2020
DOI: 10.1109/access.2020.3034633
|View full text |Cite
|
Sign up to set email alerts
|

Secure Modulation Based on Constellation Mapping Obfuscation in OFDM Based TDD Systems

Abstract: In this paper, we propose a secure modulation technique based on constellation mapping obfuscation to harden computational complexity for security at the physical-layer. To obfuscate mapping from bit stream to modulated symbols, our proposed scheme randomly changes a constellation mapping rule at each packet transmission opportunity, instead of employing a pre-determined mapping rule (e.g., Gray-coded mapping) at every packet transmission opportunity. Furthermore, to securely share the mapping rule between the… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(3 citation statements)
references
References 35 publications
0
3
0
Order By: Relevance
“…Strobel et al [129] presented a new model to extract malicious codes from the embedded system using the CPU electromagnetic emanation to prevent side-channel attacks in WSN and SWSN. To ensure the physical layer security of WSN and SWSN, Bang et al [130] proposed a secure cryptographic-enabled modulation technique for these networks. In this model, the authors used a random constellation mapping rule for packet transmission in the network instead of a pre-defined mapping rule such as "Gray-coded mapping" to guarantee the integrity of information during transmission from source to destination.…”
Section: F Non-cryptography Based Solutionsmentioning
confidence: 99%
“…Strobel et al [129] presented a new model to extract malicious codes from the embedded system using the CPU electromagnetic emanation to prevent side-channel attacks in WSN and SWSN. To ensure the physical layer security of WSN and SWSN, Bang et al [130] proposed a secure cryptographic-enabled modulation technique for these networks. In this model, the authors used a random constellation mapping rule for packet transmission in the network instead of a pre-defined mapping rule such as "Gray-coded mapping" to guarantee the integrity of information during transmission from source to destination.…”
Section: F Non-cryptography Based Solutionsmentioning
confidence: 99%
“…The approaches have included several methods ranging from scrambling/interleaving the IFFT coefficients [16], [17], changing the FFT size in pseudorandom manner and even changing the cyclic prefix along with FFT size in physical layer. Secure obfuscating of the interleaver stage and obfuscating the constellation mapping stage of OFDM pipeline are proposed respectively in references [18], [19].…”
Section: Approaches So Farmentioning
confidence: 99%
“…Noise mask [11] Binary quantization sequences [6]- [8] Constellation mapping [12]- [15] MS-Encryption schemes enhance the security level by scrambling the constellation points [9]- [11]. Nevertheless, some of them can not achieve perfect encryption because the ciphertext is not independent of plaintext.…”
Section: Mb-otp Ms-encryptionmentioning
confidence: 99%