As an emerging modulation technique, orthogonal time-frequency-space (OTFS) has been proposed to tackle the dynamics in multipath time-varying wireless channels[
Chinese Optics Letters, Volume. 19, Issue 5, 050603(2021)
Secure orthogonal time-frequency multiplexing with two-dimensional encryption for optical-wireless communications
This paper firstly, to the best of our knowledge, proposed two-dimensional (2D) encryption based on the Arnold transformation for implementing a secure DC-biased optical orthogonal time-frequency multiplexing (DCO-OTFM) in optical-wireless communications (OWCs). The encrypted data is transformed to the particular 2D matrix and decrypted by the only key to get the correct information. Meanwhile, the number of keys in 2D encryption is enormous, which prevents eavesdroppers from exhaustively searching secret keys rapidly to find the right decryption. Numerical results demonstrate that the secure DCO-OTFM based on 2D encryption can effectively prevent signal decryption from the eavesdropper, which has good secure performance for applying in OWC.
1. Introduction
As an emerging modulation technique, orthogonal time-frequency-space (OTFS) has been proposed to tackle the dynamics in multipath time-varying wireless channels[
Physical layer security techniques have been widely studied for optical OFDM systems. The data can be encrypted by a chaotic scrambling matrix based on a one-dimensional (1D) logistic map for OFDM[
In this paper, we exploit the 2D characteristic of orthogonal time-frequency multiplexing (OTFM) signals, which can be directly encrypted by 2D encryption. We produce the real-valued OTFM signal with a 2D Hermitian symmetry, which makes sure the OTFM is suitable for the DC-biased OWC. Then, the 2D signal is encrypted with an Arnold transformation extended from the traditional transform[
Sign up for Chinese Optics Letters TOC Get the latest issue of Advanced Photonics delivered right to you!Sign up now
Annotations: All through the paper, we use normal letters, lowercase boldface, and uppercase boldface to denote scalar, vector, and matrix, respectively. Conjugate, transpose, and conjugate transpose operations are indicated by the superscripts , and . The matrix operators and are set to denote the -point discrete Fourier transform (DFT) and the inverse DFT (IDFT) operations, respectively.
2. Secure DCO-OTFM System
A DCO-OTFM system over the optical-wireless channel contains a single transmitter and receiver set as Alice and Bob, which is shown in Fig. 1, and the signals can be easily intercepted by the eavesdropper due to the openness of wireless communications. In order to provide good performance in the physical layer security, we propose the secure DCO-OTFM scheme with 2D encryption. An OTFM symbol consisting of samples is transmitted by subcarriers, where is the sampling interval, so each symbol duration is . In Alice, the real-valued OTFM is generated with inverse symplectic finite Fourier transform (ISFFT), 2D Hermitian symmetry method, and Heisenberg transform. We cipher the OTFM with the 2D encryption based on Arnold transformation. The encrypted OTFM matrices convert to vector signals with the cycle prefix (CP) addition. After DC bias addition and zero clipping, the encrypted DCO-OTFM signals are converted into optical signals and transmitted, in which the optical-wireless channel response is defined in the following expression:
Figure 1.Block diagram of secure DCO-OTFM system for OWC. E/O, electro/optic; O/E, optic/electro.
In Bob, the encrypted signals are transformed into the particular 2D matrix after frequency channel estimation. Then, the matrix can be deciphered with the only correct key and demodulated to get the correct information. Meanwhile, the data on the Eve side cannot be converted to the right matrix or decrypted with the right key. The details of our encryption scheme will be introduced in the following paragraphs.
