Computer Science ›› 2018, Vol. 45 ›› Issue (10): 64-68.doi: 10.11896/j.issn.1002-137X.2018.10.013

• Network & Communication • Previous Articles     Next Articles

Modulation Protection Algorithm Based on Wireless OFDM Systems

GAO Bao-jian, WANG Shao-di, REN Yu-hui, WANG Yu-jie   

  1. College of Information Science and Technology,Northwest University,Xi’an 710127,China
  • Received:2017-12-08 Online:2018-11-05 Published:2018-11-05

Abstract: With the broadband trend in wireless communication system,traditional data encryption methods have high computational complexity,and haven’t taken the security of modulation modes of the physical layer into consideration.Aiming at this problem,a modulation protection algorithm based on wireless OFDM systems was proposed from the perspective of physical layer encryption.Modulation protection effect of the proposed algorithm was analyzed respectively in the cases of single-carrier and multi-carrier,and typical modulation identification methods in the cognitive radio were adopted in the simulation to analyze and compare the recognition rate before and after encryption.Theoretical ana-lysis and simulation results show that this algorithm doesn’t change the performance of original system,and has high capacity of modulation protection.

Key words: Modulation protection, Physical layer encryption, OFDM, Cognitive radio

CLC Number: 

  • TN918
[1]BARENGHI A,BREVEGLIERI L,KOREN I,et al.Fault Injection Attacks on Cryptographic Devices:Theory,Practice,and Countermeasures[J].Proceeding of The IEEE,2012,100(11):3056-3076.
[2]MU P C,YIN Q Y,WANG W J.A Security Method of Physical Layer Transmission Using Random Antenna Arrays in Wireless Communication[J].Journal of Xi’an Jiaotong University,2010,44(6):62-66.(in Chinese)
[3]LIN T,HUANG K Z,LUO W Y.A Multicarrier-based Physical Layer Security Scheme for the Multicast Systems[J].Journal of Electronics and Information Technology,2013,35(6):1388-1343.(in Chinese)
[4]LI M L,HUANG K Z,ZHONG Z.Physical-layer Security Algorithm Based on Joint Scrambling with Spatial and Frequency Resource[J].Journal of Electronics and Information Technology,2013,35(12):2966-2971.(in Chinese)
[5]LIU Y,WANG G P,XIAO M,et al.Spectrum Sensing and Throughput Analysis for Cognitive Two-Way Relay Networks with Multiple Transmit Powers[J].IEEE Journal on Selected Areas in Communications,2016,34(11):3038-3047.
[6]JIANG H Q,TANG P Z,GUAN W S.Research on Signal Modu- lation Recognition Technology Based on PDW[J].Transactions of Beijing Institute of Technology,2013,33(11):1183-1188.(in Chinese)
[7]ALI A,FAN Y,SHU L.Automatic Modulation Classification of Digital Modulation Signals with Stacked Autoencoders[J].Digi-tal Signal Processing,2017,71:108-116.
[8]MAREY M,DOBRE O A,INKOL R.Blind STBC Identification for Multiple-Antenna OFDM Systems[J].IEEE Transactions on Communications,2014,62(5):1554-1567.
[9]CHORTI A.Masked OFDM:A Physical Layer Encryption for Future OFDM Applications[C]∥IEEE Globecom Workshop on Mobile Computing and Emerging Communication Networks.2010:1254-1258.
[10]GAO B J,WANG Y J,LUO Y L,et al.A Hiding Algorithm for OFDM Constellation Mapping Based on Physical Layer Encryption[J].Journal of Applied Sciences,2013,13(18):3790-3797.
[11]LIU B,ZHANG L,XIN X,et al.Constellation-masked Secure Communication Technique for OFDM-PON[J].Optics Express,2012,20(22):25161.
[12]BASAR B.On Multiple-Input Multiple-Output OFDM with Index Modulation for Next Generation Wireless Networks[J].IEEE Transactions on Signal Processing,2016,64(15):3868-3878.
[13]ZHENG B,CHEN F,WEN M,et al.Low-Complexity ML Detector and Performance Analysis for OFDM With In-Phase/Quadrature Index Modulation[J].IEEE Communications Letters,2015,19(11):1893-1896.
[14]YOU L,GAO X,SWINDLEHURST A L,et al.Low-Complexity ML Detector and Performance Analysis for OFDM With In-Phase/Quadrature Index Modulation[J].IEEE Transactions on Signal Processing,2016,64(6):1461-1476.
