Secure Modulation Based on Constellation Mapping Obfuscation in OFDM Based TDD Systems

被引:3
作者
Bang, Inkyu [1 ]
Kim, Taehoon [2 ]
机构
[1] Hanbat Natl Univ, Dept Informat & Commun Engn, Daejeon 34158, South Korea
[2] Hanbat Natl Univ, Dept Comp Engn, Daejeon 34158, South Korea
基金
新加坡国家研究基金会;
关键词
Wireless network security; physical-layer security; modulation; obfuscation; fuzzy commitment; SECRET KEY GENERATION; CHANNEL ESTIMATION;
D O I
10.1109/ACCESS.2020.3034633
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose a secure modulation technique based on constellation mapping obfuscation to harden computational complexity for security at the physical-layer. To obfuscate mapping from bit stream to modulated symbols, our proposed scheme randomly changes a constellation mapping rule at each packet transmission opportunity, instead of employing a pre-determined mapping rule (e.g., Gray-coded mapping) at every packet transmission opportunity. Furthermore, to securely share the mapping rule between the transmitter and the desired receiver, the proposed scheme uses wireless channel based encryption and the fuzzy commitment with an error correction coding. We derive asymptotic bit error rate of the proposed scheme and validate our analysis through extensive simulations. We verify that our proposed scheme can further improve wireless security at the physical-layer irrespective of the upper layers' cryptographic schemes, which can be achieved by computational hardness MW computations are required for the eavesdropper to crack the mapping rule when M-quadrature amplitude modulation (QAM) is considered (e.g., 64! approximate to 1.27 x 10(89) combinations for 64-QAM).
引用
收藏
页码:197644 / 197653
页数:10
相关论文
共 37 条
[1]   Intercarrier Interference-Aware Pilot-Aided Channel Estimation in OFDM Systems [J].
Almoneer, Mohammed ;
Rohde, Christian ;
Hassan, Khaled ;
Gerstacker, Wolfgang H. .
IEEE TRANSACTIONS ON BROADCASTING, 2017, 63 (03) :449-462
[2]   A Physical-Layer Security Scheme by Phase-Based Adaptive Modulation [J].
Althunibat, Saud ;
Sucasas, Victor ;
Rodriguez, Jonathan .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2017, 66 (11) :9931-9942
[3]  
[Anonymous], 2011, P 9 INT C MOB SYST A
[4]  
[Anonymous], 2011, Physical-Layer Security:From Information Theory to Security Engineering, DOI DOI 10.1017/CBO9780511977985
[5]   A Serious Game-Derived Index for Detecting Children With Heterogeneous Developmental Disabilities: Randomized Controlled Trial [J].
Bang, Changbae ;
Nam, Yelin ;
Ko, Eun Jae ;
Lee, Wooseong ;
Kim, Byungjae ;
Choi, Yejin ;
Park, Yu Rang .
JMIR SERIOUS GAMES, 2019, 7 (04)
[6]   Artificial Noise-Aided User Scheduling From the Perspective of Secrecy Outage Probability [J].
Bang, Inkyu ;
Kim, Su Min ;
Sung, Dan Keun .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2018, 67 (08) :7816-7820
[7]   Artificial Noise-Aided User Scheduling for Optimal Secrecy Multiuser Diversity [J].
Bang, Inkyu ;
Kim, Su Min ;
Sung, Dan Keun .
IEEE COMMUNICATIONS LETTERS, 2017, 21 (03) :528-531
[8]   Performance analysis,of the IEEE 802.11 distributed coordination function [J].
Bianchi, G .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2000, 18 (03) :535-547
[9]  
Breit G., 2009, 80211100087R0 IEEE
[10]   Physical Layer Security of QSTBC With Power Scaling in MIMO Wiretap Channels [J].
Chae, Seong Ho ;
Bang, Inkyu ;
Lee, Hoojin .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (05) :5647-5651