the principle of information theory, a novel scheme of unequal-interval frequency-hopping(FH)systems is proposed. For cases of spectrum overlapping systems and non-overlapping systems, the implementation methods are presented and the security performances are discussed theoretically. Firstly, the definitions of absolute and relative key amounts of FH systems, equal-interval and unequal-interval FH systems are given. Then, the absolute key amount and relative key amount are analyzed for equal-interval and unequal-interval FH systems. The results indicate that the absolute key amount has become the key point in improving the security and secrecy of FH systems, especially in today’s epoch of highly developed computer science and IC design technology. Theoretical analysis and practical examples show that the absolute key amount of unequal-interval FH systems is generally over two orders larger than that of equal-interval ones when spectrum overlapping is allowable. Therefore, there is great superiority in enhancing the security and secrecy for the scheme mentioned.

References:

[1] Bluetooth SIG. Bluetooth Technology Standard V1. 1 [EB/OL].http: //www.bluetooth.com. 1999-12-10/2004-09-20.
[2] LAN/WAN Standards Committee of the IEEE Computer Society. IEEE 802. 11 wireless LAN medium access control and physical layer specifications [EB/OL]. http: //www.ieee.org. 1999-12-25/2004-09-20.
[3] Ye Zhihui, Shen Lianfeng, Song Tiecheng. Interference analysis and improvement of capacity reduction for FHSS networks in WPAN application environment [J]. Journal of Southeast University(English Edition), 2003, 19(3): 205-211.
[4] Fainberg M, Goodman D. Analysis of the interference between IEEE 802. 11b and Bluetooth systems [A]. In: IEEE VTS 54th[C]. New Jersey, 2002, 2: 967-971.
[5] Andrew S, Park R, Buehrer M. Throughput performance of an FHMA system with variable rate coding [J]. IEEE Transaction on Communications, 1998, 46(4): 521-532.
[6] Stranne A, Floren R, Edfors O, et al. FHSS networks in the presence of strongly interfering Bluetooth networks [A]. In: Proceeding of the 13th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications[C]. Lisbon, Portugal, 2002, 1: 161-165.
[7] Sklar Bernard. Digital communications fundamentals and applications. 2nd ed. [M]. New Jersey: Prentice Hall PTR, 2001. 890-940.
[8] Cover Thomas M, Thomas Joy A. Elements of information theory [M]. New York: Wiley, 1991.
[9] Zhang J, Wong K M, Luo Z Q, et al. Blind adaptive FRESH filtering for signal extraction [J]. IEEE Transaction on Signal Processing, 1999, 47(5): 1397-1402.

Memo

Memo:
Biographies: Shen Fei(1983—), female, undergraduate; Song Tiecheng(corresponding author), male, professor, songtc@seu.edu.cn.
Last Update: 2004-12-20