Browse > Article
http://dx.doi.org/10.3837/tiis.2014.07.003

A Secure MQAM Scheme Based on Signal Constellation Hopping  

Zhang, Yingxian (College of Communications Engineering, PLA University of Science and Technology)
Liu, Aijun (College of Communications Engineering, PLA University of Science and Technology)
Pan, Xiaofei (College of Communications Engineering, PLA University of Science and Technology)
Ye, Zhan (College of Communications Engineering, PLA University of Science and Technology)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.8, no.7, 2014 , pp. 2246-2260 More about this Journal
Abstract
In this paper, a secure multilevel quadrature amplitude modulation (MQAM) scheme is proposed for the physical layer security (PLS) of the wireless communications. In the proposed scheme, each transmitted symbol's signal constellation (SC) is hopping with the control of two unique factors: amplitude distortion (AD) factor and phase hopping (PH) factor. With unknown the two factors, the eavesdropper cannot extract effective information from the received signal. We first introduce a security metric, referred to as secrecy gain, and drive a lower bound on the gain that the secrecy capacity can be improved. Then, we investigate the relationship among the secrecy gain, the signal to noise power ratios (SNRs) of the main and wiretap channels, and the secrecy capacity. Next, we analyze the security of the proposed scheme, and the results indicate that the secrecy capacity is improved by our scheme. Specifically, a positive secrecy capacity is always obtained, whether the quality of the main channel is better than that of the wiretap channel or not. Finally, the numerical results are provided to prove the analytical work, which further suggests the security of the proposed scheme.
Keywords
Secure MQAM scheme; signal constellation hopping (SCH); amplitude distortion (AD) factor; phase hopping (PH) factor; secrecy gain;
Citations & Related Records
연도 인용수 순위
  • Reference
1 E. Sasoglu and A. Vardy, "A new polar coding scheme for strong security on wiretap channels," in Proc. of 2013 IEEE International Symposium on Information Theory (ISIT 2013), pp. 1117-1121, July, 2013.
2 Y. Yan, L. Liu and C. Ling, "Polar lattices for strong secrecy over the mod-Λ Gaussian wiretap channel," arXiv:1401.4532, January, 2014.
3 C. Ye, S. Mathur, A. Reznik, Y. Shah, W. Trappe and Narayan, "Information- theoretically secret key generation for fading wireless channels," IEEE Transactions on Information Forensics and Security, vol. 5, no. 2, pp. 240-254, June, 2010.   DOI   ScienceOn
4 G. R. Tsouri and D. M. Wagner, "Threshold constraints on symmetric key extraction from Rician fading estimates," IEEE Transactions on Mobile Computing, vol. 12, no. 12, pp. 2496-2506, December, 2013.   DOI   ScienceOn
5 O. Adamo, E. Ayeh and M. Varanasi, "Joint encryption error correction and modulation (JEEM) scheme," in Proc. of IEEE International Workshop Technical Committee on Communication Quality and Reliability, pp. 1-5, May 15-17, 2012.
6 J. G. Proakis, Digital Communications, 5th Edition, McGraw-Hill Higher Education, New York, USA, June, 2007.
7 A. Wyner, "The wire-tap channel," Bell System Technical Journal, vol. 54, no. 8, pp. 1355-1387, January, 1975.   DOI   ScienceOn
8 I. Csiszar and J. Korner, "Broadcast channels with confidential messages," IEEE Transaction on Information Theory, vol. 24, no. 3, pp. 339-348, May, 1978.   DOI
9 H. Kim and J. D. Villasenor, "Secure MIMO communications in a system with equal numbers of transmit and receive antennas," IEEE Communications Letters, vol. 12, no. 5, pp. 386-388, May, 2008.   DOI   ScienceOn
10 L. Dong, Z. Han, A. P. Petropulu and H. V. Poor, "Secure wireless communications via cooperation," in Proc. of 46th Annual Allerton Conf. on Communication, Control, and Computing, pp. 1132-1138, Sept. 23-26, 2008.
