Computer Science ›› 2020, Vol. 47 ›› Issue (3): 304-311.doi: 10.11896/jsjkx.190200369

• Information Security • Previous Articles     Next Articles

Performance Study on Constellation Obfuscation Design Method for Physical Layer Security

XI Chen-jing,GAO Yuan-yuan,SHA Nan   

  1. (Communications Engineering Academy, The Army Engineering University of PLA, Nanjing 210007, China)
  • Received:2019-02-27 Online:2020-03-15 Published:2020-03-30
  • About author:XI Chen-jing,born in 1993,postgradua-te.Her main research interests include physical layer security and so on. GAO Yuan-yuan,born in 1968,Ph.D,professor.Her main research interests include physical layer security and physical layer network.
  • Supported by:
    This work was supported by the National Natural Science Foundation of China (61501511).

Abstract: Physical layer security encryption technology is an effective physical layer security method to ensure the safe transmission of information.The signal constellation is designed by means of phase rotation,modulation constellation diversity,symbol obfuscation,amplitude adjustment and symbol sequence change to protect modulation mode and modulation symbol information.The existing physical layer security encryption technology has some disadvantages,such as unclassified key sharing and insufficient constellation ambiguity.The MIO scheme adoptes the encryption method of superposition of artificial noise symbol key andmo-dulated symbol vector to solve the problem of insufficient constellation ambiguity.Inspired by MIO scheme,this paper proposed a new physical layer security encryption scheme based on constellation obfuscation design (COD) by superimposing channel coefficient and modulated symbol vector.Under the condition of TDD mode and channel reciprocity,the channel coefficient of the legitimate channel is used as the key to solve the problem of unclassified key pre-sharing.This paper introduced the complete transmission process of sending-end encryption and legal-end decryption,and analyzed the reception process of high-order cumulant modulation re-cognition and intelligent attack eavesdropper.The theoretical SER (symbol error rate) equation of legitimate receiver in Rayleigh fading channel was derived.Simulation of SER performance of legitimate receiver,high order cumulant modulation re-cognition eavesdropper and intelligent attack eavesdropper were conducted.The performance of the legitimate receiver and eavesdropper of MIO scheme and COD scheme are compared.Simulation results show that when the SER of legitimate receiver is 1×10-4,the SNR(signal-to-noise ratio) of COD scheme is 6dB lower than that of MIO scheme.After the COD scheme is encrypted,when SNR is 0,the success rate of modulation identification is 11.8%,and the highest success rate of modulation identification is 25%,which remains stable after the SNR is greater than 40dB.In the first three data packets,the SER of the COD scheme’s intelligent attack eavesdropping terminal is always 0.284,while that of the MIO scheme’s eavesdropper who knowns the starting key is lower.With the SNR between 0 and 54dB,the SER performance of the legitimate receiver is always better than that of the modulation recognition eavesdropping terminal and the intelligent attack eavesdropping terminal.Therefore,the proposed COD scheme can guarantee the secure communication and resist the attack of modulation recognition and intelligent attack eavesdropper,and the effectiveness and reliability of COD scheme are better than MIO scheme.

Key words: Constellation mapping, Constellation obfuscation, Modulation, Physical layer security, Physical layer security encryption

CLC Number: 

