Open Access
Subscription Access
Physical layer security based on chaotic maps applied to OFDM systems
Recently, physical layer security (PLS) has attracted widespread attention to improve security in networks without focusing on encryption techniques at the higher layers. This paper proposes a PLS scheme through an orthogonal frequency division multiplexing (OFDM) system based on chaotic maps. An OFDM wave is securedby mixing its modulated symbols and encoding information bits at the same time. Informationis encoded by generating a stream of bits by chaotic maps. To build a secure OFDM wave, the modulated symbols are shuffled by a scrambling matrix that is created by chaotic maps. Their initial conditions act as a secret shared key. We send only one key to encrypt the first OFDM signal at the beginning of the transmission. After the first transmission, the received information, after its decryption, s e rv e as the key to the next information. In other word, the information itself is the key to the next information to be received.Meanwhile, we do not have to send the encryption key on every transmission.
Keywords
OFDM, chaotic maps, Logistic map, Cryptography, Physical layer security.
User
Font Size
Information
- Group 15 ITU-T, Study. ITU-T Rec. G.984.1 (03/2008) Gigabit-capable passive optical networks (GPON): General characteristics. ITU-T, 2008.
- Yi Sheng Shiu, Shih Yu Chang, Hsiao Chun Wu, Scott C.H. Huang, and Hsiao Hwa Chen. Physical layer security in wireless networks: A tutorial. IEEE Wireless Communications, 18(2):66–74, 2011.
- Reem Melki, Hassan N. Noura, Moham- mad M. Mansour, and Ali Chehab. A sur- vey on ofdm physical layer security. Physical Communication, 32:1–30, 2019.
- Ljupˇco Kocarev. Chaos-based cryptography: A brief overview. IEEE Circuits and Systems Magazine, 1(3):6–21, 2001.
- Ljupco Kocarev and Shiguo Lian. Chaosbased cryptography: Theory, algorithms and applications, volume 354. Springer Berlin, Heidelberg, 2011.
- Lijia Zhang, Xiangjun Xin, Bo Liu, and Yongjun Wang. Secure ofdm-pon based on chaos scrambling. IEEE Photonics Technology Letters, 23(14):998–1000, 2011.
- Adnan A.E. Hajomer, Xuelin Yang, and Weisheng Hu. Secure ofdm transmission precoded by chaotic discrete hartley transform. IEEE Photonics Journal, 10(2):1–9, 2018.
- Wei Zhang, Chongfu Zhang, Wei Jin, Kun Qiu, and Chen Chen. Hybrid time-frequency domain chaotic interleaving for physicallayer security enhancement in ofdm-pon systems. 2016 IEEE/CIC International Conference on Communications in China, ICCC 2016, pages 1–4, 2016.
- Lijia Zhang, Bo Liu, Xiangjun Xin, Qi Zhang, Jianjun Yu, and Yongjun Wang. Theory and performance analyses in secure co-ofdm transmission system based on twodimensional permutation. Journal of Lightwave Technology, 31(1):74–80, 2013.
- Muhammad Asif Khan, Varun Jeoti, and Rana Shahid Manzoor. Secure interleaving - physical layer security enhancement of ofdm based system. Communications in Computer and Information Science, 171 CCIS:349–361, 2011.
- Hao Li, Xianbin Wang, and Weikun Hou. Secure transmission in ofdm systems by us- ing time domain scrambling. IEEE Vehicular Technology Conference, pages 1–5, 2013.
- C. E. Shannon. Communication theory of se-crecy systems. Bell System Technical Jour- nal, 28(4):656–715, 1949.
- Mathuranathan Viswanathan. Simulation of digital communication systems using Matlab. 2013.
- Mathuranathan Viswanathan. Wireless Communication Systems in Matlab. Independent, 2020.
- Yong Soo Cho, Jaekwon Kim, Won Young Yang, and Chung G. Kang. MIMO-OFDM Wireless Communications with MATLAB®. John Wiley & Sons, 2010.
- Robert M. May. Simple mathematical models with very complicated dynamics. Nature, 261(5560):459–467, 1976.
- N. K. Pareek, Vinod Patidar, and K. K. Sud. Discrete chaotic cryptography using exter- nal key. Physics Letters, Section A: General,Atomic and Solid State Physics, 309(1-2):75–82, 2003.
- V. Patidar, K.K. Sud, and N.K. Pareek. A pseudo random bit generator based on chaotic logistic map and its statistical test- ing. Informatica, 33(4):441–452, 2009.
- Stephen Lynch. Dynamical systems with applications using MATLAB®, second edition. Springer International Publishing, 2014.
- Ahmed Sahnoune and Daoud Berkani. On the correlation of chaotic signals generated by multimodal skew tent map. Signal, Im- age and Video Processing, 12(7):1273–1278, 2018.
- Madhu Sharma, Ranjeet Kumar Ranjan, and Vishal Bharti. A pseudo-random bit generator based on chaotic maps enhanced witha bit-xor operation. Journal of Information Security and Applications, 69:103299, 9 2022.
- Ali Kanso and Nejib Smaoui. Logis- tic chaotic maps for binary numbers generations. Chaos, Solitons & Fractals, 40(5):2557–2568, 2009.
- Ahmed Badawy, Tarek Elfouly, Tamer Khattab, Amr Mohamed, and Mohsen Guizani. Unleashing the secure potential of the wireless physical layer: Secret key generation methods. Physical Communication, 19:1–10, 2016.
- Junqing Zhang, Alan Marshall, Roger Woods, and Trung Q. Duong. Efficient key generation by exploiting randomness from channel responses of individual ofdm sub- carriers. IEEE Transactions on Communi- cations, 64(6):2578–2588, 2016.
- IEEE Computer Society LAN MAN Standards Committee et al. Part 11: Wireless lan medium access control (mac) and physical layer (phy) specifications: Highspeed physi-cal layer in the 5ghz band. IEEE std 802.11 a-1999, 1999
Abstract Views: 148
PDF Views: 97