Monitoring data encryption method for howitzer shell transfer arm using chaos and compressive sensing

A novel data encryption method is presented for howitzer shell transfer arm using chaos and compressive sensing. Data are stored in the embedded fault diagnosis machine using chaos and compressive sensing, so the encrypted data are more secure in the embedded system and in the process of transmission with host computer. When the host computer extracts the operation data of the howitzer shell transfer arm monitored by the fault diagnosis machine, firstly, the encrypted data in the embedded diagnostic machine are read, then decrypted, and then the original signal is reconstructed by the orthogonal matching pursuit algorithm for further analysis and processing. The similarity degree between the reconstructed data and the original data is 0.947, the key space of the algorithm is ( 2 64 ) 2 0 48 ∗ 2 00 ∗ ( 2 64 ) N , and the algorithm is sensitive to the key. The result shows that the method can effectively save a large number of confidential data.

[1]  D. Donoho For most large underdetermined systems of linear equations the minimal 𝓁1‐norm solution is also the sparsest solution , 2006 .

[2]  R.G. Baraniuk,et al.  Compressive Sensing [Lecture Notes] , 2007, IEEE Signal Processing Magazine.

[3]  Jan Awrejcewicz,et al.  Bifurcation and Chaos: Theory and Applications , 2011 .

[4]  Zeshui Xu,et al.  Uncertain Multi-Attribute Decision Making: Methods and Applications , 2015 .

[5]  Changda Wang,et al.  Book Cipher with Infinite Key Space , 2008, 2008 International Symposium on Information Science and Engineering.

[6]  Chee Kheong Siew,et al.  Extreme learning machine: Theory and applications , 2006, Neurocomputing.

[7]  Yang Yu-lian Modeling and firing simulation accuracy assessment of a gun-power-recoil test table , 2014 .

[8]  Richard G. Baraniuk,et al.  Compressive Sensing , 2008, Computer Vision, A Reference Guide.

[9]  Frank L. Lewis,et al.  Intelligent Fault Diagnosis and Prognosis for Engineering Systems , 2006 .

[10]  Emmanuel J. Candès,et al.  Decoding by linear programming , 2005, IEEE Transactions on Information Theory.

[11]  Yan Fen Fault Diagnosis of Tiltrotor Aircraft via Improved Discrete Wavelet-OMELM , 2014 .

[12]  Yuehui Jin,et al.  Key Space of Cryptosystem Based on Chebyshev Polynomials over Finite Field , 2011, 2011 7th International Conference on Wireless Communications, Networking and Mobile Computing.

[13]  Liu Xi,et al.  Data acquisition method based on compressive sensing for automatic ammunition loading system , 2016 .

[14]  Gregory J. Pottie,et al.  Sphere-packing upper bounds on the free distance of trellis codes , 1988, IEEE Trans. Inf. Theory.

[15]  E.J. Candes Compressive Sampling , 2022 .

[16]  Li Hong-wei Characteristic Simulation and Analysis of Series Motor , 2010 .

[17]  Guo Yonghong,et al.  Sparsity adaptive orthogonal complementary matching pursuit algorithm , 2013 .