Jie Zhong, Ji Zhou, Shecheng Gao, Weiping Liu, "Secure orthogonal time-frequency multiplexing with two-dimensional encryption for optical-wireless communications," Chin. Opt. Lett. 19, 050603 (2021)
Copy Citation Text
This paper firstly, to the best of our knowledge, proposed two-dimensional (2D) encryption based on the Arnold transformation for implementing a secure DC-biased optical orthogonal time-frequency multiplexing (DCO-OTFM) in optical-wireless communications (OWCs). The encrypted data is transformed to the particular 2D matrix and decrypted by the only key to get the correct information. Meanwhile, the number of keys in 2D encryption is enormous, which prevents eavesdroppers from exhaustively searching secret keys rapidly to find the right decryption. Numerical results demonstrate that the secure DCO-OTFM based on 2D encryption can effectively prevent signal decryption from the eavesdropper, which has good secure performance for applying in OWC.
As an emerging modulation technique, orthogonal time-frequency-space (OTFS) has been proposed to tackle the dynamics in multipath time-varying wireless channels[1]. Its main idea is to modulate the symbol onto two-dimensional (2D) orthogonal basis functions set in the delay-Doppler domain. Then, traditional modulations, such as orthogonal frequency division multiplexing (OFDM), deal with the signal in the time-frequency domain. This promising scheme, which simplifies detection and channel estimation in the high mobility scenarios, also improves bit error rate (BER) performance in systems through some static multipath channels, such as optical-wireless communications (OWCs). Recently, a series of researches have emerged to discuss performance improvement or new applicable scenarios with OTFS[2–4]. Schemes including novel channel estimation, equalization, and detection methods for OTFS were introduced[5–8]. An efficient method was proposed to reduce the peak-to-average power ratio (PAPR) in the OTFS network[9]. A robust beamforming was designed for the OTFS combined with a non-orthogonal multiple-access (NOMA) system[10]. A joint radar and communication system with OTFS was proposed[11]. Multiple-input multiple-output (MIMO) OTFS systems were investigated for underwater acoustic communication[12]. In our previous work, a 2D Hermitian symmetry was proposed for generating real-valued OTFS signals in OWC systems[13].
Physical layer security techniques have been widely studied for optical OFDM systems. The data can be encrypted by a chaotic scrambling matrix based on a one-dimensional (1D) logistic map for OFDM[14]. 2D encryption was proposed for the OFDM signal to implement time-frequency domain encryption or dynamic secret key encryption[15,16]. The chaotic sequences of the key were used to encrypt time synchronization of the OFDM frame, perform subcarrier masking, and manage the fractional order of the fractional Fourier transform[17]. The encryption based on the Walsh–Hadamard transform not only enhanced the security of the OFDM signals but also reduced their PAPR[18]. The chaotic secret keys were used at discrete chaotic space or with a secure hash algorithm to encrypt the OFDM signals[19,20]. A chaotic method based on orthogonal matrix transform was designed to encrypt the pulse amplitude modulated symbols to generate real-valued OFDM signals[21]. Augmented communication was proposed for the OFDM system to realize both a high spectral efficiency and a security link[22]. The encryption algorithm scrambled both the quadrature amplitude modulation (QAM) constellations and subcarriers for the NOMA-OFDM systems[23]. The birefringent with Goos–Hanchen shifts was used to control space time holes for information cloaking[24].
In this paper, we exploit the 2D characteristic of orthogonal time-frequency multiplexing (OTFM) signals, which can be directly encrypted by 2D encryption. We produce the real-valued OTFM signal with a 2D Hermitian symmetry, which makes sure the OTFM is suitable for the DC-biased OWC. Then, the 2D signal is encrypted with an Arnold transformation extended from the traditional transform[25]. Finally, a new secure DC-biased optical OTFM (DCO-OTFM) with 2D encryption is proposed. The legitimate user transforms the received signal to the particular 2D matrix and deciphers them with the correct key. The number of secret keys in the 2D encryption is enormous. Therefore, it is almost impossible for the eavesdropper to exhaustively search all keys to find out the right decryption. Simulation results are introduced to verify our design.
