HOME JOURNALS CONTACT

Journal of Applied Sciences

Year: 2013 | Volume: 13 | Issue: 18 | Page No.: 3790-3797
DOI: 10.3923/jas.2013.3790.3797
A Hiding Algorithm for OFDM Constellation Mapping Based on Wireless Physical Layer Encryption
Gao Baojian, Wang Yujie, Luo Yongling and Lei Beibei

Abstract: With the rapid development of wireless and cognitive network technology, the security of wireless communication has faced great challenge, in which parameters of wireless communication such as modulation type and frequency are more likely to be detected. As a result, business, especially military communication faces the problems of pertinence interference and content security, which are becoming more and more serious. In this study, a hiding algorithm for OFDM constellation mapping based on physical layer encryption is proposed. A secret seed key is adopted to control the phase rotation factor and amplitude size, thus the OFDM constellation mapping process based on MPSK/MQAM was disrupted. In this way, modulation modes used by legitimate users cannot be detected, thus modulation protection was achieved and illegal users cannot distinguish the modulation type. Simulation results show that this algorithm has a high capacity of modulation hiding on the premise of not changing the original system performance.

Fulltext PDF

How to cite this article
Gao Baojian, Wang Yujie, Luo Yongling and Lei Beibei, 2013. A Hiding Algorithm for OFDM Constellation Mapping Based on Wireless Physical Layer Encryption. Journal of Applied Sciences, 13: 3790-3797.

Keywords: Modulation hiding, physical layer encryption, cognitive radio and modulation recognition

REFERENCES

  • Azzouz, E.E. and A.K. Nandi, 1995. Automatic identification of digital modulation types. Signal Process., 47: 55-69.
    CrossRef    


  • Chorti, A. and I. Kanaras, 2009. Masked M-QAM OFDM: A simple approach for enhancing the security of OFDM systems. Proceedings of the IEEE 20th International Symposium on Personal, Indoor and Mobile Radio Communications, September 13-16, 2009, Tokyo, Japan, pp: 1682-1686.


  • Dai, W., Y. Wang and J. Wang, 2002. Joint power estimation and modulation classification using second-and higher statistics. Proceedings of the IEEE Wireless Communications and Networking Conference, Volume 1, March 17-21, 2002, Orlando, USA., pp: 155-l58.


  • Gulati, S. and R. Bhattacharjee, 2006. Automatic blind recognition of noisy and faded digitally modulated MQAM signals. Proceedings of the Annual IEEE India Conference, September 2006, New Delhi, India, pp: 1-6.


  • Huo, X. and D. Donoho, 1998. A simple and robust modulation classification method via counting. Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing, Volume 6, May 12-15, 1998, Seattle, USA., pp: 3289-3292.


  • Kubankova, A. and D. Kubanek, 2011. Extended method of digital modulation recognition and its testing. Radio Eng., 20: 25-30.
    Direct Link    


  • Ma, R., L. Dai, Z. Wang and J. Wang, 2010. Secure communication in TDS-OFDM system using constellation rotation and noise insertion. IEEE Trans. Consumer Electronics, 56: 1328-1332.
    CrossRef    


  • Mucchi, L., L. Ronga and E. Der Re, 2011. Physical layer cryptography and cognitive networks. Wireless Personal Commun., 58: 95-109.
    CrossRef    


  • Polydoros, A. and K. Kim, 1990. On the detection and classification of quartered digital modulations in broad-band noise. IEEE Trans. Commun., 38: 1199-1211.


  • Reilly, D. and G.S. Kanter, 2009. Noise-enhanced encryption for physical layer security in an OFDM radio. Proceedings of the IEEE Radio and Wireless Symposium, January 18-22, 2009, San Diego, USA., pp: 344-347.


  • Sadkhan, S.B. and N.A. Abbas, 2009. Proposed simulation of modulation identification based On wavelet transform. IJACT, 11: 78-84.


  • Zou, B. and W. Tan, 2012. A new algorithm for digital modulation recognition with combined parameters. IJACT, 4: 311-318.

  • © Science Alert. All Rights Reserved