Next Article in Journal
The Impact of the Type and Spatial Resolution of a Source Image on the Effectiveness of Texture Analysis
Previous Article in Journal
Influence of DEM Resolution on the Hydrological Responses of a Terraced Catchment: An Exploratory Modelling Approach
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

CGAN BeiDou Satellite Short-Message-Encryption Scheme Using Ship PVT

Department of Intelligent Systems Science and Engineering, Harbin Engineering University, Harbin 150001, China
*
Author to whom correspondence should be addressed.
Remote Sens. 2023, 15(1), 171; https://doi.org/10.3390/rs15010171
Submission received: 16 November 2022 / Revised: 21 December 2022 / Accepted: 27 December 2022 / Published: 28 December 2022

Abstract

:
The transmission standard and format of short-message communication in the BeiDou satellite-navigation-system are open, the civilian channel adopts a direct-transmission plaintext mechanism, and the content of short messages is at risk of data leaks. Aiming at addressing the problem of safely transmitting BeiDou short messages, this study proposes a CGAN BeiDou satellite short-message-encryption scheme, using ship PVT (position, speed, and time). Various BeiDou commands with ship position, speed, or time are employed as the input. The two communicating parties use the CGAN (conditional generative adversarial network) confrontation mechanism to encrypt and decrypt the ship-PVT information and generate a symmetrically encrypted key, while the receiver parses only the sender data within the specified PVT-range. Additionally, because the BeiDou system has a positioning error and transmission delay, and considering the ship mobility, the concept of a dynamic tolerance region is introduced at the receiver, to improve the scheme’s decryption success-rate. Finally, the proposed scheme is verified, using simulation and experiments. The proposed algorithm achieves good security, with acceptable efficiency. Furthermore, the experimental platform built by this study is used to prove the feasibility of the scheme applied to BeiDou short-message encryption and decryption.

1. Introduction

Ocean-going ships use satellite communication technology to transmit important data to a ground-monitoring center, which is an important link in ship information perception [1]. The BeiDou satellite navigation system was fully networked in March 2021, and its unique short-message function also provides communication services that a GPS does not have. However, the standards for the modulation and demodulation method, carrier frequency, and data packet-structure of the BeiDou satellite short-message communication are open [2,3]. Therefore, designing an encryption scheme suitable for BeiDou short-message communication and improving the BeiDou system civilian-channel-transmission security is the problem that this study aims to solve.
Encryption technologies mainly include symmetric encryption and asymmetric encryption. The DES (the Data Encryption Standard) adopts a symmetric encryption system, which combines the plaintext after the packet with the key, which has good encryption speed. A typical algorithm for asymmetric encryption is AES (the Advanced Encryption Standard), which effectively extends the key length from 56 bits to 128 bits or even 256 bits. The security of the AES algorithm, as well as the performance of the application in software and hardware, is excellent. At present, cryptography has been integrated with chaos theory, neural networks, and deep learning. To ensure that image encryption has the ability to resist selected plaintext attacks, a chaos model combining hybrid elementary cellular automata and pseudorandom coupled-map-lattices was proposed in [4], and the encryption process was efficient and robust. A hidden Markov model and a hyperchaotic system were combined in [5] to encrypt speech processed by discrete wavelet packets and to perform safe and reliable transmission of audio data on an insecure public network. In the frontier field of image encryption, the new encryption structure and chaotic system were combined in [6], which effectively solved the information-leakage problem. To address the dynamic-degradation phenomenon in chaotic cryptography, a new hybrid-coupled-mapping-lattice model, TWMCML, was proposed in [7], in which the user could define a larger range of input parameters. Experimental verification of the encryption was performed on grayscale and RGB images, combined with edge-detection technology. The dynamic behavior of synaptic crosstalk in Hopfield neural networks was studied in [8]. Combining the chaotic phenomenon and DNA coding technology, a color-image-encryption scheme with a larger key space was proposed. A scheme for constructing a new neural-network memristor using the hyperbolic tangent function was designed in [9]. The fast DNA-encoding algorithm was applied in the field of image encryption in [10]. Its high coding efficiency was an important breakthrough, and it is valuable for many systems with strong real-time requirements. The generation of multiple double-scroll attractors is controlled by neurons, and the internal state equation of the model is used to simulate complex nonlinear behavior. Combining deep learning with encryption technology for automated-driving-data transmission, a secure transmission protocol based on chaos and private convolutional-neural-networks was established in [11], which ensures that traffic privacy data are not leaked. The deep Q-learning model was applied to Internet of things medical-information management in [12] to ensure the security of medical data. However, encryption frameworks based on deep Q-learning have the problem of unstable training. The SecureTrain data-transfer framework based on deep learning was first developed in [13]. The framework was designed based on the homomorphic-secret-sharing model, and uses a preset shared set and data features during training to eliminate extra computing time, which solves the two major challenges of unstable training and the low computational efficiency of deep learning in the field of encryption.
Although deep-learning models have been widely used in data encryption, a GAN (generative adversarial network), known as the most exciting machine-learning algorithm of the past decade, has not been widely used in the field of data encryption since it was proposed in 2014 [14]. At present, breakthroughs have been made in the fields of missing-data imputation [15,16], image generation [17], and data recovery [18]. GAN encryption is a popular encryption algorithm that was recently published by Google, and its convolutional network structure can learn high-dimensional complex data features [19]. To improve the application value of a GAN for real data, an improved discrete unsupervised-cryptographic GAN algorithm, based on the feature-mover distance was proposed in [20], using a CycleGAN to learn the mapping relationship between unmatched plaintext and ciphertext. The GAN encryption technique was used in the field of face image encryption in [21]. The user deforms the source image by customizing the deformation parameters, and the design of a secure authentication scheme for secret sharing is obtained. There have been few studies on the combination of data-security transmission technology and BeiDou satellite communication. Since the civilian channel of the BeiDou system directly transmits plaintext data, a BeiDou short-message authentication strategy based on an ECDS (Elliptic Curve Digital Signature) was proposed in [22]. The algorithm generates reserved bit data in the short-message structure to enhance the anti-spoofing of BeiDou short civil-message communication. The data transmission framework of an aviation-health-management system based on 4G communication and BeiDou communication links was established in [23], in which data encryption and adaptive-link-switching technology were considered at the same time. The application of BeiDou satellite-data-encryption technology in the field of traffic vehicles was analyzed, and the secure-information-transmission platform and PKI (public key infrastructure)-based key-generation method were studied in [24]. The StarFL joint-learning framework applied to intelligent computing was designed in [25]. In addition, a quantum-key-distribution method based on the BeiDou satellite and an encryption and decryption communication mechanism based on a neural network were designed, providing a new method for applying deep learning to BeiDou satellite-communication ideas. A real BeiDou satellite-information-transmission platform was built in [26], and it used the AES (advanced encryption standard) to encrypt military material data, but the method of directly transmitting the key in the BeiDou civilian channel was insecure.
In summary, although the existing research has improved the security of the BeiDou satellite system to a certain extent, because the BeiDou civilian-short-message communication channel directly transmits plaintext, a key transmitted by this method can be easily stolen or monitored by a third party. Additionally, applying BeiDou short-message encryption to the field of satellite information transmission considering ship mobility has not been studied. Therefore, the main contributions of this study are as follows:
  • To ensure the security of the BeiDou PVT (position, speed, and time) information used to generate the key, the user PVT information is analyzed under various BeiDou commands, and the BeiDou short-message communication channel for transmitting PVT information is encrypted and decrypted using a CGAN (conditional generative adversarial network).
  • To improve the decryption success rate of the BeiDou PVT-key at the receiver, the dynamic region of ship PVT information is analyzed, the concept of a dynamic tolerance region is introduced into the encryption scheme; a complete BeiDou short-message encryption scheme is established.
  • The security of PVT encryption based on the CGAN model and the influence of the dynamic tolerance region on the success rate of decryption are verified using simulation and experiments, and a host computer interface is designed to verify the engineering-application value of our scheme.
The remainder of this paper is structured as follows: Section 2 introduces our proposed algorithms, including BeiDou PVT-key-generation and dynamic tolerance region design. Section 3 discusses building a real experimental platform and conducting research on our algorithms. The experimental verification and analysis are then carried out. Conclusions and outlooks are discussed in Section 4.

