4.6 Article

Secure Modulation Based on Constellation Mapping Obfuscation in OFDM Based TDD Systems

Journal

IEEE ACCESS
Volume 8, Issue -, Pages 197644-197653

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/ACCESS.2020.3034633

Keywords

Wireless network security; physical-layer security; modulation; obfuscation; fuzzy commitment

Funding

  1. National Research Foundation of Korea (NRF) - Korea government (MSIT) [2020R1G1A1101176, 2020R1F1A1069934]
  2. National Research Foundation of Korea [2020R1G1A1101176, 2020R1F1A1069934] Funding Source: Korea Institute of Science & Technology Information (KISTI), National Science & Technology Information Service (NTIS)

Ask authors/readers for more resources

In this paper, we propose a secure modulation technique based on constellation mapping obfuscation to harden computational complexity for security at the physical-layer. To obfuscate mapping from bit stream to modulated symbols, our proposed scheme randomly changes a constellation mapping rule at each packet transmission opportunity, instead of employing a pre-determined mapping rule (e.g., Gray-coded mapping) at every packet transmission opportunity. Furthermore, to securely share the mapping rule between the transmitter and the desired receiver, the proposed scheme uses wireless channel based encryption and the fuzzy commitment with an error correction coding. We derive asymptotic bit error rate of the proposed scheme and validate our analysis through extensive simulations. We verify that our proposed scheme can further improve wireless security at the physical-layer irrespective of the upper layers' cryptographic schemes, which can be achieved by computational hardness MW computations are required for the eavesdropper to crack the mapping rule when M-quadrature amplitude modulation (QAM) is considered (e.g., 64! approximate to 1.27 x 10(89) combinations for 64-QAM).

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available