4.6 Article

Secure Modulation Based on Constellation Mapping Obfuscation in OFDM Based TDD Systems

期刊

IEEE ACCESS
卷 8, 期 -, 页码 197644-197653

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/ACCESS.2020.3034633

关键词

Wireless network security; physical-layer security; modulation; obfuscation; fuzzy commitment

资金

  1. National Research Foundation of Korea (NRF) - Korea government (MSIT) [2020R1G1A1101176, 2020R1F1A1069934]
  2. National Research Foundation of Korea [2020R1G1A1101176, 2020R1F1A1069934] Funding Source: Korea Institute of Science & Technology Information (KISTI), National Science & Technology Information Service (NTIS)

向作者/读者索取更多资源

In this paper, we propose a secure modulation technique based on constellation mapping obfuscation to harden computational complexity for security at the physical-layer. To obfuscate mapping from bit stream to modulated symbols, our proposed scheme randomly changes a constellation mapping rule at each packet transmission opportunity, instead of employing a pre-determined mapping rule (e.g., Gray-coded mapping) at every packet transmission opportunity. Furthermore, to securely share the mapping rule between the transmitter and the desired receiver, the proposed scheme uses wireless channel based encryption and the fuzzy commitment with an error correction coding. We derive asymptotic bit error rate of the proposed scheme and validate our analysis through extensive simulations. We verify that our proposed scheme can further improve wireless security at the physical-layer irrespective of the upper layers' cryptographic schemes, which can be achieved by computational hardness MW computations are required for the eavesdropper to crack the mapping rule when M-quadrature amplitude modulation (QAM) is considered (e.g., 64! approximate to 1.27 x 10(89) combinations for 64-QAM).

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据