2. The Design of Our Proposed BeiDou Satellite Short-Message Encryption Scheme

2.1. Theoretical Principles

  • BeiDou satellite-information transmission mechanism
BeiDou short-message communication has a strictly specified transmission mechanism and data format. As shown in Figure 1, important ship data are transmitted to the remote monitoring center through BeiDou satellites. The remote monitoring center in Figure 1 is an experimental platform built by us. The overall data format consists of five parts: “Instruction”, “Length”, “Local address”, “Information”, and “Checksum”. The specific “Instruction” form is introduced in Section 2.2, and the “Length” is used to indicate the length of the instruction. This is because the content of the BeiDou short message is edited by the user. If the length of the command is not clear, and the user adds the officially defined command-symbol to the content of the short message, it will cause serious parsing confusion. The rest have the same meaning. In addition, Ref. [27] uses a residual-coding algorithm, which improves the amount of data transmission.
To better describe which stages of information encryption are applied to the system, the principle of BeiDou-satellite global short-message communication is introduced, as shown in Figure 2. The BeiDou satellite uses the TDMA (time-division multiple access) mode and the Beidou 2.1/4.0 protocol to transmit short messages, and the routing table is completely formulated by the China BeiDou Ground Management Center. SlotX is defined as a time slot, and SatX stands for BeiDou satellite number. When Sat1 needs to communicate with Sat3, since there is no intersatellite link between the two satellites in Slot1, the transmission must be carried out in a relay-forwarding manner. First, Sat1 transmits the message to Sat5 within Slot1. Sat5 then transmits the message to Sat4 within Slot2. Finally, Sat4 transmits the message to the destination satellite, Sat3, in Slot3. In addition, the uplink of BeiDou-satellite short-message communication adopts a pseudo-random code spread-spectrum mode, and the carrier frequency is 1610.0–1626.5 MHz. The downlink of the BeiDou satellite adopts a B2b frame signal, the carrier frequency is 1207.14 MHz, and the modulation mode is QPSK.
2.
The relevant theory of the GAN network
The GAN network has been hailed as a breakthrough in a new generation of artificial intelligence. Its generator and discriminator are composed of two neural networks, which use an adversarial mechanism to dynamically adjust network parameters. After data training, the generator can generate new data in which humans cannot distinguish between true and false, and finally, both parties reach a Nash-equilibrium state. To date, GAN networks have been widely used in image processing, anomaly detection, and data-loss interpolation, but there are few related applications in the field of data encryption [28].

