Decomposed and Distributed Modulation to Achieve Secure Transmission

被引:1
|
作者
Li, Zhao [1 ]
Le, Siwei [1 ]
Chen, Jie [1 ]
Shin, Kang G. [2 ]
Liu, Jia [3 ]
Yan, Zheng [1 ]
Jantti, Riku [4 ]
机构
[1] Xidian Univ, Sch Cyber Engn, Xian 710126, Peoples R China
[2] Univ Michigan, Dept Elect Engn & Comp Sci, Ann Arbor, MI 48109 USA
[3] Natl Inst Informat, Ctr Strateg Cyber Resilience Res & Dev, Tokyo 1018430, Japan
[4] Aalto Univ, Dept Commun & Networking, Espoo 02150, Finland
基金
中国国家自然科学基金; 芬兰科学院; 美国国家科学基金会;
关键词
Modulation; Communication system security; Eavesdropping; Wireless sensor networks; Mobile computing; Binary phase shift keying; Transmitting antennas; Distributed transmission; modulation; physical-layer security; secure communication; NETWORKS;
D O I
10.1109/TMC.2024.3391344
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid deployment and wide use of mobile services and applications, more and more sensitive user information is being transmitted wirelessly. Due to the broadcast nature of wireless transmissions, they are exposed to all surrounding entities and thus vulnerable to eavesdropping. To counter this vulnerability, we propose a new physical-layer secure transmission scheme, called DDM-Sec, based on decomposed and distributed modulation (DDM). We show that a high-order modulation can be decomposed into multiple quadrature phase shift keying (QPSK) modulations, each of which can be further represented by two mutually orthogonal binary phase shift keying (BPSK) modulations. Therefore, traditional modulation can be realized by two cooperative transmitters (Txs), each generating a BPSK signal, in a distributed manner. The legitimate receiver (Rx) can decode the desired/intended information from the mixed two received BPSK signals while preventing the eavesdropper from accessing the legitimate user's information. DDM-Sec can effectively exploit the randomness of wireless channels to secure data transmission, enrich the spatial signatures of the legitimate user's transmission by employing two cooperative Txs, and then distribute the user's information to two transmissions so that none of the decomposed signals alone carry the legitimate user's full information. Moreover, due to random deployment of the two Txs and Rx, delay difference of the two transmissions is introduced. This can be further utilized to make eavesdropping difficult. Our theoretical analysis and simulation have shown that DDM-Sec can effectively prevent the eavesdropping, and hence guarantee the secrecy of the legitimate user's data transmission.
引用
收藏
页码:11172 / 11190
页数:19
相关论文
共 50 条
  • [31] Directional Modulation-Enabled Secure Transmission with Intelligent Reflecting Surface
    Lai, Liangling
    Hu, Jinsong
    Chen, Youjia
    Zheng, Haifeng
    Yang, Nan
    2020 IEEE 3RD INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND SIGNAL PROCESSING (ICICSP 2020), 2020, : 450 - 453
  • [32] Secure Precise Transmission with Multi-Relay-Aided Directional Modulation
    Zhu, Wei
    Shu, Feng
    Liu, Tingting
    Zhou, Xiaobo
    Hu, Jinsong
    Liu, Guangzu
    Gui, Linqing
    Li, Jun
    Lu, Jinhui
    2017 9TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS AND SIGNAL PROCESSING (WCSP), 2017,
  • [33] Secure Wireless Transmission Based on Precoding-Aided Spatial Modulation
    Wu, Feilong
    Dong, Chen
    Yang, Lie-Liang
    Wang, Wenjie
    2015 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2015,
  • [34] DISTRIBUTED AND SECURE
    KAY, R
    BYTE, 1994, 19 (06): : 165 - &
  • [35] Efficient Transmission and Secure Sharing of Sensing data under Distributed ISAC Conditions
    Mu, Junsheng
    Jing, Zexuan
    Cui, Yuanhao
    Jing, Xiaojun
    Zhou, Quan
    Ouyang, Wenjiang
    2023 INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING, IWCMC, 2023, : 965 - 970
  • [36] A distributed computing perspective of unconditionally secure information transmission in Russian cards problems
    Rajsbaum, Sergio
    THEORETICAL COMPUTER SCIENCE, 2023, 952
  • [37] Study on secure distributed transmission in two-way wireless communication links
    Yamanaka, Masaaki
    Zou Jingbo
    Ohno, Shuichi
    Miayamoto, Shinichi
    Sampei, Seiichi
    2017 IEEE GLOBECOM WORKSHOPS (GC WKSHPS), 2017,
  • [38] Optimizing Training and Transmission Overheads for Secure URLLC Against Randomly Distributed Eavesdroppers
    Xie, Yuncong
    Ren, Pinyi
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2022, 71 (11) : 11921 - 11935
  • [39] Distributed Transmission for Secure Wireless Links Based on a Secret-Sharing Method
    Yamanaka, Masaaki
    Wei, ShenCong
    Zou, Jingbo
    Ohno, Shuichi
    Miyamoto, Shinichi
    Sampei, Seiichi
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2019, E102B (12) : 2286 - 2296
  • [40] Distributed secure transmission for covert communication under multi-user network
    Huang, Ying
    Lei, Jing
    IET COMMUNICATIONS, 2022, 16 (16) : 1901 - 1911