Two-dimensional intelligent disturbance high-reliability optical probability shaping RoF transmission method

文档序号:11180 发布日期:2021-09-17 浏览:35次 中文

阅读说明:本技术 一种二维智能扰动的高可靠光概率成型RoF传输方法 (Two-dimensional intelligent disturbance high-reliability optical probability shaping RoF transmission method ) 是由 刘博� 张丽佳 毛雅亚 李明烨 忻向军 任建新 孙婷婷 赵立龙 吴泳锋 刘少鹏 于 2020-02-28 设计创作,主要内容包括:本发明公开了一种二维智能扰动的高可靠光概率成型RoF传输方法,在发送端和接收端都已知最初始的密钥以及生成密钥的模型,利用它可以进行混沌映射,从而生成一串数目足够大的密钥组,通过概率成型对16QAM进行处理,得到非均匀分布16QAM信号,选取一组密钥进行混沌映射获得混沌序列从而生成扰动因子,用扰动因子对已经生成的16QAM的符号和子载波的位置进行扰动,完成加密过程,在接收端,对初始的密钥进行同样的处理,由于混沌映射结果的确定性可以获得相同的扰动因子,对接收到的信息进行解密后再解码。最后改变密钥进行下一组的信息传输,实现“一次一密”高安全传输。(The invention discloses a two-dimensional intelligent disturbed high-reliability optical probability forming RoF transmission method, wherein the most initial secret key and a secret key generating model are known at a sending end and a receiving end, chaotic mapping can be carried out by utilizing the secret key generating model, so that a string of secret key groups with enough number is generated, 16QAM is processed through probability forming to obtain non-uniform distribution 16QAM signals, a group of secret keys is selected for chaotic mapping to obtain a chaotic sequence so as to generate disturbance factors, the disturbance factors are used for disturbing the positions of symbols and subcarriers of the generated 16QAM so as to complete an encryption process, the initial secret key is processed in the same way at the receiving end, the same disturbance factors can be obtained due to the certainty of chaotic mapping results, and the received information is decoded after being decrypted. And finally, changing the key to transmit the next group of information, thereby realizing high-safety transmission of the one-time pad.)

1. A two-dimensional intelligent disturbance high-reliability optical probability shaping RoF transmission method is characterized by comprising the following steps:

step 1: transmitting a binary data stream, firstly generating a 16QAM signal by using a modulator, and then shaping the 16QAM signal by using a probability forming technology;

step 2: generating a key group through a chaotic model, and generating two groups of disturbance factors M through the key group1And M2Using a first set of perturbation factors M1Disturbing the probability of 16QAM signal, then Fourier transforming the 16QAM signal, each group of 16QAM signal is transmitted by a sub-carrier wave, and a second group of disturbance factors M is used2Disturbing the position of the sub-carrier wave to change the sequence of the transmitted signals;

and step 3: converting a digital signal into an analog signal by using a digital-to-analog converter, coupling a beam of coupling light modulated by a laser with the signal in a coupler, transmitting the signal in a single-mode optical fiber, converting an electric signal into an optical signal by using a photoelectric converter, and transmitting the optical signal by using a transmitting antenna;

and 4, step 4: receiving a signal of a fixed channel at a receiving end, and converting the received optical signal into an electric signal for processing through a digital-to-analog converter;

and 5: restoring the disturbance of the subcarrier position by using the generated decryption key; receiving the 16QAM signal through inverse Fourier transform, restoring the probability position of the signal point, and then restoring the initial signal through demodulation of the 16QAM signal.

2. The two-dimensional intelligent perturbation high-reliability optical probability shaping RoF transmission method according to claim 1, characterized in that: the chaotic model in the step 2 adopts a Logistic mapping model: x is the number ofn+1=μxn(1-xn) X is in the range of (0,1) and μ is in the range of (3.57, 4)]。

3. The two-dimensional intelligent perturbation high-reliability optical probability shaping RoF transmission method according to claim 2, wherein: setting an initial x in the Logistic mapping model0The value of (D) is 0.1 and the value of μ is 3.9.

4. The two-dimensional intelligent perturbation high-reliability optical probability shaping RoF transmission method according to claim 3, wherein: the first set of perturbation factors M1The second bit after the decimal point of the key group is generated is used as a judgment condition, the second bit is less than or equal to 5, the output is-1 and greater than 5, and the output is 1.