2.2. BeiDou PVT-Key-Generation Based on a CGAN

It is not secure to directly transmit unencrypted BeiDou PVT information to generate a key. Therefore, in this study, we take a variety of BeiDou commands with PVT information as the input, and use a CGAN to encrypt and decrypt the command content to ensure the security of the data used to generate the key.
According to the BeiDou-2.1-protocol data interface-requirements set forth by the BeiDou Satellite Management Center, the user’s PVT information mainly relies on the following four ASCII character-command transmissions:
1.$GNGGA,hhmmss.ss,llll.ll,a,yyyyy.yy,a,x,xx,x.x,x.x,U,x.x,U,xxxx,x.x,x.x*hh<CR><LF>
2.$GNRMC,hhmmss.ss,llll.ll,a,yyyyy.yy,a,x.x,x.x,ddmmyy,x.x,a,a*hh<CR><LF>
3.$GNGLL,llll.ll,a,yyyyy.yy,a,hhmmss.ss,A,x*hh<CR><LF>
4.$GNVTG,x.x,T,x.x,M,x.x,N,x.x,K,a*hh<CR><LF>
Here, $GN is the specified command identifier; llll.ll and yyyyy.yy represent latitude and longitude, respectively; hhmmss.ss is a variable-length time field; x.x is a variable-length number, used to store the sailing speed; U is a fixed-length field of the display unit; *hh is the parity check bit to ensure correct parsing; <CR> and <LF> are the statement terminator and the line-feed character, respectively; and the other fields, such as A, ddmmyy, and xxxx, indicate the command transmission-mode. For the identifiers in $GNVTG, T represents the true-north reference direction, M is the magnetic-north reference direction, and N is the velocity unit. The specific operation steps are as follows:
Step 1: the sender specifies the decryption area and compiles it into the abovementioned BeiDou command format, only shipping in the specified position to perform the decryption operation.
Step 2: the receiver also receives BeiDou commands in the same format, and calculates the dynamic tolerance area to be introduced later.
Step 3: only the recipient that meets the decryption conditions will perform the decryption operation.
We delete the command identifiers of the above four common commands, and use the content before the check digit as the BeiDou PVT information to be encrypted. Although PVT information has a good probability distribution characteristic, each command format is different, and even for the same command, the position, velocity, and time information can be specified as any combination of the three. Therefore, this study proposes a BeiDou PVT-key-generation algorithm based on a CGAN. In contrast to GAN encryption, a CGAN establishes sample-label pairs by adding additional label information and then, in an adversarial manner, encrypts BeiDou PVT information in various transmission-command scenarios. Below is a detailed introduction to CGAN encryption and decryption of PVT information.
Consider an encrypted communication scenario among Alice, Bob, and Eve, as shown in Figure 3, where Alice and Bob store the master key, K, distributed by the BeiDou satellite long-term. We define the plaintext and ciphertext to be transmitted by both parties as P ( PVT | $ ) and C ( PVT | $ ) . Eve is an eavesdropper attempting to break into the BeiDou short-message communication channel. The CGAN-based model aims to use the three people’s respective convolutional network structures to generate P B ob ( PVT | $ ) and P E ve ( PVT | $ ) in an adversarial manner, through the generator, G, and the discriminator, D, so that there is no difference between P B ob ( PVT | $ ) and the plaintext, and the result, P E ve ( PVT | $ ) , obtained by Eve is, as far as possible, random. D needs to have the ability to accurately determine whether PVT is a real value or a false value generated by G. Vector x is used to represent the original PVT data, vector y is the BeiDou command label, and vector z is noise data used by G to generate false PVT data. Therefore, the CGAN objective equation for encrypting and decrypting BeiDou PVT information is as follows:
min G max D V ( G , D ) = min G max D E x p d a t a ( x ) [ log D ( x | y ) ] + E z p z ( z ) [ log ( 1 D ( G ( z | y ) ) ) ]
V ( G , D ) is a typical binary cross-entropy function, P d a t a ( x ) is the probability distribution of the real PVT information in χ space, and P z ( z ) is the noise distribution. For discriminator D, the PVT data with the BeiDou command label are used as the input to ensure that the output PVT information has a label that is consistent with the given label; that is, log D ( x | y ) and log ( 1 D ( G ( z | y ) ) ) are maximized. For the generator, the goal is to minimize log ( 1 D ( G ( z | y ) ) ) so that the generated labeled samples successfully fool discriminator D. Assuming that the fake PVT information generated by generator G satisfies the P g ( x ) distribution, the training process of a CGAN stops when P g ( x ) infinitely approaches P d a t a ( x ) . At this time, for a fixed G, the optimal D can be expressed as D g * ( x ) = P d a t a ( x ) / ( P d a t a ( x ) + P g ( x ) ) .
Based on the above CGAN, we introduce an innovative operation of the CGAN applied to BeiDou PVT-information encryption and decryption. We define θ A , θ B and θ E as the parameters of the convolutional networks of Alice, Bob, and Eve, respectively, using E A ( θ A , P ( PVT | $ ) , K ) to represent the PVT ciphertext generated by Alice, and we take D B ( θ B , C ( PVT | $ ) , K ) and D E ( θ E , C ( PVT ) ) as the deciphered values obtained by Bob and Eve, respectively, using their respective inputs.
The distance value with the labels is used to define the gap between the real PVT and the deciphered values of Bob and Eve, and the L2-norm is used to calculate the distance. Compared with the L1-norm, the L2-norm enhances the convexity of the optimization solution process, thereby avoiding the overfitting of the L1 distance. The specific formula is as follows:
d ( P ( PVT | $ ) , P ( PVT | $ ) ) = ( i = 1 N ( P ( PVT | $ ) P ( PVT | $ ) ) 2 ) 1 2
where N is the length of the BeiDou PVT information. By analyzing the above formula, it was found that the introduction of the BeiDou command label into the distance function makes the effect of the CGAN encryption- and decryption-model acceptable only after the generated fake PVT-information and the label pass the determination of discriminator D.
Bob’s reconstruction error, L B , and its extension to the plaintext and key distribution, E P ( PVT | $ ) , K , are expressed as follows:
L B ( θ A , θ B , P ( PVT | $ ) , K ) = d ( P ( PVT | $ ) , D B ( θ B , E A ( θ A , P ( PVT | $ ) , K ) , K ) )
L B ( θ A , θ B ) = E P ( PVT | $ ) , K [ L B ( θ A , θ B , P ( PVT | $ ) , K ) ]
In contrast to the decryption process (Bob), the eavesdropper (Eve) needs to reconstruct the BeiDou PVT plaintext under the condition that the master key, K, cannot be obtained. The reconstruction error of Eve is as follows:
L E ( θ A , θ E , P ( PVT | $ ) , K ) = d ( P ( PVT | $ ) , D E ( θ E , E A ( θ A , P ( PVT | $ ) , K ) ) )
L E ( θ A , θ E ) = E P ( PVT | $ ) , K [ L E ( θ A , θ E , P ( PVT | $ ) , K ) ]
The goal of Eve is to determine the convolutional network parameters, θ E , that minimize the reconstruction error, L E ( θ A , θ E ) , as follows:
O E ( θ A ) = arg min θ E ( L E ( θ A , θ E ) )
To ensure that the eavesdropper (Eve) cannot parse the ciphertext while the two communicating parties encrypt the BeiDou PVT information, the sub-errors, L B and L E , are established, to jointly reconstruct the error as follows:
L A B ( θ A , θ B ) = L B ( θ A , θ B ) L E ( θ A , O E ( θ A ) )
Then, the Alice and Bob convolutional-network-optimization parameters can be expressed as follows:
( O A , O B ) = arg min ( θ A , θ B ) [ L A B ( θ A , θ B ) ]
Considering the parallel neuron structure, nonlinear transfer function, and diffusion characteristics of the neural network, the Alice, Bob, and Eve convolutional-neural-network structure shown in Figure 4, is established. The specific steps are as follows:
Step 1: Alice and Bob have the same network structure, consisting of a fully connected layer with sigmoid as the activation function, and three convolutional layers with leaky ReLU (rectified linear unit). The output uses the tanh activation-function to normalize the value to ( 1 , 1 ) .
Step 2: Alice’s inputs are P ( PVT | $ ) and K , and the output is C ( PVT | $ ) , while Bob’s network inputs are C ( PVT | $ ) and K , and the output is P B ob ( PVT | $ ) .
Step 3: Since Eve cannot obtain the master key that was predistributed by the BeiDou satellites, the network structure of Eve has one more fully connected layer than that of Alice and of Bob.
Step 4: The CGAN model performs the encryption and decryption of BeiDou PVT-information transmission, and then inputs the PVT information into the MD5 hash function, to output the key used to encrypt the plaintext. The core purpose of the MD5 hash function is to take a variable-length message as the input and generate a fixed-length hash as the output of the function. The MD5 hash-function can effectively solve the problem of the length of BeiDou PVT information not being able to be determined, and any change in bytes will cause a huge change in the generated sequence.