3. 2D Encryption for OTFM
We introduce OTFM modulation in this part. As shown in the Alice part of Fig. 1, the information bits of OTFM are firstly transformed into QAM signals. Then, the signal vector will be reshaped as a 2D matrix before the ISFFT transform. We define each element in the original matrix as , where and are integers based on the subcarriers and samples in an OTFM symbol. Thus, the element of the modulated matrix with ISFFT is represented as
The matrix is modulated to the OTFM matrix after the Heisenberg transform, which is implemented by the -point IDFT operation[
Each element in this time-domain matrix is expressed as
Conventional Arnold transformation is usually applied for the scrambling transform of the 2D image matrix. All image pixels keep their gray values and change their coordinates in each Arnold transformation with the regulation in the following equation:
The periodicity of Arnold transformation has been proved to exist in 2D encryption for the non-equilateral matrix[
The operator presents the greatest common divisor of A and B, and other parameters have the same definition as in Eq. (8). Once we set , we can get the Arnold transformation periodicity . After we choose a proper parameter , which defines the number of transformations operated in encryption and is less than , the secret key is set. With , we encrypt the OTFM matrix by operating times in Eq. (9) to get the ciphered 2D signal .
Before we convert the 2D matrix to 1D data, we employ the biasing and clipping procedure to generate unipolar signals. A proper DC bias should be added to the bipolar signal to ensure all elements in are positive. With parallel to serial (P/S) conversion, each matrix transforms into the encrypted vector . Then, the symbol vector is added with a CP of length . The OTFM frame formed by vectors turns to the baseband signal with P/S conversion, which is transmitted after electro-optic conversion. We introduce the process of the decryption scheme in the subsequent section.
4. 2D Decryption for OTFM
On the legal receiver of the OTFM system, turns into 1D encrypted signals after the DC average component removal and serial to parallel conversion. The lower part of Fig. 1 briefly depicts the channel estimation diagram, where frequency domain equalization with CP removal is employed to eliminate the inter-symbol interference (ISI). The first symbols in are set as the training symbols. In consideration of the reduction in the training symbols' overhead, we apply the method of intra-symbol frequency-domain averaging (ISFA) to acquire the reckoned channel response [
In Bob, we set the decryption key , where is defined as
Next, we demodulate , and the operation is similar to that in our previous work[
5. Simulation Setup and Results
In the following part, the simulation setup and the superiority of the 2D secret key are introduced. Then, we display the performance of secure DCO-OTFM with different decryption keys for two QAM modes. One OTFM symbol consists of 4096 samples in all of the simulations. CP is set as to counteract ISI, which is 1/256 of the length of each symbol period. Each DCO-OTFM frame contains symbols, where the first symbols are used for training symbols, and the information payload is transmitted in the remaining 124 symbols.
We analyze the relationship between the periodicity value of Arnold transformation and parameters at first. According to the principle of Arnold transformation, when are fixed, no matter how we set , the range of is confirmed. Table 1 shows all values of when we set , , or , which means both . We find that has 16 choices when and 18 choices when . If the eavesdropper intends to find out the right secret key, he first needs to get the correct parameters of the 2D OTFM signals to derive the right . However, the OTFM signals can be modulated in the arbitrary 2D matrix theoretically and optical signals are transmitted in the 1D mode through the OWC channel. The optional number of the 2D matrix pattern is large in practical modulation. It is difficult for the eavesdropper to find out the correct by exhaustively searching all possible . Thus, he cannot get the only decryption key of 2D encryption rapidly. So, the 2D encryption enhances the physical layer security of the OTFM.
|
Next, we further discuss the relationship between and parameters . In Table 2, we set , , and , and demonstrate partial values of by different . For example, nine different can get the periodicity , which means that even if the eavesdropper gets the right or , he cannot find the right key at once and decrypt the data correctly. In fact, for each specific , the number of related and couples can be up to the level. We sum up the analysis from Tables 1 and 2 and conclude that the size of the key space for depending on different is at least in the level. It would be tough work for the eavesdropper to find the only right from the tremendous secret key pool in a short time.
|
We then show the BER performance of secure OTFM schemes. In simulations, each OTFM symbol is transmitted in sampling time interval durations by subcarriers. The signals’ transmission rate is set to 100 Mbit/s, the DC bias is set to 7 dB, and RMS delay spread is set to 10 ns in the CB channel. Figure 2 illustrates the performance of BER for three decryption modes in different QAM modes. The BER performance of unencrypted DCO-OTFM signals is set as the benchmark, and the required SNR should reach or be lower than threshold of BER .