Annotations: All through the paper, we use normal letters, lowercase boldface, and uppercase boldface to denote scalar, vector, and matrix, respectively. Conjugate, transpose, and conjugate transpose operations are indicated by the superscripts , and . The matrix operators and are set to denote the -point discrete Fourier transform (DFT) and the inverse DFT (IDFT) operations, respectively.
2. Secure DCO-OTFM System
A DCO-OTFM system over the optical-wireless channel contains a single transmitter and receiver set as Alice and Bob, which is shown in Fig. 1, and the signals can be easily intercepted by the eavesdropper due to the openness of wireless communications. In order to provide good performance in the physical layer security, we propose the secure DCO-OTFM scheme with 2D encryption. An OTFM symbol consisting of samples is transmitted by subcarriers, where is the sampling interval, so each symbol duration is . In Alice, the real-valued OTFM is generated with inverse symplectic finite Fourier transform (ISFFT), 2D Hermitian symmetry method, and Heisenberg transform. We cipher the OTFM with the 2D encryption based on Arnold transformation. The encrypted OTFM matrices convert to vector signals with the cycle prefix (CP) addition. After DC bias addition and zero clipping, the encrypted DCO-OTFM signals are converted into optical signals and transmitted, in which the optical-wireless channel response is defined in the following expression: where denotes the channel coefficient, is the delay associated with the th propagation path, and the channel contains propagation paths. The optical-wireless channel model should be suitable for multiple common OWC scenarios, in which both the line of sight and non-directed channels are considered. Thus, the ceiling-bounce (CB) model is exploited to study the multipath effect[26]. So, Eq. (1) in the CB model defines the impulse response as where , denotes the root-mean-square (RMS) delay spread caused by multiple reflections, and the unit step function is set as . So, we represent the encrypted signal at the receiver as
Figure 1.Block diagram of secure DCO-OTFM system for OWC. E/O, electro/optic; O/E, optic/electro.
In Bob, the encrypted signals are transformed into the particular 2D matrix after frequency channel estimation. Then, the matrix can be deciphered with the only correct key and demodulated to get the correct information. Meanwhile, the data on the Eve side cannot be converted to the right matrix or decrypted with the right key. The details of our encryption scheme will be introduced in the following paragraphs.
3. 2D Encryption for OTFM
We introduce OTFM modulation in this part. As shown in the Alice part of Fig. 1, the information bits of OTFM are firstly transformed into QAM signals. Then, the signal vector will be reshaped as a 2D matrix before the ISFFT transform. We define each element in the original matrix as , where and are integers based on the subcarriers and samples in an OTFM symbol. Thus, the element of the modulated matrix with ISFFT is represented as where and are integers. A 2D Hermitian symmetry is proposed for OTFM to guarantee that the time-domain information is real-valued before transmission, which is similar to the Hermitian symmetry for optical OFDM. The matrix is defined as
The matrix is modulated to the OTFM matrix after the Heisenberg transform, which is implemented by the -point IDFT operation[12] and denoted as
Each element in this time-domain matrix is expressed as where , ; thus, the matrix is a real-valued matrix. The matrix can be ciphered with 2D encryption presented in the next part.
Conventional Arnold transformation is usually applied for the scrambling transform of the 2D image matrix. All image pixels keep their gray values and change their coordinates in each Arnold transformation with the regulation in the following equation: where and should be positive integers, and represent the original and new coordinate values, respectively. The periodicity of Arnold transformation was proved existent, which means that the encryption and decryption can be executed in one expression. The periodicity varies with the change of parameters ; thus, we can set different secret keys with proper security parameters.
The periodicity of Arnold transformation has been proved to exist in 2D encryption for the non-equilateral matrix[27]. The coordinate scrambling expression is shown as where the parameter is defined as
The operator presents the greatest common divisor of A and B, and other parameters have the same definition as in Eq. (8). Once we set , we can get the Arnold transformation periodicity . After we choose a proper parameter , which defines the number of transformations operated in encryption and is less than , the secret key is set. With , we encrypt the OTFM matrix by operating times in Eq. (9) to get the ciphered 2D signal .