2.3. Design of the Dynamic Tolerance Region

Denning’s model was first proposed in [29], and meets the constraint that the receiver can only decrypt ciphertexts sent from a designated area. In the previous section, the two communicating parties performed the encrypted transmission of BeiDou PVT information. In this section, the BeiDou receiver actively obtains the sender’s PVT information through the RDSS antenna, and compares it with the PVT information transmitted based on the CGAN model in the previous section. The receiver performs the decryption operation only when the two sets of PVT information match. However, considering that the maximum communication frequency of the BeiDou short messages is 1 s, and the ship is mobile, the PVT information received by the decryption terminal is often of the state of the previous moment. Additionally, the BeiDou satellite system itself has positioning errors, and the direct use of Denning’s model leads to a low decryption success-rate. Therefore, in this study, we analyze dynamic changes in ship PVT information and set a dynamic tolerance region to solve the above problems.
As shown in Figure 5, we define the longitude and latitude of the ship node at time t 0 as ( X 0 , Y 0 ) , and the receiver uses the BeiDou RDSS antenna to periodically update the ship’s position at a fixed time interval, Δ t , which is denoted as t i = t 0 + i Δ t .
The shape of the dynamic tolerance region of the moving ship is defined as an ellipse, the center of the decryption area is the center of the ellipse ( O X t , O Y t ) , the speed is V , and the angle between the course and latitude is θ . Then, the center of the dynamic tolerance area at time t is as follows:
{ O X t = X 0 + V ( t t 0 ) cos θ O Y t = Y 0 + V ( t t 0 ) sin θ
By analyzing the ship’s sailing plan, the user needs to predefine the longitudinal and lateral maneuverability-parameters, ρ and δ . ρ represents the degree of deviation of the ship’s course from a straight line, and δ represents the degree of change of the ship’s speed. Generally, highways with winding routes and poor road conditions require larger maneuverability-parameters to be set. For ship motions that do not include emergency operations, small coefficients can be chosen for ρ and δ . Assuming that ( X t , Y t ) obeys a multivariate Gaussian distribution, using the 3-sigma principle yields the parameters of the dynamic tolerance region as follows:
{ σ X = X t + 1 6 ( δ O X t ) cos θ + 1 6 ( ρ O Y t ) sin θ σ Y = Y t 1 6 ( δ O X t ) sin θ + 1 6 ( ρ O Y t ) cos θ
Therefore, the ellipse equation of the dynamic tolerance region at time t can be expressed as follows:
E l l i p s e ( X t , Y t ) = ( X t O X t ) 2 σ X 2 + ( Y t O Y t ) 2 σ Y 2 2 cos θ ( X t O X t ) σ X ( Y t O Y t ) σ Y c
Here, c is a constant set, according to the positioning error of the BeiDou satellite itself.
Below is an analysis of the parameter update of the dynamic ellipse equation. We use the Gauss–Markov model proposed in [30], to update the four dynamic variables V , θ , δ and ρ . The formula is as follows:
Z t = λ Z t 1 + ( 1 λ ) Z ¯ t 1 + 1 λ 2 ε t 1
Here, λ [ 0 , 1 ] is used to adjust the influence of time, t 1 , and the historical time on time t , Z ¯ t 1 is the historical average of Z t , and ε t 1 is a stationary, random Gaussian process that is not related to the parameters to be updated, which can be eliminated by setting the mean and variance. The vessel speed and course update-values, V ^ k , θ ^ k , at the k th time, are as follows:
V ^ k = λ V ^ k 1 + 1 λ n 1 t = 1 n 1 ( X t X t 1 Δ t ) 2 + ( Y t Y t 1 Δ t ) 2
θ ^ k = λ θ ^ k 1 + ( 1 λ ) arctan { 1 n 1 t = 1 n 1 ( Y t Y t 1 X t X t 1 ) }
where k = 1 , 2 , , n . Inverting Equation (11) provides the updated formulas for the longitudinal and lateral maneuverability-parameters, ρ ^ and δ ^ , as follows:
{ δ ^ = X t + 6 ( σ ^ X O X t ) cos θ ^ 6 ( σ ^ Y O Y t ) sin θ ^ ρ ^ = Y t + 6 ( σ ^ X O X t ) sin θ ^ + 6 ( σ ^ Y O Y t ) cos θ ^
where
{ σ ^ X = 1 n 1 i = 1 n ( X t X ¯ ) 2 ,   X ¯ = i = 1 n X t / n σ ^ Y = 1 n 1 i = 1 n ( Y t Y ¯ ) 2 ,   Y ¯ = i = 1 n Y t / n
Before each dynamic tolerance area is determined, the ellipse equation needs to be recalculated with the updated parameters, but if the ship’s course and speed remain relatively constant, the dynamic tolerance area only needs to update the center of the ellipse. With this setting, the balance between the optimal decryption region and the PVT update frequency can be effectively guaranteed.
The BeiDou short-message encryption scheme considering the dynamic tolerance region is shown in Figure 6. Its structure is a hybrid data-encryption system combining symmetric and asymmetric features. It has the characteristics of symmetric encryption, high efficiency, fast encryption speed, and a small amount of calculation, as well as high security with asymmetric encryption. First, both parties use a CGAN to encrypt and decrypt BeiDou PVT information. This process is equivalent to using an asymmetric encryption system to transmit the encryption/decryption key. Conditional adversarial learning ensures that the BeiDou PVT information used to generate encryption keys are not stolen. The receiver calculates the dynamic tolerance region and compares it with the position actively obtained by the BeiDou RDSS antenna, and it only generates a decryption key for a sender that meets the dynamic-tolerance-region conditions. Finally, both parties use the AES symmetric-encryption algorithm to encrypt and decrypt the BeiDou plaintext and ciphertext, and all ship-data plaintext and BeiDou PVT information with labels P ( PVT | $ ) are transmitted by the BeiDou short-message communication channel.
The encryption and decryption process-flow is shown in Figure 7. This study proposes the CGAN BeiDou satellite short-message encryption scheme using ship PVT to ensure that the key is not directly exposed in the BeiDou short-message channel. The CGAN model implements the protection of keys generated using ship PVT. By calculating the dynamic tolerance area, the receiver is only responsible for parsing the BeiDou plaintext within the area specified by the sender. Both users use the AES algorithm to encrypt the plaintext and decrypt the ciphertext. The encryption process is as follows:
Step 1: the sender specifies the receiver’s PVT information, and only the receiver located at the specified latitude and longitude performs the decryption operation.
Step 2: the pretrained CGAN model is used to encrypt the BeiDou PVT information, and as the initial key to perform key expansion.
Step 3: The BeiDou plaintext to be transmitted uses the AES algorithm to generate the BeiDou ciphertext, and the operations include SubByte, ShiftRow, MixColumn, and AddRoundKey. Since the encryption algorithm is widely known, this article does not repeat its operation principle.
The decryption process is as follows:
Step 1: the receiver obtains the real PVT information through the BeiDou antenna, and calculates the dynamic tolerance area through the preset parameters.
Step 2: the receiver decrypts the PVT information provided by the sender through the pretrained CGAN model, and compares the received PVT information with the real value received by its own antenna in combination with the dynamic tolerance area.
Step 3: when the decryption conditions are not met, the receiver does not perform the decryption operation.
Step 4: When the PVT information of both parties is matched, the receiver uses the AES inverse operation to decrypt the BeiDou ciphertext sent by the user. The AES decryption process also includes five operations, SubByte, ShiftRow, MixColumn, and AddRoundKey, and the process is similar to the encryption procedure.

