Computer Science ›› 2018, Vol. 45 ›› Issue (10): 64-68.doi: 10.11896/j.issn.1002-137X.2018.10.013

• Network & Communication • Previous Articles     Next Articles

Modulation Protection Algorithm Based on Wireless OFDM Systems

GAO Bao-jian, WANG Shao-di, REN Yu-hui, WANG Yu-jie   

  1. College of Information Science and Technology,Northwest University,Xi’an 710127,China
  • Received:2017-12-08 Online:2018-11-05 Published:2018-11-05

Abstract: With the broadband trend in wireless communication system,traditional data encryption methods have high computational complexity,and haven’t taken the security of modulation modes of the physical layer into consideration.Aiming at this problem,a modulation protection algorithm based on wireless OFDM systems was proposed from the perspective of physical layer encryption.Modulation protection effect of the proposed algorithm was analyzed respectively in the cases of single-carrier and multi-carrier,and typical modulation identification methods in the cognitive radio were adopted in the simulation to analyze and compare the recognition rate before and after encryption.Theoretical ana-lysis and simulation results show that this algorithm doesn’t change the performance of original system,and has high capacity of modulation protection.

Key words: Modulation protection, Physical layer encryption, OFDM, Cognitive radio

CLC Number: 

  • TN918
[1]BARENGHI A,BREVEGLIERI L,KOREN I,et al.Fault Injection Attacks on Cryptographic Devices:Theory,Practice,and Countermeasures[J].Proceeding of The IEEE,2012,100(11):3056-3076.
[2]MU P C,YIN Q Y,WANG W J.A Security Method of Physical Layer Transmission Using Random Antenna Arrays in Wireless Communication[J].Journal of Xi’an Jiaotong University,2010,44(6):62-66.(in Chinese)
穆鹏程,殷勤业,王文杰.无线通信中使用随机天线阵列的物理层安全传输方法[J].西安交通大学学报,2010,44(6):62-66.
[3]LIN T,HUANG K Z,LUO W Y.A Multicarrier-based Physical Layer Security Scheme for the Multicast Systems[J].Journal of Electronics and Information Technology,2013,35(6):1388-1343.(in Chinese)
林通,黄开枝,罗文宇.一种基于多载波的多播系统物理层安全方案[J].电子与信息学报,2013,35(6):1338-1343.
[4]LI M L,HUANG K Z,ZHONG Z.Physical-layer Security Algorithm Based on Joint Scrambling with Spatial and Frequency Resource[J].Journal of Electronics and Information Technology,2013,35(12):2966-2971.(in Chinese)
李明亮,黄开枝,钟州.基于空频联合加扰的物理层安全算法[J].电子与信息学报,2013,35(12):2966-2971.
[5]LIU Y,WANG G P,XIAO M,et al.Spectrum Sensing and Throughput Analysis for Cognitive Two-Way Relay Networks with Multiple Transmit Powers[J].IEEE Journal on Selected Areas in Communications,2016,34(11):3038-3047.
[6]JIANG H Q,TANG P Z,GUAN W S.Research on Signal Modu- lation Recognition Technology Based on PDW[J].Transactions of Beijing Institute of Technology,2013,33(11):1183-1188.(in Chinese)
江海清,唐浦钊,关文硕.基于脉冲描述字的信号调制识别技术研究[J].北京理工大学学报,2013,33(11):1183-1188.
[7]ALI A,FAN Y,SHU L.Automatic Modulation Classification of Digital Modulation Signals with Stacked Autoencoders[J].Digi-tal Signal Processing,2017,71:108-116.
[8]MAREY M,DOBRE O A,INKOL R.Blind STBC Identification for Multiple-Antenna OFDM Systems[J].IEEE Transactions on Communications,2014,62(5):1554-1567.
[9]CHORTI A.Masked OFDM:A Physical Layer Encryption for Future OFDM Applications[C]∥IEEE Globecom Workshop on Mobile Computing and Emerging Communication Networks.2010:1254-1258.
[10]GAO B J,WANG Y J,LUO Y L,et al.A Hiding Algorithm for OFDM Constellation Mapping Based on Physical Layer Encryption[J].Journal of Applied Sciences,2013,13(18):3790-3797.
[11]LIU B,ZHANG L,XIN X,et al.Constellation-masked Secure Communication Technique for OFDM-PON[J].Optics Express,2012,20(22):25161.
[12]BASAR B.On Multiple-Input Multiple-Output OFDM with Index Modulation for Next Generation Wireless Networks[J].IEEE Transactions on Signal Processing,2016,64(15):3868-3878.
[13]ZHENG B,CHEN F,WEN M,et al.Low-Complexity ML Detector and Performance Analysis for OFDM With In-Phase/Quadrature Index Modulation[J].IEEE Communications Letters,2015,19(11):1893-1896.
