Font Size: a A A

Research On Information Covert Communication Based On DSSS/OOK Code And Modulation

Posted on:2020-09-06Degree:MasterType:Thesis
Country:ChinaCandidate:H Q HuFull Text:PDF
GTID:2428330596976540Subject:Engineering
Abstract/Summary:PDF Full Text Request
In the past,people thought that the leakage of information is from the Internet network.They thought when a computer or other device disconnected from the network and is air-gapped,it often did not lead to information leakage.The development of technology has shown that computers and other devices that are not connected to the Internet or wireless communication devices are still likely to leak large amounts of data.Most of the insecure of wireless communication is caused by the disclosure of the communication channel.For wireless communication security,there are three main countermeasures.The first one is the conventional method of encrypting the information.Before sending the information,the original data well be deeply encrypted,even if the information is leaked,it is still hard to decode it.The second is to make the signal difficult to capture or decode through some special methods,for example FHSS.The third method is covert communication.Covert communication is that two devices hide themselves when changing information,the third one cannot find the existence of communication,and there is no way to obtain the information.When the two parties communicate,as long as they can be detected,information may be intercepted and decoded.Converting communication can ensure the security of information to the greatest exten.The encryption key may leak or be cracked,and the Follow-On Jammer can scan at high speed to estimate the frequency variation of the requency-Hopping Spread Spectrum),which makes the method of changing the parameters of the wireless signal unsafe.Convert communication communicates in an undetectable way,others cannot discover the existence of communication,and can not obstain the information,which can ensure the security of information to the greatest extent.According to it,a new covert communication model using interference noise as a carrier is proposed to obtain better concealment and better anti-interference.The main work of this thesis is as follows:In this thesis,another method of converting communication using interference noise as a carrier wave is proposed;the information is transmitted using noise as a carrier,so that better concealment and better anti-interference can be obtained.The main works of this thesis are as follows:(1)In terms of the shortcomings of current covert communication,this thesis proposes its own new design ideas.We will use the noise or malicious interference wave in the environment as the carrier wave to transmit information,and create a new covert communication model.(2)Introducing the background technology related to information hiding and covert communication.(3)Discusses the shortcomings of traditional DSSS spread spectrum communication technology and Rake receiver,and to optimize the algorithm,which improves the security of information and made information interception not easy to crack.(4)The simulation experimens are carried out based on the design ideas.The experiment compares the bit error rate of different carrier wave,the noise and sine wave,comparing the bit error rate with DSSS and not,and comparing the bit error rate with Rake receiver and the normal receiver.These experiments are conducted to illustrate the feasibility of the proposed systems.The simulation results show that the design of the covert communication model of using interference noise as carrier wave is feasible.The system model is suitable for military,satellite communication and other important scenarios to prevent important data leakage.
Keywords/Search Tags:Covert communication, Spread Spectrum Communication, Wireless Communication Security, Information Leakage
PDF Full Text Request
Related items