Fig 5 - uploaded by Zhaocheng Wang
Content may be subject to copyright.
TDS-OFDM physical layer encryption scheme.  

TDS-OFDM physical layer encryption scheme.  

Source publication
Article
Full-text available
Time-domain synchronous orthogonal frequency division multiplexing (TDS-OFDM) is the key technology of Chinese digital television terrestrial broadcasting (DTTB) standard. However, the issue of security was not considered, and this limits its application in commercial or military scenarios where secure communication is very important. This paper pr...

Similar publications

Article
Full-text available
IEEE 802.16 OFDMA (Orthogonal Frequency Division Multiple Access) technology has emerged as a promising technology for broadband access in a Wireless Metropolitan Area Network (WMAN) environment. In this paper, we address the problem of queueing theoretic performance modeling and analysis of OFDMA under broad-band wireless networks. We consider a s...
Article
Full-text available
The use of multi-carrier techniques is a natural choice when regarding wireless systems with high bandwidths and for which the application environment exhibits severe multi-path propagation. These techniques provide a way to cope with and benefit from the time-dispersive channel. This, however, comes at the cost of a higher sensitivity to imperfect...
Article
Full-text available
Orthogonal frequency division multiplexing(OFDM)has recently attracted vast research attention from both academia and industry and has become a part of new emerging standards for broadband wireless access. Synchronization at receiver end represents one of the most challenging issues and plays a major role in physical layer design.This paper present...
Conference Paper
Full-text available
In IEEE 802.16 Wireless Metropolitan Area Networks (WMAN) with Orthogonal Frequency Division Multiple Access (OFDMA) physical layer, dynamic subchannel allocation algorithm (DSAA) is essential for a Base Station (BS) to efficiently utilize bandwidth capacity. Conventional DSAAs usually group all subcarriers into a number of subchannels and allocate...
Article
Full-text available
A three-dimensional (3D) orthogonal frequency division multiplexing (OFDM) system with peak-to-average power ratio (PAPR) reduction method for the wireless sensor networks (WSNs) is presented. The transmit power of wireless nodes in an ad hoc network is strictly limited. Thus, high PAPR of the 3D OFDM system is a possible drawback when it is consid...

Citations

... This work was supported in part by JSPS KAKENHI Grant Number JP21H01329 and the SECOM Science and Technology Foundation. security (PLS) based on advanced coding [2] and physical layer encryption (PLE) utilizing unique signal encoding and/or modulation with a pre-shared seed key [3][4][5][6]. The use of PLE together with a symmetric key algorithm enhances security against interception because correct acquisition of encrypted messages is essential for effective cryptoanalysis of the symmetric key algorithm. ...
Article
Full-text available
Security enhancement is a major challenge in future wireless transmission systems. This study reports photonic-assisted physical layer encryption (PLE) based on quantum-noise signal masking. PLE is a signal-level symmetric key encryption that directly protects millimeter-wave signals from being illegitimately received by an eavesdropper without a symmetric seed key. A 4.25-Gbit/s orthogonal frequency division multiplexing quantum-noise randomized quadrature amplitude modulation cipher is generated at 1.875 GHz via intensity-modulation/direct-detection analog intermediate-frequency-over-fiber transmission with a directly modulated laser. Following the optical signal delivery and encryption based on the quantum-noise signal masking, the intermediate frequency is upconverted to 59 GHz, and V-band secure wireless transmission is demonstrated. The system achieves unique signal security that can never be reduced without sacrificing signal quality.
... OFDM, which has a high spectral efficiency and easy implementation, is used as a self-encryption via the constellation rotation principal. It has been incorporated into different protocols including IEEE 802.11 a/g/n, IEEE 802.16 WiMAX, the frequency domain [29][30][31], data scrambling in the time domain [32], rotation of the modulation symbols [33], and noiseenhanced constellation rotation [34,35] for many of these reasons. Research has looked at using PLE, such as constellation scrambling, to increase the security level of OFDM. ...
