In this paper, a multiple parameters weighted fractional Fourier transform(MPWFRFT) and constellation scrambling(CS) method based physical layer(PHY) security system is proposed. The proposed scheme is executed by two...In this paper, a multiple parameters weighted fractional Fourier transform(MPWFRFT) and constellation scrambling(CS) method based physical layer(PHY) security system is proposed. The proposed scheme is executed by two steps. In the first step, MPWFRFT, implemented as the constellation beguiling(CB) method, is applied to change the signal's identity. In the second step the additional pseudo random phase information, regarded as the encryption key, is attached to the original signal to enhance the security. Typically, the pseudo random phase information can be removed effectively by the legitimate receiver. In contrast to the cryptography based encryption algorithms and the conventional PHY secrecy techniques, the main contribution of the proposed scheme is concentrated on the variation in signal's characteristics. Simulation results show that the proposed scheme can prevent the exchanging signal from eavesdroppers' classifi cation or inception. Moreover, the proposed scheme can guarantee the BER performance at a tolerate increasing in computational complexity for the legitimate receivers.展开更多
A hybrid carrier(HC)scheme based on weighted-type fractional Fourier transform(WFRFT)has been proposed recently.While most of the works focus on HC scheme's inherent characteristics,little attention is paid to the...A hybrid carrier(HC)scheme based on weighted-type fractional Fourier transform(WFRFT)has been proposed recently.While most of the works focus on HC scheme's inherent characteristics,little attention is paid to the WFRFT modulation recognition.In this paper,a new theory is provided to recognize the WFRFT modulation based on higher order cumulants(HOC).First,it is deduced that the optimal WFRFT received order can be obtained through the minimization of 4 th-order cumulants,C_(42).Then,a combinatorial searching algorithm is designed to minimize C_(42).Finally,simulation results show that the designed scheme has a high recognition rate and the combinatorial searching algorithm is effective and reliable.展开更多
In this paper, a weighted fractional Fourier transform(WFRFT) based cooperative overlay system, aiming to guarantee physical layer(PHY) security, is proposed. The paper elaborates how WFRFT and physical layer properti...In this paper, a weighted fractional Fourier transform(WFRFT) based cooperative overlay system, aiming to guarantee physical layer(PHY) security, is proposed. The paper elaborates how WFRFT and physical layer properties of the wireless medium are collaborated to guarantee the secrecy of wireless transmissions. In the proposed system, WFRFT is first preform on the secret data, such that the transmitted signal is distorted and can only be neutralized by inverse-WFRFT with the same parameter. And then two streams of the transformed sequences that bearing different messages are cooperatively and simultaneously transmitted to two legitimate receivers via a beamforming-liked method, respectively. In general, both the rapid spatial decorrelation property and the inherent security features of WFRFT are leveraged, such that only the eavesdropper's is degraded, and hence, the wireless communication secrecy is reliably guaranteed. Numerical simulations are conducted to evaluate the performance of the proposed system in terms of the average bit error rate and the secrecy capacity.展开更多
基金supported by the National Basic Research Program of China under Grant 2013CB329003in part by the National Natural Science Foundation General Program of China under Grant 61171110
文摘In this paper, a multiple parameters weighted fractional Fourier transform(MPWFRFT) and constellation scrambling(CS) method based physical layer(PHY) security system is proposed. The proposed scheme is executed by two steps. In the first step, MPWFRFT, implemented as the constellation beguiling(CB) method, is applied to change the signal's identity. In the second step the additional pseudo random phase information, regarded as the encryption key, is attached to the original signal to enhance the security. Typically, the pseudo random phase information can be removed effectively by the legitimate receiver. In contrast to the cryptography based encryption algorithms and the conventional PHY secrecy techniques, the main contribution of the proposed scheme is concentrated on the variation in signal's characteristics. Simulation results show that the proposed scheme can prevent the exchanging signal from eavesdroppers' classifi cation or inception. Moreover, the proposed scheme can guarantee the BER performance at a tolerate increasing in computational complexity for the legitimate receivers.
基金supported by the National Natural Science Foundation of China(61271250,61571460)
文摘A hybrid carrier(HC)scheme based on weighted-type fractional Fourier transform(WFRFT)has been proposed recently.While most of the works focus on HC scheme's inherent characteristics,little attention is paid to the WFRFT modulation recognition.In this paper,a new theory is provided to recognize the WFRFT modulation based on higher order cumulants(HOC).First,it is deduced that the optimal WFRFT received order can be obtained through the minimization of 4 th-order cumulants,C_(42).Then,a combinatorial searching algorithm is designed to minimize C_(42).Finally,simulation results show that the designed scheme has a high recognition rate and the combinatorial searching algorithm is effective and reliable.
基金supported by the National Basic Research Program of China under Grant 2013CB329003the National Natural Science Founda-tion General Program of China under Grant 61171110
文摘In this paper, a weighted fractional Fourier transform(WFRFT) based cooperative overlay system, aiming to guarantee physical layer(PHY) security, is proposed. The paper elaborates how WFRFT and physical layer properties of the wireless medium are collaborated to guarantee the secrecy of wireless transmissions. In the proposed system, WFRFT is first preform on the secret data, such that the transmitted signal is distorted and can only be neutralized by inverse-WFRFT with the same parameter. And then two streams of the transformed sequences that bearing different messages are cooperatively and simultaneously transmitted to two legitimate receivers via a beamforming-liked method, respectively. In general, both the rapid spatial decorrelation property and the inherent security features of WFRFT are leveraged, such that only the eavesdropper's is degraded, and hence, the wireless communication secrecy is reliably guaranteed. Numerical simulations are conducted to evaluate the performance of the proposed system in terms of the average bit error rate and the secrecy capacity.