Next Article in Journal
Embedded System for Monitoring Fuel Cell Power Supply System in Mobile Applications
Previous Article in Journal
Forensic Joint Photographic Experts Group (JPEG) Watermarking for Disk Image Leak Attribution: An Adaptive Discrete Cosine Transform–Discrete Wavelet Transform (DCT-DWT) Approach
Previous Article in Special Issue
Efficient Adversarial Training for Federated Image Systems: Crafting Client-Specific Defenses with Robust Trimmed Aggregation
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Block-Cipher No-Hit-Zone Sequence-Assisted Spectrum Control Scheme for Distributed Systems

State Key Laboratory of Integrated Services Networks, Xidian University, Xi’an 710071, China
*
Author to whom correspondence should be addressed.
Electronics 2025, 14(9), 1802; https://doi.org/10.3390/electronics14091802
Submission received: 15 February 2025 / Revised: 14 April 2025 / Accepted: 24 April 2025 / Published: 28 April 2025
(This article belongs to the Special Issue Security and Privacy in Distributed Machine Learning)

Abstract

:
In distributed systems, the dense access of wireless devices introduces significant challenges, including severe quasi-synchronous multiple access interference (MAI) and transmission security threats, which limit the effectiveness of traditional orthogonality-based spectrum control schemes. To address these challenges, this paper proposes a new block-cipher no-hit-zone (BC-NHZ) sequence-assisted spectrum control transmission scheme, aimed at enhancing privacy protection and improving overall communication capacity for distributed systems. The BC-NHZ scheme employs block cipher encryption and establishes control sequences to represent the spectrum usage scheme. Moreover, we mathematically prove that the parameters of the BC-NHZ scheme achieve optimal results with respect to the bound of the Hamming correlation. Numerical analysis and simulation results validate the practical feasibility of the BC-NHZ scheme, demonstrating its reliability to relax synchronous requirements while providing enhanced transmission privacy protection performance.

1. Introduction

With the rapid advancement of 5G networks, edge computing, and ultra-reliable low-latency communication (URLLC), the enhanced connectivity and computational capabilities have fundamentally accelerated the adoption of distributed systems (DSs) [1,2,3]. Empowered by these advancements, DSs can seamlessly integrate massive heterogeneous smart devices—ranging from smartphones to IoT sensors—as decentralized processing nodes, achieving superior scalability compared to centralized architectures [4,5,6,7]. According to Statista, the current number of smartphone users worldwide is 7.21 billion, providing a pervasive infrastructure for DS to dynamically allocate tasks across edge devices. This paradigm shift enables applications such as distributed learning in healthcare diagnostics, real-time collaborative robotics, and adaptive traffic prediction systems [8,9]. Unlike traditional centralized approaches, distributed systems exhibit extended operational sustainability through node collaboration and lower maintenance costs by eliminating centralized hardware dependencies [10,11,12,13].
Despite DS offering significant benefits, it also presents several challenging issues that should be further investigated. On the one hand, the coexistence of numerous devices sharing limited spectrum resources results in multi-access interference within DS, reducing communication capacity. The constrained spectrum and complex network structures make strict time synchronization across the entire DS unfeasible, thus offering significant battles to implementing effective communication resource allocation schemes. On the other hand, the open system architecture and broadcast nature of radio propagation expose private information intended for distributed devices to the risk of eavesdropping attacks.
Recent advances in interference and eavesdropping technologies have introduced significant challenges to the security of DS. Interference-based attacks, such as jamming, exploit vulnerabilities in wireless channels, leading to disrupted communications and compromised data integrity [14]. Similarly, eavesdropping, enabled by advancements in hardware and algorithmic techniques, allows attackers to capture sensitive data [15]. The proliferation of wireless networks, while enhancing connectivity, has also increased the attack surface, making it easier for adversaries to exploit wireless system flaws [16]. These challenges are compounded in scenarios involving distributed devices, where swarm communication suffers from heightened risks of interference and unauthorized access. Efforts to counter these threats include integrating interference-canceling techniques and adopting robust encryption strategies, yet these measures face limitations in real-time, high-density environments [17]. Overall, DS necessitates a continuous evolution of countermeasures aligned with modern threats.
Therefore, it is crucial to guarantee reliable data transmission in DS communications while addressing interference and eavesdropping threats. In this paper, we propose a spectrum control transmission scheme based on BC-NHZ sequences for the DS communication network. By employing the proposed scheme, the goal of strengthening the security and improving the network capacity can be achieved. The main contributions of this paper can be summarized as follows:
  • DS Communication Network Architecture: We propose a DS communication network architecture consisting of multiple devices that dynamically adjust spectrum allocation schemes using control sequences. The network model supports quasi-synchronous access and tolerates signal-relative delay at the receiver. Each device accesses spectrum resources through its own control sequence, ensuring flexible and efficient utilization of the spectrum.
  • BC-NHZ sequence-assisted spectrum control scheme: The novel BC-NHZ scheme is introduced, leveraging block cipher encryption to construct a secure NHZ sequence set. This scheme provides robust privacy protection, making the spectrum utilization scheme resistant to deciphering by non-cooperative entities. Additionally, it ensures communication spectrum orthogonality and effectively mitigates MAI among distributed devices, even under conditions of relative delay.
  • Performance Analysis and Validation: The performance of the proposed scheme is analyzed through mathematical reasoning and validated via simulation. The results demonstrate that the proposed approach outperforms baseline methods in terms of complexity and network capacity. This makes the BC-NHZ scheme well-suited for DS communication networks, particularly for ensuring high communication quality and privacy protection in decentralized devices with terminal access.
The rest of the paper is organized as follows. The related work is given in Section 2. Section 3 depicts the system model. Then, the proposed scheme and mathematical analysis are elaborated in Section 4. Based on the proposed scheme, Section 5 presents the simulation results and discussion. Finally, the conclusion and future work are shown in Section 6.

