Masked M-QAM OFDM: A simple approach for enhancing the security of OFDM systems

This paper investigates the secure transmission of Orthogonal Frequency Division Multiplexing (OFDM) signals, masked under non-orthogonal FDM signals of approximately the same overall bandwidth. Carrier orthogonality of traditional OFDM is intentionally violated in order to generate an encrypted signal at the physical layer, without any loss in bandwidth efficiency or extra overhead. A symmetric secret key is used for the modulation of part of the FDM signal while the original information symbol modulates the remaining carriers. The encrypted FDM signal generation takes place in an IFFT stage by simple truncation of part of its output. At the receiver, a straightforward suppression of the induced Inter-Carrier Interference (ICI) is performed before the OFDM demodulator, based on knowledge of the secret key. The key holder subsequently uses the traditional OFDM FFT demodulator to extract the information symbol. We demonstrate that an eavesdropper cannot demodulate the transmitted FDM signal by reduced complexity detection methods due to its severe ill-conditioning. Conversely, they have to rely on vectorial Maximum Likelihood detection of exponential complexity. Furthermore, in real noisy environments the eavesdropper detection capability is further affected by the abrupt shrinking of the FDM demodulator detection regions.

[1]  Fuqin Xiong,et al.  M-ary amplitude shift keying OFDM system , 2003, IEEE Trans. Commun..

[2]  V. Jeoti,et al.  On secure OFDM system: Chaos based constellation scrambling , 2007, 2007 International Conference on Intelligent and Advanced Systems.

[3]  Rajarathnam Chandramouli,et al.  Opportunistic Encryption: A Trade-Off between Security and Throughput in Wireless Networks , 2007, IEEE Transactions on Dependable and Secure Computing.

[4]  Xiang-Gen Xia,et al.  A Distributed Differentially Space-Time-Frequency Coded OFDM for Asynchronous Cooperative Systems with Low Probability of Interception , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[5]  Edward J. Wegman,et al.  Statistical Signal Processing , 1985 .

[6]  Masanori Hamamura,et al.  Bandwidth efficiency improvement for multi-carrier systems , 2004, 2004 IEEE 15th International Symposium on Personal, Indoor and Mobile Radio Communications (IEEE Cat. No.04TH8754).

[7]  Izzat Darwazeh,et al.  Spectrally Efficient FDM Signals: Bandwidth Gain at the Expense of Receiver Complexity , 2009, 2009 IEEE International Conference on Communications.

[8]  Jian Ren,et al.  Physical layer built-in security analysis and enhancement of CDMA systems , 2005, MILCOM 2005 - 2005 IEEE Military Communications Conference.

[9]  Ebroul Izquierdo,et al.  An ill-posed operator for secure image authentication , 2003, IEEE Trans. Circuits Syst. Video Technol..

[10]  Arnold Neumaier,et al.  Solving Ill-Conditioned and Singular Linear Systems: A Tutorial on Regularization , 1998, SIAM Rev..

[11]  J. E. Mazo,et al.  Faster than Nyquist Signaling: Algorithms to Silicon , 2014 .

[12]  S. Srilasak,et al.  Revisiting the impact of encryption on performance of IEEE 802.11 WLAN , 2008, 2008 5th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology.

[13]  Don H. Johnson,et al.  Statistical Signal Processing , 2009, Encyclopedia of Biometrics.

[14]  Henry J. Landau,et al.  On the minimum distance problem for faster-than-Nyquist signaling , 1988, IEEE Trans. Inf. Theory.

[15]  Izzat Darwazeh,et al.  Fast OFDM: A proposal for doubling the data rate of OFDM schemes , 2002 .

[16]  Ahmad Ahmad,et al.  Study of a new physical layer encryption concept , 2008, 2008 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems.

[17]  Mohammed Boulmalf,et al.  Impact of Encryption on the Throughput of Infrastructure WLAN IEEE 802.11g , 2007, 2007 IEEE Wireless Communications and Networking Conference.

[18]  Tongtong Li,et al.  Physical Layer Built-In Security Analysis and Enhancement Algorithms for CDMA Systems , 2007, EURASIP J. Wirel. Commun. Netw..

[19]  Jie Peng,et al.  The Research of Cross-layer Design between the PHY and MAC Layer for OFDM-Based Cognitive Radio Network , 2009, 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing.

[20]  Fredrik Rusek,et al.  Multistream Faster than Nyquist Signaling , 2009, IEEE Transactions on Communications.

[21]  Qing Han,et al.  Solving Box-Constrained Integer Least Squares Problems , 2008, IEEE Transactions on Wireless Communications.

[22]  David H. Bailey,et al.  The Fractional Fourier Transform and Applications , 1991, SIAM Rev..