Decomposed and Distributed Modulation to Achieve Secure Transmission | IEEE Journals & Magazine | IEEE Xplore

Decomposed and Distributed Modulation to Achieve Secure Transmission


Abstract:

With the rapid deployment and wide use of mobile services and applications, more and more sensitive user information is being transmitted wirelessly. Due to the broadcast...Show More

Abstract:

With the rapid deployment and wide use of mobile services and applications, more and more sensitive user information is being transmitted wirelessly. Due to the broadcast nature of wireless transmissions, they are exposed to all surrounding entities and thus vulnerable to eavesdropping. To counter this vulnerability, we propose a new physical-layer secure transmission scheme, called DDM-Sec, based on decomposed and distributed modulation (DDM). We show that a high-order modulation can be decomposed into multiple quadrature phase shift keying (QPSK) modulations, each of which can be further represented by two mutually orthogonal binary phase shift keying (BPSK) modulations. Therefore, traditional modulation can be realized by two cooperative transmitters (Txs), each generating a BPSK signal, in a distributed manner. The legitimate receiver (Rx) can decode the desired/intended information from the mixed two received BPSK signals while preventing the eavesdropper from accessing the legitimate user’s information. DDM-Sec can effectively exploit the randomness of wireless channels to secure data transmission, enrich the spatial signatures of the legitimate user’s transmission by employing two cooperative Txs, and then distribute the user’s information to two transmissions so that none of the decomposed signals alone carry the legitimate user’s full information. Moreover, due to random deployment of the two Txs and Rx, delay difference of the two transmissions is introduced. This can be further utilized to make eavesdropping difficult. Our theoretical analysis and simulation have shown that DDM-Sec can effectively prevent the eavesdropping, and hence guarantee the secrecy of the legitimate user’s data transmission.
Published in: IEEE Transactions on Mobile Computing ( Volume: 23, Issue: 12, December 2024)
Page(s): 11172 - 11190
Date of Publication: 19 April 2024

ISSN Information:

Funding Agency:


References

References is not available for this document.