Z. Dou, Guangzhen Si, Chao Li, Chunmei Li, Qingsong Feng
{"title":"A secret communication system via SD-SMSE","authors":"Z. Dou, Guangzhen Si, Chao Li, Chunmei Li, Qingsong Feng","doi":"10.1109/ICEICT.2016.7879670","DOIUrl":null,"url":null,"abstract":"Setting up a communication system should also pay attention to both security and concealment in addition to the validity and reliability of the information, especially in military communication. In this paper, we introduce an application of the SD-SMSE framework under the secret communication, and the application combines overlay and underlay access with encryption. At the receiving end, we use the received key to restore the original information from the received encrypted information. The simulation results approve the feasibility of the framework under the given new application, which improves the utilization of spectrum and ensures the security of communication.","PeriodicalId":224387,"journal":{"name":"2016 IEEE International Conference on Electronic Information and Communication Technology (ICEICT)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 IEEE International Conference on Electronic Information and Communication Technology (ICEICT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICEICT.2016.7879670","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Setting up a communication system should also pay attention to both security and concealment in addition to the validity and reliability of the information, especially in military communication. In this paper, we introduce an application of the SD-SMSE framework under the secret communication, and the application combines overlay and underlay access with encryption. At the receiving end, we use the received key to restore the original information from the received encrypted information. The simulation results approve the feasibility of the framework under the given new application, which improves the utilization of spectrum and ensures the security of communication.