Spread spectrum systems have been recently studied and developed for commercial applications, because they have some advantages such as robustness against interference and a noise, low probability of intercept, realization of code-division multiple access, high accuracy ranging and so on. In this paper we analyze the information security of spread spectrum systems into confidentiality, untraceability, authenticity, and antijamming property and present some measures to achieve these properties using cryptographic techniques. We show that the spreading sequences play central role in the information security issues of spread spectrum systems. A generation method of the spreading sequence having high-security property is proposed.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copy
Hideki IMAI, Ryuji KOHNO, Tsutomu MATSUMOTO, "Information Security of Spread Spectrum Systems" in IEICE TRANSACTIONS on Fundamentals,
vol. E74-A, no. 3, pp. 488-505, March 1991, doi: .
Abstract: Spread spectrum systems have been recently studied and developed for commercial applications, because they have some advantages such as robustness against interference and a noise, low probability of intercept, realization of code-division multiple access, high accuracy ranging and so on. In this paper we analyze the information security of spread spectrum systems into confidentiality, untraceability, authenticity, and antijamming property and present some measures to achieve these properties using cryptographic techniques. We show that the spreading sequences play central role in the information security issues of spread spectrum systems. A generation method of the spreading sequence having high-security property is proposed.
URL: https://globals.ieice.org/en_transactions/fundamentals/10.1587/e74-a_3_488/_p
Copy
@ARTICLE{e74-a_3_488,
author={Hideki IMAI, Ryuji KOHNO, Tsutomu MATSUMOTO, },
journal={IEICE TRANSACTIONS on Fundamentals},
title={Information Security of Spread Spectrum Systems},
year={1991},
volume={E74-A},
number={3},
pages={488-505},
abstract={Spread spectrum systems have been recently studied and developed for commercial applications, because they have some advantages such as robustness against interference and a noise, low probability of intercept, realization of code-division multiple access, high accuracy ranging and so on. In this paper we analyze the information security of spread spectrum systems into confidentiality, untraceability, authenticity, and antijamming property and present some measures to achieve these properties using cryptographic techniques. We show that the spreading sequences play central role in the information security issues of spread spectrum systems. A generation method of the spreading sequence having high-security property is proposed.},
keywords={},
doi={},
ISSN={},
month={March},}
Copy
TY - JOUR
TI - Information Security of Spread Spectrum Systems
T2 - IEICE TRANSACTIONS on Fundamentals
SP - 488
EP - 505
AU - Hideki IMAI
AU - Ryuji KOHNO
AU - Tsutomu MATSUMOTO
PY - 1991
DO -
JO - IEICE TRANSACTIONS on Fundamentals
SN -
VL - E74-A
IS - 3
JA - IEICE TRANSACTIONS on Fundamentals
Y1 - March 1991
AB - Spread spectrum systems have been recently studied and developed for commercial applications, because they have some advantages such as robustness against interference and a noise, low probability of intercept, realization of code-division multiple access, high accuracy ranging and so on. In this paper we analyze the information security of spread spectrum systems into confidentiality, untraceability, authenticity, and antijamming property and present some measures to achieve these properties using cryptographic techniques. We show that the spreading sequences play central role in the information security issues of spread spectrum systems. A generation method of the spreading sequence having high-security property is proposed.
ER -