2. Related Work

Spectrum control schemes based on sequences are widely employed in wireless communications due to their multiple access capabilities. The spectrum control sequences directly affect the implementation effect of the communication resource allocation schemes [18,19].
The existing research on sequence generation schemes is divided into two categories. One is the traditional pseudo-random sequence, and the construction methods include but are not limited to, the methods based on prime numbers, the methods based on m-sequence, the methods based on GMW sequence, the methods based on ReedSolomon code, and the methods based on Chaos Theory [20,21,22]. These sequences, constructed by these methods, have great randomization performance and are widely used in modern communication. As the demand for reliability and confidentiality of communications is further enhanced, cryptography-based algorithms for generating sequences have emerged [23]. The sequence generation technique based on iterated block cipher is representative of this category [24], which uses the system time of day (TOD) and the system encryption key (KEY) to generate sequences according to the obfuscation and diffusion criterion for cryptographic design proposed by Shannon. Since then, Li et al. have further proved that cryptographic sequences are significantly better than the sequences generated by the traditional chaos theory in terms of long-periodicity, security, randomness, and complexity [25]. Moreover, attribute-based authentication on the cloud ensures secure, privacy-preserving access control for thin clients in distributed systems, enabling verifiable data integrity and decentralized trust management while mitigating identity-linkability risks [26,27]. However, these sequences were not designed with the increasingly crowded spectrum resources, which makes it challenging to adapt to the dense access of decentralized devices.
The other category is spectrum allocation schemes with specific properties, such as sequence sets with orthogonal properties. In the literature [28], based on the frequency hopping multiple access (FHMA) network model for Bluetooth networks, the orthogonal sequences with stochastic mapping and cyclic shift replacement are proposed and analyzed for their throughput and transmission delay. The technique is further applied to cognitive radios, and the orthogonal sequences with a dynamic number of frequency slots have been established in [29].
However, the orthogonal schemes must ensure that the end devices are guaranteed time synchronization, which is difficult to achieve in practical DS scenarios. Figure 1 demonstrates that orthogonal sequences control the frequency usage schemes of U s e r 1 and U s e r 2, eliminating spectrum conflicts under strict synchronization. Terminals send data based on fixed-length frames containing 6 hops during t 1 t 6 , and each frequency hop is synchronized based on information from TOD. However, in Figure 1b, there are relative time delays, and orthogonal schemes experience severe spectrum conflicts.
In order to break through the limitation of high-precision time synchronization, the concept of a no-hit-zone (NHZ) sequence set has been proposed, which can effectively realize orthogonal multiple access [30,31,32]. As shown in Figure 2, U s e r 3 and U s e r 4 with NHZ sequences eliminate spectrum conflicts, even with relative time delay. Peng et al. analyzed the characteristics and principles of the NHZ and proposed a general construction method for NHZ sequence sets [33,34]. Their methods optimize periodic Hamming sequences of arbitrary lengths by fully aligning column vectors. Liu et al. introduced a new approach for constructing NHZ sequences based on new Hamming correlations, which achieves the theoretical limit [35,36]. Some NHZ sequence sets with new properties have been proposed in recent years. GAO increased the size of the sequence sets under a particular scene, significantly increasing the network capacity [37]. Zeng proposed some constructions of NHZ sequences with wide gap properties for improved FHMA systems under follower jamming [38,39].
Existing NHZ sequences, despite their good orthogonality properties, suffer from small family sizes and simplistic constructions, limiting their suitability for high-throughput, high-security DS networks. There remains a significant research gap in the theory and construction of NHZ sequences to enhance their security and family size. The parameters of sequence sets with NHZ properties from some known constructions and the new ones are listed in Table 1. The proposed construction yields optimal NHZ sequence sets with new peculiarities not covered in the literature.

3. Preliminaries

3.1. Definition of No-Hit Zone

This section recalls the mathematical foundations of the Hamming correlation and no-hit zone, constructing an analytical framework that fundamentally governs the interference mitigation capacity and orthogonal efficiency in DS spectrum control architectures.
The Hamming correlation quantifies the positional symbol discrepancy between sequences by counting differing elements at corresponding indices. For orthogonal sequences, this metric vanishes entirely, serving as an ideal interference-free condition. The no-hit zone specifies the maximum permissible timing offset between transmissions that preserves sequence orthogonality in asynchronous channel access scenarios.
Consider a distributed communication network with M devices, and let G = g 1 , g 2 , , g M be a control sequence set over the alphabet Q = { 0 , 1 , , q 1 } , where g u = g 0 u , g 1 u , , g N 1 u for 1 u M . For presentation convenience, we denote the sequence set G having alphabet size q, sequence length N, and family size M as G ( q , N , M ) .
We define
h a 0 , a 1 1 , i f   a 0 = a 1 ; 0 , e l s e .
For g u , g v G , the Hamming correlation with delay τ is given by
H u , v ( τ ) = n = 0 N τ 1 h ( g u n , g v n + τ ) , τ = 0 , 1 , , N 1 .
The Hamming correlation indicates the degree of overlap of sequences at different delays. An ideal spectrum control sequence set should have a Hamming correlation of 0 at the delay of interest, thus eliminating MAI.
Then, the width Z of the no-hit zone is under the Hamming correlation defined by
Z a = m a x { C | H u , u ( τ ) = 0 , g u G , 0 < τ C } , Z c = m a x { C | H u , v ( τ ) = 0 , g u , g v G , u v , 0 τ C } , Z = m i n Z a , Z c .
Liu et al. obtained the following bound under Hamming correlation [36] in 2022. An NHZ sequence set with parameters ( q , N , M ) is considered optimal if NHZ width Z is the maximum integer solution of the following inequality:
Z q M 1 .
The family size M and alphabet size q have a constraint relationship with Z.
The design of the no-hit zone extends the delay range of sequence orthogonality. In particular, the set of sequences is the traditional set of orthogonal sequences when Z = 0 (as shown in Table 2). If Z > 0 , we call G an NHZ sequence set. In order to clearly represent the parameters, we set G ( q , N , M , Z ) to denote a sequence set whose NHZ width is Z.