Article
Full-text available
In this paper, a new physical layer authenticated encryption (PLAE) scheme based on the multi-parameter fractional Fourier transform–Orthogonal frequency division multiplexing (MP-FrFT-OFDM) is suggested for secure image transmission over the IoT network. In addition, a new robust multi-cascaded chaotic modular fractional sine map (MCC-MF sine map) is designed and analyzed. Also, a new dynamic chaotic biometric signature (DCBS) generator based on combining the biometric signature and the proposed MCC-MF sine map random chaotic sequence output is also designed. The final output of the proposed DCBS generator is used as a dynamic secret key for the MPFrFT OFDM system in which the encryption process is applied in the frequency domain. The proposed DCBS secret key generator generates a very large key space of 22200. The proposed DCBS secret keys generator can achieve the confidentiality and authentication properties. Statistical analysis, differential analysis and a key sensitivity test are performed to estimate the security strengths of the proposed DCBS-MP-FrFT-OFDM cryptosystem over the IoT network. The experimental results show that the proposed DCBS-MP-FrFT-OFDM cryptosystem is robust against common signal processing attacks and provides a high security level for image encryption application.
... This kind of PLE is different from PLS in the fact that the PLE operates in the physical layer of the OFDM system. Many existing works are available with the literature with PLE [8][9][10]. Ruifeng et al. have proposed a secure OFDM system based on PLE [8]. ...
... Many existing works are available with the literature with PLE [8][9][10]. Ruifeng et al. have proposed a secure OFDM system based on PLE [8]. This work is based on constellation rotation in the pseudo-random fashion, and the system security is enhanced by inserting the artificial noise. ...
Article
Full-text available
In this paper, a hybrid security solution based on the chaotic map for a discrete cosine transform (DCT) precoded orthogonal frequency division multiplexing (OFDM) system is proposed. The two-level encryption scheme is employed to encrypt the image in the upper and physical layer of the OFDM system. At first, bit-level encryption based on Deoxyribo Nucleic Acid coding and combined chaotic map is done in the upper layer of the proposed system. Then, the encrypted bitstreams are fed to the OFDM transmitter where the real and imaginary parts of the quadrature amplitude modulated symbols are scrambled chaotically to achieve the symbol level encryption in the physical layer of OFDM system. In addition to the hybrid security model, DCT precoding is added to achieve the trade-off between bit error rate (BER) and peak to average power ratio (PAPR) performance. Experiments are carried out to validate the strength of encryption algorithms against key sensitivity, statistical and differential attacks. Further, the BER, PAPR and peak signal to noise ratio performances have been analyzed for various cases to prove the strength of the proposed system to achieve enhanced security with better power and BER performance.
... Various PLE methods have also been proposed for securing Orthogonal Frequency Division Multiplexing (OFDM) systems. Some of these techniques change in pseudo-random way the constellation symbols [35], add a small amount of random noise to each constellation symbol [72] or encrypt training symbols along with data symbols [43]. ...
Thesis
Full-text available
This dissertation was written as part of my MSc degree in Cybersecurity at the International Hellenic University. More specifically, this paper critically examines the cybersecurity aspects and requirements of aerial networks, being formed between aircraft and other flying vehicles and the ground, including Air Traffic Control services, operators and users. It does that in the general context of the currently evolving aviation industry that strives to incorporate new basically wireless communication and networking technologies to enhance automation and efficiency. To introduce the unfamiliar reader to the aviation operational environment and the aspects of cybersecurity, this thesis provides an introductory description of the general context of the aviation industry and its evolution, as well as the challenges it faces with regards to cybersecurity that shape its evolution. The examination of a real world scenario as a test case was attempted next as an example of a cybersecurity aware design method. The scenario involves the development of a new air traffic control service similar to ADS-B. The system addresses the need to incorporate small aircraft and UAVs into the Air Traffic Management System and is based on low consumption wireless protocol LoRa and the Internet of Things (IoT) concept. The system was developed as a proof of concept and was subsequently analyzed to assess the threats and risks involved. Contingency measures for the hardening of the system were proposed and used to update the design. Finally, the paper studies more closely some of the measures proposed, with focus on the wireless physical level security. The use of encryption in this layer, as part of the modulation as well as Multi Input Multi Output (MIMO) techniques, is explored through simulations and possible advantages and disadvantages are identified.
... As a result, the eavesdropper is unaware of the modulation scheme/order being used in the transmission block and therefore, incapable of demodulating it as shown in Fig. 9. In addition to channel-based sequences, other shared sequences have also been used for constellation rotation [46], [47]. All these approaches lead to a seemingly chaotic signal [48], characterized by a cloudy/distorted constellation, being observed by the eavesdropper. ...
Article
Full-text available
Wireless systems have become an increasingly pivotal part of our lives. Various critical applications and use cases such as healthcare, financial transactions, e-commerce, transportation, industrial automation, etc. rely on secure and reliable communication for their proper operation. Despite their widespread adoption, conventional cryptographic security mechanisms are unable to scale with the increasingly decentralized and heterogeneous networks. Physical layer security (PLS), on the other hand, provides a promising complementary solution to ensure authenticity, confidentiality, integrity, and availability of legitimate transmissions by exploiting the dynamic characteristics of the wireless environment. Despite the plethora of literary works regarding different facets of PLS being present, a unified framework is still absent. In this paper, we provide a PLS framework that not only encompasses the existing works but also enables the development of next-generation PLS methods. In line with this, the importance of PLS for emerging technologies such as joint sensing and communication, vehicular communication, non-terrestrial networks, millimeter-wave, terahertz communication, etc. is highlighted. Furthermore, the key challenges and directions for future PLS mechanisms are identified.
... However, PLS is not practical for a system with a high data rate because it requires complex coding and perfect channel state information for the receiver and eavesdropper. PLE utilizes unique signal encoding or scrambling for data encryption [2]- [5]. While a short private key is essential, a high data rate of more than a few Gbit/s is achieved. ...
Article
Full-text available
This study proposes an intensity modulation/direct detection intermediate frequency-over-fiber (IFoF) system that generates a microwave orthogonal frequency-division multiplexing (OFDM) quantum-noise randomized phase-shift-keying (PSK) cipher. The system directly prevents wireless interception by an eavesdropper without a private key. We theoretically analyze the system and derive a fundamental tradeoff between the security and signal quality at an intermediate frequency (IF). The system achieves balanced security and signal quality. We experimentally demonstrate 4.09-Gbit/s PSK cipher generation at an IF of 3.6 GHz. The cipher has 216 phase levels, and more than 100 adjacent signals are masked by quantum noise. The quantum-noise signal masking imposes irreducible uncertainty on illegitimate reception of the cipher, and a symbol error ratio (SER) that an eavesdropper can reach approaches 1. A lower bound of the SER is promised because truly random signal masking by quantum noise cannot be reduced. The error vector magnitude of the IF signals after decryption is maintained at a low value for wireless transmission. The cipher directly and effectively protects the wireless transmission of personal data from interception.
... However, the aforementioned methods have the potential that the modulation scheme may easily be guessed and require dummy data. To avoid these limitations, advanced security techniques are proposed to prevent revelation of the modulation scheme [39], [40]. Both methods adjust the magnitude and phase of the original mapping point and precludes to guess what kind of modulation scheme is adopted. ...
Article
Full-text available
This paper presents a method to improve the Vehicle-to-Everything (V2X) security. With the recent rapid development of communication technology and traffic applications, V2X is recently commercialized and has been growing as a fundamental system for future applications. Because of the high mobility of the vehicles, V2X requires a low latency and high-reliability. However, previous security methods demand a large computational burden and generate high latency owing to complex operations and long additional data bits for ensuing security. To resolve such constraints, an advanced security method ensuring lower latency and higher reliability is required. We propose a noise-shaped signaling method that provides high-level security with low latency for reliable V2X communication. The proposed method encrypts original data symbols to noise-like symbols by applying a noise envelope that consists of Chaotic Random Magnitude Sequence (CRMS) and Chaotic Random Phase Sequences (CRPS). Our method simplifies the sequence sharing process between a sender and an intended receiver by adapting the characteristics of a chaotic dynamic system. Moreover, the proposed method does not demand additional data bits and generate delay because the method only uses simple multiplication and division procedure for data encryption in the physical layer. We analyze our method in depth using extensive simulations and various viewpoints such as error rate, probability of modulation identification. From the simulations, we demonstrate that a malicious adversary cannot comprehend the transmitted symbols and always has the maximum error rate under various network environments and conditions. We also demonstrate how the adversary cannot infer the modulation scheme from the symbols applying the proposed method. After these analyses, we confirm that the noise-shaped signaling method is high-level of secure method with a low latency for V2X communication.
... In this manner, the constellation is distorted and the secrecy rate is enhanced. In [12,13], the phase of the transmit signal was randomized by a pseudorandom sequence, which led to the constellation rotation and thus, the signals were harder to be demodulated by the eavesdropper. Moreover, in [13], signals were randomized by a pseudorandom sequence and processed by WFRFT, which further distorted the constellations and enhanced the protection for the pseudorandom sequence and the WFRFT orders. ...
Article
Full-text available
In this paper, a transmission scheme based on polarization filtering and weighted fractional Fourier transform (PF-WFRFT) is proposed to enhance the transmission security in wireless communications. Indeed, the distribution of the transmit signals processed by WFRFT can be close to Gaussian, which can significantly improve the low detection probability. However, through scanning the WFRFT order with small step size, an eavesdropper can restore a regular constellation and crack the information. To overcome the problem, in the PF-WFRFT scheme, two polarized signals with mutually orthogonal polarization state are utilized to convey the information, which are processed by WFRFT separately and added up linearly before being transmitted by dual-polarized antennas. In this manner, even by scanning the WFRFT order, recovered signals are composite ones, which make the WFRFT order and the signals’ PSs difficult to crack, thus improving the security. In addition, the polarization-dependent loss (PDL) effect on the proposed scheme is discussed and a proprocessing matrix based on the channel information is constructed to eliminate this effect. Finally, numerical results are given to demonstrate the security performance of the proposed scheme in wireless communications.
... Phase encryption schematic diagram is shown in figure 1. Based on the concept of traditional constellation rotation, literature [4] proposed the random phase angle as a key to encrypt the signal constellation. The modulation signal through constellation encryption can be expressed as: ...
Article
Full-text available
In view of the characteristic of all-domain openness of tactical network, a Weighted-type Fractional Fourier Transform-based encryption modulation scheme of physical layer constellation is proposed based on the aliasing characteristic of WFRFT signal constellation diagram. On this basis, the influence of weighted parameters on system safety capacity and reliability is considered, and WFRFT weighted parameters are optimized. The simulation results show that when SNR is 15dB, the BER of the system meets the requirements of secure communication, and the low interception performance of the system will be well realized.
... In [20], randomised constellation rotation is used for downlink sparse code multiple access systems. In [21], constellation and noise are combined together to improve secrecy performance. However, these schemes are based on some unpractical assumptions. ...
... Lai et al. [20] assume that the eavesdroppers do not know the CSI of the main channel, but the base station knows the global CSI including that of the eavesdropper channel. Ma et al. [21] assume that only the legitimate nodes know the details of the pseudo-random rotation generator. ...
... Thus, we can omit the subscript of number of time frames in (19) processing h 1i = h 2i = h i . Also, the optimisation problem for maximum secrecy capacity is (see (21)) . ...
Article
Full-text available
This study proposes a scheme to realise secure orthogonal frequency-division multiplexing (OFDM) wireless communication between two full duplex nodes-node A and node B. If node A wants to send secret messages to node B, node A and node B transmit the training signal to each other to acquire channel state information (CSI) in the first time frame. Node A acquires the phases of the received signal from node B (no need to decode). In the second time frame, node A then sends secret messages to node B with the phases of the modulated signal being added to the random phases of the signal from node B in the previous time frame, i.e node A relaying the phases of the signal from node B. Node B can recover the secret messages from node A, but eavesdroppers cannot because they do not know the CSI of the main channel. The secrecy capacity is irrelevant to the CSI of the eavesdropper channel, which is a big advantage over other schemes. The scheme can guarantee secrecy capacity to be positive in all circumstances and work well for single-input single-output systems. A computation efficient algorithm is presented to optimally allocate power over sub-carriers for secrecy capacity maximisation.