Decomposed and Distributed Modulation to Achieve Secure Transmission

被引:1
|
作者
Li, Zhao [1 ]
Le, Siwei [1 ]
Chen, Jie [1 ]
Shin, Kang G. [2 ]
Liu, Jia [3 ]
Yan, Zheng [1 ]
Jantti, Riku [4 ]
机构
[1] Xidian Univ, Sch Cyber Engn, Xian 710126, Peoples R China
[2] Univ Michigan, Dept Elect Engn & Comp Sci, Ann Arbor, MI 48109 USA
[3] Natl Inst Informat, Ctr Strateg Cyber Resilience Res & Dev, Tokyo 1018430, Japan
[4] Aalto Univ, Dept Commun & Networking, Espoo 02150, Finland
基金
中国国家自然科学基金; 芬兰科学院; 美国国家科学基金会;
关键词
Modulation; Communication system security; Eavesdropping; Wireless sensor networks; Mobile computing; Binary phase shift keying; Transmitting antennas; Distributed transmission; modulation; physical-layer security; secure communication; NETWORKS;
D O I
10.1109/TMC.2024.3391344
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid deployment and wide use of mobile services and applications, more and more sensitive user information is being transmitted wirelessly. Due to the broadcast nature of wireless transmissions, they are exposed to all surrounding entities and thus vulnerable to eavesdropping. To counter this vulnerability, we propose a new physical-layer secure transmission scheme, called DDM-Sec, based on decomposed and distributed modulation (DDM). We show that a high-order modulation can be decomposed into multiple quadrature phase shift keying (QPSK) modulations, each of which can be further represented by two mutually orthogonal binary phase shift keying (BPSK) modulations. Therefore, traditional modulation can be realized by two cooperative transmitters (Txs), each generating a BPSK signal, in a distributed manner. The legitimate receiver (Rx) can decode the desired/intended information from the mixed two received BPSK signals while preventing the eavesdropper from accessing the legitimate user's information. DDM-Sec can effectively exploit the randomness of wireless channels to secure data transmission, enrich the spatial signatures of the legitimate user's transmission by employing two cooperative Txs, and then distribute the user's information to two transmissions so that none of the decomposed signals alone carry the legitimate user's full information. Moreover, due to random deployment of the two Txs and Rx, delay difference of the two transmissions is introduced. This can be further utilized to make eavesdropping difficult. Our theoretical analysis and simulation have shown that DDM-Sec can effectively prevent the eavesdropping, and hence guarantee the secrecy of the legitimate user's data transmission.
引用
收藏
页码:11172 / 11190
页数:19
相关论文
共 50 条
  • [1] Decomposed and Distributed Modulation to Achieve Secure Transmission
    Li, Zhao
    Le, Siwei
    Chen, Jie
    Shin, Kang G.
    Jantti, Riku
    Yan, Zheng
    Liu, Jia
    IEEE CONFERENCE ON GLOBAL COMMUNICATIONS, GLOBECOM, 2023, : 5378 - 5383
  • [2] Decomposed and Distributed Directional Modulation for Secure Wireless Communication
    Qiu, Bin
    Cheng, Wenchi
    Zhang, Wei
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2024, 23 (05) : 5219 - 5231
  • [3] Modified coherence modulation techniques for secure transmission
    Wacogne, B
    Porte, H
    Mollier, P
    Jackson, DA
    ALL-OPTICAL COMMUNICATION SYSTEMS: ARCHITECTURE, CONTROL, AND NETWORK ISSUES II, 1996, 2919 : 130 - 141
  • [4] Distributed Coalition Formation Games for Secure Wireless Transmission
    Walid Saad
    Zhu Han
    Tamer Başar
    Mérouane Debbah
    Are Hjørungnes
    Mobile Networks and Applications, 2011, 16 : 231 - 245
  • [5] Distributed Coalition Formation Games for Secure Wireless Transmission
    Saad, Walid
    Han, Zhu
    Basar, Tamer
    Debbah, Merouane
    Hjorungnes, Are
    MOBILE NETWORKS & APPLICATIONS, 2011, 16 (02): : 231 - 245
  • [6] Secure Transmission of Mobile Agent in Dynamic Distributed Environments
    Zakerolhosseini, Ali
    Nikooghadam, Morteza
    WIRELESS PERSONAL COMMUNICATIONS, 2013, 70 (02) : 641 - 656
  • [7] Secure Transmission of Mobile Agent in Dynamic Distributed Environments
    Ali Zakerolhosseini
    Morteza Nikooghadam
    Wireless Personal Communications, 2013, 70 : 641 - 656
  • [8] Phase modulation and false data transmission for secure communication
    Wacogne, B.
    Jackson, M.D.
    Fisher, N.E.
    Podoleanu, A.
    Jackson, D.A.
    Conference Proceedings - Lasers and Electro-Optics Society Annual Meeting-LEOS, 1996, : 486 - 487
  • [9] Secure transmission via random quadrature spatial modulation
    Qi, Xuanzhe
    Luo, Junshan
    Wang, Hao
    Wang, Shilian
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2020, 31 (08):
  • [10] Secure upgraded spatial modulation for wireless transmission systems
    Rengaraj, Ramaprabha
    Loganathan, Lavanya Dhamodharan
    Konganathan, Gunaseelan
    COMPUTER NETWORKS, 2023, 226