期刊文献+

电视制导导弹无线电指令加密认证研究 被引量:2

Encryption and Authentication for Wireless Commands of TV-Guided Missiles
在线阅读 下载PDF
导出
摘要 针对两枚导弹同时攻击邻近目标时相互之间的指令干扰问题,提出了一种含有载机认证的无线电控制指令加密方案。方案结合对称密码学与非对称密码学的特点,利用非线性滤波函数产生密钥流对指令明文进行加密,并利用简化的数字签名实现了对制导指令的认证。描述了非线性滤波函数的构造、指令加密认证方案和算法的DSP实现与仿真,仿真结果表明该方案能很好地解决指令干扰问题,为综合更全面的航空电子系统的研究提供了有益的帮助。 Considering that the command of two missiles may interfere with each other when they attacking the nearby target at the same time,we put forward an encryption program for wireless command of TV-Guided missiles.The program combined the features of symmetrical cryptography with that of asymmetric cryptography,encrypted the command using the key stream produced by non-linear filter function,and realized command authentication using simplified digital signatures.The structure of the non-linear filter function,the encryption program and the DSP simulation of the program were described in the paper.Simulation results showed that the program provides a good solution to the interference problem,which provides a useful method for further study on integrated avionic system.
出处 《电光与控制》 北大核心 2010年第11期56-60,共5页 Electronics Optics & Control
基金 军队重点科研项目(KJ08053)
关键词 电视制导 非线性滤波 加密认证 航空电子系统 TV guidance non-linear filter encryption and authentication avionic system
  • 相关文献

参考文献11

  • 1吴文超,杜海文,韩统,王浩.空地电视制导导弹作战使用研究[J].电光与控制,2008,15(7):55-57. 被引量:4
  • 2李望西,黄长强,庞春雨,罗艺.基于神经网络的电视遥控制导导弹损失率预测[J].电光与控制,2009,16(6):89-92. 被引量:2
  • 3МОДЕЛЬ ПРОЦЕССА ПРОСТРАНСТВЕ ННОГО НАВЕДЕ НИЯАУРС ТКСН В УСЛ-ОВИЯХ ОЭ И РЭН [R]. 2000.
  • 4付裕松.H-XX电视制导训练弹交联控制系统研究[D].西安:空军工程大学,2005.
  • 5李骞,冯金富,潘勃,许凌权.电视制导导弹无线电制导指令编码加密[J].电光与控制,2009,16(10):55-57. 被引量:3
  • 6ARIK S. An neural networks and their paplieations [ C ]// Proceedings of the 7th IEEE International Workshop ,2002 (7) :22-24.
  • 7COA J. A set of stability criteria of delayed cellular neural networks[J]. IEEE Trans Circuits Syst,2001,48(4) : 449-498.
  • 8LI Zan, CHANG Yilin, JIN Lijun, et al. Analysis of FHMA performance on block cipher based frequency-hopping sequences [ C ]// Communications Letters, IEEE, 2004 : 434-436.
  • 9HORAN D M, GUNEE R. A novel pseudorandom binary sequence generator for keystream generation [ C ]//Proceedings of the 2006 IEEE International Symposium on Circuits and Systems, ISCAS 2006 : 1358-1362.
  • 10KAHATE A. Cryptography and network security [ M ]. 北京:清华大学出版社,2009.

二级参考文献22

共引文献7

同被引文献6

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部