3.2. System Model

Based on real-world application scenarios and the existing DS models, a typical DS communication network scenario is considered in this work, as shown in Figure 3. The DS communication network has multiple sub-network structures, where each sub-network consists of one data collector and multiple data owners, with C e ( e = 1 , 2 , 3 , . . . ) as the data collector and D u ( u = 1 , 2 , 3 , ) as the data owner. Specifically, this paper focuses on spectrum control schemes for uplinks of data owners, where packets are transmitted independently by data owners over a shared communication spectrum.
In the DS network, the shared communication spectrum B is divided equally into q frequency slots, and B = { b 0 , b 1 , , b q 1 } . Let T be the hopping interval and F u = { f 0 u , f 1 u , f 2 u , } denote the spectrum usage scheme of D u , where f n u B , ( n = 0 , 1 , 2 , ) . Different spectrum resources are allocated to all data owners in different hopping intervals, which realizes the sharing of the whole spectrum for information transmission. Generally, F u is presented by a sequence g u = { g 0 u , g 1 u , g 2 u , } over a set of integers Q = { 0 , 1 , , q 1 } , where f n u = b g n u .
Based on the transceiver model and the signal analysis presented in [18], the superimposed signals r ( t ) with different time delays at the receiver are expressed as:
r t = u = 1 M A u y u t τ u .
A u is the received signal amplitude of the u-th data owner, and τ u is the relative delay of D u ’s signal.
Considering that the signal delay is caused by the superposition of hardware, software, and environmental conditions, we approximate that τ u obeys a Gaussian distribution with expectation μ = 0 and mean square deviation σ 2 , and τ u is independent for different D u .
y u t is D u ’s transmitted waveform and is denoted as
y u t = s u t p u t ,
where
p u t = n = 0 e j 2 π f n u t + θ u · w t n T .
s u ( t ) is the baseband modulation signal with transmitted information, p u t is the carrier controlled by the scheme g u , and w ( t ) is a chip waveform. If { g 0 u , g 1 u , g 2 u , } satisfy Z > 0 in (3), then the MAI is eliminated when the signal arrival delay does not exceed the width of NHZ.

3.3. Complexity Metric

To validate the privacy protection performance of the spectrum control scheme, we introduce the complexity metric. The scheme { g 0 u , g 1 u , g 2 u , } with a higher complexity means it is more difficult for the hostile to forecast the sequence from the known sequence fragments. In this paper, we choose the FuEn algorithm for evaluating the complexity of a spectrum control policy to reject illegal eavesdroppers. Fuzzy entropy (FuEn) shows better performance than linear complexity and approximate entropy in distinguishing various kinds of sequences and is proven to be less sensitive to the test parameters. The FuEn algorithm is given here.
Let positive integer N be the watch length of the discrete sequence, and fix two non-negative integers m (vector dimension) and r (resolution parameter) with m < N . Let l = [ l ( 0 ) , l ( 1 ) , , l ( N 1 ) ] denote the observed part of { g 0 u , g 1 u , g 2 u , } . The non-negative integer number space of dimension m is formed by the sequence of vectors
lv ( i ) = [ l ( i ) , l ( i + 1 ) , , l ( i + m 1 ) ] l 0 ( i ) ,
where l 0 ( i ) = m 1 j = 0 m 1 l ( i + j ) , 0 i N m is window vectors.
According to the nature of sequences { lv ( i ) } , the distance vector d i j m , N is defined for each 0 i N m as
D i j m , N = e ln 2 · ( d i j m , N / r ) 2 , j = 0 , 1 , , N m , and j i ,
where d i j m , N = max k = 1 , 2 , . . . , m ( l ( i + k 1 ) l ( j + k 1 ) ) .
Thus, the corresponding C i m , N ( r ) applied to evaluating the complexities can be obtained
C i m , N ( r ) = ( N m ) 1 j = 1 , j i N m + 1 D i j m , N .
The complexity metric of l based on FuEn is then defined following the classical one by
F u E n ( m , r , N ) = ln Φ m , N ( r ) ln Φ m + 1 , N ( r ) ,
where Φ m , N ( r ) = ( N m + 1 ) 1 i = 1 N m + 1 C i m , N ( r ) .
FuEn has relatively reasonable statistical properties when r is between 0.1 and 0.25 S D ( l ) and S D ( l ) is the standard deviation of the series l [21].
A more considerable FuEn test value indicates a higher level of complexity and a safer spectrum control scheme. Therefore, it effectively differentiates between most of the existing spectrum control schemes based on sequences.

4. The Block-Cipher No-Hit-Zone Sequence Set

In this section, we first proposed a BC-NHZ spectrum control sequence set by block cipher encryption and no-hit zone design. The parameter relationships are discussed and the optimality of the proposed sequence set is proved. Then, we present a numerical example to verify orthogonal performance and parametric relationships.

