RSA encrypted FSK RF transmission powered by an innovative microwave technique for invulnerable security

Prashnatita Pal, Bikash Chandra Sahana, Jayanta Poray
{"title":"RSA encrypted FSK RF transmission powered by an innovative microwave technique for invulnerable security","authors":"Prashnatita Pal, Bikash Chandra Sahana, Jayanta Poray","doi":"10.1177/15485129211031670","DOIUrl":null,"url":null,"abstract":"Ensuring the secure communication is the prime concern for all kinds of data communication infrastructure. Several data encryption techniques are in use for secure communication. There is a scope for further improvement in the security level, as well as for the received signal quality. The selection of a proper combination of encryption and modulation techniques can improve the overall effectiveness of both the security level and the received signal quality. The combination of asymmetric cryptography (here use RSA (Rivest–Shamir–Adleman) algorithm) algorithm with the proposed reflex klystron-based frequency shift keying (FSK) modulation technique provides a high level of secure communication system. The performance of the proposed technique is experimentally verified. The conventional FSK modulation technique operates in the low-frequency band, but the proposed FSK modulation technique is powered by high-power microwave devices, which operate in the X band. The experimental result has been demonstrated and successfully verified for secured communication using the X band.","PeriodicalId":44661,"journal":{"name":"Journal of Defense Modeling and Simulation-Applications Methodology Technology-JDMS","volume":"18 1","pages":"839 - 854"},"PeriodicalIF":1.0000,"publicationDate":"2021-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Defense Modeling and Simulation-Applications Methodology Technology-JDMS","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1177/15485129211031670","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"ENGINEERING, MULTIDISCIPLINARY","Score":null,"Total":0}
引用次数: 1

Abstract

Ensuring the secure communication is the prime concern for all kinds of data communication infrastructure. Several data encryption techniques are in use for secure communication. There is a scope for further improvement in the security level, as well as for the received signal quality. The selection of a proper combination of encryption and modulation techniques can improve the overall effectiveness of both the security level and the received signal quality. The combination of asymmetric cryptography (here use RSA (Rivest–Shamir–Adleman) algorithm) algorithm with the proposed reflex klystron-based frequency shift keying (FSK) modulation technique provides a high level of secure communication system. The performance of the proposed technique is experimentally verified. The conventional FSK modulation technique operates in the low-frequency band, but the proposed FSK modulation technique is powered by high-power microwave devices, which operate in the X band. The experimental result has been demonstrated and successfully verified for secured communication using the X band.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
RSA加密FSK射频传输由创新的微波技术供电,安全无懈可击
保证通信的安全是各种数据通信基础设施的首要问题。有几种数据加密技术用于安全通信。在安全级别和接收信号质量方面还有进一步改进的余地。选择适当的加密和调制技术组合可以提高安全级别和接收信号质量的整体有效性。非对称密码(此处使用RSA (Rivest-Shamir-Adleman)算法)算法与所提出的基于反射速调管的频移键控(FSK)调制技术相结合,提供了高水平的安全通信系统。实验验证了该技术的性能。传统的FSK调制技术工作在低频段,但所提出的FSK调制技术是由高功率微波器件供电,其工作在X波段。实验结果已在X波段保密通信中得到验证。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
CiteScore
2.80
自引率
12.50%
发文量
40
期刊最新文献
Modeling fog and friction in military enterprise Adapting military doctrine in the shadow of the future Modeling of Russian–Ukrainian war based on fuzzy cognitive map with genetic tuning Decision-making in the shadow of strategic competition costs Multiple UAVs on a shared tether: Use cases, modeling, and probabilistic path planning
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1