Decomposed and Distributed Modulation to Achieve Secure Transmission

被引:1
|
作者
Li, Zhao [1 ]
Le, Siwei [1 ]
Chen, Jie [1 ]
Shin, Kang G. [2 ]
Liu, Jia [3 ]
Yan, Zheng [1 ]
Jantti, Riku [4 ]
机构
[1] Xidian Univ, Sch Cyber Engn, Xian 710126, Peoples R China
[2] Univ Michigan, Dept Elect Engn & Comp Sci, Ann Arbor, MI 48109 USA
[3] Natl Inst Informat, Ctr Strateg Cyber Resilience Res & Dev, Tokyo 1018430, Japan
[4] Aalto Univ, Dept Commun & Networking, Espoo 02150, Finland
基金
中国国家自然科学基金; 芬兰科学院; 美国国家科学基金会;
关键词
Modulation; Communication system security; Eavesdropping; Wireless sensor networks; Mobile computing; Binary phase shift keying; Transmitting antennas; Distributed transmission; modulation; physical-layer security; secure communication; NETWORKS;
D O I
10.1109/TMC.2024.3391344
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid deployment and wide use of mobile services and applications, more and more sensitive user information is being transmitted wirelessly. Due to the broadcast nature of wireless transmissions, they are exposed to all surrounding entities and thus vulnerable to eavesdropping. To counter this vulnerability, we propose a new physical-layer secure transmission scheme, called DDM-Sec, based on decomposed and distributed modulation (DDM). We show that a high-order modulation can be decomposed into multiple quadrature phase shift keying (QPSK) modulations, each of which can be further represented by two mutually orthogonal binary phase shift keying (BPSK) modulations. Therefore, traditional modulation can be realized by two cooperative transmitters (Txs), each generating a BPSK signal, in a distributed manner. The legitimate receiver (Rx) can decode the desired/intended information from the mixed two received BPSK signals while preventing the eavesdropper from accessing the legitimate user's information. DDM-Sec can effectively exploit the randomness of wireless channels to secure data transmission, enrich the spatial signatures of the legitimate user's transmission by employing two cooperative Txs, and then distribute the user's information to two transmissions so that none of the decomposed signals alone carry the legitimate user's full information. Moreover, due to random deployment of the two Txs and Rx, delay difference of the two transmissions is introduced. This can be further utilized to make eavesdropping difficult. Our theoretical analysis and simulation have shown that DDM-Sec can effectively prevent the eavesdropping, and hence guarantee the secrecy of the legitimate user's data transmission.
引用
收藏
页码:11172 / 11190
页数:19
相关论文
共 50 条
  • [21] Polarized spatial and directional modulation toward secure wireless transmission
    Jiangong Chen
    Xia Lei
    Yue Xiao
    Hongyan Zhang
    Yuan Ding
    Gang Wu
    Science China Information Sciences, 2022, 65
  • [22] Polarized spatial and directional modulation toward secure wireless transmission
    Chen, Jiangong
    Lei, Xia
    Xiao, Yue
    Zhang, Hongyan
    Ding, Yuan
    Wu, Gang
    SCIENCE CHINA-INFORMATION SCIENCES, 2022, 65 (07)
  • [23] Signal Mapping for Bit-Interleaved Coded Modulation Schemes to Achieve Secure Communications
    Xiang, Weichen
    Le Goff, Stephane
    Johnston, Martin
    Cumanan, Kanapathippillai
    IEEE WIRELESS COMMUNICATIONS LETTERS, 2015, 4 (03) : 249 - 252
  • [24] A Distributed Layered Modulation for Relay Downlink Cooperative Transmission
    Meng, Yan
    You, Mingli
    Zhao, Shengjie
    Zhang, Lu
    2010 IEEE 21ST INTERNATIONAL SYMPOSIUM ON PERSONAL INDOOR AND MOBILE RADIO COMMUNICATIONS (PIMRC), 2010, : 1 - 5
  • [25] Secure On-Off Transmission in mmWave Systems With Randomly Distributed Eavesdroppers
    Yang, Weiwei
    Tao, Liwei
    Sun, Xiaoli
    Ma, Ruiqian
    Cai, Yueming
    Zhang, Tao
    IEEE ACCESS, 2019, 7 : 32681 - 32692
  • [26] Secure transmission and power allocation in multiuser distributed massive MIMO systems
    Zhang, Xianyu
    Guo, Daoxing
    An, Kang
    Ma, Wenfeng
    Guo, Kefeng
    WIRELESS NETWORKS, 2020, 26 (02) : 941 - 954
  • [27] Secure transmission and power allocation in multiuser distributed massive MIMO systems
    Xianyu Zhang
    Daoxing Guo
    Kang An
    Wenfeng Ma
    Kefeng Guo
    Wireless Networks, 2020, 26 : 941 - 954
  • [28] Combined Antenna Selection and Beamforming for Secure Transmission in Distributed Antenna Systems
    Jin, Hu
    Kim, Junsu
    2013 INTERNATIONAL CONFERENCE ON ICT CONVERGENCE (ICTC 2013): FUTURE CREATIVE CONVERGENCE TECHNOLOGIES FOR NEW ICT ECOSYSTEMS, 2013, : 1043 - 1047
  • [29] Secure Transmission Design for Cognitive Radio Networks With Poisson Distributed Eavesdroppers
    Xu, Xiaoming
    He, Biao
    Yang, Weiwei
    Zhou, Xiangyun
    Cai, Yueming
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (02) : 373 - 387
  • [30] Secure transmission technology based on direct modulation with random channel characteristics
    Rong Yang
    Aiqun Hu
    Security and Safety, 2023, 2 (01) : 5 - 16