Analysis of Low Probability of Detection Capability for Chaotic Standard Map-Based FH-OFDMA System

: A frequency hopping orthogonal frequency division multiple access (FH-OFDMA) can provide low probability of detection (LPD) and anti-jamming capabilities to users against adversary detectors. To obtain an extreme LPD capability that cannot be provided by the basic symbol-by-symbol (SBS)-based FH pattern, we proposed two FH patterns, namely chaotic standard map (CSM) and cat map for FH-OFDMA systems. In our previous work, through analysis of complexity to regenerate the transmitted symbol sequence, at the point of adversary detectors, we found that the CSM had a lower probability of intercept than the cat map and SBS. It is possible when a detector already knows symbol and frame structures, and the detector has been synchronized to the FH-OFDMA system. Unlike the previous work, here, we analyze whether the CSM provides greater LPD capability than the cat map and SBS by detection probability using spectrum sensing technique. We analyze the detection probability of the CSM and provide detection probabilities of the cat map and SBS compared to the CSM. Based on our analysis of the detection probability and numerical results, it is evident that the CSM provides greater LPD capability than both the cat map and SBS-based FH-OFDMA systems.


Introduction
Frequency hopping-orthogonal frequency division multiple access (FH-OFDMA) can provide low probability of detection (LPD) and anti-jamming capabilities to authenticated users against adversaries for secure multimedia and military communication services [1]. In the OFDMA system, the entire frequency spectrum is divided into multiple narrow-band subcarriers, which are then assigned to multiple users to transmit data symbols on different subcarriers simultaneously [2]. In the FH-OFDMA system, the total number of subcarriers is partitioned into a set of clusters composed of contiguous subcarriers, and each cluster is changed to a different frequency during each period based on the FH pattern. The users are each assigned to one of the clusters to transmit data symbols over the FH-OFDMA system. Thus, the FH-OFDMA system has the advantages of both LPD due to FH pattern and high spectral efficiency of the OFDMA system [3]. The FH-OFDMA system chooses the orthogonal frequency division multiplexing (OFDM) symbols and cyclic prefix durations according to the Doppler and delay spreads of the transmitting channel, respectively; thus, subcarriers of the FH-OFDMA system retain their orthogonality and experience flat fading upon reception. The FH-OFDMA system can be combined with channel coding resulting in frequency diversity when the channel response varies over the hopping distance, and such frequency diversity has been verified in many prior studies [4][5][6]. In the military domain, the authors of Reference [7] consider the condition that an adversary intentionally jams parts of frequency hopping slots and select non-jammed hopping sequences to obtain low bit error performance. However, in this study, we have fundamentally different focus on the

FH Patterns for FH-OFDMA System
The total bandwidth is divided into a number of subcarriers N FFT according to the length of the fast Fourier transform (FFT) signal of the FH-OFDMA system, which is composed of contiguous OFDMA symbols consisting of a sum of subcarriers modulated by multiple phase shift keying (PSK) or quadrature amplitude modulation (QAM). Without loss of generality, we assume the sampling rate between the number of effective symbols T d , and the number of subcarriers N FFT , after the inverse FFT (IFFT) as 1. The size of each subcarrier is constructed using several clusters with the number of clusters N L , which are composed of contiguous subcarriers whose number is denoted as N s . Thus, we achieve N L = N FFT /N s . The FH-OFDMA signal converts from serial to parallel by an IFFT block. Let D n (0), D n (1), . . . , D n (N FFT − 1) be complex multiple PSK or QAM modulated data that are transmitted on N FFT subcarriers at the n-th cluster index; then, the output of the IFFT as the symbol of the transmitted FH-OFDMA frame is where t is a discrete time index, t = 0, . . . , T d −1, n is cluster index from 0 to N L −1, and f is a discrete