Z. Dou, Guangzhen Si, Chao Li, Chunmei Li, Qingsong Feng
{"title":"通过SD-SMSE的秘密通信系统","authors":"Z. Dou, Guangzhen Si, Chao Li, Chunmei Li, Qingsong Feng","doi":"10.1109/ICEICT.2016.7879670","DOIUrl":null,"url":null,"abstract":"Setting up a communication system should also pay attention to both security and concealment in addition to the validity and reliability of the information, especially in military communication. In this paper, we introduce an application of the SD-SMSE framework under the secret communication, and the application combines overlay and underlay access with encryption. At the receiving end, we use the received key to restore the original information from the received encrypted information. The simulation results approve the feasibility of the framework under the given new application, which improves the utilization of spectrum and ensures the security of communication.","PeriodicalId":224387,"journal":{"name":"2016 IEEE International Conference on Electronic Information and Communication Technology (ICEICT)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A secret communication system via SD-SMSE\",\"authors\":\"Z. Dou, Guangzhen Si, Chao Li, Chunmei Li, Qingsong Feng\",\"doi\":\"10.1109/ICEICT.2016.7879670\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Setting up a communication system should also pay attention to both security and concealment in addition to the validity and reliability of the information, especially in military communication. In this paper, we introduce an application of the SD-SMSE framework under the secret communication, and the application combines overlay and underlay access with encryption. At the receiving end, we use the received key to restore the original information from the received encrypted information. The simulation results approve the feasibility of the framework under the given new application, which improves the utilization of spectrum and ensures the security of communication.\",\"PeriodicalId\":224387,\"journal\":{\"name\":\"2016 IEEE International Conference on Electronic Information and Communication Technology (ICEICT)\",\"volume\":\"32 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-08-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 IEEE International Conference on Electronic Information and Communication Technology (ICEICT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICEICT.2016.7879670\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 IEEE International Conference on Electronic Information and Communication Technology (ICEICT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICEICT.2016.7879670","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Setting up a communication system should also pay attention to both security and concealment in addition to the validity and reliability of the information, especially in military communication. In this paper, we introduce an application of the SD-SMSE framework under the secret communication, and the application combines overlay and underlay access with encryption. At the receiving end, we use the received key to restore the original information from the received encrypted information. The simulation results approve the feasibility of the framework under the given new application, which improves the utilization of spectrum and ensures the security of communication.