  • TP918.9
[1]SHAFIEE S,ULUKUSS.Achievable rates in Gaussian MISO channels with secrecy constraints[C]∥IEEE International Symposium on Conference:Information Theory,2007(ISIT 2007).IEEE,2007:2466-2470.
[2]KHISTI A,WORNELL G,WIESEL A,et al.On the Gaussian MIMO wiretap channel[C]∥IEEE International Symposium on Conference:Information Theory,2007(ISIT 2007).IEEE,2007:2471-2475.
[3]WANG K,WANG X,ZHANG X.SLNR-based transmit beamforming for MIMO wiretap channel[J].Wireless Personal Communications,2013,71(1):109-121.
[4]LI Q,MAW K.Optimal and robust transmit designs for MISO channel secrecy by semidefinite programming[J].IEEE Tran-sactions on Signal Processing,2011,59(8):3799-3812.
[5]BAGHERIKARAM G,MOTAHARIA S,KHANDANI A K.The secrecy capacity region of the Gaussian MIMO broadcast channel [J].IEEE Transactions on Information Theory,2013,59(5):2673-2682.
[6]NEGI R,GOEL S.Secret communication using artificial noise [C]∥IEEE 62nd Vehicular Technology Conference,2005.IEEE,2005.
[7]LAI L,GAMAL H E.The relay-eavesdropper channel:Cooperation for secrecy [J].IEEE Transactions on Information Theory,2008,54(9):4005-4019.
[8]LUO S,LI J,PETROPULU A.Physical layer security with uncoordinated helpers implementing cooperative jamming[J].ar-Xiv:1202.6596,2012.
[9]DONG L,HAN Z,PETROPULU A P,et al.Improving wireless physical layer security via cooperating relays[J].IEEE Transactions on Signal Processing,2010,58(3):1875-1888.
[10]EKREM E,ULUKUS S.Secrecy in cooperative relay broadcast channels[J].IEEE Transactions on Information Theory,2011,57(1):137-155.
[11]LIU Y,DRAPER S C,SAYEED A M.Exploiting channel diversity in secret key generation from multipath fading randomness[J].IEEE Transactions on Information Forensics and Security,2012,7(5):1484-1497.
[12]AONO T,HIGUCHI K,OHIRA T,et al.Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels[J].IEEE Transactions on Antennas and Propagation,2005,53(11):3776-3784.
[13]REN K,SU H,WANG Q.Secret key generation exploiting channel characteristics in wireless communications[J].IEEE Wireless Communications,2011,18(4):6-12.
[14]BLOCH M,BARROS J,RODRIGUES M R D,et al.Wireless information-theoretic security[J].IEEE Transactions on Information Theory,2008,54(6):2515-2534.
[15]GOERGEN N,LIN W S,LIU K J R,et al.Extrinsic channel-like fingerprint embedding for authenticating MIMO systems [J].IEEE Transactions on Wireless Communications,2011,10(12):4270-4281.
[16]COBB W E,LASPE E D,BALDWIN R O,et al.Intrinsic physi- cal-layer authentication of integrated circuits [J].IEEE Tran-sactions on Information Forensics & Security,2015.
[17]MARTINIAN E,WORNELLG W,CHEN B.Authentication with distortion criteria[J].IEEE Transactions on Information Theory,2005,51(7):2523-2542.
[18]MA R,DAI L,WANG Z,et al.Secure communication in TDS-OFDM system using constellation rotation and noise insertion[J].IEEE Transactions on Consumer Electronics,2010,56(3):1328-1332.
[19]HAN C G,HASHIMOTO T,SUEHIRO N.Constellation-rota- ted vector OFDM and its performance analysis over rayleigh fading channels [J].IEEE Transactions on Communications,2010,58(3):828-838.
[20]PÖPPER C,TIPPENHAUER N O,DANEV B,et al.Investigation of Signal and Message Manipulations on the Wireless Channel[C]∥European Conference on Research in Computer Security.Springer-Verlag,2011:40-59.
[21]CHEN B,ZHU C S,LI W,et al.Original Symbol Phase Rotated Secure Transmission Against Powerful Massive MIMO Eavesdropper[J].IEEE Access,2017,4:3016-3025.
[22]XU Z,YUAN T,GONG Y,et al.Achieving secure communica- tion through random phase rotation technique[C]∥Wireless Communications & Mobile Computing Conference.IEEE,2017.
[23]ALTHUNIBAT,SUCASAS V,RODRIGUEZ J.A Physical Layer Security Scheme by Phase-Based Adaptive Modulation[J].IEEE Transactions on Vehicular Technology,2017,66(11):9931-9942.
[24]HUSAIN M I,MAHANT S,SRIDHAR R.CD-PHY:Ph-ysical layer security in wireless networks through constellation diversity [J].arXiv:1108.5148,2012.