[15]GORCIN A,ARSLAN H.An OFDM Signal Identification Meth- od for Wireless Communications Systems[J].IEEE Transactions on Vehicular Technology,2015,64(12):5688-5700.
[1] FANG Ting, GONG Ao-yu, ZHANG Fan, LIN Yan, JIA Lin-qiong, ZHANG Yi-jin. Dynamic Broadcasting Strategy in Cognitive Radio Networks Under Delivery Deadline [J]. Computer Science, 2021, 48(7): 340-346.
[2] TIAN Miao-miao, WANG Zu-lin, XU Mai. DVB-S2 Signal Receiving and Analysis Based on Cognitive Radio [J]. Computer Science, 2020, 47(4): 226-232.
[3] ZHOU Hui-ting, ZHOU Jie. Simulation and Analysis on Improved NC-OFDM Algorithm [J]. Computer Science, 2020, 47(10): 263-268.
[4] XUE Ling-ling, FAN Xiu-mei. Cognitive Spectrum Allocation Mechanism in Internet of Vehicles Based on Clustering Structure [J]. Computer Science, 2019, 46(9): 143-149.
[5] ZHANG Yu-pei, ZHAO Zhi-jin, ZHENG Shi-lian. Cognitive Decision Engine of Hybrid Learning Differential Evolution and Particle Swarm Optimization [J]. Computer Science, 2019, 46(6): 95-101.
[6] JI Yi, JIA Jun-cheng, SHENG Kai. Time Slot Optimization for Channel Hopping in CRN [J]. Computer Science, 2019, 46(11): 58-64.
[7] CAO Kai-tian, HANG Yi-ling. Novel Energy Detection Method and Detection Performance Analysis [J]. Computer Science, 2018, 45(6A): 266-269.
[8] WANG Lu, BAI Guang-wei, SHEN Hang, WANG Tian-jing. Spectrum-aware Secure Opportunistic Routing Protocol in Cognitive Radio Networks [J]. Computer Science, 2018, 45(10): 166-171.
[9] ZHANG Yang, ZHAO Hang-sheng and ZHAO Xiao-long. Energy-efficient Design under Imperfect Condition Based on Spectrum Prediction [J]. Computer Science, 2017, 44(Z6): 258-262.
[10] ZHOU Xue-qian, WU Xiao-fu and YU Xun-jian. LDPC Coded Primary Transmitter Authentication Schemes in Cognitive Radio Networks [J]. Computer Science, 2017, 44(7): 89-93.
[11] ZHAO Cheng, HAO Yin-yin, HUA Jing-yu, YAO Xin-wei and WANG Wan-liang. Subcarrier Pairing Strategy for Energy Efficiency Optimization in Cognitive Radio [J]. Computer Science, 2017, 44(6): 108-113.
[12] HAN Jie, SONG Xiao-qin, DONG Li and JIN hui. Suboptimal Dynamic Resource Allocation Algorithm in OFDM Based Cognitive Radio Network [J]. Computer Science, 2017, 44(5): 48-52.
[13] ZHANG Hai-chuan and LEI Ying-ke. Blind Estimation Method for OFDM Parameter Based on Symbol Kurtosis [J]. Computer Science, 2017, 44(4): 207-212.
[14] ZHANG Hai-chuan and LEI Ying-ke. Identification Method for OFDM Signal Based on MUSIC Algorithm [J]. Computer Science, 2017, 44(3): 114-117.
[15] ZHU Zheng-guo, HE Ming-xing, LIU Rong-qi and LIU Ze-min. Wavelet Neural Network Model for Cognitive Radio Spectrum Prediction [J]. Computer Science, 2017, 44(12): 86-89.
Full text



[1] . [J]. Computer Science, 2018, 1(1): 1 .
[2] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75 .
[3] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[4] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[5] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[6] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99 .
[7] ZHOU Yan-ping and YE Qiao-lin. L1-norm Distance Based Least Squares Twin Support Vector Machine[J]. Computer Science, 2018, 45(4): 100 -105 .
[8] LIU Bo-yi, TANG Xiang-yan and CHENG Jie-ren. Recognition Method for Corn Borer Based on Templates Matching in Muliple Growth Periods[J]. Computer Science, 2018, 45(4): 106 -111 .
[9] GENG Hai-jun, SHI Xin-gang, WANG Zhi-liang, YIN Xia and YIN Shao-ping. Energy-efficient Intra-domain Routing Algorithm Based on Directed Acyclic Graph[J]. Computer Science, 2018, 45(4): 112 -116 .
[10] CUI Qiong, LI Jian-hua, WANG Hong and NAN Ming-li. Resilience Analysis Model of Networked Command Information System Based on Node Repairability[J]. Computer Science, 2018, 45(4): 117 -121 .