MP-WFRFT and Chaotic Scrambling Aided Directional Modulation Technique for Physical Layer Security Enhancement

Directional modulation (DM) technique based on artificial noise (AN) enables the physical layer security (PLS) for wireless communications in free space. However, on one hand, the introduction of AN results in less power efficient for a DM system; on the other hand, the AN-aided DM technique is strongly dependent on the channel state information (CSI) of transceivers, which greatly limits its practical application. What is more, when the eavesdropper (EVE) is slowly approaching the legitimate user (LU) or the EVE and the LU are in the same direction, the transmission security cannot be guaranteed. To circumvent these problems, DM technique with multiple parameters weighted-type fractional Fourier transform (MP-WFRFT) and chaotic scrambling (CS) aided is proposed in this paper to realize the power-efficient and security-enhanced wireless transmissions. Then, the symbol error rate (SER), secrecy rate, robustness, and anti-interception performance of the proposed method are analyzed and simulated. The simulation results are presented to verify that the proposed method is more power-efficient than the traditional AN-aided DM schemes, and the PLS is guaranteed due to the proposed approach, albeit knowing the intended direction for an EVE.

[1]  William Stallings,et al.  Cryptography and network security , 1998 .

[2]  Qian Cheng,et al.  Secure Spatial Modulation Based on Dynamic Multi-Parameter WFRFT , 2018, IEICE Trans. Commun..

[3]  Jun Li,et al.  Robust Synthesis Method for Secure Directional Modulation With Imperfect Direction Angle , 2016, IEEE Communications Letters.

[4]  Yuan Ding,et al.  BER Driven Synthesis for Directional Modulation Secured Wireless Communication , 2014 .

[5]  Yuan Ding,et al.  A Vector Approach for the Analysis and Synthesis of Directional Modulation Transmitters , 2014, IEEE Transactions on Antennas and Propagation.

[6]  Wen-Qin Wang,et al.  DM using FDA antenna for secure transmission , 2017 .

[7]  J. L. Massey,et al.  An introduction to contemporary cryptology , 1988, Proc. IEEE.

[8]  Vincent Fusco,et al.  Directional Modulation Far-field Pattern Separation Synthesis Approach , 2015 .

[9]  Feng Liu,et al.  Directional Modulation via Weighted Fractional Fourier Transform - A Way to Enhance Security , 2018 .

[10]  A. Tennant,et al.  An experimental two element array configured for directional antenna modulation , 2012, 2012 6th European Conference on Antennas and Propagation (EUCAP).

[11]  Ran Tao,et al.  The multiple-parameter fractional Fourier transform , 2008, Science in China Series F: Information Sciences.

[12]  Feng Shu,et al.  Secure and Precise Wireless Transmission for Random-Subcarrier-Selection-Based Directional Modulation Transmit Antenna Array , 2017, IEEE Journal on Selected Areas in Communications.

[13]  Erica L. Daly,et al.  Demonstration of Directional Modulation Using a Phased Array , 2010, IEEE Transactions on Antennas and Propagation.

[14]  Xuejun Sha,et al.  Research on the application of 4-weighted fractional Fourier transform in communication system , 2010, Science China Information Sciences.

[15]  Yuan Liang,et al.  Research on Constellation-Splitting Criterion in Multiple Parameters WFRFT Modulations , 2018, IEEE Access.

[16]  Michael P Daly,et al.  Beamsteering in Pattern Reconfigurable Arrays Using Directional Modulation , 2010, IEEE Transactions on Antennas and Propagation.

[17]  M. Daly,et al.  Directional Modulation Technique for Phased Arrays , 2009, IEEE Transactions on Antennas and Propagation.

[18]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[19]  Wen-Wei Lin,et al.  Randomness Enhancement Using Digitalized Modified Logistic Map , 2010, IEEE Transactions on Circuits and Systems II: Express Briefs.

[20]  P. Colet,et al.  Security Implications of Open- and Closed-Loop Receivers in All-Optical Chaos-Based Communications , 2009, IEEE Photonics Technology Letters.

[21]  Ling Wang,et al.  Artificial-Noise-Aided Secure Transmission for Proximal Legitimate User and Eavesdropper Based on Frequency Diverse Arrays , 2018, IEEE Access.

[22]  V. Namias The Fractional Order Fourier Transform and its Application to Quantum Mechanics , 1980 .

[23]  Ali Hajimiri,et al.  Near-Field Direct Antenna Modulation (NFDAM) transmitter at 2.4GHz , 2009, 2009 IEEE Antennas and Propagation Society International Symposium.

[24]  Vincent Fusco,et al.  Constraining Directional Modulation Transmitter Radiation Patterns , 2014 .