Before we convert the 2D matrix to 1D data, we employ the biasing and clipping procedure to generate unipolar signals. A proper DC bias should be added to the bipolar signal to ensure all elements in are positive. With parallel to serial (P/S) conversion, each matrix transforms into the encrypted vector . Then, the symbol vector is added with a CP of length . The OTFM frame formed by vectors turns to the baseband signal with P/S conversion, which is transmitted after electro-optic conversion. We introduce the process of the decryption scheme in the subsequent section.
4. 2D Decryption for OTFM
On the legal receiver of the OTFM system, turns into 1D encrypted signals after the DC average component removal and serial to parallel conversion. The lower part of Fig. 1 briefly depicts the channel estimation diagram, where frequency domain equalization with CP removal is employed to eliminate the inter-symbol interference (ISI). The first symbols in are set as the training symbols. In consideration of the reduction in the training symbols' overhead, we apply the method of intra-symbol frequency-domain averaging (ISFA) to acquire the reckoned channel response [28]. With and , the time-domain vector is obtained, which is then transformed into 2D matrix . The dimension of should be the same as that of , which ensures that the data can be decrypted correctly.
In Bob, we set the decryption key , where is defined as and other parameters stay the same as those in . The key indicates that we execute times scrambling in Eq. (9) for each to get the deciphered matrix .
Next, we demodulate , and the operation is similar to that in our previous work[13]. We first apply the inverse of the Heisenberg transform and the Wigner transform on . Thus, the frequency domain signal is achieved by where is the Hermitian symmetry because of the definition in Eq. (5). Then, we use the effective data in to form matrix , and the element of is defined as where and . turns into the QAM signals with symplectic finite Fourier transform (SFFT), where we obtain the constellation value by where and . The decrypted bits are achieved after constellation demapping.
5. Simulation Setup and Results
In the following part, the simulation setup and the superiority of the 2D secret key are introduced. Then, we display the performance of secure DCO-OTFM with different decryption keys for two QAM modes. One OTFM symbol consists of 4096 samples in all of the simulations. CP is set as to counteract ISI, which is 1/256 of the length of each symbol period. Each DCO-OTFM frame contains symbols, where the first symbols are used for training symbols, and the information payload is transmitted in the remaining 124 symbols.
We analyze the relationship between the periodicity value of Arnold transformation and parameters at first. According to the principle of Arnold transformation, when are fixed, no matter how we set , the range of is confirmed. Table 1 shows all values of when we set , , or , which means both . We find that has 16 choices when and 18 choices when . If the eavesdropper intends to find out the right secret key, he first needs to get the correct parameters of the 2D OTFM signals to derive the right . However, the OTFM signals can be modulated in the arbitrary 2D matrix theoretically and optical signals are transmitted in the 1D mode through the OWC channel. The optional number of the 2D matrix pattern is large in practical modulation. It is difficult for the eavesdropper to find out the correct by exhaustively searching all possible . Thus, he cannot get the only decryption key of 2D encryption rapidly. So, the 2D encryption enhances the physical layer security of the OTFM.
Periodicity Value
M = 256
256
192
128
96
64
48
32
24
16
12
8
6
4
3
2
1
M = 512
512
384
256
192
128
96
64
48
32
24
16
12
8
6
4
3
2
1
Table 1. All Possible Periodicity Values TAr for Different M, with N = 16, q = 1 and a, b as the Arbitrary Integers
Next, we further discuss the relationship between and parameters . In Table 2, we set , , and , and demonstrate partial values of by different . For example, nine different can get the periodicity , which means that even if the eavesdropper gets the right or , he cannot find the right key at once and decrypt the data correctly. In fact, for each specific , the number of related and couples can be up to the level. We sum up the analysis from Tables 1 and 2 and conclude that the size of the key space for depending on different is at least in the level. It would be tough work for the eavesdropper to find the only right from the tremendous secret key pool in a short time.