3. Results and Discussion

To verify the feasibility of the proposed scheme, we built a BeiDou satellite short-message-communication experimental platform. The freighter data in Qingdao, Shandong Province, China, are used as the plaintext, and the decryption terminal is in Harbin Engineering University, Heilongjiang Province, China, as shown in Figure 8. The NI PXIe-1085 box and PXIe-8840 express controller are used to collect real-time data to be transmitted, the BeiDou short-message sending device is responsible for data encryption and transmission, and the BeiDou RDSS antenna actively obtains the real ship’s position. The ground-receiving center is equipped with a dedicated high-performance processor, to receive and decrypt short messages. Real data are collected by the experimental equipment for encryption, as shown in Figure 9. A total of 137,230 pieces of data were collected from 10 November 2021 to 17 December 2021, including: motor power (kW), fuel efficiency (g/kWh), motor speed (RPM), relative wind speed (m/s), fuel consumption (kg/nm), and sailing speed (kn). Below, Section 3.1 and Section 3.2 demonstrate the feasibility of the scheme from the perspective of a simulation and experiment.

3.1. Simulation and Analysis

Instructions containing PVT in the BeiDou-satellite short messages are used as the training set. The number of training instructions is 4096 entries. The CGAN model is trained with a “minibatch”, the learning rate is set to 0.0012, and the optimizer is selected as the Adam optimizer. The simulation sets the input instruction length and output key length of the CGAN as 64 bits, and subsequently needs to concatenate two 64-bit keys as the 128-bit encryption and decryption keys of the AES. The window size of each convolution is set, the input and output depths are [8, 1, 2], [2, 2, 4], [1, 4, 4], and [1, 4, 1], and the step sizes are set to 1, 2, 1, and 1. The convolution window of the first layer is set to 8, considering that a single byte occupies 8 bits, which means that the association between PVT information bytes can be mined more efficiently.
There are two conditions for stopping training: (1) the decryption error rate of the receiver is infinitely close to zero, and the BeiDou PVT information decrypted by the eavesdropper is similar to a random result; (2) the network has not converged after 20,000 rounds of adversarial learning. Therefore, the algorithm’s performance is evaluated by the number of decrypted error bits of the BeiDou PVT information, and making this value tend toward zero is the goal that the CGAN adversarial model needs to achieve. To more comprehensively analyze the advantages of the CGAN model for encrypting BeiDou PVT information, we not only train the 64-bit BeiDou instructions, but also add 16-bit and 32-bit plaintext training. The GAN encryption model is used as the control group.
The objective-function loss is shown in Figure 10. As the number of bits increases, the loss value of the two methods gradually increases, and the loss of a CGAN is always smaller than that of a GAN.
Figure 11, Figure 12 and Figure 13 show the comparison of the training results in 16-, 32-, and 64-bit scenarios, respectively. The number of decryption error bits for Bob tends toward 0 after the training is completed in the three cases, which means that Bob can correctly parse the BeiDou PVT information sent by Alice. Compared with Bob’s relatively smooth training-process, there are single or multiple performance fluctuations during the Eve training-process. However, with the continuous adjustment of the convolutional-network parameters of both parties under the adversarial mechanism, in the scenarios with 16, 32, and 64 bits, Eve’s decryption error bits converge to 7.718, 15.39, and 31.06 bits, respectively. Ideally, they should reach 8, 16, and 32 bits, respectively, which means that when Eve tries to recover the stolen BeiDou PVT information, only approximately half of the BeiDou plaintext can be recovered; that is, Eve’s decryption result is almost completely random. By analyzing the number of decryption error bits after the Eve-network parameters are stabilized, it was found that since the convolution structure is not changed in the simulation, as the number of data bits increases, the deviation between the convergence value of the Eve network and the ideal value becomes increasingly obvious. This is because the convolutional network in complex data scenarios gradually shows a tendency toward underfitting, and an effective way to address this phenomenon is by increasing the network depth and the number of neurons in a single-layer convolution.
Both models achieve stable convergence in limited rounds in 16-, 32-, or 64-bit scenarios. The convergence speed of the CGAN and the number of decrypted error bits after stabilization are both lower than those of the GAN. The number of error bits in the stable state of the CGAN is 7.718, 15.39, and 31.06, respectively, while the GAN only reaches 7.58, 14.92, and 29.29, which obviously deviates from the ideal values of 8, 16, and 32. This is because the CGAN uses labels to preprocess BeiDou commands, which is equivalent to classifying the input BeiDou command-training-set before adversarial training. This mechanism effectively prevents the defect of the GAN input data being completely random. In summary, it is feasible for the CGAN model designed in this study to encrypt and decrypt BeiDou PVT information, and it achieves better results than the GAN model. In addition, to verify the security of the algorithm proposed in this study, we tested 50 neural networks under attack by the Eve-network model, to verify whether the CGAN model can ensure the security of ship-PVT information. The experimental results are shown in Table 1. The CGAN model proposed in this study can effectively realize the encryption of ship information, and has good security.
To verify the encryption efficiency of the algorithm in this study, we use 1024 MB of data as the input for comparative experiments. The control groups are the algorithms without PVT-information encryption, namely the traditional DES and AES algorithms, and the algorithms that use the GAN model to encrypt PVT information, namely the GAN-AES. The experimental results are shown in Table 2. Although the algorithm in this study adds the encryption and decryption of ship-PVT information on the basis of AES, since the neural network is pretrained, after the BeiDou short message is input into the model, most of its operations run linearly. Therefore, no excessive computational burden is added. In particular, for the BeiDou-satellite information-transmission system, the frequency of sending short messages is once a minute, so the system using BeiDou satellites is not a system with strong real-time requirements, and thus, the algorithm in this study is applied to BeiDou satellites, with good efficiency.
We take the “Ship remote support” as an example to verify the effect of encryption and decryption. The specified latitude and longitude are set to 120.020866 and 35.816002, respectively, and the actual latitude and longitude are 120.020866 and 35.816012, respectively, with a slight deviation between the two, which is used to simulate the positioning error of the BeiDou satellite. The key generated by the CGAN model is 1B0313952878650D0AC95B4EA5476AB5. From the simulation results, it can be found that by setting the parameters of the dynamic tolerance region, the BeiDou plaintext can be encrypted as “001001100110001111101111101000011111000000001010000010000111010101110011110011111000000000000101111”; the decryptor successfully obtained the BeiDou message information “Ship remote support”, as shown in Table 3.

