Abstract:The security of traditional wireless communication is mainly dependent on the upper layer encryption mechanism,which cannot protect the physical layer modulation mode and the modulation information security.This paper proposes a physical layer encryption modulation method for the orthogonal frequency division multiplexing (OFDM) system.In this method,the phase random signal is used to detect and extract the equivalent channel phase information,then the 3D (Three-Dimensional) constellation is modulated in the physical layer,followed by the receiver's decryption and demodulation.The scheme makes full use of the wireless channel phase response of randomness,reciprocity and location sensibility,and this characteristic is used to enhance the safety of physical layer signal.Theoretical analysis and computer simulation results show that the algorithm is secure,and compared with the traditional QPSK (Quadrature Phase Shift Keying) modulation,the BER (Bit Error Rate) of the proposed algorithm improves about 2.5dB.This paper focuses on the physical layer security,which aims at providing a new security for the physical signal layer,and has a wide application prospect in the future 5G communications and military security communications.
李小倩, 李为, 雷菁, 程龙旺. OFDM系统中基于三维星座旋转的物理层安全加密算法[J]. 电子学报, 2017, 45(12): 2873-2880.
LI Xiao-qian, LI Wei, LEI Jing, CHENG Long-wang. A Novel Physical Layer Encryption Algorithm Based on Three Dimensional Constellation Rotation in OFDM System. Acta Electronica Sinica, 2017, 45(12): 2873-2880.
[1] Klinc D,Ha J,Mclaughlin S W,et al.LDPC codes for physical layer security[A].GLOBECOM 2009-2009 IEEE Global Telecommunications Conference[C].Honolulu:IEEE,2009.5765-5770.
[2] Cheng L,Li W,Ma D,et al.Moving window scheme for extracting secret keys in stationary environments[J].Iet Communications,2016,10(16):2206-2214.
[3] Fakoorian S A A,Swindlehurst A L.Full rank solutions for the MIMO Gaussian wiretap channel with an average power constraint[J].IEEE Transactions on Signal Processing,2013,61(10):2620-2631.
[4] Li W,Ghogho M,Chen B,et al.Secure communication via sending artificial noise by the receiver:outage secrecy capacity/region analysis[J].Communications Letters IEEE,2012,16(10):1628-1631.
[5] 李为,陈彬,魏急波,等.基于接收机人工噪声的物理层安全技术及保密区域分析[J].信号处理,2012,28(9):1314-1320. LI Wei,CHEN Bin,WEI Ji-bo,et al.Secure communication via sending artificial noise by the receiver:ergodic secure region[J].Signal Processing,2012,28(9):1314-1320.(in Chinese)
[6] Li W,Tang Y,Ghogho M,et al.Secure communications via sending artificial noise by both transmitter and receiver:optimum power allocation to minimise the insecure region[J].Iet Communications,2014,8(16):2858-2862.
[7] Mceliece R J.A Public-Key Cryptosystem Based on Algebraic Coding Theory[R].Pasadena:NASA,1978.114-116.
[8] Adamo O,Fu S,Varanasi M R.Physical layer error correction based cipher[A].2010 IEEE Global Telecommunications Conference GLOBECOM 2010[C].Miami:IEEE,2010.1-5.
[9] Wang Q,Su H,Ren K,et al.Fast and scalable secret key generation exploiting channel phase randomness in wireless networks[A].2011 Proceedings IEEE INFOCOM[C].Shanghai:IEEE,2011.1422-1430.
[10] Huo F,Gong G.A new efficient physical layer OFDM encryption scheme[A].IEEE INFOCOM 2014-IEEE Conference on Computer Communications[C].Toronto:IEEE,2014.1024-1032.
[11] 蕾蓓蓓.基于物理层加密的调制方式隐蔽算法研究[D].西安:西北大学,2012.
[12] 岳敖,李为,马东堂,等.拉丁阵和幅相变换相结合的物理层加密传输算法[J].信号处理,2016,32(6):660-668. YUE Ao,LI Wei,MA Dong-tang,et al.A novel physical layer encryption algorithm combined Latin rectangle and phase-amplitude mask[J].Signal Processing,2016,32(6):660-668.(in Chinese)
[13] Kang S G.An OFDM with 3-D signal mapper and 2-D IDFT modulator[J].IEEE Communications Letters,2008,12(12):871-873.
[14] Chen Z,Choi E C,Kang S G.Closed-form expressions for the symbol error probability of 3-D OFDM.[J].IEEE Communications Letters,2010,14(2):112-114.
[15] Jakes W.Microwave Mobile Communications[M].New York:IEEE,1993.11-78.
[16] Chorti A.Masked-OFDM:A physical layer encryption for future OFDM applications[A].2011 IEEE GLOBECOM Workshops (GC Wkshps 2011)[C].Houston:IEEE,2011.1254-1258.
[17] Stinson D R.Cryptography:Theory and Practice[M].London:CRC,1995.177-186.