11 S. Yan, N. Yang, R. Malaney and J. Yuan, "Transmit antenna selection with alamouti coding and power allocation in MIMO wiretap Channels," IEEE Transactions on Wireless Communications, vol. 13, no. 3, pp. 1656-1667, March, 2014.   DOI   ScienceOn
12 A. Khisti and G. W. Wornell, "Secure transmission with multiple antennas-part I:The MISOME wiretap channel," IEEE Transactions on Information Theory, vol. 56, no. 7, pp. 3088-3014, July, 2010.   DOI   ScienceOn
13 A. Khisti and G. W. Wornell, "Secure transmission with multiple antennas-part II: The MIMOME Wiretap Channel," IEEE Transactions on Information Theory, vol. 56, no. 11, pp. 5515-5532, November, 2010.   DOI   ScienceOn
14 F. Oggier and B. Hassibi, "The secrecy capacity of the MIMO wiretap channel", IEEE Transaction on Information Theory, vol. 57, no. 8, pp. 4961-4972, August, 2011.   DOI   ScienceOn
15 L. Dong, Z. Han, A. P. Petropulu and H. V. Poor, "Amplify-and-Forward based cooperation for secure wireless communications," in Proc. of IEEE Int. Conf. on Acoustics, Speech and Signal Processing, pp. 2613-2616, Apr. 19-24, 2009.
16 A. Mukherjee, "Imbalanced beam-forming by a multi-antenna source for secure utilization of an untrusted Relay," IEEE Communications Letters, vol. 17, no. 7, pp. 1309-1312, July, 2013.   DOI   ScienceOn
17 J. Deng, R. Zhang, L. Song, Z. Han and B. Jiao, "Truthful mechanisms for secure communication in wireless cooperative system," IEEE Transactions on Wireless Communications, vol. 12, no. 9, pp. 4236-4245, September, 2013.   DOI   ScienceOn
18 Y. Zou, X. Wang and W. Shen, "Optimal relay selection for physical-layer security in cooperative wireless networks," IEEE Journal on Selected Areas in Communications, vol. 31, no. 10, pp. 2099-2111, October, 2013.   DOI   ScienceOn
19 F. Renna, N. Laurenti and H. V. Poor, "Physical layer secrecy for OFDM systems," in Proc. of European Wireless Conference, pp. 782-789, Apr. 12-15, 2010.
20 X. Wang, M. Tao, J. Mo and Y. Xu, "Power and subcarrier allocation for physical-layer security in OFDMA-based broadband wireless," IEEE Transactions on Information Forensics and Security, vol. 6, no. 3, pp. 693-702, September, 2011.   DOI   ScienceOn
21 A. A. Tomko, "Physical-layer intrusion detection in wireless networks," in Proc. of IEEE Military Communication Conference, pp. 1-7,Oct. 23-25, 2006.
22 Z. Ding, Z. Ma and P. Fan , "Asymptotic studies for the impact of antenna selection on secure Two-Way relaying communications with artificial noise," IEEE Transactions on Wireless Communications, vol. 13, no. 4, pp. 2189-2203, April, 2014.   DOI   ScienceOn
23 P.-S. Murvay and B. Groza, "Source identification using signal characteristics in controller area networks," IEEE Signal Processing Letters, vol. 21, no. 4, pp. 395-399, April, 2014.   DOI   ScienceOn
24 S. Goel and R. Negi, "Guaranteeing secrecy using artificial noise," IEEE Transactions on wireless communications, vol.7, no.6, pp.2180-2189, June, 2008.   DOI   ScienceOn
25 W. Li, M. Ghogho, B. Chen and C. Xiong, "Secure communication via sending artificial noise by the receiver: Outage secrecy capacity/region analysis," IEEE Communications Letters, vol. 16, no. 10, pp. 1628-1631, October, 2012.   DOI   ScienceOn
26 A. Thangaraj, S. Dihidar, A. R. Calderbank, S. W. McLaughlin and J.-M. Merolla, "Applications of LDPC codes to the wiretap channel," IEEE Transactions on Information Theory, vol. 53, no. 8, pp. 2933-2945, August, 2007.   DOI   ScienceOn
27 D. Silva and F. R. Kschischang, "Universal secure network coding via rank-metric codes," IEEE Transactions on Information Theory, vol. 57, no. 2, pp. 1124-1135, February, 2011.   DOI   ScienceOn
28 H. Mahdavifar and A. Vardy, "Achieving the secrecy capacity of wiretap channels using polar codes," IEEE Transactions on Information Theory, vol. 57, no. 10, pp. 6428-6443, October, 2011.   DOI   ScienceOn