3.2. Experimental Verification of BeiDou Short-Message Encryption/Decryption

Since this study does not improve the encryption algorithm itself, but introduces the concept of a dynamic tolerance region, the receiver can only parse the BeiDou ciphertext transmitted in the designated sending area by using a BeiDou satellite RDSS antenna, thus preventing eavesdroppers from forging location information, and preventing the BeiDou short-message channel from being invaded. Therefore, the security, complexity, and correlation of the generated ciphertext are consistent with those of the AES, and they are not introduced in detail. This section aims to use MATLAB 2019b to design the experimental software of the upper computer. Then, the CGAN-based BeiDou PVT-key-generation and the encryption- and decryption-processes, considering the dynamic tolerance region, are tested in the designed software. The receiver is limited to only having the ability to parse BeiDou short messages in the designated area, and the decryption success-rate under different combinations of longitudinal and lateral maneuverability-parameters is verified, thus demonstrating the engineering value of the proposed scheme applied to BeiDou satellite short-message communication.
Figure 14 shows the CGAN-based BeiDou satellite short-message-encryption interface. The user can read the BeiDou-PVT information of the specified path, input it into the trained CGAN encryption model, and display the generated key in a binary and graphical manner. The plaintext is encrypted with the key generated, based on the CGAN model and displayed in the “BeiDou Short Message Binary Ciphertext Display” window.
Figure 15 shows the CGAN-based BeiDou satellite short-message-decryption interface. The real PVT information is “4546.54692, N, 12640.86403. E”, and the received PVT information based on the CGAN is “4546.54696, N, 12640.86409. E”. There is a slight gap between the two, which is caused by objective factors, such as a Beidou satellite positioning error, transmission delay, and ship mobility. It was found that the receiver correctly parses the ciphertext, and the specific process is as follows. First, the longitudinal and lateral maneuverability-parameters need to be set, and the dynamic tolerance area needs to be calculated. The receiver can only parse BeiDou ciphertext sent within the specified dynamic-tolerance-region. The BeiDou RDSS antenna actively obtains the true position of the sender, and determines whether it is within the dynamic tolerance area. If the conditions are not met, the operation will be stopped, and if the conditions are met, the next step will be performed. Then, the receiver obtains the BeiDou-PVT information from the trained CGAN decryption model, and displays the generated key in a binary and graphical manner. Finally, the key is used to decrypt the BeiDou ciphertext, and the string can be displayed in the BeiDou Short Message Plaintext Display window. Figure 16 shows a situation where the receiver fails to decrypt correctly: that is, the receiver does not use the received BeiDou PVT information to generate a key but uses the real PVT information actively obtained by the RDSS antenna. If “4546.54696” in the “Real PVT information” dialog is forcibly set to “4646.54696”, the correct key cannot be generated, and the BeiDou short message cannot be decrypted correctly.
To study the effect of the dynamic tolerance region on the decryption success-rate, experiments were carried out on various combinations of longitudinal and lateral maneuverability-parameters. Each combination was tested 100 times, and the decryption success-rate was analyzed. Using Franson’s CoordTrans multisource data-coordinate-conversion tool, it is estimated that every 50 m corresponds to approximately 1.6482 s and 2.0538 s of longitude and latitude changes, respectively. According to the positioning accuracy officially announced by the BeiDou Management Center, 50 m is set as the ideal range for the dynamic tolerance region. The following two situations are discussed: in one situation, the longitudinal maneuverability-parameter, ρ , is held fixed in the ideal range, and the lateral maneuverability-parameter, δ , is dynamically adjusted. In the other situation, the influence of dynamic changes in δ on the decryption success-rate is analyzed under the condition of a fixed ρ .
An analysis of Figure 17 shows that if the dynamic tolerance region is not considered, that is, when either δ or ρ is 0, the decryption success-rate basically remains at 0%. This proves that when the receiver does not consider factors such as BeiDou-system positioning error, transmission delay, and ship mobility, the BeiDou PVT information transmitted based on the GCAN model, cannot match the real value actively obtained by the RDSS antenna. Therefore, the receiver cannot parse the BeiDou ciphertext of the sender, which reflects the importance of the dynamic tolerance zone designed in this study. As δ or ρ increases gradually, the decryption success-rate also increases. The increase is most obvious when δ or ρ is in the range of 20 to 30 m, after which the decryption success-rate increases slowly. When either δ or ρ is set to 50 m, the other maneuverability parameter only needs to be set to more than 30 m. Then, a decryption success-rate of more than 80% can be achieved. In particular, in the ideal case, both δ and ρ are set to the maximum value of 50 m, and the two communicating parties achieve 100% communication decryption in 100 experiments. In summary, the encryption and decryption scheme considering the dynamic tolerance region proposed in this study has better communication robustness, on the basis of data security.

4. Conclusions

To improve the security of the BeiDou civilian-short-message channel, this study proposes a CGAN BeiDou satellite short-message encryption scheme using ship PVT. The BeiDou PVT information for key generation is transmitted using the CGAN model, and the decryption success-rate is improved by introducing a dynamic tolerance region. The following conclusions are obtained through simulation: the CGAN model is better than the GAN model at encrypting 16-, 32-, and 64-bit BeiDou-PVT commands, but the number of decrypted error bits increases with the complexity of the BeiDou commands. Additionally, by adjusting the longitudinal and lateral maneuverability-parameters to update the dynamic-tolerance-region ellipse equation, the decryption success-rate can be effectively improved, and can reach 100% under ideal conditions. Furthermore, this study describes the design of BeiDou short-message encryption-and-decryption host-computer software based on MATLAB 2019b, and visually displays the CGAN BeiDou satellite short-message encryption scheme using the ship PVT proposed in this study, which increases the engineering-application value.
Considering the problem of the limited length of the BeiDou satellite short-message-communication string, designing an algorithm with both ship-data compression and encryption is a research problem to be solved in the future.

Author Contributions

Conceptualization, D.W. and L.Z.; methodology, D.W.; software, D.W.; validation, D.W., L.Z. and S.L.; formal analysis, D.W.; investigation, S.L.; resources, S.L.; data curation, L.Z.; writing—original draft preparation, D.W.; writing—review and editing, L.Z.; visualization, L.Z.; supervision, S.L.; project administration, S.L.; funding acquisition, S.L. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the National Natural Science Foundation of China subsidization project (51579047), the Natural Science Foundation of Heilongjiang Province (QC2017048), and the Fundamental Research Funds for the Central Universities (3072022JC0404).

