S. Meng, A. Huang, T. Sung, C. C. Chen, J. F. Huang
{"title":"基于签名重构的复合编码和信道编码方案增强Internet网络保密性","authors":"S. Meng, A. Huang, T. Sung, C. C. Chen, J. F. Huang","doi":"10.1109/CMCSN.2016.52","DOIUrl":null,"url":null,"abstract":"We have proposed Enhancing Internet Networks Confidentiality Based on composite Coding and Channels Coding Schemes of Signatures Reconfiguration. On the transmitter side, data bits are sliced into spectral chips, coded into M-sequence codes, and conducted with different units of time-delay. The composite signature keyword is structured from two or more M-sequence codes. Two relatively prime-length M-sequence codes are taken to compose composite M-signature codes and time channels coding to achieve network confidentiality systems. Besides, the double scrambling scheme over time/wavelength representatives doubles the defense to prevent eavesdropping. The proposed scheme has a number of attractive features such as asynchronous network coordination, reduced transceiver encoder/decoders, and enhanced system confidentiality.","PeriodicalId":153377,"journal":{"name":"2016 Third International Conference on Computing Measurement Control and Sensor Network (CMCSN)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Enhancing Internet Networks Confidentiality Based on Composite Coding and Channels Coding Schemes of Signatures Reconfiguration\",\"authors\":\"S. Meng, A. Huang, T. Sung, C. C. Chen, J. F. Huang\",\"doi\":\"10.1109/CMCSN.2016.52\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We have proposed Enhancing Internet Networks Confidentiality Based on composite Coding and Channels Coding Schemes of Signatures Reconfiguration. On the transmitter side, data bits are sliced into spectral chips, coded into M-sequence codes, and conducted with different units of time-delay. The composite signature keyword is structured from two or more M-sequence codes. Two relatively prime-length M-sequence codes are taken to compose composite M-signature codes and time channels coding to achieve network confidentiality systems. Besides, the double scrambling scheme over time/wavelength representatives doubles the defense to prevent eavesdropping. The proposed scheme has a number of attractive features such as asynchronous network coordination, reduced transceiver encoder/decoders, and enhanced system confidentiality.\",\"PeriodicalId\":153377,\"journal\":{\"name\":\"2016 Third International Conference on Computing Measurement Control and Sensor Network (CMCSN)\",\"volume\":\"17 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-05-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 Third International Conference on Computing Measurement Control and Sensor Network (CMCSN)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CMCSN.2016.52\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 Third International Conference on Computing Measurement Control and Sensor Network (CMCSN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CMCSN.2016.52","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Enhancing Internet Networks Confidentiality Based on Composite Coding and Channels Coding Schemes of Signatures Reconfiguration
We have proposed Enhancing Internet Networks Confidentiality Based on composite Coding and Channels Coding Schemes of Signatures Reconfiguration. On the transmitter side, data bits are sliced into spectral chips, coded into M-sequence codes, and conducted with different units of time-delay. The composite signature keyword is structured from two or more M-sequence codes. Two relatively prime-length M-sequence codes are taken to compose composite M-signature codes and time channels coding to achieve network confidentiality systems. Besides, the double scrambling scheme over time/wavelength representatives doubles the defense to prevent eavesdropping. The proposed scheme has a number of attractive features such as asynchronous network coordination, reduced transceiver encoder/decoders, and enhanced system confidentiality.