2018
DOI: 10.1109/access.2018.2866797
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic QAM Mapping for Physical-Layer Security Using Digital Chaos

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
9
0
1

Year Published

2019
2019
2022
2022

Publication Types

Select...
10

Relationship

0
10

Authors

Journals

citations
Cited by 26 publications
(10 citation statements)
references
References 24 publications
0
9
0
1
Order By: Relevance
“…In recent years, considerable efforts have been devoted to physical-layer security enhancement using digital signal processing (DSP) approaches in electric domain for OFDM-PON system [17]- [29]. In particular, chaotic encryption has been widely investigated owing to its desirable properties such as ergodicity, sensitivity to the initial values and low implementation cost [17]- [24]. For example, the OFDM symbols are divided into sub-matrices and encrypted by different algorithms based on chaotic systems [21]- [23].…”
Section: Introductionmentioning
confidence: 99%
“…In recent years, considerable efforts have been devoted to physical-layer security enhancement using digital signal processing (DSP) approaches in electric domain for OFDM-PON system [17]- [29]. In particular, chaotic encryption has been widely investigated owing to its desirable properties such as ergodicity, sensitivity to the initial values and low implementation cost [17]- [24]. For example, the OFDM symbols are divided into sub-matrices and encrypted by different algorithms based on chaotic systems [21]- [23].…”
Section: Introductionmentioning
confidence: 99%
“…The encryption in a layered communication model such as TCP/IP can be performed at different levels of the communication, such as in layers 2 or 3 with MACsec or IPsec standards, respectively. Although encryption in physical layer (layer 1) is less usual than in other layers some proposals have been made, for example related with photonic [26]- [29] or radio [30], [31] technologies or with the physical layer protocols [20], [21], [32].…”
Section: Application Case: Ethernet 1000base-xmentioning
confidence: 99%
“…The symbol substitution and interleave are adopted for encryption [19]. Dynamic radius and phase offsets are added into the constellation to achieve multifold security data encryption [20]. A 7-D hyperchaos is adopted to implement two-layer encryption, where Walsh-Hadamard and discrete cosine transform are used to effectively reduce the computational complexity and increase the key space [21].…”
Section: Introductionmentioning
confidence: 99%