b
1
2
3
4
5
TAr
192
128
192
256
96
b
6
7
8
9
10
TAr
64
96
256
192
128
b
41
42
43
44
45
TAr
192
128
192
256
48
b
46
47
48
49
50
TAr
32
48
256
192
128
b
297
298
299
300
301
TAr
192
128
192
256
48
b
302
303
304
305
306
TAr
32
48
256
192
128
Table 2. Values of TAr Depend on Different b, with M = 256, N = 16, q = 1, and a = 1
We then show the BER performance of secure OTFM schemes. In simulations, each OTFM symbol is transmitted in sampling time interval durations by subcarriers. The signals’ transmission rate is set to 100 Mbit/s, the DC bias is set to 7 dB, and RMS delay spread is set to 10 ns in the CB channel. Figure 2 illustrates the performance of BER for three decryption modes in different QAM modes. The BER performance of unencrypted DCO-OTFM signals is set as the benchmark, and the required SNR should reach or be lower than threshold of BER .
Figure 2.Performance of BER versus SNR for deciphered signals with different keys through CB channel; w/o, without. (a) BER and decoded constellations for 4QAM signals. (b) BER and decoded constellations for 16QAM signals.
In Fig. 2(a), we illustrate the performance contrast between Bob and the eavesdropper with 4QAM signals. When the transmission , Bob succeeds in signal decryption and achieves the communication requirement. The performance of a secure DCO-OTFM scheme has a little loss compared with the unencrypted system. An OTFM symbol is transmitted through time slot, which is different from an OFDM symbol transmitted in one time slot. The elements in one row of the OTFM matrix are processed together in the 2D demodulation. These elements are in the same time slot for unencrypted OTFM. However, each row of the encrypted OTFM matrix contains multi-time slot elements after 2D decryption. The correlations of noise among different time slots are usually weaker than that of one time slot in common sense. This leads to more deviations between each row of the received decrypted data and original data than those of unencrypted data. The loss caused by 2D decryption will further make more errors with the encrypted data in the demodulation, which brings out BER loss after demapping. We do not need to raise any SNR to reach the transmission threshold. On the other hand, the eavesdropper demodulates the signals directly or deciphers them with a wrong decryption key. He cannot get the correct data with any SNR. The constellation coordinates on the right side of the figure also compare the effect of the secret key. In Fig. 2(b), we find that for the 16QAM encrypted signal, the SNR of secure OTFM communication needs to raise about 8 dB to reach the same performance of unencrypted signals, which is the reason for the loss being the same as that for 4QAM signals. The secure DCO-OTFM scheme brings out partial performance loss for high-order modulation signals. Both subfigures demonstrate good secure performance in our proposed system with 2D encryption.
6. Conclusion
In this paper, a secure DCO-OTFM in OWC was firstly implemented with 2D encryption. A 2D Hermitian symmetry is utilized in the modulation to generate the real-valued OTFM matrix, and then the signals were encrypted with a 2D Arnold transformation. In the signal recovery of the legal user, we applied the proper equalization method, transformed the signals to the particular 2D matrices, and deciphered them with the right key. As a result, the data could be demodulated correctly. The number of keys in 2D encryption is enormous, which was analyzed to verify the superiority of 2D encryption. Consequently, it is nearly impossible for the eavesdropper to get the right cipher key. Numerical results showed that our proposed schemes can prevent signal decryption from the eavesdropper. All of the results revealed that our secure DCO-OTFM based on 2D encryption has good secure performance for applying in OWC.
References
[1] R. Hadani, S. Rakib, M. Tsatsanis, A. Monk, A. J. Goldsmith, A. F. Molisch, R. Calderbank. Orthogonal time frequency space modulation. 2017 IEEE Wireless Communications and Networking Conference (WCNC), 1(2017).
[25] Z. Shang, H. Ren, J. Zhang. A block location scrambling algorithm of digital image based on Arnold transformation. Proceedings of the 9th International Conference for Young Computer Scientists, 2942(2008).
[27] L. Shao, Z. Qin, B. Liu, H. Gao, J. Qin. 2D bi-scale rectangular mapping and its application in image scrambling. J. Comput.-Aided Des. Comput. Graphics, 21, 1025(2009).
Jie Zhong, Ji Zhou, Shecheng Gao, Weiping Liu, "Secure orthogonal time-frequency multiplexing with two-dimensional encryption for optical-wireless communications," Chin. Opt. Lett. 19, 050603 (2021)