Technical Field

The invention belongs to the technical field of encrypted transmission, and particularly relates to a two-dimensional intelligent disturbance high-reliability optical probability modeling RoF transmission method.

Background

In the increasingly developed era of computer networks, with the advent of 4g, 5g, artificial intelligence, and even quantum computers, the transmission rate, storage capacity, and computing power of information and computers have increased exponentially, and in this increasingly developed network era, almost everything can appear in different forms on the network. But the privacy is as low as personal privacy, the economic security and the national security are experienced continuously, and a series of problems such as hacker attack, commercial competition, enemy interference and the like continuously affect the network environment. Therefore, secure transmission of information is increasingly gaining attention.

The competition between encryption and decryption has never been stopped after the german radio signal cipher was broken by the british scientists in the period of war ii. The encryption system can be divided into two types at present, namely a symmetric encryption system and an asymmetric encryption system, wherein the symmetric encryption system refers to the condition that a secret key used by the encryption system and a secret key used by the decryption system are consistent, and the secret key is called a private key; an asymmetric system is a system in which an encryption system and a decryption system use different keys, and is also called a public key encryption system. The study of chaos was started since the 20 th century, the 70 th era, with the meteorologist lorentz presenting the butterfly effect and giving mathematical equations for the "deterministic aperiodic flow" problem. The chaos theory-based encryption idea is firstly proposed by Robert Matthews in 1989, and the chaos-based information encryption system is proposed by cryptologists and information security scientists later, so that the completeness of the chaos encryption system is further enriched. The chaotic system is extremely sensitive to initial conditions, even if the initial conditions are slightly different, the motion trajectories of the chaotic system are completely different through iteration of chaotic equations, and the result is pseudo-random, which is contrary to the concept of confusion and walking in cryptography. By giving parameters and initial values of the chaotic system and then using a Logistic mapping equation in the chaos, a series of pseudo random numbers in the chaotic state can be given. As long as the parameters and initial values of the equation are known at the receiving end, the chaos phenomenon can be reproduced, so that decryption can be performed. Through continuous testing and actual use for many years, the chaotic mapping encryption technology can improve the encryption efficiency and ensure that the information security is not reduced, and the chaotic mapping encryption technology becomes a promising scheme for replacing classical cryptography.

However, most of the current encryption schemes are in a single mode, that is, encryption of information is performed only once, and if malicious attackers know initial parameters of an encryption system and reproduce an encryption model through continuous tracking and learning, the attackers can easily obtain encryption keys of the whole system, so that information is stolen, and great influence is caused on life. Therefore, the system needs to be enriched continuously, and the complexity and reliability of encryption are increased, so that the security of the system is improved more.

Disclosure of Invention

Technical problem to be solved

The invention utilizes the chaos mapping to generate the key group to respectively disturb the symbol emission probability of the constellation diagram and the frequency position of the subcarrier, thereby greatly enhancing the safety of information transmission on the basis of reducing the average emission power. The encryption mode adopts chaotic encryption, two-dimensional intelligent disturbance and one-time pad encryption, so that the cost is reduced, and the information security is greatly improved.

(II) technical scheme

In order to achieve the purpose, the invention provides the following technical scheme: a two-dimensional intelligent disturbance high-reliability optical probability shaping RoF transmission method specifically comprises the following steps:

step 1: transmitting a binary data stream, firstly generating a 16QAM signal by using a modulator, and then shaping the 16QAM signal by using a probability forming technology;

step 2: generating a key group through a chaotic model, and generating two groups of disturbance factors M through the key group1And M2Using a first set of perturbation factors M1Disturbing the probability of 16QAM signal, then Fourier transforming the 16QAM signal, each group of 16QAM signal is transmitted by a sub-carrier wave, and a second group of disturbance factors M is used2Disturbing the position of the sub-carrier wave to change the sequence of the transmitted signals;

and step 3: converting a digital signal into an analog signal by using a digital-to-analog converter, coupling a beam of coupling light modulated by a laser with the signal in a coupler, transmitting the signal in a single-mode optical fiber, converting an electric signal into an optical signal by using a photoelectric converter, and transmitting the optical signal by using a transmitting antenna;

and 4, step 4: receiving a signal of a fixed channel at a receiving end, and converting the received optical signal into an electric signal for processing through a digital-to-analog converter;

and 5: restoring the disturbance of the subcarrier position by using the generated decryption key; receiving the 16QAM signal through inverse Fourier transform, restoring the probability position of the signal point, and then restoring the initial signal through demodulation of the 16QAM signal.