4.1. The Construction of BC-NHZ Sequence Set

Let Z be a nonnegative integer and M , N be positive integers. The construction of the BC-NHZ sequence set G [ N , M , M ( Z + 1 ) , Z ] is as follows. As shown in Figure 4, the BC-NHZ scheme obtains the control sequence set G by performing the ‘block cipher encryption’ and ‘no hit zone design’ processes. Block cipher encryption is essential for the BC-NHZ spectrum control sequence set as it constructs high-strength cryptographic mechanisms to ensure collision resistance while substantially enhancing decryption resistance complexity, thereby enabling dual guarantees for communication quality and privacy protection in distributed networks.
In the block cipher encryption step, the { T o d n } is processed based on the block cipher (BC) algorithm and remapping method to obtain the basic sequence { b s n } . With the improved DES algorithm, the code series c n can be generated by utilizing the K e y and { T o d n } . The sequence has good statistical properties, and its detailed construction method and performance analysis in frequency hopping systems can be found in references [25].
c n = { S b o x 4 P 2 16 S b o x 5 P 4 16 S b o x 6 P 6 16 } + { S b o x 4 P 1 16 S b o x 5 P 3 16 S b o x 6 P 5 16 } 4 ,
where
P 2 j i + 1 = P 2 j 1 i K i z 1 i ; P 2 j 1 i + 1 = S b o x j ( P 2 j i ) P 2 j i z 2 i ;       j 1 , 2 , 3 .
In (12) and (13), ⊕ is the XOR operation, i = 0 , 1 , 2 , , 15 is the number of iterations, K n is the encryption key obtained from the K e y , Sbox1–Sbox6 are the substitution boxes that are used for the cipher, and P 2 j i + 1 , P 2 j 1 i + 1 , z 1 i , and z 2 i are medium variables in the iterator with initial values obtained by dividing the T o d n . z 1 i and z 2 i are equal to Z 1 and Z 2 separately when t = 8 , 16 , otherwise they are equal to 0.
By leveraging the remapping method, the basic sequence b s 0 , b s 1 , , b s N 1 can be constructed by the following algorithm.
b s n = n + c n mod M , f o r n = 0 , 1 , , N 1 .
Next, to meet the high-performance requirements of the no-hit zone by improving the NHZ algorithm [37], the proposed sequence set G = g 1 , g 2 , , g M is obtained.
We define F ( · ) as a one-to-one function from alphabet { 0 , 1 , , M N 1 } to the frequency slot set F. Consequently, G = g 1 , g 2 , , g M is as follows:
g u = g 0 u , g 1 u , , g N 1 u ,
where
g n u = F { b s n + u M + n Z + 1 · M } ,
for u = 1 , 2 , , M , n = 0 , 1 , , L 1 . Here, the function a b means a modulo b.
The BC-NHZ sequence set G consists of several integer sequences. Each integer sequence determines the spectrum control scheme of one data owner, and all sequences control all owners to achieve orthogonalized networking with high complexity.

4.2. Parameter Optimality Analysis

Under the requirement of satisfying orthogonal multiple access with relative delay, maximizing the use of the limited spectrum resource to accommodate a more significant number of data owners becomes the core index to measure the spectrum control scheme. By analyzing the Hamming correlation, this subsection demonstrates that the parameter constraint of the proposed BC-NHZ sequence set is optimal with respect to the NHZ bound.
Theorem 1. 
The constructed BC-NHZ scheme G is an optimal NHZ set concerning the bound (4), and the parameters are concluded as follows: G has M sequences with the length of N, the width of the NHZ is Z, the size of the frequency-slot set F is q = M ( Z + 1 ) .
Proof. 
Obviously, G contains M sequences of length N. For u { 0 , 1 , , M 1 } , n { 0 , 1 , , N 1 } , we have 0 b s n + u M M 1 and 0 M · n Z + 1 M Z , which immediately leads to 0 g n u M ( Z + 1 ) 1 . The elements in the constructed sequences take values in the range { 0 , 1 , , M ( Z + 1 ) 1 } , so the size of the frequency-slot sets F is equal to M ( Z + 1 ) .
For g u , g v G , the Hamming correlation at time delay τ is
H u , v ( τ ) = n = 0 N τ 1 h ( g n u , g n + τ v ) = n = 0 N τ 1 h b s n + u M + M n Z + 1 , b s n + τ + v M + M n + τ Z + 1 = n = 0 N τ 1 h b s n b s n + τ + u v M , M τ Z + 1 .
Case 1: 0 < τ Z . Since b s n b s n + τ + u v M M 1 and M τ Z + 1 , we have h ( g n u , g n + τ v ) = 0 , which immediately leads to H u , v ( τ ) = 0 .
Case 2: τ = 0 and u v , then we have H u , v ( τ ) = n = 0 N τ 1 h u v M , 0 = 0 .
Hence, G is a [ q , N , M , Z ] NHZ sequence set and q = M ( Z + 1 ) . Therefore, G is optimal with respect to the bound (4). □

