scispace - formally typeset
Proceedings ArticleDOI

CFB-AES-TURBO: Joint Encryption and Channel Coding for Secure Satellite Data Transmission

TLDR
This paper proposes a novel method of joint encryption and channel coding, called CFB-AES-TURBO, by combining advanced encryption standard (AES) encryption and turbo coding, which can achieve processing time gains, security enhancement, and bit error rate (BER) performance improvement at the same time.
Abstract
As the advanced satellite network can serve extremely diverse information data to different types of users, it is of a vital interest to achieve data security using encryption over satellite channels. However, because the avalanche effect makes encryption techniques vulnerable to bit errors in the wireless channel, a more powerful encryption technique is required. In this paper, we propose a novel method of joint encryption and channel coding, called CFB-AES-TURBO, by combining advanced encryption standard (AES) encryption and turbo coding. As we introduce turbo coding in the cipher feedback (CFB) mode with AES, our scheme can protect bits and also correct bit errors. We control system parameters of the encryption block size and the code rate, tailored to the channel state information (CSI). As a result, we can achieve processing time gains, security enhancement, and bit error rate (BER) performance improvement at the same time.

read more

Citations
More filters
Journal ArticleDOI

An overview of protected satellite communications in intelligent age

TL;DR: A comprehensive overview of the protected SatCom systems is presented, with focus on the critical technologies and practical applications, and finally discuss remaining challenges and look forward to the future research directions.
Journal ArticleDOI

Threat analysis for space information network based on network security attributes: a review

TL;DR: In this article , the authors present a comprehensive review of threats and corresponding solutions in SIN from the perspective of network security attributes, including confidentiality, integrity, and availability, and provide a cross-layer perspective for analyzing threat and enhancing the security and stability of SIN.
Journal ArticleDOI

Secured Data Transmission Over Insecure Networks-on-Chip by Modulating Inter-Packet Delays

TL;DR: A new method that can ensure secure and secret data transmission over such an untrusted NoC, which relies on encoding binary data as delays between packets travelling across the source and destination pair and is suitable for secure data transmission in unsecure systems is introduced.
References
More filters
Journal ArticleDOI

IEEE 802.11n MAC frame aggregation mechanisms for next-generation high-throughput WLANs

TL;DR: This article investigates the key MAC enhancements that help 802.11n achieve high throughput and high efficiency, and concludes that overall, the two-level aggregation is the most efficacious.
Book

Understanding LTE with MATLAB: From Mathematical Modeling to Simulation and Prototyping

TL;DR: This book examines the Physical Layer (PHY) of the LTE standards by incorporating three conceptual elements: an overview of the theory behind key enabling technologies; a concise discussion regarding standard specifications; and the MATLAB algorithms needed to simulate the standard.
Journal ArticleDOI

Security in space information networks

TL;DR: This article focuses on the security problems in space information networks from four perspectives, that is, secure handoff, secure transmission control, key management, and secure routing.
Journal ArticleDOI

Opportunistic Encryption: A Trade-Off between Security and Throughput in Wireless Networks

TL;DR: A framework called opportunistic encryption is proposed that uses channel opportunities (acceptable signal to noise ratio) to maximize the throughput subject to desired security constraints and produces significant improvement in the performance compared to traditional approaches.
Related Papers (5)