Further, the chaotic model in the step 2 adopts a Logistic mapping model: x is the number ofn+1=μxn(1-xn) X is in the range of (0,1) and μ is in the range of (3.57, 4)]。

Further, setting an initial x in the Logistic mapping model0The value of (D) is 0.1 and the value of μ is 3.9.

Further, the first set of perturbation factors M1The second bit after the decimal point of the key group is generated as a judgment condition, the judgment condition is that the second bit is less than or equal to 5, the output is-1 and is greater than 5, and the output is 1.

(III) advantageous effects

The invention respectively generates a key group and a chaos sequence of time slot change based on the key group through the chaos mapping module, generates disturbance factors to respectively disturb the 16QAM symbol after probability shaping processing and disturb the frequency domain of a subcarrier, reduces the transmitting power and greatly enhances the safety of information transmission in a one-time pad encryption mode.

Drawings

In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings used in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained according to the drawings without creative efforts.

FIG. 1 is a flow chart of the overall steps in the present invention;

FIG. 2 is a flow chart of a transmit end encryption module of the present invention;

FIG. 3 is a graphical illustration of a Logistic mapping population model according to the present invention;

FIG. 4 is a chaotic map of the present invention;

FIG. 5 is a flow chart of a decryption module at the receiving end of the present invention;

FIG. 6 is a flow chart of key set generation according to the present invention;

fig. 7 shows a probability shaped 16QAM signal according to the present invention.

Detailed Description

The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.

The invention provides a technical scheme that: a two-dimensional intelligent disturbance high-reliability optical probability modeling RoF transmission method is disclosed, and specifically comprises the following steps:

step 1: transmitting a binary data stream, firstly generating a 16QAM signal by using a modulator, and then shaping the 16QAM signal by using a probability forming technology;

step 2: generating a key group through a chaotic model, and generating two groups of disturbance factors M through the key group1And M2Using a first set of perturbation factors M1Disturbing the probability of 16QAM signal, then Fourier transforming the 16QAM signal, each group of 16QAM signal is transmitted by a sub-carrier wave, and a second group of disturbance factors M is used2Disturbing the position of the sub-carrier wave to change the sequence of the transmitted signals;

and step 3: converting a digital signal into an analog signal by using a digital-to-analog converter, coupling a beam of coupling light modulated by a laser with the signal in a coupler, transmitting the signal in a single-mode optical fiber, converting an electric signal into an optical signal by using a photoelectric converter, and transmitting the optical signal by using a transmitting antenna;

and 4, step 4: receiving a signal of a fixed channel at a receiving end, and converting the received optical signal into an electric signal for processing through a digital-to-analog converter;

and 5: restoring the disturbance of the subcarrier position by using the generated decryption key; receiving the 16QAM signal through inverse Fourier transform, restoring the probability position of the signal point, and then restoring the initial signal through demodulation of the 16QAM signal.

The encryption scheme used at this time is a cipher encryption module based on a chaos theory, the most classical Logistic mapping is adopted, and the mapping model is a population model: x is the number ofn+1=μxn(1-xn) X is in the range of (0,1) and μ is in the range of (3.57, 4)]Taking x as 0.1 and μ as 3.9, and iterating one hundred times as an example, the generated discrete graph is shown in fig. 4, from which we can see that the discrete type and the randomness are very good. Initial values and parameters are given, a first chaotic mapping sequence is generated by utilizing the mapping, and a huge key set is further generated according to an initial key generated by the mapping. From this set of keys, we generate perturbation factors and hence interference signals.

Setting the initial x0 value to 0.1 and the mu value to 3.9, generating 1 key times, then multiplying the initial key by 0.4 plus 3.6 to generate the mu value with the interval range of [3.6, 4], utilizing the chaos to realize the encryption method of one-time pad, and generating the needed key group number.