Figure 2.Performance of BER versus SNR for deciphered signals with different keys through CB channel; w/o, without. (a) BER and decoded constellations for 4QAM signals. (b) BER and decoded constellations for 16QAM signals.
In Fig. 2(a), we illustrate the performance contrast between Bob and the eavesdropper with 4QAM signals. When the transmission , Bob succeeds in signal decryption and achieves the communication requirement. The performance of a secure DCO-OTFM scheme has a little loss compared with the unencrypted system. An OTFM symbol is transmitted through time slot, which is different from an OFDM symbol transmitted in one time slot. The elements in one row of the OTFM matrix are processed together in the 2D demodulation. These elements are in the same time slot for unencrypted OTFM. However, each row of the encrypted OTFM matrix contains multi-time slot elements after 2D decryption. The correlations of noise among different time slots are usually weaker than that of one time slot in common sense. This leads to more deviations between each row of the received decrypted data and original data than those of unencrypted data. The loss caused by 2D decryption will further make more errors with the encrypted data in the demodulation, which brings out BER loss after demapping. We do not need to raise any SNR to reach the transmission threshold. On the other hand, the eavesdropper demodulates the signals directly or deciphers them with a wrong decryption key. He cannot get the correct data with any SNR. The constellation coordinates on the right side of the figure also compare the effect of the secret key. In Fig. 2(b), we find that for the 16QAM encrypted signal, the SNR of secure OTFM communication needs to raise about 8 dB to reach the same performance of unencrypted signals, which is the reason for the loss being the same as that for 4QAM signals. The secure DCO-OTFM scheme brings out partial performance loss for high-order modulation signals. Both subfigures demonstrate good secure performance in our proposed system with 2D encryption.
6. Conclusion
In this paper, a secure DCO-OTFM in OWC was firstly implemented with 2D encryption. A 2D Hermitian symmetry is utilized in the modulation to generate the real-valued OTFM matrix, and then the signals were encrypted with a 2D Arnold transformation. In the signal recovery of the legal user, we applied the proper equalization method, transformed the signals to the particular 2D matrices, and deciphered them with the right key. As a result, the data could be demodulated correctly. The number of keys in 2D encryption is enormous, which was analyzed to verify the superiority of 2D encryption. Consequently, it is nearly impossible for the eavesdropper to get the right cipher key. Numerical results showed that our proposed schemes can prevent signal decryption from the eavesdropper. All of the results revealed that our secure DCO-OTFM based on 2D encryption has good secure performance for applying in OWC.
[1] R. Hadani, S. Rakib, M. Tsatsanis, A. Monk, A. J. Goldsmith, A. F. Molisch, R. Calderbank. Orthogonal time frequency space modulation. 2017 IEEE Wireless Communications and Networking Conference (WCNC), 1(2017).
[10] Z. Ding. Robust beamforming design for OTFS-NOMA. IEEE OJ-COMS, 1, 33(2020).
[25] Z. Shang, H. Ren, J. Zhang. A block location scrambling algorithm of digital image based on Arnold transformation. Proceedings of the 9th International Conference for Young Computer Scientists, 2942(2008).
[27] L. Shao, Z. Qin, B. Liu, H. Gao, J. Qin. 2D bi-scale rectangular mapping and its application in image scrambling. J. Comput.-Aided Des. Comput. Graphics, 21, 1025(2009).
Get Citation
Copy Citation Text
Jie Zhong, Ji Zhou, Shecheng Gao, Weiping Liu, "Secure orthogonal time-frequency multiplexing with two-dimensional encryption for optical-wireless communications," Chin. Opt. Lett. 19, 050603 (2021)
Category: Fiber Optics and Optical Communications
Received: Oct. 9, 2020
Accepted: Nov. 8, 2020
Published Online: Feb. 25, 2021
The Author Email: Ji Zhou (zhouji@jnu.edu.cn)