4.3. A Numerical Example of BC-NHZ Sequence Set

The parameters of the BC-NHZ sequence set are preset as q = 20 , N = 22 , M = 5 , and the basic sequence b s 0 , b s 1 , , b s 21 constructed by the BC algorithm and remapping method is as follows.
b s 0 , b s 1 , , b s 21 = 0 1 0 3 1 2 3 2 2 3 0 1 2 1 2 3 1 3 3 2 1 0 .
The BC-NHZ sequence set of G = { g u | u = 1 , 2 , 3 , 4 , 5 } can be obtained as displayed in the middle of this page according to the proposed algorithm. It is easy to check that the constructed set has five integer sequences with a length of 22; additionally, the size of the alphabet is equal to 20. The constructed G has a no-hit zone of width Z = 3 , and the parameters make the equation established in (4). Therefore, G is the optimal NHZ sequence set satisfying the optimal NHZ bound.
- { g u | u   =   1 ,   2 ,   3 ,   4 ,   5 }   = ( 19 16 14 15 12 5 8 11 18 0 14 9 18 16 6 15 12 0 8 11 12 16 ) , ( 12 5 2 13 18 0 7 15 1 17 2 11 1 5 8 13 18 17 7 15 18 5 ) , ( 18 0 6 4 1 17 14 13 3 10 6 15 3 0 7 4 1 10 14 13 1 0 ) , ( 1 17 8 9 3 10 2 4 19 16 8 13 19 17 14 9 3 16 2 4 3 17 ) , ( 3 10 7 11 19 16 6 9 12 5 7 4 12 10 2 11 19 5 6 9 19 10 ) .
The maximum values related to the Hamming correlation at delays τ are shown in Table 2. For comparison, the pseudorandom sequences [17], the orthogonal sequences [29], and the NHZ sequences [36] are also presented. In Table 2, we mainly focus on the case when the delay τ is limited within the NHZ width Z (i.e., | τ | 3 ). For the pseudorandom sequences, the frequency hits always spread over all delays, implying that the DS network suffers from severe MAI. The proposed BC-NHZ and NHZ sequences possess the all-zero Hamming correlations, while the orthogonal sequences attain non-zero Hamming correlation values when | τ | > 0 . Thus, the proposed BC-NHZ and NHZ scheme is superior to the orthogonal scheme in MAI suppression.
Table 2. Hamming correlation of comparisons among the proposed BC-nhz and classic sequences.
Table 2. Hamming correlation of comparisons among the proposed BC-nhz and classic sequences.
τ 4 3 2 1 01234
P r o p o s e d   B C N H Z   s e q u e n c e s H u , u ( τ ) 2000220002
H u , v ( τ ) , u v 500000005
P s e u d o r a n d o m   s e q u e n c e s [17] H u , u ( τ ) 1234224321
H u , v ( τ ) , u v 543525345
T r a d .   O r t h o g o n a l   s e q u e n c e s [29] H u , u ( τ ) 1222222221
H u , v ( τ ) , u v 322404223
O p t i m a l   N H Z   s e q u e n c e s [36] H u , u ( τ ) 4000220004
H u , v ( τ ) , u v 600000006

5. Simulation Results

In this section, the network capacity and complexity metric of the DS network employing the BC-NHZ scheme are simulated to verify communication quality and privacy protection. We recall the following assumptions for system infrastructure and simulation setup:
  • The quasi-synchronous access mechanism is adopted by practical systems, and r ( t ) consists of several y u ( t τ u ) . D u ’s relative delay τ u is independently distributed over τ u N ( μ , σ 2 ) for any τ u .
  • The shared communication spectrum B is divided equally into 20 frequency slots. The proposed BC-NHZ or the baseline schemes control the communication carrier frequency and continuously vary over frequency slots with a width of 1 MHz, switching the frequency at each time interval T = 1 ms.
  • The simulation time length is 260 s, and each hopping interval consists of protection time T 0 = 0.2 ms and transmission time ( T T 0 ) = 0.8 ms.
  • The length of the transmitted service packet is L s p = 4 hopping intervals, and the packet services arrival between data owners are independent and satisfy the Poisson distribution of the DS network’s total arrival rate Γ .
  • For a fair comparison, the adopted spectrum control sequence sets in the following simulations have similar values of parameters, i.e., the frequency-slot size q, the NHZ width Z, the family size M, and so forth.
Under the aforementioned conditions and setup, the BC-NHZ set G with the parameters of [ q , N , M , Z ] = [ 20 , 2 18 , 5 , 3 ] , as shown in Section 4.1, is constructed by the proposed algorithm. The results are also observed and analyzed against the other optimal NHZ sequence sets concerning the Hamming correlation [36,39], which are denoted as ‘Optimal NHZ Scheme 1’ and ‘Optimal NHZ Scheme 2’.

