magazinelogo

Advances in Computer and Communication

ISSN Online: 2767-2875 Downloads: 98119 Total View: 702745
Frequency: quarterly CODEN: ACCDC3
Email: acc@hillpublisher.com

Volumes & Issues

Current Issue

Article Open Access http://dx.doi.org/10.26855/acc.2022.04.001

A Low Probability of Interception Method Based on Nonlinear Transformation of Channel Transmission Characteristic

Wen Zhao*, Boxiao Li, Ping Tang, Zejian Lu

China Academy of Electronics and Information Technology, 100041, Beijing, China.

*Corresponding author: Wen Zhao

Published: April 12,2022

Abstract

To realize the low probability of interception communication system, this paper presents a memory nonlinear model to carry on nonlinear transformation for channel transmission characteristic. When primary signals are transmitted through this kind of system, the quality of signals will be observably deteriorated due to strong memory effect nonlinear distortion. Located at the frequency range where primary signals are, the nonlinearities decrease primary signals’ signal to interference ratio (SIR) and memory effect introduce inter-symbol interference (ISI). Hence, with the purpose of encryption, the proposed model is designed to change both amplitude-frequency and phase-frequency characteristics in channel. At receiving end, suffered from bad SIR and ISI, illegal user cannot obtain correct information by I/Q demodulation and sample sentence processing, while authorized users can easily recover the primary signals waveform by proposed inverse nonlinear transformation model and get correct information next. The experiment results are provided to verify encryption effect of our method and analyze the loss of signal to noise ratio (SNR) of authorized user is also discussed for evaluating the impact of encryption method on conventional communication process.

References

[1] Shannon, C. E. (1949). Communication theory of secrecy systems [J]. Bell System Technical Journal, 1949, 28(4): 656-715.

[2] Lam, A. W., Sarwate, D. V. (1990). Time-hopping and frequency-hopping multiple-access packet communications [J]. IEEE Transactions on Communications, 1990, 38(6): 875-888.

[3] Win, M. Z., Scholtz, R. A. (2000). Ultra-wide bandwidth time-hopping spread-spectrum impulse radio for wireless multiple-access communications [J]. IEEE Transactions on Communications, 2000, 48(4): 679-689.

[4] Simon, M. K., Omura, J. K., Scholtz, R. A., et al. (1994). Spread spectrum communications handbook [M]. New York: McGraw-Hill, 1994.

[5] Peterson, R. L., Ziemer, R. E., Borth, D. E. (1995). Introduction to spread-spectrum communications [M]. New Jersey: Prentice hall, 1995.

[6] Win, M. Z., Scholtz, R. A. (1998). Impulse radio: How it works [J]. IEEE Communications letters, 1998, 2(2): 36-38.

[7] Win, M. Z., Scholtz, R. A. (2000). Ultra-wide bandwidth time-hopping spread-spectrum impulse radio for wireless multiple-access communications [J]. IEEE Transactions on Communications, 2000, 48(4): 679-689.

[8] Renna, F., Bloch, M. R., Laurenti, N. (2012). Semi-blind key-agreement over MIMO fading channels [J]. IEEE Transactions on Communications, 2012, 61(2): 620-627.

[9] Appendix: Yang, N., Elkashlan, M., Duong, T. Q., et al. (2015). Optimal transmission with artificial noise in MISOME wiretap channels [J]. IEEE Transactions on Vehicular Technology, 2015, 65(4): 2170-2181.

[10] Yang, N., Yan, S., Yuan, J., et al. (2015). Artificial noise: Transmission optimization in multi-input single-output wiretap channels [J]. IEEE Transactions on Communications, 2015, 63(5): 1771-1783.

[11] Zhang, X., Zhou, X., McKay, M. R. (2013). On the design of artificial-noise-aided secure multi-antenna transmission in slow fading channels [J]. IEEE Transactions on Vehicular Technology, 2013, 62(5): 2170-2181.

[12] Huang, J., Swindlehurst, A. L. (2011). Cooperative jamming for secure communications in MIMO relay networks [J]. IEEE Transactions on Signal Processing, 2011, 59(10): 4871-4884.

[13] Deng, H., Wang, H. M., Guo, W., et al. (2014). Secrecy transmission with a helper: To relay or to jam [J]. IEEE Transactions on Information Forensics and Security, 2014, 10(2): 293-307.

[14] Wang, X., Zhang, Z., Long, K. (2015). Secure beamforming for multiple-antenna amplify-and-forward relay networks [J]. IEEE Transactions on Signal Processing, 2015, 64(6): 1477-1492.

[15] Gong, X., Yin, H., Dong, F., et al. (2016). Robust beamforming design for secrecy in multiuser peer-to-peer wireless relay networks [J]. IEEE Systems Journal, 2016, 12(1): 682-690.

[16] Wang, C., Wang, H. M., Ng, D. W. K., et al. (2015). Joint beamforming and power allocation for secrecy in peer-to-peer relay networks [J]. IEEE Transactions on Wireless Communications, 2015, 14(6): 3280-3293.

[17] Wang, W., The, K. C., Li, K. H. (2015). Generalized relay selection for improved security in cooperative DF relay networks [J]. IEEE Wireless Communications Letters, 2015, 5(1): 28-31.

[18] Chang, C., Huan, H., Xu, J., et al. (2017). Multidimensional parallel combinatory transform domain communication system [J]. International Journal of Communication Systems, 2017, 30(11): e3249.

[19] Chakravarthy, V., Nunez, A. S., Stephens, J. P., et al. (2005). TDCS, OFDM, and MC-CDMA: a brief tutorial [J]. IEEE Communications Magazine, 2005, 43(9): S11-S16.

[20] Chakravarthy, V., Li, X., Wu, Z., et al. (2009). Novel overlay/underlay cognitive radio waveforms using SD-SMSE framework to enhance spectrum efficiency-part I: theoretical framework and analysis in AWGN channel [J]. IEEE Transactions on Communications, 2009, 57(12): 3794-3804.

[21] Koeppl, H. (2009). A Local Nonlinear Model for the Approximation and Identification of a Class of Systems [J]. IEEE Transactions on Circuits & Systems II Express Briefs, 2009, 56(4): 315-319.

[22] Matsui, M. (1994). Linear cryptanalysis method for DES cipher (III) [C]//Proceedings of the 1994 Symposium on Cryptography and Information Security (SCIS 94), Lake Biwa, Japan. 1994, 27-29.

[23] Tsimbinos, J. (1995). Identification and compensation of nonlinear distortion [D]. University of South Australia, 1995.

[24] Zhu, Z., Leung, H., Huang, X. (2013). Challenges in reconfigurable radio transceivers and application of nonlinear signal processing for RF impairment mitigation [J]. IEEE Circuits and Systems Magazine, 2013, 13(1): 44-65.

How to cite this paper

A Low Probability of Interception Method Based on Nonlinear Transformation of Channel Transmission Characteristic

How to cite this paper: Wen Zhao, Boxiao Li, Ping Tang, Zejian Lu. (2022) A Low Probability of Interception Method Based on Nonlinear Transformation of Channel Transmission Characteristic. Advances in Computer and Communication3(1), 1-15.

DOI: http://dx.doi.org/10.26855/acc.2022.04.001