Highly secure non-orthogonal multiple access based on key accompanying transmission in training sequence

被引:26
|
作者
Han, Yongcan [1 ,2 ,3 ,4 ]
Ren, Jianxin [1 ,3 ,4 ]
Liu, Bo [1 ,3 ,4 ]
Li, Yong [2 ]
Ullah, Rahat [1 ,3 ,4 ]
Mao, Yaya [1 ,3 ,4 ]
Wu, Xiangyu [1 ,3 ,4 ]
Chen, Shuaidong [1 ,3 ,4 ]
Wang, Bin [2 ]
Wu, Yongfeng [1 ,3 ,4 ]
Zhao, Lilong [1 ,3 ,4 ]
机构
[1] Nanjing Univ Informat Sci & Technol, Inst Opt & Elect, Nanjing 210044, Peoples R China
[2] Sci & Technol Commun Networks Lab, Shijiazhuang, Hebei, Peoples R China
[3] Nanjing Univ Informat Sci & Technol, Jiangsu Key Lab Optoelect Detect Atmosphere Ocean, Nanjing 210044, Peoples R China
[4] Nanjing Univ Informat Sci & Technol, Jiangsu Int Joint Lab Meteorol Photon & Optoelect, Nanjing 210044, Peoples R China
基金
中国国家自然科学基金;
关键词
PHYSICAL LAYER SECURITY; OFDM-PON; POWER ALLOCATION; NOMA; ENCRYPTION; SCHEME; CHAOS; CODE;
D O I
10.1364/OE.510558
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
This paper proposes a high -security chaotic encrypted power sparse coding division (CE-PSCD) scheme for 7 -core fiber based on non -orthogonal multiple access (NOMA) technology. The method utilizes power multiplexing to realize parallel transmission of two signals. Joint encryption of the four-dimensional region is realized using constellation mapping encryption, carrier frequency encryption, symbol scrambling, and sparse code scrambling. What we believe to be a new dimension for encryption of autonomously designed sparse codes is proposed. Meanwhile, we hide the chaotic key in training sequence (TS) to realize the co -transmission of the key and the message. A 70 Gb/s CE-PSCD signal transmission over 2 km of 7 -core fiber is demonstrated experimentally. At the limit of forward error correction (FEC) similar to 3.8 x 10-3, the difference in the encrypted sensitivity among different users at the equal power level is 0.36 dB, which means that the fairness of users will not be destroyed. The key space can reach 10134, with a bit error rate (BER) of about 0.5 for brute -force cracking at illegal receivers. As long as the key bits in the hidden TS are wrong by one bit, the BER stays around 0.5. The results show no significant attenuation of the signal before and after encryption at either high or low power, verifying the high -security performance of our proposed scheme.
引用
收藏
页码:1979 / 1997
页数:19
相关论文
共 50 条
  • [1] Secure Transmission to the Strong User in Non-Orthogonal Multiple Access
    Feng, Youhong
    Yan, Shihao
    Yang, Zhen
    IEEE COMMUNICATIONS LETTERS, 2018, 22 (12) : 2623 - 2626
  • [2] Secure Transmission in Downlink Non-Orthogonal Multiple Access Based on Polar Codes
    Sun, Ce
    Fei, Zesong
    Lie, Bin
    Wang, Xinyi
    Li, Nan
    Hu, Lijie
    CHINA COMMUNICATIONS, 2021, 18 (09) : 221 - 235
  • [3] Secure Transmission in HARQ-Assisted Non-Orthogonal Multiple Access Networks
    Xiang, Zhongwu
    Yang, Weiwei
    Pan, Gaofeng
    Cai, Yueming
    Song, Yi
    Zou, Yulong
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 : 2171 - 2182
  • [4] On the Design of Secure Non-Orthogonal Multiple Access Systems
    He, Biao
    Liu, An
    Yang, Nan
    Lau, Vincent K. N.
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2017, 35 (10) : 2196 - 2206
  • [5] Optimal Power Allocation for Secure Non-orthogonal Multiple Access Transmission
    Lu, Weidang
    Wu, Weicong
    Qian, Liping
    Wu, Yuan
    Yu, Ningning
    Huang, Liang
    2020 IEEE 92ND VEHICULAR TECHNOLOGY CONFERENCE (VTC2020-FALL), 2020,
  • [6] Secure Transmission in Non-Orthogonal Multiple Access Networks With an Untrusted Relay
    Xiang, Zhongwu
    Yang, Weiwei
    Pan, Gaofeng
    Cai, Yueming
    Sun, Xiaoli
    IEEE WIRELESS COMMUNICATIONS LETTERS, 2019, 8 (03) : 905 - 908
  • [7] Deep learning-based resource allocation for secure transmission in a non-orthogonal multiple access network
    Zhang, Miao
    Zhang, Yao
    Cen, Qian
    Wu, Shixun
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2022, 18 (06)
  • [8] Secure Communications in a Unified Non-Orthogonal Multiple Access Framework
    Yue, Xinwei
    Liu, Yuanwei
    Yao, Yuanyuan
    Li, Xuehua
    Liu, Rongke
    Nallanathan, Arumugam
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2020, 19 (03) : 2163 - 2178
  • [9] Exploiting Inter-User Interference for Secure Massive Non-Orthogonal Multiple Access
    Chen, Xiaoming
    Zhang, Zhaoyang
    Zhong, Caijun
    Ng, Derrick Wing Kwan
    Jia, Rundong
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2018, 36 (04) : 788 - 801
  • [10] Secure Non-Orthogonal Multiple Access: An Interference Engineering Perspective
    Lv, Lu
    Jiang, Hai
    Ding, Zhiguo
    Ye, Qiang
    Al-Dhahir, Naofal
    Chen, Jian
    IEEE NETWORK, 2021, 35 (04): : 278 - 285