5.1. Network Capacity

Here, the network capacity is simulated under different arrival rates by two metrics: collision probability and network throughput, as shown in Figure 5 and Figure 6.
The collision probability indicates that two or more data owners use the same frequency slot for transmission at the same hopping interval. The simulation results for the variation of collision probability to the arrival rate Γ are shown in Figure 5. The horizontal axis is the packet arrival rate Γ , and the vertical axis is the corresponding simulated values of collision probability. The proposed scheme is compared here with FHMA transmission strategies using orthogonal sequences in [29] (denoted as ‘Trad. Orthogonal FHMA’).
In Figure 5, it can be seen that the collision probability of all schemes rises with increasing Γ . This is because when there are more transmission tasks in the network, the signals from several data owners are more likely to transmit simultaneously, leading to more collisions. From Figure 5a,b, the NHZ scheme considerably reduces the collision probability compared to the traditional orthogonal FHMA schemes. For instance, at Γ = 3.0 and σ = 1 ms, all three NHZ schemes achieve a value of 0.05 compared to 0.77 achieved by traditional orthogonal FHMA. This is because traditional orthogonal FHMA transmission eliminates the MAI when the relative delay is close to 0. In contrast, the NHZ schemes achieve this effect over a wide range of delays. In addition, the root-variance σ value of the delay τ u is assumed to have the value of 1 ms and 3 ms, respectively. The collision probability of optimal NHZ schemes and the proposed scheme increases with the increase in σ . This is because as the σ increases, the discretization of the relative delay of the signals at the receiver increases, resulting in the relative delay between the signals from different data owners exceeding the preset no-hit zone.
The network throughput is the number of packets correctly transmitted by the network per time interval and is a key determinant of the performance of a spectrum control transmission scheme. Figure 6 illustrates the variation in network throughput with arrival rate Γ . The horizontal axis is the packet arrival rate Γ , and the vertical axis is the corresponding simulated values of network throughput. The figure takes as a theoretical limit the DS network throughput of all data owners ideally transmitting without mutual interference, and the value of network throughput is equal to Γ .
In Figure 6, all three NHZ schemes perform better than the competing orthogonal FHMA transmission. The proposed BC-NHZ algorithm’s network throughput increases with the arrival rate Γ increasing, while the throughput of traditional orthogonal FHMA increases and then decreases. When Γ > 0.5 , the throughput of the NHZ sequence set is significantly higher than that of the conventional orthogonal FHMA. For example, at Γ = 3 and σ = 1 , the three NHZ schemes achieve the same value of 2.76 for network throughput compared to 0.21 achieved by FHMA. This is because all three schemes have the same NHZ width. The collision probability is minimal, and even if the network load is large, the interactions of the subnets are not severe, so the throughput becomes more significant with the increase in the network load. In contrast, the traditional orthogonal FHMA scheme uses semi-random multi-access schemes, leading to performance degradation in QS networks. The frequency usage conflict between data users worsens when the network load is significant, leading to a decrease in the network load. In addition, the network throughputs of optimal NHZ schemes and the proposed scheme are more resistant to reaching the theoretical bounds with the increase in σ . Similarly, this is because as σ increases, the discretization of the relative delay of the signals at the receiver increases, resulting in the relative delay between the signals from different data owners exceeding the preset no-hit zone.
In conclusion, the proposed BC-NHZ scheme achieves or is close to the theoretical limit when the relative delay τ u distribution of the signal is relatively concentrated (e.g., σ = 1 ms). Thanks to the excellent properties of the constructed set of BC-NHZ sequences, the proposed scheme is able to achieve the performance of the optimal NHZ scheme and significantly improves the communication capability of QS DS networks.

5.2. Complexity Metric

In this subsection, the complexity metric of the schemes is evaluated using the FuEn test. The sample variances of the three NHZ schemes are measured as 33.38, 33.21, and 33.23, respectively. Thus, with the guidelines established in the literature [20,21], the value of the resolution parameter r is from 0.1 to 1.44 (e.g., r = 0.1 , 0.5 , 1.4 ), while the vector dimension m is set to 2. Figure 7 illustrates the complexity performance of different sequences under the FuEn test, where the vertical axis represents the FuEn test values and the horizontal axis corresponds to the length of the observation sequence. Based on FuEn applications reported in the existing literature, the observation sequence length in this study is set to ( 100 , 200 , . , 2000 ) .
From Figure 7, the FuEn metric of the proposed sequence with the cryptographic algorithm remains stable and significantly higher than the other control sequences for different watch lengths because the proposed sequences use cryptographic principles and have excellent resistance to deciphering. In addition, comparing Figure 7a–c, the FuEn values of the three schemes are gradually closer to each other as the resolution parameter r increases. The reason is that a larger r loses part of the statistical information and reduces the sensitivity to random variation.
In conclusion, leveraging a block cipher-based encryption mechanism, our sequence generation algorithm demonstrates superior cryptographic complexity metrics. The FuEn value of the proposed sequence is consistently higher than the other baseline sequences under different conditions, showing higher complexity and stability, proving its excellence in privacy protection.

6. Conclusions and Future Work

In this paper, we addressed the challenges of ensuring communication quality and privacy protection among distributed devices in DS networks. To tackle these issues, we proposed a BC-NHZ sequences-assisted spectrum control scheme that effectively mitigates multiple access interference (MAI) while maintaining network capacity within a specific delay range. Leveraging a block cipher-based encryption mechanism, our sequence generation algorithm demonstrates superior cryptographic complexity metrics. Through rigorous theoretical analysis and simulations, we demonstrated that the BC-NHZ scheme outperforms baseline methods in terms of collision probability and network throughput, highlighting its ability to efficiently utilize limited spectrum resources. Additionally, simulation results confirmed that our BC-NHZ scheme achieves significant improvements in deciphering resistance complexity compared to existing NHZ schemes.
This paper underscores the BC-NHZ scheme’s potential to enhance network capacity and secure transmission in DS communication networks. The proposed design methodology and theoretical insights provide a valuable foundation for future research on secure access schemes in wireless communication systems. However, the block cipher operations introduced in our scheme may exacerbate computational overhead in resource-constrained edge devices, which merits further optimization. Future research should address the trade-off between sequence performance and computational efficiency—a dimension conspicuously absent in existing NHZ sequence set designs, which primarily focus on Hamming correlation metrics.
To address these challenges, our ongoing work aims to: (1) develop lightweight cryptographic primitives that maintain security guarantees while reducing computational complexity and (2) extend the BC-NHZ framework to support hierarchical subnet access control, thereby enabling scalable deployment in large-scale networks. By integrating these enhancements, we seek to create a next-generation secure access scheme that balances theoretical performance, computational efficiency, and practical deployability in emerging wireless ecosystems.

Author Contributions

Conceptualization, W.G. and L.G.; Methodology, P.H. and H.Z.; Formal Analysis, L.G.; Writing—Original Draft Preparation, W.G. and L.G.; Writing—review and editing, W.G. and Z.L., funding acquisition, L.G. and Z.L. All authors have read and agreed to the published version of the manuscript.