Data Availability Statement

Due to the nature of this research, participants of this study did not agree for their data to be shared publicly, so supporting data is not available.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Ji, S.Y.; Weng, D.J.; Ji, S.Y.; Wang, Z.J.; Chen, W.; Lu, Y.W. Ocean Real-Time Precise Point Positioning with the BeiDou Short-Message Service. Remote Sens. 2020, 12, 4167. [Google Scholar]
  2. Li, X.J.; Guo, R.; Chen, J.B.; Liu, S.; Chang, Z.Q.; Xin, J.; Guo, J.L.; Tian, Y.J. New Orbit Determination Method for GEO Satellites Based on BeiDou Short-Message Communication Ranging. Remote Sens. 2022, 14, 4602. [Google Scholar] [CrossRef]
  3. Zhang, P.F.; Tu, R.; Zhang, R.; Gao, Y.P.; Cai, H.B. Combining GPS, BeiDou, and Galileo Satellite Systems for Time and Frequency Transfer Based on Carrier Phase Observations. Remote Sens. 2018, 10, 324. [Google Scholar] [CrossRef] [Green Version]
  4. Dong, Y.H.; Zhao, G.; Ma, Y.J.; Pan, Z.; Wu, R. A novel image encryption scheme based on pseudo-random coupled map lattices with hybrid elementary cellular automata. Inf. Sci. 2022, 593, 121–154. [Google Scholar] [CrossRef]
  5. Sathiyamurthi, P.; Ramakrishnan, S. Speech encryption using hybrid-hyper chaotic system and binary masking technique. Multimed. Tools Appl. 2022, 81, 6331–6349. [Google Scholar] [CrossRef]
  6. Zhang, X.Q.; Gong, Z.J. Color image encryption algorithm based on 3D Zigzag transformation and view planes. Multimed. Tools Appl. 2022, 81, 31753–31785. [Google Scholar] [CrossRef]
  7. Wang, X.Y.; Liu, P.B. A New Full Chaos Coupled Mapping Lattice and Its Application in Privacy Image Encryption. IEEE Trans. Circuits Syst. I-Regul. Pap. 2022, 69, 1291–1301. [Google Scholar] [CrossRef]
  8. Ding, D.W.; Xiao, H.; Yang, Z.L. Coexisting multi-stability of Hopfield neural network based on coupled fractional-order locally active memristor and its application in image encryption. Nonlinear Dyn. 2022, 108, 4433–4458. [Google Scholar] [CrossRef]
  9. Lai, Q.; Wan, Z.Q.; Zhang, H.; Chen, G.R. Design and Analysis of Multiscroll Memristive Hopfield Neural Network with Adjustable Memductance and Application to Image Encryption. IEEE Trans. Neural Netw. Learn. Syst. 2022, 1–14. [Google Scholar] [CrossRef]
  10. Zhang, X.Q.; Tian, J.X. Fast DNA encoding algorithm inspired by the SPOOLing system. Med. Biol. Eng. Comput. 2022, 60, 2707–2720. [Google Scholar] [CrossRef]
  11. Bo, J.; Bi, X.R.; Tian, Y.L.; Liu, X.M.; Wu, D.P. Toward Lightweight, Privacy-Preserving Cooperative Object Classification for Connected Autonomous Vehicles. IEEE Internet Things J. 2022, 9, 2787–2801. [Google Scholar]
  12. Kathamuthu, N.D.; Chinnamuthu, A.; Iruthayanathan, N.; Ramachandran, M.; Gandomi, A.H. Deep Q-Learning-Based Neural Network with Privacy Preservation Method for Secure Data Transmission in Internet of Things (IoT) Healthcare Application. Electronics 2022, 11, 157. [Google Scholar] [CrossRef]
  13. Zhang, Q.; Xin, C.S.; Wu, H.Y. SecureTrain: An Approximation-Free and Computationally Efficient Framework for Privacy-Preserved Neural Network Training. IEEE Trans. Netw. Sci. Eng. 2022, 9, 187–202. [Google Scholar] [CrossRef]
  14. Goodfellow, I.J.; Pouget-Abadie, J.; Mirza, M. Generative Adversarial Nets. Commun. ACM 2014, 27, 2672–2680. [Google Scholar]
  15. Awan, S.E.; Bennamoun, M.; Sohel, F.; Sanfilippo, F.; Dwivedi, G. Imputation of missing data with class imbalance using conditional generative adversarial networks. Neuromputing 2021, 453, 164–171. [Google Scholar] [CrossRef]
  16. Zhang, W.J.; Luo, Y.H.; Zhang, Y.; Srinivasan, D. SolarGAN: Multivariate Solar Data Imputation Using Generative Adversarial Network. IEEE Trans. Sustain. Energy 2021, 12, 743–746. [Google Scholar] [CrossRef]
  17. Otberdout, N.; Daoudi, M.; Kacem, A.; Ballihi, L.; Berretti, S. Dynamic Facial Expression Generation on Hilbert Hypersphere with Conditional Wasserstein Generative Adversarial Nets. IEEE Trans. Pattern Mach. Intell. 2022, 44, 848–863. [Google Scholar] [CrossRef] [PubMed]
  18. Wang, Y.F.; Li, D.; Li, X.; Yang, M. PC-GAIN: Pseudo-label conditional generative adversarial imputation networks for incomplete data. Neural Netw. 2021, 141, 395–403. [Google Scholar] [CrossRef]
  19. Coutinho, M.; Albuquerque, R.D.; Borges, F.; Villalba, L.J.G.; Kim, T.H. Learning Perfectly Secure Cryptography to Protect Communications with Adversarial Neural Cryptography. Sensors 2018, 18, 1306. [Google Scholar] [CrossRef] [Green Version]
  20. Gomez, A.N.; Huang, S.; Zhang, I. Unsupervised Cipher Cracking Using Discrete GANs. arXiv 2018, arXiv:1801.04883. [Google Scholar]
  21. Chen, S.S.; Chang, C.C.; Echizen, I. Steganographic Secret Sharing With GAN-Based Face Synthesis and Morphing for Trustworthy Authentication in IoT. IEEE Acccess 2021, 9, 116427–116439. [Google Scholar] [CrossRef]
  22. Wu, Z.J.; Liu, R.S.; Cao, H.J. ECDSA-Based Message Authentication Scheme for BeiDou-II Navigation Satellite System. IEEE Trans. Aerosp. Electron. Syst. 2019, 55, 1666–1682. [Google Scholar] [CrossRef]
  23. Yan, Q.Y.; Li, W.; Zhang, J. Real-Time Air-to-Ground Data Communication Technology of Aeroengine Health Management System with Adaptive Rate in the Whole Airspace. Math. Probl. Eng. 2021, 201, 9912574. [Google Scholar] [CrossRef]
  24. Deng, L.Q.; Ye, S.P.; Qiu, H.Y. Transmission Security Platform for Transportation Information based on BeiDou Navigation Satellite System. In Proceedings of the 2018 IEEE 3rd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC), Chongqing, China, 12–14 October 2018; pp. 2110–2113. [Google Scholar]
  25. Huang, A.B.; Liu, Y.; Chen, T.Z. StarFL: Hybrid Federated Learning Architecture for Smart Urban Computing. ACM Trans. Intell. Syst. Technol. 2021, 12, 1–23. [Google Scholar] [CrossRef]