subcarrier index. Let T c be the number of symbols for the cyclic prefix; we define cyclic prefix symbols of the n-th cluster as s n (T d −T c ), . . . , s n (T d −1), and the cyclic prefix symbols are added to the FH-OFDMA symbols. In the time domain, the FH-OFDMA time block with duration In the FH-OFDMA system, the modulated data with N FFT size before an IFFT block are constructed by a specific FH pattern given by where d k n (t) denotes the transmitted data of k-th user for n-th cluster at t-th symbol time index. H k α,x (j) and H k α,y (j) are the x-axis and y-axis of the FH pattern for the j-th generated data of k-th user, respectively. Each user generates data of size N L , and the data is mixed and modulated by the FH pattern, such as CSM, cat map, and SBS-based FH pattern. x-axis and y-axis indicate the range of the symbol and cluster indexes, respectively. Since we consider that a user can be assigned only one cluster index in the FH-OFDMA system, the maximum number of users is limited to N L . With a seed number of α, we assign the , C k α,y (j)} for the SBS, cat map, and CSM-based hopping strategies, respectively. In Figure 1, we set N s = 4 and show the symbol of a transmitted FH-OFDMA frame as an example. The same-colored blocks are transmitted contiguously by the same user. As shown in Figure 1, the number of symbols for cyclic prefix, T c , is copied from the number of effective symbols, T d , and is added in front of the effective symbols to absorb the multipath delay of the FH-OFDMA system. Before we introduce three FH patterns to verify the LPD capabilities of the FH-OFDMA system, we address that the CSM and cat map-based FH patterns have practical limitations that those FH patterns must have symbol buffers with size N L unlike the SBS-based FH pattern. Because the transmitting data sequences of the two FH patterns are mixed to increase the complexity of detection probability against eavesdroppers. In addition, receivers of the FH-OFDMA systems using the CSM and cat map-based FH patterns can start parsing modulated data after receiving N L symbol buffers. Now, we show the SBSbased FH pattern and its FH pattern indexes of x-axis and y-axis. In this study, we choose a formula of the Latin squares-based FH pattern as one of the SBS-based FH patterns [13]. We can obtain the SBS-based FH pattern of the j-th data for the k-th user using Latin squares as where α is the seed number of the FH pattern for α = 2, . . . , N L − 1. We introduce the cat map-based FH pattern using block symmetric ciphers [13]. In the cat map-based FH pattern, the generated symbols appear to be hopped in both time and frequency domains, since the transmitted symbol of each user appears at each period once, but the transmission order is mixed. The cat map-based FH pattern of the j-th data for the k-th user can be obtained by where b 11 , b 12 , b 21 , and b 22 are positive integers satisfying relations b 11 ×b 22 −b 12 ×b 21 = 1 and αb 12 > b 11 . The cluster index of c k α (j) of the j-th data for the k-th user using a seed number of α is given by where j denotes the data index of consecutive points (i, j) for which L α (i, j) = k and L α (i, j) = (αi + j) mod N L , i, j = 0, . . . , N L − 1 [13]. The CSM is widely used to design block symmetric ciphers for LPD capability. Beside the cat map-based FH pattern, the symbols generated by the CSM-based FH pattern are hopped in both time and frequency domains, and the transmitted sequences are mixed. Based on the complexity of detection probability, the CSM-based FH pattern provides greater LPD capability than the cat map and SBS-based FH patterns. The CSM-based FH pattern of the j-th data for the k-th user can be obtained by where the cluster index of c k α (j) of the j-th data for the k-th user using a seed number α can be obtained by (5). r x and r y are constant integers from 0 to N L − 1, and K C is a positive integer. [x] is the nearest integer to x. Figure 2 shows an example of how to assign the three FH patterns in time and subcarrier domains, and we compare the three FH patterns, i.e., the SBS, cat map, and CSM-based patterns. To increase the detection probability from the point of view of eavesdropping detectors, we assume that the detectors receive a redundant number, N s , of contiguous