Embedding WFRFT Signals Into TDCS for Secure Communications

This paper presents a novel combinatory strategy to embed weighted-type fractional Fourier transform (WFRFT) precoding signals into transform domain communication system (TDCS). The original data can be divided into two parts. One part is modulated with the cyclic code shift keying in the traditional TDCS. The other part is first disguised as other higher order baseband modulations MPSK through WFRFT proceding process, then will further be embedded into the traditional TDCS system. A double-random scheme is designed to dynamically generate the pseudo phase for WFRFT rotation and TDCS basic function’s phase. Theoretical analyses show that the higher spectral efficiency can be obtained while causing little effect on its original communication quality. The final simulations demonstrate that the constellation precoding method can help disguise the original signals into other higher order baseband PSK modulations with a controllable Gaussian-like noise. Besides, owing to the dynamically double-random phase generation scheme, the proposed combinatory WFRFT-TDCS system can gain better anti-eavesdropping capacity while maintaining its own communications’ quality with regards to bit error rate performances.

[1]  Sabrina Hirsch,et al.  Digital Signal Processing A Computer Based Approach , 2016 .

[2]  Kaijie Zhou,et al.  Physical Layer Security Scheme Based on Polarization Modulation and WFRFT Processing for Dual-polarized Satellite Systems , 2017, KSII Trans. Internet Inf. Syst..

[3]  Yuan Liang,et al.  Research on Constellation-Splitting Criterion in Multiple Parameters WFRFT Modulations , 2018, IEEE Access.

[4]  P. J. Swackhammer,et al.  Performance simulation of a transform domain communication system for multiple access applications , 1999, MILCOM 1999. IEEE Military Communications. Conference Proceedings (Cat. No.99CH36341).

[5]  J.E. Mazo,et al.  Digital communications , 1985, Proceedings of the IEEE.

[6]  Reza Tavakkoli-Moghaddam,et al.  A Modified Genetic Algorithm For Solving Machine-Tool Selection and Operation Allocation Problem in an FMS , 2015 .

[7]  Matthias Patzold,et al.  Mobile Fading Channels , 2003 .

[8]  Zhu Han,et al.  PHY-Layer Authentication With Multiple Landmarks With Reduced Overhead , 2018, IEEE Transactions on Wireless Communications.

[9]  Catherine A. French,et al.  Spread-Spectrum Despreading Without the Code , 1986, IEEE Trans. Commun..

[10]  Geoffrey Ye Li,et al.  Modulation and Multiple Access for 5G Networks , 2017, IEEE Communications Surveys & Tutorials.

[11]  Xuejun Sha,et al.  Guaranteeing wireless communication secrecy via a WFRFT-based cooperative system , 2015 .

[12]  Jun Wang,et al.  Addressing the control channel design problem: OFDM-based transform domain communication system in cognitive radio , 2008, Comput. Networks.

[13]  Li Guo,et al.  Modular and High-Resolution Channel State Information and Beam Management for 5G New Radio , 2018, IEEE Communications Magazine.

[14]  Ismail Güvenç,et al.  An iterative interference cancellation method for co-channel multicarrier and narrowband systems , 2011, Phys. Commun..

[15]  Zhu Han,et al.  Physical-Layer Security in Distributed Wireless Networks Using Matching Theory , 2013, IEEE Transactions on Information Forensics and Security.

[16]  Xuejun Sha,et al.  The concepts of hybrid-carrier scheme communication system , 2011, 2011 6th International ICST Conference on Communications and Networking in China (CHINACOM).

[17]  C. Shih Fractionalization of Fourier transform , 1995 .

[18]  Ran Tao,et al.  The multiple-parameter fractional Fourier transform , 2008, Science in China Series F: Information Sciences.

[19]  Jun Wang,et al.  Performance of the OFDM-based Transform Domain Communication System in Cognitive Radio contexts , 2006, 2006 1st International Conference on Cognitive Radio Oriented Wireless Networks and Communications.

[20]  C. K. Yuen,et al.  Theory and Application of Digital Signal Processing , 1978, IEEE Transactions on Systems, Man, and Cybernetics.

[21]  Fang Dong,et al.  An Improved Genetic Algorithm for Cost-Effective Data-Intensive Service Composition , 2013, 2013 Ninth International Conference on Semantics, Knowledge and Grids.

[22]  Xuejun Sha,et al.  On Physical Layer Security: Weighted Fractional Fourier Transform Based User Cooperation , 2017, IEEE Transactions on Wireless Communications.

[23]  Donald F. Towsley,et al.  Hiding information in noise: fundamental limits of covert wireless communication , 2015, IEEE Communications Magazine.

[24]  L.P. Ligthart,et al.  On the utilization of embedded symbol for CCSK BER improvement in TDCS dynamic spectrum access , 2008, 2008 European Conference on Wireless Technology.

[25]  Qinyu Zhang,et al.  WFRFT Precoding for Narrowband Interference Suppression in DFT-Based Block Transmission Systems , 2013, IEEE Communications Letters.

[26]  Xuejun Sha,et al.  The approach to carrier scheme convergence based on 4-weighted fractional fourier transform , 2010, IEEE Communications Letters.

[27]  Natashia Boland,et al.  Comparison of Mixed-Integer Programming and Genetic Algorithm Methods for Distributed Generation Planning , 2014, IEEE Transactions on Power Systems.