期刊
IEEE ACCESS
卷 8, 期 -, 页码 197644-197653出版社
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/ACCESS.2020.3034633
关键词
Wireless network security; physical-layer security; modulation; obfuscation; fuzzy commitment
资金
- National Research Foundation of Korea (NRF) - Korea government (MSIT) [2020R1G1A1101176, 2020R1F1A1069934]
- National Research Foundation of Korea [2020R1G1A1101176, 2020R1F1A1069934] Funding Source: Korea Institute of Science & Technology Information (KISTI), National Science & Technology Information Service (NTIS)
In this paper, we propose a secure modulation technique based on constellation mapping obfuscation to harden computational complexity for security at the physical-layer. To obfuscate mapping from bit stream to modulated symbols, our proposed scheme randomly changes a constellation mapping rule at each packet transmission opportunity, instead of employing a pre-determined mapping rule (e.g., Gray-coded mapping) at every packet transmission opportunity. Furthermore, to securely share the mapping rule between the transmitter and the desired receiver, the proposed scheme uses wireless channel based encryption and the fuzzy commitment with an error correction coding. We derive asymptotic bit error rate of the proposed scheme and validate our analysis through extensive simulations. We verify that our proposed scheme can further improve wireless security at the physical-layer irrespective of the upper layers' cryptographic schemes, which can be achieved by computational hardness MW computations are required for the eavesdropper to crack the mapping rule when M-quadrature amplitude modulation (QAM) is considered (e.g., 64! approximate to 1.27 x 10(89) combinations for 64-QAM).
作者
我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。
推荐
暂无数据