FH-OFDMA frames consisting of N L symbols. For the examples in Figure 2, we set N L = 5, N FFT = 20, N s = 4, number of transmitting users as 3, and indexes of the users as k = 1, 2, and 5. In Figure 2a, we show an example of an SBS-based FH pattern using Latin squares-based strategy for seed number, α = 4. The users, k = 1, 2, and 5 are assigned their SBS-based FH patterns as {L 1 4 (5,5), (1, 1)} for j = 1, . . . , 5, respectively. As shown in Figure 2a as an example of the SBS-based FH pattern, the data index of each user is shown once at each cluster and are hopped to a different cluster for each symbol. In addition, the transmitting data order of every user is continuous in Figure 2a. In Figure 2b, we show an example of a cat map-based FH pattern for {b 11 , b 12 , b 21 , b 22 }={1, 1, 1, 2} and seed number, α = 4. The users, k = 1, 2, and 5 are assigned their cat map-based FH patterns as {T 1 4 . . , 5, respectively. As shown in Figure 2b as an example of the cat map-based FH pattern, the first data set for k = 2 is transmitted at the symbol period of n = 4 and the first data set for k = 5 is transmitted at the symbol period of n = 1. In the cat map-based FH pattern, the transmitted data order is mixed as shown in Figure 2b. However, the data index of each user using the cat map-based FH pattern is shown once for each cluster and hopped to a different cluster for each symbol. In Figure 2c, we show the example of a CSM-based FH pattern for K C = 3000, r x = 1, r y = 3 and seed number α = 2. The users, k = 1, 2, and 5 are assigned their CSM-based FH patterns as {C 1 4,x (j), C 1 4,y (j)}={(5, 5), (3,4), (1, 1), (4, 1), (2, 1)}, (1,2), (4, 2)} for j = 1, . . . , 5, respectively. As shown in Figure 2c as example of the CSM-based FH pattern, two data sets for k = 1 appeared at the symbol period n = 1, and two data sets for k = 5 appeared at the symbol period n = 2. In addition, the transmitted data order is mixed, since the last and first data sets for k = 1 is transmitted at the symbol periods n = 0 and n = 4, respectively.

Analysis of Detection Probability
In this section, our goal is to analyze detection probability of a CSM-based FH-OFDMA system compared to detection probabilities of the other FH-OFDMA systems from the point of view of an adversary detector. To increase detection probability, the detector should observe over several FH-OFDMA symbols, i.e., y(0), y(1), . . . , y(M + T d − 1). The number of observing FH-OFDMA symbols, M, must be composed of multiplications of the redundant number of FH-OFDMA frames, N R , and the number of symbols in a frame, i.e., M = N R ×N L . Our analysis assumes that the adversary detector already knows the effective symbol duration T d and its cyclic prefix T c . The knowledge of symbol duration is specified in standards or can be estimated by knowledge of the implementable IFFT and FFT sizes. Even if the exact value is not known, the symbol duration can be estimated by the receipt of sufficient symbols.
We analyze the detection probability using the spectrum sensing technique based on hypothesis testing. First, let h 0 be the null hypothesis, i.e., a transmitting user is absent in a FH-OFDMA system, and h 1 be the alternate hypothesis, i.e., a transmitting user exists in the FH-OFDMA system. Thus, the hypothesis testing problem may be written as where y(t) is the received complex FH-OFDMA signal, and w(t) is the complex circular additive white Gaussian noise. Invoking the central limit theorem under the assumption of sufficiently large IFFT size, we have where N c (.) denotes the Gaussian distribution for a complex random variable. Therefore, for different hypotheses, we have We consider y(t) = y r (t) + jy i (t) as a circularly symmetric Gaussian random variable composed of real and imaginary parts of y, and these real and imaginary parts are obtained as: y r (t) ∼ N r (0, σ 2 y /2) and y i (t) ∼ N r (0, σ 2 y /2) , (10) where N r (·) denotes the Gaussian distribution for a real random variable. For the FH-OFDMA signal using cyclic prefix, the values of the auto-correlation coefficient where where Γ denotes the signal-to-noise ratio (SNR) as σ 2 s /σ 2 w and 0 < ρ D < 1. For a real valued coefficient, ρ(τ) = ρ(−τ). Hence, without loss of generality, we consider only τ = T d .
We can form two real random vectors from the observations such that z 1 = [y r (0)y i (0) where y r (t) and y i (t) are the real and imaginary parts of y(t). Due to the circular symmetry assumption, the zero mean random variables y r (t) and y i (t) are independent and identically distributed (i.i.d.). We defineρ ML as the maximum likelihood estimate from the vectors z 1 and z 2 . When using the log likelihood ratio test (LLRT), we decide the alternative hypothesis for the present hypothesis test above the threshold, η l of the adversary detector. For sufficiently large M, we approximate the distribution of the test statistic described in Reference [18] as This is a classical detection problem with test statisticρ ML . To detect and intercept the desired signal, detectors can adopt one of the well-known detection strategies. We consider that the detectors adopt the detection strategy of Neyman-Pearson detection to satisfy a constant false alarm rate constraint [19]. For a Gaussian random variable r ∼ N r (µ r , σ 2 r ), we have where erfc(·) is the complementary error function. Using (14) for 2M real symbols, the required false alarm probability P f a is given by Thus, the threshold at the detector can be calculated as . (16) The detection probability of the FH-OFDMA system is composed of the product of the auto-correlation-based symbol detection probability, that we have analyzed, and the intercept probability of FH patterns from the point of view of an adversary detector, as the two events are independent. Thus, the detection probability, P FT d , of the FH-OFDMA system using different FH patterns, such as SBS, cat map, and CSM-based strategies, for 2M real symbols can be obtained using (14), and we get: where P FH I denotes the intercept probability for the FH-OFDMA system using different FH patterns. Based on Reference [13], P FH I has a different value according to the SBS, cat map, CSM-based FH patterns, and FH can, thus, be rewritten by SBS, CAT, and CSM, respectively. Without loss of generality, we assume that the hopping sequence does not change during the M OFDMA symbols, i.e., 2M real symbols. For the SBS FH pattern, the detector is able to intercept the transmitted OFDMA symbol by selecting one cluster from N L clusters, except the previously selected cluster at each period. For K transmitting users (K < N L ), the detector can select one cluster from K clusters at each period. Hence, the P SBS I can be given as For the cat map-based FH pattern, transmitted symbols of each user appear at each symbol period once with mixed order in the time domain. The detector can intercept these symbols by selecting one cluster from K clusters at each period and finding the correct order from possible permutations. Hence, the P CAT I can be given by For the CSM-based FH pattern, the detector should select N L clusters from N L × K(K ≤ N L ) symbols and find the order of these symbols after detecting, receiving, and storing the symbols during the period N L . Hence, the P CSM I is given by Here, n P r denotes the permutation of n!/(n − r)!.

Simulation Results
The simulation results are provided to analyze whether the CSM-based FH-OFDMA system provides greater LPD capability than the cat map and SBS-based FH-OFDMA systems. We set common parameters of simulation results as the number of subcarriers, N FFT = 220, excluding guard subcarriers of 36, number of symbols for cyclic prefix, T c = T d /4, number of clusters as the number of maximum transmitting users, N L = 11, and N s = 20. The transmitted data is modulated as QPSK or 16-QAM, and the data is coded by convolutional coding at 1/2 coding rate. The FH-OFDMA signal is sent over a wireless six-ray channel impulse model of the Universal Mobile Telecommunications System-Terrestrial Radio Access System (UTRA) vehicular model A [20]. For the SBS-based FH pattern, we select a Latin squares-based FH pattern of α = 4. For the cat map-based FH pattern, we consider α = 4, b 11 = b 12 = b 21 = 1, and b 22 = 2. For the CSM-based FH pattern, we consider α = 2, r x = 1, r y = 3, and K C = 3000.
Before we analyze the detection probabilities of FH-OFDMA systems, we verify that the FH-OFDMA systems based on SBS, cat map, and CSM patterns can achieve frequency diversities by bit error rate (BER) performance. Figure 3 shows the BER results of an OFDMA system without hopping and FH-OFDMA systems based on SBS, cat map, and CSM patterns, in which we adopt two modulation rates as QPSK and 16-QAM over the same channel response. As shown in Figure 3, all the three FH-OFDMA systems can obtain better BER results than the OFDMA system operated without hopping. This result verifies that the SBS, cat map, and CSM-based FH-OFDMA systems can achieve frequency diversities over the channel model. In addition, since the BER results by adopting QPSK are better than those by adopting 16-QAM, we observe that BER performance increases as the modulation rate decreases. Through the simulation results of Figure 3, we show that frequency hopping is a significant and effective method to achieve frequency diversity and improve BER performance in the OFDMA system. Figure 4 shows the detection probabilities of SBS, cat map, and CSM-based FH-OFDMA systems for logarithmic scales as the SNR increases. We set common parameters for the three FH-OFDMA systems as false alarm probability, P f a = 0.05, redundant number of FH-OFDMA frames, N R = 100, number of clusters, N L = 11, and number of transmitting users, K = 11. As we mentioned previously, since the detection probability of the FH-OFDMA system is the product of the symbol detection probability and the intercept probability, the gap among three FH patterns is sustained as constant as SNR increases. As a result, since the CSM-based FH pattern has the lowest intercept probability, the CSM always has a lower detection probability than other FH-OFDMA systems. In addition, we can observe that all the detection probabilities are increased when SNR is varied from −35 to −15 dB. However, the detection probabilities of the three FH-OFDMA systems converge to a fixed value when the SNR exceeds −14 dB.   