[25]  Shi Hongzhe,et al.  Direction dependent antenna modulation using a two element array , 2011, Proceedings of the 5th European Conference on Antennas and Propagation (EUCAP).

[26]  Vincent Fusco,et al.  Orthogonal Vector Approach for Synthesis of Multi-Beam Directional Modulation Transmitters , 2015, IEEE Antennas and Wireless Propagation Letters.

[27]  Qiu Xin,et al.  Hybrid Carrier Spread Spectrum System Based on 4-Weighted Fractional Fourier Transform , 2012 .

[28]  Hsiao-Hwa Chen,et al.  A Survey on Multiple-Antenna Techniques for Physical Layer Security , 2017, IEEE Communications Surveys & Tutorials.

[29]  Zuohong Xu,et al.  Time-Invariant Angle-Range Dependent Directional Modulation Based on Time-Modulated Frequency Diverse Arrays , 2017, IEEE Access.

[30]  Seymour Stein,et al.  Modern communication principles : with applications to digital signaling , 1967 .

[31]  Kaijie Zhou,et al.  Combined Constellation Rotation With Weighted FRFT for Secure Transmission in Polarization Modulation Based Dual-Polarized Satellite Communications , 2017, IEEE Access.

[32]  Wade Trappe,et al.  The challenges facing physical layer security , 2015, IEEE Communications Magazine.

[33]  Xuejun Sha,et al.  Covert communication based on waveform overlay with Weighted Fractional Fourier Transform signals , 2010, 2010 IEEE International Conference on Wireless Communications, Networking and Information Security.

[34]  Vincent Fusco,et al.  A review of directional modulation technology , 2015, International Journal of Microwave and Wireless Technologies.

[35]  A. Babakhani,et al.  Near-field direct antenna modulation , 2009, IEEE Microwave Magazine.

[36]  Hui Chen,et al.  Secrecy Capacity Analysis of AN-Aided FDA Communication Over Nakagami- ${m}$ Fading , 2018, IEEE Wireless Communications Letters.

[37]  Osama N. Alrabadi,et al.  Directional space-time modulation: A novel approach for secured wireless communication , 2012, 2012 IEEE International Conference on Communications (ICC).

[38]  Robert W. Heath,et al.  Antenna Subset Modulation for secure millimeter-wave wireless communication , 2013, 2013 IEEE Globecom Workshops (GC Wkshps).

[39]  Lajos Hanzo,et al.  A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends , 2015, Proceedings of the IEEE.

[40]  Xiangjun Xin,et al.  Secure OFDM-PON Based on Chaos Scrambling , 2011, IEEE Photonics Technology Letters.

[41]  A. Hajimiri,et al.  Transmitter Architectures Based on Near-Field Direct Antenna Modulation , 2008, IEEE Journal of Solid-State Circuits.

[42]  Jian Xie,et al.  Directional Modulation Technique for Linear Sparse Arrays , 2019, IEEE Access.

[43]  Vincent Fusco,et al.  Directional modulation transmitter synthesis using particle swarm optimization , 2013, 2013 Loughborough Antennas & Propagation Conference (LAPC).

[44]  Feng Shu,et al.  Robust Synthesis Scheme for Secure Multi-Beam Directional Modulation in Broadcasting Systems , 2016, IEEE Access.

[45]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[46]  Jun Li,et al.  Artificial-Noise-Aided Secure Transmission With Directional Modulation Based on Random Frequency Diverse Arrays , 2016, IEEE Access.

[47]  T. Hong,et al.  RF DIRECTIONAL MODULATION TECHNIQUE USING A SWITCHED ANTENNA ARRAY FOR PHYSICAL LAYER SECURE COMMUNICATION APPLICATIONS , 2011 .

[48]  C. Shih Fractionalization of Fourier transform , 1995 .

[49]  Qinyu Zhang,et al.  WFRFT Precoding for Narrowband Interference Suppression in DFT-Based Block Transmission Systems , 2013, IEEE Communications Letters.

[50]  Xuejun Sha,et al.  Secret Communication Using Parallel Combinatory Spreading WFRFT , 2015, IEEE Commun. Lett..

[51]  Tao Hong,et al.  Synthesis of Sparse Linear Array for Directional Modulation via Convex Optimization , 2018, IEEE Transactions on Antennas and Propagation.

[52]  Alexander Vardy,et al.  Achieving the secrecy capacity of wiretap channels using Polar codes , 2010, ISIT.

[53]  Byung-Jae Kwak,et al.  LDPC Codes for the Gaussian Wiretap Channel , 2009, IEEE Transactions on Information Forensics and Security.

[54]  Li Sun,et al.  Exploiting Fountain Codes for Secure Wireless Delivery , 2014, IEEE Communications Letters.