Funding

This research was supported by the following funding sources: National Natural Science Foundation for Distinguished Young Scholar grant number 62425103; National Key R&D Program of China grant number 2022YFC3301300; Innovative Research Groups of the National Natural Science Foundation of China grant number 62121001 and Natural Science Basic Research Program of Shaanxi grant number 2021JQ-205.

Data Availability Statement

The original contributions presented in this study are included in the article. Further inquiries can be directed to the corresponding authors.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Li, T.; Sahu, A.K.; Talwalkar, A.; Smith, V. Federated Learning: Challenges, Methods, and Future Directions. IEEE Signal Process. Mag. 2020, 37, 50–60. [Google Scholar] [CrossRef]
  2. Yu, S.; Lee, J.W. Channel Sounding for Multi-User Massive MIMO in Distributed Antenna System Environment. Electronics 2019, 8, 36. [Google Scholar] [CrossRef]
  3. Chen, J.; Ran, X. Deep Learning with Edge Computing: A Review. Proc. IEEE 2019, 107, 1655–1674. [Google Scholar] [CrossRef]
  4. Dai, F.; Hossain, M.A.; Wang, Y. State of the Art in Parallel and Distributed Systems: Emerging Trends and Challenges. Electronics 2025, 14, 677. [Google Scholar] [CrossRef]
  5. Ghosh, P.; Basu, K.; Das, S.K. A Game Theory-Based Pricing Strategy to Support Single/Multiclass Job Allocation Schemes for Bandwidth-Constrained Distributed Computing Systems. IEEE Trans. Parallel Distrib. Syst. 2007, 18, 289–306. [Google Scholar] [CrossRef]
  6. Al-Garadi, M.A.; Mohamed, A.; Al-Ali, A.K.; Du, X.; Ali, I.; Guizani, M. A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security. IEEE Commun. Surv. Tutorials 2020, 22, 1646–1685. [Google Scholar] [CrossRef]
  7. Zhang, C.; Hu, C.; Wu, T.; Zhu, L.; Liu, X. Achieving Efficient and Privacy-Preserving Neural Network Training and Prediction in Cloud Environments. IEEE Trans. Dependable Secur. Comput. 2023, 20, 4245–4257. [Google Scholar] [CrossRef]
  8. Lee, S.; Jeong, T. Large-Scale Distributed System and Design Methodology for Real-Time Cluster Services and Environments. Electronics 2022, 11, 4037. [Google Scholar] [CrossRef]
  9. Maxim, A.; Pauca, O.; Caruntu, C.F. Coalitional Distributed Model Predictive Control Strategy with Switching Topologies for Multi-Agent Systems. Electronics 2024, 13, 792. [Google Scholar] [CrossRef]
  10. Miller, D.E. A Comparison of LQR Optimal Performance in the Decentralized and Centralized Settings. IEEE Trans. Autom. Control 2016, 61, 2308–2311. [Google Scholar] [CrossRef]
  11. Short, M.; Abugchem, F.; Abrar, U. Dependable Control for Wireless Distributed Control Systems. Electronics 2015, 4, 857–878. [Google Scholar] [CrossRef]
  12. Zhou, Y.; Cui, F.; Che, J.; Ni, M.; Zhang, Z.; Li, J. Elastic Balancing of Communication Efficiency and Performance in Federated Learning with Staged Clustering. Electronics 2025, 14, 745. [Google Scholar] [CrossRef]
  13. Zhang, C.; Luo, X.; Liang, J.; Liu, X.; Zhu, L.; Guo, S. POTA: Privacy-Preserving Online Multi-Task Assignment with Path Planning. IEEE Trans. Mob. Comput. 2024, 23, 5999–6011. [Google Scholar] [CrossRef]
  14. Li, C.; Guan, L.; Wu, H.; Cheng, N.; Li, Z.; Shen, X.S. Dynamic Spectrum Control-Assisted Secure and Efficient Transmission Scheme in Heterogeneous Cellular Networks. Engineering 2022, 17, 220–231. [Google Scholar] [CrossRef]
  15. Ali, S.; Saad, W.; Rajatheva, N.; Chang, K.; Steinbach, D.; Sliwa, B.; Wietfeld, C.; Mei, K.; Shiri, H.; Zepernick, H.J.; et al. 6G White Paper on Machine Learning in Wireless Communication Networks. arXiv 2020. [Google Scholar] [CrossRef]
  16. Zhu, X.; Liu, J.; Lu, L.; Zhang, T.; Qiu, T.; Wang, C.; Liu, Y. Enabling Intelligent Connectivity: A Survey of Secure ISAC in 6G Networks. IEEE Commun. Surv. Tutor. 2024; early access. [Google Scholar] [CrossRef]
  17. Chen, R.; Li, Z.; Shi, J.; Guan, L.; Zhang, J. High Secure Sequence Design in Frequency Hopping Communications. China Commun. 2019, 16, 139–150. [Google Scholar]
  18. Li, C.; Qi, P.; Wang, D.; Li, Z. On the Anti-Interference Tolerance of Cognitive Frequency Hopping Communication Systems. IEEE Trans. Reliab. 2020, 69, 1453–1464. [Google Scholar] [CrossRef]
  19. Guan, L.; Li, Z.; Xiao, S.; Si, J.; Wan, J. A Family of Adaptive Frequency Slot Number FH Sequences for High Security and Reliability Communication. In Proceedings of the 2015 European Intelligence and Security Informatics Conference, Manchester, UK, 7–9 September 2015; pp. 30–36. [Google Scholar] [CrossRef]
