skip to main content
10.1145/3386415.3386948acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiciteeConference Proceedingsconference-collections
research-article

Research on High Fidelity Cluster Encrypted Transmission Method for Marine Target Detection

Authors Info & Claims
Published:30 May 2020Publication History

ABSTRACT

A high fidelity cluster encryption transmission method for sea target detection is proposed. The disadvantage of relatively complex processors and slow encryption speed for software encryption on the ocean. The characteristics of information realtime and miniaturization in practical application can not be satisfied. This paper focuses on the fusion and encryption and coding of target information, Reliable and safe transmission of target information at sea can be achieved with high precision underwater acoustic detection module and high speed processor of FPGA and combined with RSA digital encryption algorithm. Finally, display in data terminal interface. Through simulation experiment, the test results show that the method collects the orthogonal vector underwater acoustic signal and boost underwater acoustic signal with zero time difference, and synchronized wireless transmission of signals to host computer by cluster encryption together with magnetic signals. The method can achieve high precision and high fidelity target information restoration.

References

  1. Qi Na, Li Jinping, Wang yuanwei. A cluster of encrypted information high fidelity sea target detection device: China, 201811548754.5[P].2018-12-18.Google ScholarGoogle Scholar
  2. Chen Hongjuan. Vector sensor [M]. Haerbin: Harbin engineering university press.2006.Google ScholarGoogle Scholar
  3. Liu Boshegn, Lei Jiayi. Principle of underwater acoustics [M]. Haerbin: Harbin Engineering University Press, 2006.Google ScholarGoogle Scholar
  4. Li Jinping, Shi Xin, Wang Ye, Sun Likai, Zhang Peng. An autonomous directional magnetic composite 3D MEMS vector hydrophone [J]. Journal of China Academy of Electronic Sciences.2014, 9(6): 653--657.Google ScholarGoogle Scholar
  5. Chen Lijie, Zhang Peng, Xu Xingye, Wang Fujiang. Overview of vector hydrophone [J]. Sensors and Microsystems, 2006, 25(6): 5--8.Google ScholarGoogle Scholar
  6. Na Qi, Jing Pan, Qun Ding. The implementation of FPGA-based RSA public-key algorithm and its application in mobile-phone SMS encryption system[C]. The First International Conference on Instrumentation Measurement, Computer, Communication and Control (IMCCC 2011).2011(10): 102--106.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Zheng Yanbin, Song Yu, Du Baoxiagn, Pan Jing, Ding Qun. A new method for detecting periodic characteristics of chaotic cryptographic sequences [J]. Journal of Physics.2012, 61(23): 58--70.Google ScholarGoogle Scholar
  8. Hongjun Wang, Bingbing Song, Jing Pan, Qun Ding. FPGA Design and Applicable Analysis of Discrete Chaotic Maps. International Journal of Bufication and Chaos.2014, Vol. 24, No. 4, Page: 1450054--1-15.Google ScholarGoogle Scholar
  9. Xing Jun, Liu Zhong, Peng Pengfei. Study on the characteristics of deep sea acoustic detection [J]. Ship Science and Technology.2009, 31(6): 67--72.Google ScholarGoogle Scholar
  10. Qi Na. Design and Implementation of Public Key Encryption System Based on FPGA [D]. Master's thesis of Heilongjiang University, 2012.Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    ICITEE '19: Proceedings of the 2nd International Conference on Information Technologies and Electrical Engineering
    December 2019
    870 pages
    ISBN:9781450372930
    DOI:10.1145/3386415

    Copyright © 2019 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 30 May 2020

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article
    • Research
    • Refereed limited

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader