Highly secure non-orthogonal multiple access based on key accompanying transmission in training sequence

被引:26
|
作者
Han, Yongcan [1 ,2 ,3 ,4 ]
Ren, Jianxin [1 ,3 ,4 ]
Liu, Bo [1 ,3 ,4 ]
Li, Yong [2 ]
Ullah, Rahat [1 ,3 ,4 ]
Mao, Yaya [1 ,3 ,4 ]
Wu, Xiangyu [1 ,3 ,4 ]
Chen, Shuaidong [1 ,3 ,4 ]
Wang, Bin [2 ]
Wu, Yongfeng [1 ,3 ,4 ]
Zhao, Lilong [1 ,3 ,4 ]
机构
[1] Nanjing Univ Informat Sci & Technol, Inst Opt & Elect, Nanjing 210044, Peoples R China
[2] Sci & Technol Commun Networks Lab, Shijiazhuang, Hebei, Peoples R China
[3] Nanjing Univ Informat Sci & Technol, Jiangsu Key Lab Optoelect Detect Atmosphere Ocean, Nanjing 210044, Peoples R China
[4] Nanjing Univ Informat Sci & Technol, Jiangsu Int Joint Lab Meteorol Photon & Optoelect, Nanjing 210044, Peoples R China
基金
中国国家自然科学基金;
关键词
PHYSICAL LAYER SECURITY; OFDM-PON; POWER ALLOCATION; NOMA; ENCRYPTION; SCHEME; CHAOS; CODE;
D O I
10.1364/OE.510558
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
This paper proposes a high -security chaotic encrypted power sparse coding division (CE-PSCD) scheme for 7 -core fiber based on non -orthogonal multiple access (NOMA) technology. The method utilizes power multiplexing to realize parallel transmission of two signals. Joint encryption of the four-dimensional region is realized using constellation mapping encryption, carrier frequency encryption, symbol scrambling, and sparse code scrambling. What we believe to be a new dimension for encryption of autonomously designed sparse codes is proposed. Meanwhile, we hide the chaotic key in training sequence (TS) to realize the co -transmission of the key and the message. A 70 Gb/s CE-PSCD signal transmission over 2 km of 7 -core fiber is demonstrated experimentally. At the limit of forward error correction (FEC) similar to 3.8 x 10-3, the difference in the encrypted sensitivity among different users at the equal power level is 0.36 dB, which means that the fairness of users will not be destroyed. The key space can reach 10134, with a bit error rate (BER) of about 0.5 for brute -force cracking at illegal receivers. As long as the key bits in the hidden TS are wrong by one bit, the BER stays around 0.5. The results show no significant attenuation of the signal before and after encryption at either high or low power, verifying the high -security performance of our proposed scheme.
引用
收藏
页码:1979 / 1997
页数:19
相关论文
共 50 条
  • [11] Deep Reinforcement Learning Based Robust Secure Transmission for Cooperative Non-orthogonal Multiple Access Networks
    Pu H.
    Liu X.
    Xu D.
    Zhongguo Dianji Gongcheng Xuebao/Proceedings of the Chinese Society of Electrical Engineering, 2022, 42 (13): : 4760 - 4774
  • [12] Blockchain based secure data handover scheme in non-orthogonal multiple access
    Islam, Anik
    Uddin, Mohammed Belal
    Kader, Md Fazlul
    Shin, Soo Young
    PROCEEDINGS OF 2018 4TH INTERNATIONAL CONFERENCE ON WIRELESS AND TELEMATICS (ICWT), 2018,
  • [13] Secure Non-Orthogonal Multiple Access: An Interference Engineering Perspective
    Lv, Lu
    Jiang, Hai
    Ding, Zhiguo
    Ye, Qiang
    Al-Dhahir, Naofal
    Chen, Jian
    IEEE NETWORK, 2021, 35 (04): : 278 - 285
  • [14] Secure Communications in a Unified Non-Orthogonal Multiple Access Framework
    Yue, Xinwei
    Liu, Yuanwei
    Yao, Yuanyuan
    Li, Xuehua
    Liu, Rongke
    Nallanathan, Arumugam
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2020, 19 (03) : 2163 - 2178
  • [15] Non-Orthogonal Multiple Access-Based Statistical Signal Transmission Technique
    Xu, Tianheng
    Zhang, Mengying
    Zhou, Ting
    Wei, Fanbo
    Hu, Honglin
    ICC 2020 - 2020 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2020,
  • [16] Wireless Powered Cooperative Non-Orthogonal Multiple Access Transmission
    Liu, Lu
    Zhang, Zhifei
    Shen, Chao
    Gong, Jie
    Chang, Tsung-Hui
    2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC WORKSHOPS), 2018,
  • [17] Non-Orthogonal Multiple Access in Coordinated Direct and Relay Transmission
    Kim, Jung-Bin
    Lee, In-Ho
    IEEE COMMUNICATIONS LETTERS, 2015, 19 (11) : 2037 - 2040
  • [18] Secure Relaying in Non-Orthogonal Multiple Access: Trusted and Untrusted Scenarios
    Arafa, Ahmed
    Shin, Wonjae
    Vaezi, Mojtaba
    Poor, H. Vincent
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 : 210 - 222
  • [19] Multi-dimensional disturbance secure communication system with dynamic key hiding transmission based on power-domain non-orthogonal multiple access
    Zhong, Qing
    Liu, Bo
    Ren, Jianxin
    Guo, Zhiruo
    Ullah, Rahat
    Mao, Yaya
    Wu, Xiangyu
    Ma, Yiming
    Wu, Yongfeng
    Zhao, Lilong
    Sun, Tingting
    OPTICS COMMUNICATIONS, 2022, 524
  • [20] Non-orthogonal Multiple Access and Artificial-Noise Aided Secure Transmission in FD Relay Networks
    Feng, Youhong
    Yang, Zhen
    Yan, Shihao
    2017 IEEE GLOBECOM WORKSHOPS (GC WKSHPS), 2017,