基于改进型随机振动的电磁泄漏信号检测算法
Electromagnetic Leakage Signal Detection Algorithm Based On Improved Random Vibration
DOI: 10.12677/csa.2024.144073, PDF,   
作者: 叶 彬:中国科学院大学网安学院,北京
关键词: 电磁泄漏随机振动弱信号检测Electromagnetic Leakage Random Vibration Weak Signal Detection
摘要: 针对当前电子设备电磁泄漏安全检测中,微弱泄漏信号频点易被漏检等问题。本文提出了一种新型随机振动电磁泄漏检测算法,该算法利用随机振动原理,通过迁移原始信号中的噪声信号能量到泄漏信号上,达到增强泄漏信号强度,降低噪声强度,解决泄漏频谱的漏检问题。该算法通过移频,新型遗传算法及分段双稳态等方法,对传统随机振动算法进行优化,克服传统双稳态随机算法中存在的不足。本文通过实验和仿真证明了该方法的在电磁泄漏检测中的有效性。
Abstract: In view of the current electronic equipment electromagnetic leakage safety detection, the weak leakage signal frequency point is easy to be detected and so on. In this paper, a new electromagnetic leakage detection algorithm based on random vibration is proposed. The algorithm uses the principle of random vibration to transfer the energy of noise signal from the original signal to the leakage signal, so as to enhance the leakage signal strength and reduce the noise strength, solve the problem of leak detection of leakage spectrum. This algorithm optimizes the traditional random vibration algorithm by frequency shift, new genetic algorithm and subsection bistable method, and overcomes the shortcomings of the traditional bistable random vibration algorithm. The effectiveness of this method in electromagnetic leakage detection is proved by experiment and simulation.
文章引用:叶彬. 基于改进型随机振动的电磁泄漏信号检测算法[J]. 计算机科学与应用, 2024, 14(4): 24-32. https://doi.org/10.12677/csa.2024.144073

参考文献

[1] Van Eck, W. (1985) Electromagnetic Radiation from Video Display Units: An Eavesdropping Risk? Computers & Security, 4, 269-286. [Google Scholar] [CrossRef
[2] Kuhn, M.G. (1998) Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations. Proceeding 2nd International Workshop on Information Hiding, Portland, 14-17 April 1998, 124-142. [Google Scholar] [CrossRef
[3] Hesseldahl, A. (2013) You Won’t Believe All the Crazy Hardware the NSA Uses for Spying. All Things Digital.
http://allthingsd.com/20131230/you-wont-believe-all-the-crazy-hardware-the-nsa-uses-for-spying/
[4] Oren, Y. and Shamir, A. (2007) Remote Password Extraction from RFID Tags. IEEE Transactions on Computers, 56, 1292-1296. [Google Scholar] [CrossRef
[5] 王丹琛. 建设国家电磁空间安全体系维护电磁空间安全国家利益——陈鲸院士谈电磁空间安全[J]. 中国信息安全, 2020(12): 24-28.
[6] U.S. Department of Defense (2020) Electromagnetic Spectrum Superiority Strategy Released.
https://media.defense.gov/2020/Oct/29/2002525927/-1/-1/0/ELECTROMAGNETIC_SPECTRUM_SUPERIORITY_STRATEGY.PDF
[7] 崔天舒. 面向天基电磁倌号识别的深度学习方法[D]: [博士学位论文]. 北京: 中国科学院大学, 2021.
[8] Liang, L.L., Li, Z., Wang, D.Y., et al. (2016) Comparison Results of Stochastic Resonance Effects Realized by Coherent and Non-Coherent Receiver. 2016 International Conference on Computer, Information and Telecommunication Systems (CITS), Kunming, 6-8 July 2016, 1-5. [Google Scholar] [CrossRef
[9] Lai, Z.H., Liu, J.S., Zhang, H.T., Zhang, C.L., Zhang, J.W. and Duan, D.Z. (2019) Multi-Parameter-Adjusting Stochastic Resonance in a Standard Tri-Stable System and Its Application in Incipient Fault Diagnosis. Nonlinear Dynamics, 96, 2069-2085. [Google Scholar] [CrossRef
[10] Ma, Q., Huang, D. and Yang, J. (2018) Adaptive Stochastic Resonance in Second-Order System with General Scale Transformation for Weak Feature Extraction and Its Application in Bearing Fault Diagnosis. Fluctuation and Noise Letters, 17, Article No. 1850009. [Google Scholar] [CrossRef
[11] Li, Z. and Shi, B. (2017) An Adaptive Stochastic Resonance Method for Weak Fault Characteristic Extraction in Planetary Gearbox. Journal of Vibroengineering, 19, 1782-1792. [Google Scholar] [CrossRef
[12] Zhang, G. and Gao, J.P. (2018) Weak Signal Detection Based on Combination of Power and Exponential Function Model in Tri-Stable Stochastic Resonance. Journal of Computational and Applied Mathematics, 38, 2747-2752.