[14]YOU L,GAO X,SWINDLEHURST A L,et al.Low-Complexity ML Detector and Performance Analysis for OFDM With In-Phase/Quadrature Index Modulation[J].IEEE Transactions on Signal Processing,2016,64(6):1461-1476.
[15]GORCIN A,ARSLAN H.An OFDM Signal Identification Meth- od for Wireless Communications Systems[J].IEEE Transactions on Vehicular Technology,2015,64(12):5688-5700.
[1] FANG Ting, GONG Ao-yu, ZHANG Fan, LIN Yan, JIA Lin-qiong, ZHANG Yi-jin. Dynamic Broadcasting Strategy in Cognitive Radio Networks Under Delivery Deadline [J]. Computer Science, 2021, 48(7): 340-346.
[2] TIAN Miao-miao, WANG Zu-lin, XU Mai. DVB-S2 Signal Receiving and Analysis Based on Cognitive Radio [J]. Computer Science, 2020, 47(4): 226-232.
[3] ZHOU Hui-ting, ZHOU Jie. Simulation and Analysis on Improved NC-OFDM Algorithm [J]. Computer Science, 2020, 47(10): 263-268.
[4] XUE Ling-ling, FAN Xiu-mei. Cognitive Spectrum Allocation Mechanism in Internet of Vehicles Based on Clustering Structure [J]. Computer Science, 2019, 46(9): 143-149.
[5] ZHANG Yu-pei, ZHAO Zhi-jin, ZHENG Shi-lian. Cognitive Decision Engine of Hybrid Learning Differential Evolution and Particle Swarm Optimization [J]. Computer Science, 2019, 46(6): 95-101.
[6] JI Yi, JIA Jun-cheng, SHENG Kai. Time Slot Optimization for Channel Hopping in CRN [J]. Computer Science, 2019, 46(11): 58-64.
[7] CAO Kai-tian, HANG Yi-ling. Novel Energy Detection Method and Detection Performance Analysis [J]. Computer Science, 2018, 45(6A): 266-269.
[8] WANG Lu, BAI Guang-wei, SHEN Hang, WANG Tian-jing. Spectrum-aware Secure Opportunistic Routing Protocol in Cognitive Radio Networks [J]. Computer Science, 2018, 45(10): 166-171.
[9] ZHANG Yang, ZHAO Hang-sheng and ZHAO Xiao-long. Energy-efficient Design under Imperfect Condition Based on Spectrum Prediction [J]. Computer Science, 2017, 44(Z6): 258-262.
[10] ZHOU Xue-qian, WU Xiao-fu and YU Xun-jian. LDPC Coded Primary Transmitter Authentication Schemes in Cognitive Radio Networks [J]. Computer Science, 2017, 44(7): 89-93.
[11] ZHAO Cheng, HAO Yin-yin, HUA Jing-yu, YAO Xin-wei and WANG Wan-liang. Subcarrier Pairing Strategy for Energy Efficiency Optimization in Cognitive Radio [J]. Computer Science, 2017, 44(6): 108-113.
[12] HAN Jie, SONG Xiao-qin, DONG Li and JIN hui. Suboptimal Dynamic Resource Allocation Algorithm in OFDM Based Cognitive Radio Network [J]. Computer Science, 2017, 44(5): 48-52.
[13] ZHANG Hai-chuan and LEI Ying-ke. Blind Estimation Method for OFDM Parameter Based on Symbol Kurtosis [J]. Computer Science, 2017, 44(4): 207-212.
[14] ZHANG Hai-chuan and LEI Ying-ke. Identification Method for OFDM Signal Based on MUSIC Algorithm [J]. Computer Science, 2017, 44(3): 114-117.
[15] ZHU Zheng-guo, HE Ming-xing, LIU Rong-qi and LIU Ze-min. Wavelet Neural Network Model for Cognitive Radio Spectrum Prediction [J]. Computer Science, 2017, 44(12): 86-89.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] . [J]. Computer Science, 2018, 1(1): 1 .
[2] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75 .
[3] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[4] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[5] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[6] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99 .
[7] ZHOU Yan-ping and YE Qiao-lin. L1-norm Distance Based Least Squares Twin Support Vector Machine[J]. Computer Science, 2018, 45(4): 100 -105 .
[8] LIU Bo-yi, TANG Xiang-yan and CHENG Jie-ren. Recognition Method for Corn Borer Based on Templates Matching in Muliple Growth Periods[J]. Computer Science, 2018, 45(4): 106 -111 .
[9] GENG Hai-jun, SHI Xin-gang, WANG Zhi-liang, YIN Xia and YIN Shao-ping. Energy-efficient Intra-domain Routing Algorithm Based on Directed Acyclic Graph[J]. Computer Science, 2018, 45(4): 112 -116 .
[10] CUI Qiong, LI Jian-hua, WANG Hong and NAN Ming-li. Resilience Analysis Model of Networked Command Information System Based on Node Repairability[J]. Computer Science, 2018, 45(4): 117 -121 .