  26. He, W.X.; Cong, L.H. Intelligent security system based on location information. In Proceedings of the 2020 5th International Conference on Mechanical, Control and Computer Engineering (ICMCCE), Harbin, China, 25–27 December 2020; pp. 981–985. [Google Scholar]
  27. Wu, D.; Liu, S.; Sun, H.F. Short Message Communication Lossy Data Compression Algorithm for BeiDou-3 Satellites Information Transmission. Multimed. Tools Appl. 2022, 81, 12833–12855. [Google Scholar] [CrossRef]
  28. Liu, S.; Wu, D.; Sun, H.F. A Novel BeiDou Satellite Transmission Framework with Missing Package Imputation Applied to Smart Ships. IEEE Sens. J. 2022, 22, 13162–13176. [Google Scholar] [CrossRef]
  29. Scott, L.; Denning, D. Geo-encryption: Using GPS to Enhance Data Security. GPS World 2013, 14, 40–46. [Google Scholar]
  30. Al-Fuqaha, A.; Al-Ibrahim, O. Geo-encryption protocol for mobile networks. Comput. Commun. 2007, 30, 2510–2517. [Google Scholar] [CrossRef]
Figure 1. BeiDou satellite-information transmission mechanism.
Figure 1. BeiDou satellite-information transmission mechanism.
Remotesensing 15 00171 g001
Figure 2. BeiDou-satellite global short-message communication principle.
Figure 2. BeiDou-satellite global short-message communication principle.
Remotesensing 15 00171 g002
Figure 3. BeiDou PVT-information-encryption/decryption model based on a CGAN.
Figure 3. BeiDou PVT-information-encryption/decryption model based on a CGAN.
Remotesensing 15 00171 g003
Figure 4. Alice, Bob, and Eve convolutional-neural-network structure.
Figure 4. Alice, Bob, and Eve convolutional-neural-network structure.
Remotesensing 15 00171 g004
Figure 5. Schematic diagram of the dynamic tolerance region of a ship.
Figure 5. Schematic diagram of the dynamic tolerance region of a ship.
Remotesensing 15 00171 g005
Figure 6. Flow chart of the BeiDou short-message encryption scheme considering the dynamic tolerance region.
Figure 6. Flow chart of the BeiDou short-message encryption scheme considering the dynamic tolerance region.
Remotesensing 15 00171 g006
Figure 7. Flowchart of the encryption and decryption processes.
Figure 7. Flowchart of the encryption and decryption processes.
Remotesensing 15 00171 g007
Figure 8. Experimental equipment used to verify the encryption scheme described in this study.
Figure 8. Experimental equipment used to verify the encryption scheme described in this study.
Remotesensing 15 00171 g008
Figure 9. Real data collected by the experimental equipment for encryption.
Figure 9. Real data collected by the experimental equipment for encryption.
Remotesensing 15 00171 g009
Figure 10. The result of the objective-function loss.
Figure 10. The result of the objective-function loss.
Remotesensing 15 00171 g010
Figure 11. Comparison of training results in 16-bit scenarios.
Figure 11. Comparison of training results in 16-bit scenarios.
Remotesensing 15 00171 g011
Figure 12. Comparison of training results in 32-bit scenarios.
Figure 12. Comparison of training results in 32-bit scenarios.
Remotesensing 15 00171 g012
Figure 13. Comparison of training results in 64-bit scenarios.
Figure 13. Comparison of training results in 64-bit scenarios.
Remotesensing 15 00171 g013
Figure 14. CGAN-based BeiDou satellite short-message-encryption interface.
Figure 14. CGAN-based BeiDou satellite short-message-encryption interface.
Remotesensing 15 00171 g014
Figure 15. CGAN-based BeiDou satellite short message decryption interface.
Figure 15. CGAN-based BeiDou satellite short message decryption interface.
Remotesensing 15 00171 g015
Figure 16. A situation where the receiver cannot decrypt correctly.
Figure 16. A situation where the receiver cannot decrypt correctly.
Remotesensing 15 00171 g016
Figure 17. Decryption success-rate under various combinations of ρ and δ .
Figure 17. Decryption success-rate under various combinations of ρ and δ .
Remotesensing 15 00171 g017
Table 1. Algorithm-security verification under different key lengths.
Table 1. Algorithm-security verification under different key lengths.
Key LengthNumber of Test NetworksNumber of Successful EncryptionsEncryption Success Rate
116 bit5050100%
232 bit5050100%
364 bit5050100%
Table 2. Efficiency verification of different algorithms.
Table 2. Efficiency verification of different algorithms.
AlgorithmsData Size (MB)Encryption Time (s)Average Speed (MB/s)
1DES10244224.38
2AES10242051.20
3GAN-AES10242836.57
4CGAN-AES10242442.67
Table 3. Encrypted-communication test results.
Table 3. Encrypted-communication test results.
Simulation ExperimentsSimulation-Experiment Results
The specified latitude and longitudeLongitude: 120.020866 Latitude: 35.816002
The actual latitude and longitudeLongitude: 120.020866 Latitude: 35.816012
Dynamic tolerance parameters50,50
A key generated based on CGAN1B0313952878650D0AC95B4EA5476AB5
BeiDou satellite plaintextShip remote support
BeiDou satellite ciphertext0010011001100011111011111010000111110000000010100000100001
11010101110011110011111000000000000101111
The decrypted BeiDou plaintextShip remote support
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Liu, S.; Wu, D.; Zhang, L. CGAN BeiDou Satellite Short-Message-Encryption Scheme Using Ship PVT. Remote Sens. 2023, 15, 171. https://doi.org/10.3390/rs15010171

AMA Style

Liu S, Wu D, Zhang L. CGAN BeiDou Satellite Short-Message-Encryption Scheme Using Ship PVT. Remote Sensing. 2023; 15(1):171. https://doi.org/10.3390/rs15010171

Chicago/Turabian Style

Liu, Sheng, Di Wu, and Lanyong Zhang. 2023. "CGAN BeiDou Satellite Short-Message-Encryption Scheme Using Ship PVT" Remote Sensing 15, no. 1: 171. https://doi.org/10.3390/rs15010171

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop