Decomposed and Distributed Modulation to Achieve Secure Transmission

被引:1
|
作者
Li, Zhao [1 ]
Le, Siwei [1 ]
Chen, Jie [1 ]
Shin, Kang G. [2 ]
Liu, Jia [3 ]
Yan, Zheng [1 ]
Jantti, Riku [4 ]
机构
[1] Xidian Univ, Sch Cyber Engn, Xian 710126, Peoples R China
[2] Univ Michigan, Dept Elect Engn & Comp Sci, Ann Arbor, MI 48109 USA
[3] Natl Inst Informat, Ctr Strateg Cyber Resilience Res & Dev, Tokyo 1018430, Japan
[4] Aalto Univ, Dept Commun & Networking, Espoo 02150, Finland
基金
芬兰科学院; 中国国家自然科学基金; 美国国家科学基金会;
关键词
Modulation; Communication system security; Eavesdropping; Wireless sensor networks; Mobile computing; Binary phase shift keying; Transmitting antennas; Distributed transmission; modulation; physical-layer security; secure communication; NETWORKS;
D O I
10.1109/TMC.2024.3391344
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid deployment and wide use of mobile services and applications, more and more sensitive user information is being transmitted wirelessly. Due to the broadcast nature of wireless transmissions, they are exposed to all surrounding entities and thus vulnerable to eavesdropping. To counter this vulnerability, we propose a new physical-layer secure transmission scheme, called DDM-Sec, based on decomposed and distributed modulation (DDM). We show that a high-order modulation can be decomposed into multiple quadrature phase shift keying (QPSK) modulations, each of which can be further represented by two mutually orthogonal binary phase shift keying (BPSK) modulations. Therefore, traditional modulation can be realized by two cooperative transmitters (Txs), each generating a BPSK signal, in a distributed manner. The legitimate receiver (Rx) can decode the desired/intended information from the mixed two received BPSK signals while preventing the eavesdropper from accessing the legitimate user's information. DDM-Sec can effectively exploit the randomness of wireless channels to secure data transmission, enrich the spatial signatures of the legitimate user's transmission by employing two cooperative Txs, and then distribute the user's information to two transmissions so that none of the decomposed signals alone carry the legitimate user's full information. Moreover, due to random deployment of the two Txs and Rx, delay difference of the two transmissions is introduced. This can be further utilized to make eavesdropping difficult. Our theoretical analysis and simulation have shown that DDM-Sec can effectively prevent the eavesdropping, and hence guarantee the secrecy of the legitimate user's data transmission.
引用
收藏
页码:11172 / 11190
页数:19
相关论文
共 50 条
  • [41] Secure Transmission via Jamming in Wireless Networks with Possion Spatially Distributed Eavesdroppers
    Hu, Xiang
    Zhang, Xing
    Huang, Haozhou
    Li, Yongjing
    PROCEEDINGS 2016 INTERNATIONAL CONFERENCE ON NETWORKING AND NETWORK APPLICATIONS NANA 2016, 2016, : 161 - 166
  • [42] Distributed multiprocessor scheduling with decomposed optimization criterion
    Seredynski, F
    Koronacki, J
    Janikow, CZ
    FUTURE GENERATION COMPUTER SYSTEMS, 2001, 17 (04) : 387 - 396
  • [43] Secure Transmission Scheme Based on Uneven PSK Modulation Using Phase Noise
    Dong, Mingxia
    Zhang, Jie
    Zhang, Huibin
    Zhao, Yongli
    Lei, Chao
    2019 ASIA COMMUNICATIONS AND PHOTONICS CONFERENCE (ACP), 2019,
  • [44] A Random Subcarrier-Selection Method Based on Index Modulation for Secure Transmission
    Zhan, Tao
    Chen, Jiangong
    Luan, Shan
    Lei, Xia
    SENSORS, 2022, 22 (07)
  • [45] Chaotic Secure Communication Based on Single Feedback Phase Modulation and Channel Transmission
    Cui, Shuangyi
    Zhang, Jianzhong
    IEEE PHOTONICS JOURNAL, 2019, 11 (05):
  • [46] Artificial Noise-Aided Secure Generalized Spatial Modulation for Multiuser Transmission
    Yang, Pengli
    Qiu, Xin
    Mu, Fuqi
    IEEE COMMUNICATIONS LETTERS, 2020, 24 (11) : 2416 - 2420
  • [47] Covert Information Mapped Spatial and Directional Modulation toward Secure Wireless Transmission
    Tian, Jie
    Chen, Hao
    Wang, Zhigang
    Shi, Xianhua
    Ji, Zhengyu
    Li, Xianglu
    SENSORS, 2021, 21 (22)
  • [48] On the Realization and Design of Chaotic Spread Spectrum Modulation Technique for Secure Data Transmission
    Bhat, G. M.
    Ahmad, Javaid
    Ahmad, Shabir
    2009 INTERNATIONAL CONFERENCE ON MULTIMEDIA, SIGNAL PROCESSING AND COMMUNICATION TECHNOLOGIES, 2009, : 241 - +
  • [49] Enhanced Secure Wireless Transmission Using IRS-Aided Directional Modulation
    Lin, Yeqing
    Shi, Baihua
    Shu, Feng
    Dong, Rongen
    Zhang, Peng
    Wang, Jiangzhou
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2023, 72 (12) : 16794 - 16798
  • [50] TAMED FREQUENCY-MODULATION - NOVEL METHOD TO ACHIEVE SPECTRUM ECONOMY IN DIGITAL TRANSMISSION
    DEJAGER, F
    DEKKER, CB
    IEEE TRANSACTIONS ON COMMUNICATIONS, 1978, 26 (05) : 534 - 542