Invisible WFRFT Communication Method with Jump Vector
Author:
Affiliation:
School of Information Science and Engineering, Shenyang Ligong University, Shenyang 110159, China
Fund Project:
摘要
|
图/表
|
访问统计
|
参考文献
|
相似文献
|
引证文献
|
资源附件
摘要:
加权分数傅里叶变换(Weighted fractional Fourier transform,WFRFT)技术可以极大地改变信号的特性,使信号的统计特性多样化,从而有效地保障通信信息安全。为解决单参数WFRFT通信抗扫描能力不足的问题,以单参数WFRFT为切入点,深入研究单参数分数域的形成机理,分析其潜在的微观特征和暗特征,从而提出了一种基于跳转向量的隐性WFRFT通信方法(Implicit WFRFT communication method of jump vector,IWVJ)。利用调制阶数与星座图的关系,建立了跳变矩阵和跳变向量,并以此制定了控制规则。此外,通过跳变向量控制获得动态调制阶数,从而达到安全通信的目的。仿真结果表明,IWVJ方法对授权接收机具有较高的反变换解调相似度和较低的误码率,相比于具有普适扫描能力的非授权接收机性能更优。同时对解调阶数误差、基础调制阶数和跳转频率等参数的设置给出了适用的建议,使IWVJ方法能够更好地应用于通信系统,为具有抗干扰、抗截获和抗欺骗能力的保密通信提供技术依据。
Abstract:
The weighted fractional Fourier transform (WFRFT) technology can greatly change the characteristics of the signal and diversify the statistical characteristics of the signal. Thus the security of communication information is ensured. In order to solve the problem of insufficient anti-scanning ability of single-parameter WFRFT communication, taking single-parameter WFRFT as an entry point, the formation mechanism of single-parameter fractional domain is deeply studied, and its potential microscopic features and dark features are analyzed. So an implicit WFRFT communication method of jump vector (IWVJ) is proposed. Using the relationship between the modulation order and the constellation diagram, the hopping matrix and the hopping vector are established. And the control rules are formulated. In addition, the dynamic modulation order is obtained through the hopping vector control to achieve safe communication. Simulation results show that the IWVJ method has higher inverse transform demodulation similarity and lower bit error rate for licensed receivers, which is better than unlicensed receivers with universal scanning capability. At the same time, the appropriate suggestions for the setting of the demodulation order error, the basic modulation order and the jump frequency are given, so that the IWVJ method can be better applied to communication systems, and provide security information with anti-jamming, anti-interception and anti-spoofing capabilities.