Highly secure non-orthogonal multiple access based on key accompanying transmission in training sequence

被引:26
|
作者
Han, Yongcan [1 ,2 ,3 ,4 ]
Ren, Jianxin [1 ,3 ,4 ]
Liu, Bo [1 ,3 ,4 ]
Li, Yong [2 ]
Ullah, Rahat [1 ,3 ,4 ]
Mao, Yaya [1 ,3 ,4 ]
Wu, Xiangyu [1 ,3 ,4 ]
Chen, Shuaidong [1 ,3 ,4 ]
Wang, Bin [2 ]
Wu, Yongfeng [1 ,3 ,4 ]
Zhao, Lilong [1 ,3 ,4 ]
机构
[1] Nanjing Univ Informat Sci & Technol, Inst Opt & Elect, Nanjing 210044, Peoples R China
[2] Sci & Technol Commun Networks Lab, Shijiazhuang, Hebei, Peoples R China
[3] Nanjing Univ Informat Sci & Technol, Jiangsu Key Lab Optoelect Detect Atmosphere Ocean, Nanjing 210044, Peoples R China
[4] Nanjing Univ Informat Sci & Technol, Jiangsu Int Joint Lab Meteorol Photon & Optoelect, Nanjing 210044, Peoples R China
基金
中国国家自然科学基金;
关键词
PHYSICAL LAYER SECURITY; OFDM-PON; POWER ALLOCATION; NOMA; ENCRYPTION; SCHEME; CHAOS; CODE;
D O I
10.1364/OE.510558
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
This paper proposes a high -security chaotic encrypted power sparse coding division (CE-PSCD) scheme for 7 -core fiber based on non -orthogonal multiple access (NOMA) technology. The method utilizes power multiplexing to realize parallel transmission of two signals. Joint encryption of the four-dimensional region is realized using constellation mapping encryption, carrier frequency encryption, symbol scrambling, and sparse code scrambling. What we believe to be a new dimension for encryption of autonomously designed sparse codes is proposed. Meanwhile, we hide the chaotic key in training sequence (TS) to realize the co -transmission of the key and the message. A 70 Gb/s CE-PSCD signal transmission over 2 km of 7 -core fiber is demonstrated experimentally. At the limit of forward error correction (FEC) similar to 3.8 x 10-3, the difference in the encrypted sensitivity among different users at the equal power level is 0.36 dB, which means that the fairness of users will not be destroyed. The key space can reach 10134, with a bit error rate (BER) of about 0.5 for brute -force cracking at illegal receivers. As long as the key bits in the hidden TS are wrong by one bit, the BER stays around 0.5. The results show no significant attenuation of the signal before and after encryption at either high or low power, verifying the high -security performance of our proposed scheme.
引用
收藏
页码:1979 / 1997
页数:19
相关论文
共 50 条
  • [11] Beamforming for the Successive Relaying-Based Cooperative Non-Orthogonal Multiple Access Transmission
    Hwang, Duckdong
    Nam, Sung Sik
    Yang, Janghoon
    Song, Hyoung-Kyu
    APPLIED SCIENCES-BASEL, 2024, 14 (08):
  • [12] Joint Transmission Scheduling and Power Allocation in Non-Orthogonal Multiple Access
    Fu, Shu
    Fang, Fang
    Zhao, Lian
    Ding, Zhiguo
    Jian, Xin
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2019, 67 (11) : 8137 - 8150
  • [13] Differential Modulation-Based Non-Orthogonal Multiple Access
    Kumar, Surjeet
    Bhatnagar, Manav R.
    2024 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, WCNC 2024, 2024,
  • [14] A Lattice Coding Based Non-Orthogonal Multiple Access Scheme
    Bao, Jinchen
    Ma, Zheng
    Zhu, Zhongliang
    Alhaji Mahamadu, Mahamuda
    Ding, Zhiguo
    2015 SEVENTH INTERNATIONAL WORKSHOP ON SIGNAL DESIGN AND ITS APPLICATIONS IN COMMUNICATIONS (IWSDA), 2015, : 133 - 136
  • [15] Wireless Powered Cooperative Non-Orthogonal Multiple Access Transmission
    Liu, Lu
    Zhang, Zhifei
    Shen, Chao
    Gong, Jie
    Chang, Tsung-Hui
    2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC WORKSHOPS), 2018,
  • [16] Non-Orthogonal Multiple Access-Based Statistical Signal Transmission Technique
    Xu, Tianheng
    Zhang, Mengying
    Zhou, Ting
    Wei, Fanbo
    Hu, Honglin
    ICC 2020 - 2020 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2020,
  • [17] The impact of user mobility into non-orthogonal multiple access (NOMA) transmission systems
    Masaracchia A.
    Nguyen V.-L.
    Nguyen M.T.
    EAI Endorsed Transactions on Industrial Networks and Intelligent Systems, 2020, 7 (24) : 1 - 5
  • [18] Secure Relaying in Non-Orthogonal Multiple Access: Trusted and Untrusted Scenarios
    Arafa, Ahmed
    Shin, Wonjae
    Vaezi, Mojtaba
    Poor, H. Vincent
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 : 210 - 222
  • [19] Multi-dimensional disturbance secure communication system with dynamic key hiding transmission based on power-domain non-orthogonal multiple access
    Zhong, Qing
    Liu, Bo
    Ren, Jianxin
    Guo, Zhiruo
    Ullah, Rahat
    Mao, Yaya
    Wu, Xiangyu
    Ma, Yiming
    Wu, Yongfeng
    Zhao, Lilong
    Sun, Tingting
    OPTICS COMMUNICATIONS, 2022, 524
  • [20] Multiple Codebook-Based Non-Orthogonal Multiple Access
    Tsegaye, Ameha T.
    Kang, Chung G.
    IEEE WIRELESS COMMUNICATIONS LETTERS, 2020, 9 (05) : 683 - 687