[25]MA R,WANG Z,YANG Z.Improving physical layer security using APSK constellations with finite-alphabet inputs [C]∥2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC).2013:149-152.
[26]ZANG G,HUANG B,CHEN L,et al.One trans-mission scheme based on variable MSK modulator for wireless physical layer security[C]∥2015 International Conference on Wireless Communications & Signal Processing (WCSP).2015:1-5.
[27]MAO X N,LIN K J,LIU H.A physical layer security algorithm based on constellation[C]∥International Conference on Communication Technology.IEEE,2018.
[28]HUANG Y,EL-HAJJAR M.Mohammed Multi-dimensional en- cryption scheme based on physical layer for fading channel[J].IET Communications,2018,12(9):2470-2477.
[29]LEI B B.Research on Protection Algorithms of Modulation Mode Based on Physical Layer Encryption[D].Xi’an:Northwest University,2012.
[30]XIONG T,LOU W,ZHANG J,et al.MIO:Enhancing Wireless Communications Security Through Physical Layer Multiple Inter-Symbol Obfuscation [J].IEEE Transactions on Information Forensics and Security,2015,10(8):1678-1691.
[31]PROAKIS J G,MASOUD S.Digital Communications:Fifth Edition[M].Electronic Industry Press,2012.
[1] JIAO Xiang, WEI Xiang-lin, XUE Yu, WANG Chao, DUAN Qiang. Automatic Modulation Recognition Based on Deep Learning [J]. Computer Science, 2022, 49(5): 266-278.
[2] ZHAO Geng, SONG Xin-yu, MA Ying-jie. Secure Data Link of Unmanned Aerial Vehicle Based on Chaotic Sub-carrier Modulation [J]. Computer Science, 2022, 49(3): 322-328.
[3] WANG Chao, WEI Xiang-lin, TIAN Qing, JIAO Xiang, WEI Nan, DUAN Qiang. Feature Gradient-based Adversarial Attack on Modulation Recognition-oriented Deep Neural Networks [J]. Computer Science, 2021, 48(7): 25-32.
[4] DING Qing-feng, XI Tao, LIAN Yi-chong, WU Ze-xiang. Antenna Selection for Spatial Modulation Based on Physical Layer Security [J]. Computer Science, 2020, 47(7): 322-327.
[5] CHEN Jin-yin, CHENG Kai-hui and ZHENG Hai-bin. Deep Learning Based Modulation Recognition Method in Low SNR [J]. Computer Science, 2020, 47(6A): 283-288.
[6] CHEN Jin-yin, JIANG Tao and ZHENG Hai-bin. Radio Modulation Recognition Based on Signal-noise Ratio Classification [J]. Computer Science, 2020, 47(6A): 310-317.
[7] CHEN Pei-pei, LI Tao-shen, FANG Xing, WANG Zhe. Study on Secure Beamforming for Full-duplex Energy Harvesting Relaying System [J]. Computer Science, 2020, 47(6): 316-321.
[8] XU Mao,HOU Jin,WU Pei-jun,LIU Yu-ling,LV Zhi-liang. Convolutional Neural Networks Based on Time-Frequency Characteristics for Modulation Classification [J]. Computer Science, 2020, 47(2): 175-179.
[9] CHEN Chao, ZHAO Chun-lei, ZHANG Chun-xiang, LUO Hui. Review of IoT Sonar Perception [J]. Computer Science, 2020, 47(10): 9-18.
[10] PENG Lei, ZANG Guo-zhen, GAO Yuan-yuan, SHA Nan, XI Chen-jing, JIANG Xuan-you. Research and Application of LMS Adaptive Interference Cancellation in Physical Layer SecurityCommunication System Based on Artifical Interference [J]. Computer Science, 2019, 46(6): 168-173.
[11] ZOU Peng, CHEN Yu-zhang, CHEN Long-biao, ZENG Zhang-fan. Night Vision Restoration Algorithm Based on Neural Network for Illumination Distribution Prediction [J]. Computer Science, 2019, 46(11A): 329-333.
[12] YU Xiu-lan, WANG Si-yi. Adaptive Information Transmission Scheme for LEO Satellite Based on Ka Band [J]. Computer Science, 2019, 46(11): 72-79.
[13] JIANG Xuan-you, WEI Yi-min, WANG Lei, LIU Ling-jun, PENG Lei. M-APSK Signal Modulation and Demodulation Method Approaching Gaussian Channel Capacity [J]. Computer Science, 2019, 46(10): 97-102.
[14] CHEN Gui-ping,WANG Zi-niu. Multiple Encrypted Storage Technology of User Information Based on Big Data Analysis [J]. Computer Science, 2018, 45(7): 150-153.
[15] LIU Dan, MA Xiu-rong and SHAN Yun-long. Digital Modulation Signal Recognition Method Based on ST-RFT Algorithm [J]. Computer Science, 2018, 45(5): 64-68.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!