| With the rapid growth of satellite networks and the increasing number of deep space satellites launched by various countries,satellite communication technology has seen unprecedented development.However,this has led to increasingly prominent issues of satellite communication security.Due to the special nature of deep space communication,the payload capacity carried by satellites is far less than that of the ground.Therefore,ensuring the security of satellite communication not only requires considering the effectiveness of secure transmission algorithms,but also their hardware feasibility.This paper conducts in-depth research on the physical layer security transmission encryption technology based on the commonly used QPSK modulation and demodulation system in satellite communication.Firstly,the shortcomings of traditional chaotic systems in hardware implementation are analyzed,and the research focus of this paper-integer domain chaotic systems-is proposed.The feasibility of applying integer domain chaotic systems to encryption transmission schemes is demonstrated through simulation tests.Then,two secure transmission schemes were proposed:chaotic permutation encryption technology based on integer field and improved AES encryption technology based on chaotic integer field.The chaotic permutation encryption technology based on integer field performs position permutation and interpolation encryption on data grouping,which can make full use of the five-dimensional chaotic sequence to realize the disorder permutation of data.The improved AES encryption algorithm based on chaotic integer field combines the generated five-dimensional chaos with the traditional AES round key generation process and improves it to achieve data permutation.Through simulation verification,the feasibility of the proposed two secure transmission schemes was verified in terms of performance such as bit error rate.Finally,the proposed two secure transmission algorithms were validated through hardware,including the generated chaotic sequences,the encryption algorithms used and the performance of encrypted transmissions.The experiment results proved that both secure transmission schemes could be implemented on a hardware platform. |