Table one Smart Key Generation example

Generating a key group through a chaotic model, and generating two groups of disturbance factors M through the key group1And M2Using a first set of perturbation factors M1Disturbing the probability of the 16QAM signal to change the emission probability so as to achieve the effect of primary encryption; the 16QAM signals are then Fourier transformed, each group of 16QAM signals being transmitted using a subcarrier and using a second group of perturbation factors M2The positions of the subcarriers are disturbed, so that the sequence of the transmitted signals is changed, and the effect of two-dimensional encryption is achieved.

(1) Constellation probability perturbation

Here, we take the second bit after the decimal point of the generated key set as the decision condition, and if less than or equal to 5, we output-1,if it is greater than 5, we output 1, so we generate a set of perturbation factors. For example, the signal to be interfered has 5 symbol positions, i.e. 5 perturbation factors are generated, and the above generated key set is taken as an example to continue, the perturbation factor M1Is [ -111-11]T

Multiplying the position of the signal by the disturbance factor, wherein if the disturbance factor is 1, the position of the signal point is not changed; if the perturbation factor is-1, the position of the signal point changes centrosymmetrically.

TABLE 2 constellation mapping perturbation

(2) Subcarrier perturbation

After symbol disturbance is completed on a 16QAM signal, the symbol signal is modulated onto a subcarrier, and second disturbance, namely the frequency position of the symbol signal is moved on the frequency domain in the process. Firstly, a group of perturbation factors are generated according to a secret key, and the specific perturbation rule is as follows:

let N be the number of frequency domains requiring perturbation, MNTo perturb the matrix, CkIs a secret key, CktIs an intermediate key. Using the above generated set of keys as an example, N is set to 4 and CkIs [ 0.3510.88840.38860.9249 ]],CktIs CkThe size of the inverted matrix is sorted and then the inverted matrix is taken, namely the inverted matrix isThen using MN=fs(Ckt·Ck)-1Generating a perturbation matrix, this side fs ()-1When the size of an element in the matrix is defined as 1, the value of a position in the matrix is 1, and if the size is not 1, the value of the position in the matrix is 0. According to the above formula, the generated disturbance factor is:

if the frequency of the disturbance is required to be [ f ]1 f2 f3 f4]TMultiplying the disturbance factor by it to generate a new frequency [ f1 f3 f2 f4]TSo that we achieve the effect of encryption, and then we convert the newly generated frequency signal to the time domain for optical signal transmission.

The decryption mode and the encryption mode of the receiving end are identical, except that the order is reversed. The chaos mapping system is restored by a secret key and an encryption mode which are sent through an encryption channel, and then an inverse matrix of a disturbance factor is generated according to a known mode. After receiving the signal, we perform two decryption processes on the signal. Firstly, restoring the frequency domain of the received subcarrier, then restoring the 16QAM signal by using the inverse matrix of the disturbance factor, finally outputting the original data, and completing decryption.

The invention has the advantages that the most initial key and the model for generating the key are known at the transmitting end and the receiving end, and chaotic mapping can be carried out by utilizing the model, so that a string of key groups with enough number is generated. Processing the 16QAM through probability forming to obtain non-uniformly distributed 16QAM signals, selecting a group of keys to carry out chaotic mapping to obtain chaotic sequences so as to generate disturbance factors, and disturbing the positions of generated symbols and subcarriers of the 16QAM by using the disturbance factors to finish the encryption process. At the receiving end, the same processing is carried out on the initial secret key, the same disturbance factor can be obtained due to the certainty of the chaotic mapping result, and the received information is decoded after being decrypted. And finally, changing the key to transmit the next group of information, thereby realizing high-safety transmission of the one-time pad.

In the description herein, references to the description of "one embodiment," "an example," "a specific example" or the like are intended to mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, the schematic representations of the terms used above do not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.

The preferred embodiments of the invention disclosed above are intended to be illustrative only. The preferred embodiments are not intended to be exhaustive or to limit the invention to the precise embodiments disclosed. Obviously, many modifications and variations are possible in light of the above teaching. The embodiments were chosen and described in order to best explain the principles of the invention and the practical application, to thereby enable others skilled in the art to best utilize the invention. The invention is limited only by the claims and their full scope and equivalents.

11页详细技术资料下载
上一篇:一种医用注射器针头装配设备
下一篇:一种基于工业数据总线的安全通信方法

网友询问留言

已有0条留言

还没有人留言评论。精彩留言会获得点赞!

精彩留言,会给你点赞!