Figure 5 shows the relationship between the detection probability and redundant number of FH-OFDMA frames for detecting for the SBS, cat map, and CSM-based FH-OFDMA systems. We set common parameters as false alarm probability, P f a = 0.05, number of clusters, N L = 11, number of transmitting users, K = 11, and SNR = 10 dB. In Figure 5, as the redundant number of FH-OFDMA frames for detecting increases, the detection probability also increases. This result shows that, if a seed number changes after N L periods and the hopping cluster index, thus, changes every FH-OFDMA frame, the LPD capability is enhanced extremely. Figure 5 also shows that the gap among three FH patterns is sustained as constant regardless of the value of N R , since the detection probability of the FH-OFDMA system is the product of the symbol detection probability and the intercept probability.  Figure 6 shows the required false alarm probability for detection probabilities for the SBS, cat map, and CSM-based systems. We choose common parameters as SNR = −20 dB, redundant number of FH-OFDMA frames, N R = 100, number of clusters, N L = 11, and number of transmitting users, K = 11. In Figure 6, we observe that the detection probability at the detector decreases as the required false alarm probability increases. As shown in Figure 6, the CSM always has a lower detection probability than the cat map and SBS for all values of the false alarm probabilities.   Figure 7 shows the detection probabilities of the SBS, cat map, and CSM-based FH-OFDMA systems for logarithmic scales as the user load increases from 0.1 to 1.0. The user load is defined as the ratio of the number of transmitting users K to the number of clusters N L . We set the parameters as false alarm probability, P f a = 0.05, redundant number of FH-OFDMA frames, N R = 100, number of clusters, N L = 11, and SNR = −20 dB. When K = 1, the detection probabilities of the cat map and CSM-based systems have the same value and lower than that of the SBS-based system. When K increases above 1, the detection probability of the CSM becomes smaller than that of the cat map. As shown in Figure 7, we can also observe that when user load approaches 1, the detection probabilities are decreased. This means that an increase in user load enhances the LPD capability of the FH-OFDMA system. From Figures 4-7, we conclude that the CSM-based FH-OFDMA system has the greatest LPD capability. Figure 8 shows the effect of the required false alarm probability, P f a of the CSM-based FH-OFDMA system. We chose three values of P f a as 0.05, 0.1, and 0.2, while setting redundant number of FH-OFDMA frames, N R = 100, number of clusters, N L = 11, and number of transmitting users, K = 11. For the results, we varied the SNR from −35 to −10 dB. As the SNR increases from −35 to −15 dB, detection probabilities of the CSM sharply increase for all values of P f a . Above SNR = −15 dB, the detection probabilities are stable. As seen in Figure 8, as the required false alarm probability increases, the detection probability decreases because the threshold to detect the FH-OFDMA signal increases.

Conclusions
In this study, we analyzed the detection probability of the CSM-based FH-OFDMA system and compared it with the cat map and SBS-based FH-OFDMA systems. We theoretically derived the LPD capability of the CSM-based FH-OFDMA system using autocorrelation-based spectrum sensing technique with hypothesis testing, and we showed the CSM-based system has greater LPD capability than the cat map and SBS-based systems. Simulation results also show the CSM-based system has similar BER performance as the two systems, but the CSM-based system decreases the detection probability dramatically in various simulation environments. As the redundant number of detecting frames or SNR increases, and the number of simultaneous users decreases, an intentional eavesdropper has a higher detection probability to find FH patterns, and the CSM stands out among the three FH patterns. Additionally, we found that the gap among the three FH patterns is sustained as the redundant number of frames or SNR increases, since the detection probability of the FH-OFDMA system is the product of the symbol detection probability and the intercept probability. The CSM-based FH pattern can be applied to time-frequency hopping domain, as well as the FH-OFDMA system. The CSM-based FH pattern has a limit to having symbol buffers of cluster size. Even considering the limitation, the CSM-based FH pattern has powerful LPD capability because the time and frequency transmitting sequences are mixed.