Font Size: a A A

Wireless Channel On The Target Security Identification Protocol Analysis And Design

Posted on:2013-09-18Degree:MasterType:Thesis
Country:ChinaCandidate:P LvFull Text:PDF
GTID:2248330374485603Subject:Cryptography
Abstract/Summary:PDF Full Text Request
Wireless target identification secure protocols are widely used in targetidentification systems during the modern wars. The protocols proposed early didn’tperform well in security and stability due to data errors, Fruit and Garble.The noble wireless target identification secure protocol proposed in this paper isbased on the secondary surveillance radar with Mode S. The main achievements are asfollows.Firstly, the way SSR works and its work modes involving Mode1,2,3/A, C,4andSelected are introduced. Then we present two different protocols based on Mode4andMode4/S respectively both adopting same symmetric block encryption scheme.When designing the new protocol, we set two rounds challenge–response scheme,including Mode S interrogation–reply for target24bit–address, and encrypted Mode Sinterrogation–reply for target features. According to the importance, the features datacan be encrypted or not. In this way, the impact of avalanche effect to the protocol canbe reduced.An integrated system model for wireless target secure identification is build.Specially, the wireless identification channel model consists of data bit error, Fruit andGarble. Parameter for bit error is the transition probability of binary symmetric channel.Particularly, the encrypted data is invalid when there are bit errors. Parameter for Garbleis the target number. Specially, the replying data is invalid when garble exists.By implementing the two rounds challenge–response protocol on the wirelessidentification channel, the target multiple features are obtained. According to theidentity decision rule based on cooperative priori knowledge, the target identity isverified. Simulation results and conclusion:The protocol proposed in this paper is used to identify one target. When thecorrect identification probability is about98.3%, the transition probability is5×10-3,in the same situation, the transition probability of the protocols based on Mode4andMode S/4is5×10-4and2×10-4.Supposing the transition probability is fixed, the correct identification of thenew protocol reduces less than0.5%when identification environment worsens.In summary, the noble wireless target identification secure protocol proposed in thepaper performs well on the wireless identification channel with data errors and Garble.
Keywords/Search Tags:Wireless target identification, Selected mode, Symmetric block encryptionscheme, Wireless channel, Secure identification protocol
PDF Full Text Request
Related items