Decomposed and Distributed Modulation to Achieve Secure Transmission

被引:0
|
作者
Li, Zhao [1 ]
Le, Siwei [1 ]
Chen, Jie [1 ]
Shin, Kang G. [2 ]
Jantti, Riku [3 ]
Yan, Zheng [1 ]
Liu, Jia [4 ]
机构
[1] Xidian Univ, Sch Cyber Engn, Xian, Peoples R China
[2] Univ Michigan, Dept Elect Engn & Comp Sci, Ann Arbor, MI USA
[3] Aalto Univ, Dept Commun & Networking, Espoo, Finland
[4] Natl Inst Informat, Ctr Strateg Cyber Resilience Res & Dev, Tokyo, Japan
基金
芬兰科学院; 中国国家自然科学基金;
关键词
Physical-layer security; modulation; distributed transmission; secrecy capacity;
D O I
10.1109/GLOBECOM54140.2023.10437573
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Due to the broadcast nature of wireless transmissions, they are exposed to all surrounding entities and thus vulnerable to eavesdropping. To counter this vulnerability, we propose a new physical-layer secure transmission scheme, called DDM-Sec, based on decomposed and distributed modulation (DDM). DDM-Sec realizes traditional QPSK modulation by using two cooperative transmitters (Txs), each generating a BPSK signal, in a distributed manner. The legitimate receiver (Rx) can decode the desired/intended information from the mixed received signal while preventing the eavesdropper from accessing the legitimate user's information. DDM-Sec can effectively exploit the randomness of wireless channels to encrypt data transmission, enrich the spatial signatures of the legitimate transmission by employing two cooperative Txs. Moreover, DDM-Sec distributes user's information to two transmissions so that none of the decomposed signals alone carry the legitimate user's full information. Our theoretical analysis, hardware experiment, and simulation have shown that DDM-Sec can effectively prevent the eavesdropping, and hence guarantee the secrecy of the legitimate user's data transmission.
引用
收藏
页码:5378 / 5383
页数:6
相关论文
共 50 条
  • [41] Secure Transmission via Jamming in Wireless Networks with Possion Spatially Distributed Eavesdroppers
    Hu, Xiang
    Zhang, Xing
    Huang, Haozhou
    Li, Yongjing
    PROCEEDINGS 2016 INTERNATIONAL CONFERENCE ON NETWORKING AND NETWORK APPLICATIONS NANA 2016, 2016, : 161 - 166
  • [42] Distributed multiprocessor scheduling with decomposed optimization criterion
    Seredynski, F
    Koronacki, J
    Janikow, CZ
    FUTURE GENERATION COMPUTER SYSTEMS, 2001, 17 (04) : 387 - 396
  • [43] Secure Transmission Scheme Based on Uneven PSK Modulation Using Phase Noise
    Dong, Mingxia
    Zhang, Jie
    Zhang, Huibin
    Zhao, Yongli
    Lei, Chao
    2019 ASIA COMMUNICATIONS AND PHOTONICS CONFERENCE (ACP), 2019,
  • [44] A Random Subcarrier-Selection Method Based on Index Modulation for Secure Transmission
    Zhan, Tao
    Chen, Jiangong
    Luan, Shan
    Lei, Xia
    SENSORS, 2022, 22 (07)
  • [45] Chaotic Secure Communication Based on Single Feedback Phase Modulation and Channel Transmission
    Cui, Shuangyi
    Zhang, Jianzhong
    IEEE PHOTONICS JOURNAL, 2019, 11 (05):
  • [46] Artificial Noise-Aided Secure Generalized Spatial Modulation for Multiuser Transmission
    Yang, Pengli
    Qiu, Xin
    Mu, Fuqi
    IEEE COMMUNICATIONS LETTERS, 2020, 24 (11) : 2416 - 2420
  • [47] Covert Information Mapped Spatial and Directional Modulation toward Secure Wireless Transmission
    Tian, Jie
    Chen, Hao
    Wang, Zhigang
    Shi, Xianhua
    Ji, Zhengyu
    Li, Xianglu
    SENSORS, 2021, 21 (22)
  • [48] On the Realization and Design of Chaotic Spread Spectrum Modulation Technique for Secure Data Transmission
    Bhat, G. M.
    Ahmad, Javaid
    Ahmad, Shabir
    2009 INTERNATIONAL CONFERENCE ON MULTIMEDIA, SIGNAL PROCESSING AND COMMUNICATION TECHNOLOGIES, 2009, : 241 - +
  • [49] Enhanced Secure Wireless Transmission Using IRS-Aided Directional Modulation
    Lin, Yeqing
    Shi, Baihua
    Shu, Feng
    Dong, Rongen
    Zhang, Peng
    Wang, Jiangzhou
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2023, 72 (12) : 16794 - 16798
  • [50] TAMED FREQUENCY-MODULATION - NOVEL METHOD TO ACHIEVE SPECTRUM ECONOMY IN DIGITAL TRANSMISSION
    DEJAGER, F
    DEKKER, CB
    IEEE TRANSACTIONS ON COMMUNICATIONS, 1978, 26 (05) : 534 - 542