5G 网络中基于椭圆曲线和混合混沌图的 GFDM 调制器加密音频的安全性分析

Q2 Mathematics
Mohammed Jabbar Mohammed Ameen, Saad S. Hreshee
{"title":"5G 网络中基于椭圆曲线和混合混沌图的 GFDM 调制器加密音频的安全性分析","authors":"Mohammed Jabbar Mohammed Ameen, Saad S. Hreshee","doi":"10.11591/eei.v12i6.4913","DOIUrl":null,"url":null,"abstract":"Wireless communications face significant security challenges, so there is an ongoing necessity to develop an appropriate security strategy to protect data from eavesdroppers using cryptography based on chaos theory. Generalized frequency division multiplexing (GFDM) is a modern multicarrier waveform adaptable to 5G requirements, but its security issues have not been considered. Therefore, this paper proposed an efficient security technique within the GFDM modulator to protect the audio transmission against eavesdropping in 5G networks. The proposed GFDM is achieved by separating the subsymbols for the subcarrier into real and imaginary parts and combining them using a mixture of elliptic curve-linear congruential generator sequence (EC-LCG) with Ikeda and Tent maps, respectively. After that, the subsymbols of each subcarrier are permuted independently using the Duffing map. The effectiveness of the proposed approach to resist attacks was tested, and findings that were achieved are histogram, signal to noise ratio (SNR=-27.8068), spectral segment SNR (SSSNR=-34.9912), peak SNR (PSNR=0.9142), frequency weighted log spectral distance (dFWLOG=37.498), cepstral distance (dCD=9.0176), mean square error (MSE=0.82097), keyspace, and speed. These results show that the proposed model provides a high-security level, high speed in the encryption/decryption, large keyspace, and high sensitivity to the initial conditions.","PeriodicalId":37619,"journal":{"name":"Bulletin of Electrical Engineering and Informatics","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Security analysis of encrypted audio based on elliptic curve and hybrid chaotic maps within GFDM modulator in 5G networks\",\"authors\":\"Mohammed Jabbar Mohammed Ameen, Saad S. Hreshee\",\"doi\":\"10.11591/eei.v12i6.4913\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Wireless communications face significant security challenges, so there is an ongoing necessity to develop an appropriate security strategy to protect data from eavesdroppers using cryptography based on chaos theory. Generalized frequency division multiplexing (GFDM) is a modern multicarrier waveform adaptable to 5G requirements, but its security issues have not been considered. Therefore, this paper proposed an efficient security technique within the GFDM modulator to protect the audio transmission against eavesdropping in 5G networks. The proposed GFDM is achieved by separating the subsymbols for the subcarrier into real and imaginary parts and combining them using a mixture of elliptic curve-linear congruential generator sequence (EC-LCG) with Ikeda and Tent maps, respectively. After that, the subsymbols of each subcarrier are permuted independently using the Duffing map. The effectiveness of the proposed approach to resist attacks was tested, and findings that were achieved are histogram, signal to noise ratio (SNR=-27.8068), spectral segment SNR (SSSNR=-34.9912), peak SNR (PSNR=0.9142), frequency weighted log spectral distance (dFWLOG=37.498), cepstral distance (dCD=9.0176), mean square error (MSE=0.82097), keyspace, and speed. These results show that the proposed model provides a high-security level, high speed in the encryption/decryption, large keyspace, and high sensitivity to the initial conditions.\",\"PeriodicalId\":37619,\"journal\":{\"name\":\"Bulletin of Electrical Engineering and Informatics\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Bulletin of Electrical Engineering and Informatics\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.11591/eei.v12i6.4913\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"Mathematics\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Bulletin of Electrical Engineering and Informatics","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.11591/eei.v12i6.4913","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"Mathematics","Score":null,"Total":0}
引用次数: 0

摘要

无线通信面临着重大的安全挑战,因此有必要开发一种适当的安全策略,利用基于混沌理论的加密技术来保护数据不被窃听。广义频分复用(GFDM)是一种适应5G要求的现代多载波波形,但其安全性问题尚未得到充分考虑。因此,本文提出了一种有效的GFDM调制器内部安全技术,以保护5G网络中音频传输免受窃听。所提出的GFDM是通过将子载波的子符号分离成实部和虚部,并分别使用椭圆曲线-线性同余生成器序列(EC-LCG)与Ikeda和Tent映射的混合组合来实现的。然后,使用Duffing映射对每个子载波的子符号进行独立排列。对该方法的抗攻击效果进行了测试,得到了直方图、信噪比(SNR=-27.8068)、谱段信噪比(SSSNR=-34.9912)、峰值信噪比(PSNR=0.9142)、频率加权对数谱距离(dFWLOG=37.498)、背谱距离(dCD=9.0176)、均方误差(MSE=0.82097)、键距和速度。结果表明,该模型具有较高的安全性、较高的加密/解密速度、较大的密钥空间和对初始条件的敏感性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Security analysis of encrypted audio based on elliptic curve and hybrid chaotic maps within GFDM modulator in 5G networks
Wireless communications face significant security challenges, so there is an ongoing necessity to develop an appropriate security strategy to protect data from eavesdroppers using cryptography based on chaos theory. Generalized frequency division multiplexing (GFDM) is a modern multicarrier waveform adaptable to 5G requirements, but its security issues have not been considered. Therefore, this paper proposed an efficient security technique within the GFDM modulator to protect the audio transmission against eavesdropping in 5G networks. The proposed GFDM is achieved by separating the subsymbols for the subcarrier into real and imaginary parts and combining them using a mixture of elliptic curve-linear congruential generator sequence (EC-LCG) with Ikeda and Tent maps, respectively. After that, the subsymbols of each subcarrier are permuted independently using the Duffing map. The effectiveness of the proposed approach to resist attacks was tested, and findings that were achieved are histogram, signal to noise ratio (SNR=-27.8068), spectral segment SNR (SSSNR=-34.9912), peak SNR (PSNR=0.9142), frequency weighted log spectral distance (dFWLOG=37.498), cepstral distance (dCD=9.0176), mean square error (MSE=0.82097), keyspace, and speed. These results show that the proposed model provides a high-security level, high speed in the encryption/decryption, large keyspace, and high sensitivity to the initial conditions.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Bulletin of Electrical Engineering and Informatics
Bulletin of Electrical Engineering and Informatics Computer Science-Computer Science (miscellaneous)
CiteScore
3.60
自引率
0.00%
发文量
0
期刊介绍: Bulletin of Electrical Engineering and Informatics publishes original papers in the field of electrical, computer and informatics engineering which covers, but not limited to, the following scope: Computer Science, Computer Engineering and Informatics[...] Electronics[...] Electrical and Power Engineering[...] Telecommunication and Information Technology[...]Instrumentation and Control Engineering[...]
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信