Highly secure non-orthogonal multiple access based on key accompanying transmission in training sequence

被引:26
|
作者
Han, Yongcan [1 ,2 ,3 ,4 ]
Ren, Jianxin [1 ,3 ,4 ]
Liu, Bo [1 ,3 ,4 ]
Li, Yong [2 ]
Ullah, Rahat [1 ,3 ,4 ]
Mao, Yaya [1 ,3 ,4 ]
Wu, Xiangyu [1 ,3 ,4 ]
Chen, Shuaidong [1 ,3 ,4 ]
Wang, Bin [2 ]
Wu, Yongfeng [1 ,3 ,4 ]
Zhao, Lilong [1 ,3 ,4 ]
机构
[1] Nanjing Univ Informat Sci & Technol, Inst Opt & Elect, Nanjing 210044, Peoples R China
[2] Sci & Technol Commun Networks Lab, Shijiazhuang, Hebei, Peoples R China
[3] Nanjing Univ Informat Sci & Technol, Jiangsu Key Lab Optoelect Detect Atmosphere Ocean, Nanjing 210044, Peoples R China
[4] Nanjing Univ Informat Sci & Technol, Jiangsu Int Joint Lab Meteorol Photon & Optoelect, Nanjing 210044, Peoples R China
基金
中国国家自然科学基金;
关键词
PHYSICAL LAYER SECURITY; OFDM-PON; POWER ALLOCATION; NOMA; ENCRYPTION; SCHEME; CHAOS; CODE;
D O I
10.1364/OE.510558
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
This paper proposes a high -security chaotic encrypted power sparse coding division (CE-PSCD) scheme for 7 -core fiber based on non -orthogonal multiple access (NOMA) technology. The method utilizes power multiplexing to realize parallel transmission of two signals. Joint encryption of the four-dimensional region is realized using constellation mapping encryption, carrier frequency encryption, symbol scrambling, and sparse code scrambling. What we believe to be a new dimension for encryption of autonomously designed sparse codes is proposed. Meanwhile, we hide the chaotic key in training sequence (TS) to realize the co -transmission of the key and the message. A 70 Gb/s CE-PSCD signal transmission over 2 km of 7 -core fiber is demonstrated experimentally. At the limit of forward error correction (FEC) similar to 3.8 x 10-3, the difference in the encrypted sensitivity among different users at the equal power level is 0.36 dB, which means that the fairness of users will not be destroyed. The key space can reach 10134, with a bit error rate (BER) of about 0.5 for brute -force cracking at illegal receivers. As long as the key bits in the hidden TS are wrong by one bit, the BER stays around 0.5. The results show no significant attenuation of the signal before and after encryption at either high or low power, verifying the high -security performance of our proposed scheme.
引用
收藏
页码:1979 / 1997
页数:19
相关论文
共 50 条
  • [1] Highly secure non-orthogonal multiple access with key accompanying transmission based on subcarrier-indexed modulation
    Zhu, Dongxu
    Liu, Bo
    Ren, Jianxin
    Chen, Shuaidong
    Mao, Yaya
    Song, Xiumin
    Wu, Xiangyu
    Han, Yongcan
    Yin, Mengtong
    Dai, Wei
    Li, Ying
    Sun, Tingting
    OPTICS EXPRESS, 2024, 32 (21): : 36272 - 36285
  • [2] Secure Transmission to the Strong User in Non-Orthogonal Multiple Access
    Feng, Youhong
    Yan, Shihao
    Yang, Zhen
    IEEE COMMUNICATIONS LETTERS, 2018, 22 (12) : 2623 - 2626
  • [3] Secure Transmission in Downlink Non-Orthogonal Multiple Access Based on Polar Codes
    Sun, Ce
    Fei, Zesong
    Lie, Bin
    Wang, Xinyi
    Li, Nan
    Hu, Lijie
    CHINA COMMUNICATIONS, 2021, 18 (09) : 221 - 235
  • [4] Secure Transmission in Downlink Non-Orthogonal Multiple Access Based on Polar Codes
    Ce Sun
    Zesong Fei
    Bin Li
    Xinyi Wang
    Nan Li
    Lijie Hu
    ChinaCommunications, 2021, 18 (09) : 221 - 235
  • [5] Optimal Power Allocation for Secure Non-orthogonal Multiple Access Transmission
    Lu, Weidang
    Wu, Weicong
    Qian, Liping
    Wu, Yuan
    Yu, Ningning
    Huang, Liang
    2020 IEEE 92ND VEHICULAR TECHNOLOGY CONFERENCE (VTC2020-FALL), 2020,
  • [6] Energy Efficient Secure MISO Non-Orthogonal Multiple Access Transmission
    Jahanbazi, Shahab
    Mirmohseni, Mahtab
    2018 IEEE GLOBECOM WORKSHOPS (GC WKSHPS), 2018,
  • [7] Secure Transmission in Non-Orthogonal Multiple Access Networks With an Untrusted Relay
    Xiang, Zhongwu
    Yang, Weiwei
    Pan, Gaofeng
    Cai, Yueming
    Sun, Xiaoli
    IEEE WIRELESS COMMUNICATIONS LETTERS, 2019, 8 (03) : 905 - 908
  • [8] Secure Transmission in HARQ-Assisted Non-Orthogonal Multiple Access Networks
    Xiang, Zhongwu
    Yang, Weiwei
    Pan, Gaofeng
    Cai, Yueming
    Song, Yi
    Zou, Yulong
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 : 2171 - 2182
  • [9] On the Design of Secure Non-Orthogonal Multiple Access Systems
    He, Biao
    Liu, An
    Yang, Nan
    Lau, Vincent K. N.
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2017, 35 (10) : 2196 - 2206
  • [10] Deep learning-based resource allocation for secure transmission in a non-orthogonal multiple access network
    Zhang, Miao
    Zhang, Yao
    Cen, Qian
    Wu, Shixun
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2022, 18 (06)