  20. Chen, W.; Wang, Z.; Xie, H.; Yu, W. Characterization of Surface EMG Signal Based on Fuzzy Entropy. IEEE Trans. Neural Syst. Rehabil. Eng. 2007, 15, 266–272. [Google Scholar] [CrossRef]
  21. Chen, X.; Si, J.; Li, Z.; Cai, J.; Bai, B. A New Complexity Metric for FH/SS Sequences Using Fuzzy Entropy. Sci. China Inf. Sci. 2011, 54, 1491–1499. [Google Scholar] [CrossRef]
  22. Li, Z.; Cai, J.; Chang, Y. Determining the complexity of FH/SS sequence by approximate entropy. IEEE Trans. Commun. 2009, 57, 812–820. [Google Scholar] [CrossRef]
  23. Li, Z.; Chang, Y.; Jin, L.; Cai, J. Analysis of FHMA Performance on Block Cipher Based Frequency-Hopping Sequences. IEEE Commun. Lett. 2004, 8, 434–436. [Google Scholar] [CrossRef]
  24. Li, Z.; Chang, Y.; Kou, W.; Jin, L.; Wang, Y. A Family of FH Sequences Based on 3DES Block Cipher for FHMA Communications. In Proceedings of the 2004 IEEE International Conference on Communications, Paris, France, 20–24 June 2004; Volume 1, pp. 311–315. [Google Scholar] [CrossRef]
  25. Li, Z.; Chang, Y.; Jin, L. A Novel Family of Frequency Hopping Sequences for Multi-Hop Bluetooth Networks. IEEE Trans. Consum. Electron. 2003, 49, 1084–1089. [Google Scholar] [CrossRef]
  26. Guo, L.; Zhang, C.; Sun, J.; Fang, Y. A Privacy-Preserving Attribute-Based Authentication System for Mobile Health Networks. IEEE Trans. Mob. Comput. 2014, 13, 1927–1941. [Google Scholar] [CrossRef]
  27. Tan, H.; Zheng, W.; Guan, Y.; Lu, R. A Privacy-Preserving Attribute-Based Authenticated Key Management Scheme for Accountable Vehicular Communications. IEEE Trans. Veh. Technol. 2023, 72, 3622–3635. [Google Scholar] [CrossRef]
  28. Guan, L.; Zan, L.; Si, J.; Liang, X. Performance Analysis of Cognitive Bluetooth Networks Based on the Orthogonal FH Sequences. In Proceedings of the 2014 IEEE International Conference on Computer and Information Technology, Xi’an, China, 11–13 September 2014; pp. 869–875. [Google Scholar] [CrossRef]
  29. Guan, L.; Li, Z.; Si, J.; Huang, Y. Generation and Characterization of Orthogonal FH Sequences for the Cognitive Network. Sci. China Inf. Sci. 2015, 58, 1–11. [Google Scholar] [CrossRef]
  30. Ye, W. Two classes of frequency hopping sequences with no-hit zone. In Proceedings of the 7th International Symposium on Communications Theory and Applications, Ambleside, UK, 13–18 July 2003; pp. 304–306. [Google Scholar]
  31. Peng, D.; Fan, P.; Lee, M.H. Lower bounds on the periodic Hamming correlations of frequency hopping sequences with low hit zone. Sci. China Ser. F Inf. Sci. 2006, 49, 208–218. [Google Scholar] [CrossRef]
  32. Bao, J.; Ji, L. New Families of Optimal Frequency Hopping Sequence Sets. IEEE Trans. Inf. Theory 2016, 62, 5209–5224. [Google Scholar] [CrossRef]
  33. Peng, D.; Han, H. Theoretical boundary and design for frequency/time series hopping in collision-free zone. J. Chengdu Inst. Inf. Eng. 2015, 30, 1–6. [Google Scholar] [CrossRef]
  34. Zhou, L.; Han, H.; Liu, X. Frequency-hopping sequence sets with no-hit-zone through Cartesian product. Cryptogr. Commun. 2020, 12, 485–497. [Google Scholar] [CrossRef]
  35. Liu, X.; Zhou, L.; Zeng, Q.; Niu, X. On the Average Hamming Correlation of Frequency-Hopping Sequence Sets with Low Hit Zone. In Proceedings of the 2019 International Symposium on Networks, Computers and Communications (ISNCC), Istanbul, Turkey, 18–20 June 2019; pp. 1–6. [Google Scholar] [CrossRef]
  36. Liu, X.; Hong, S.; Zeng, Q.; Zhou, L. NHZ frequency hopping sequence sets under aperiodic Hamming correlation: Tighter bound and optimal constructions. Cryptogr. Commun. 2022, 14, 347–356. [Google Scholar] [CrossRef]
  37. Gao, W.; Guan, L.; Li, Z.; Si, J.; Hui, P.; Fu, H. An Extended Family of No-Hit-Zone Frequency Hopping Sequences for UAVs Cluster Communication. In Proceedings of the 2022 14th International Conference on Wireless Communications and Signal Processing, Nanjing, China, 1–3 November 2022; pp. 928–932. [Google Scholar] [CrossRef]
  38. Zeng, Q.; Chen, J.; Niu, X.; Zhou, L.; Liu, X. Optimal No-Hit-Zone Sequences With Wide-Gap for Improved FHMA Systems Under Follower Jamming. IEEE Trans. Commun. 2024, 73, 1652–1662. [Google Scholar] [CrossRef]
  39. Zeng, Q.; Zhou, Z.; Liu, X.; Liu, Z. Strong No-Hit-Zone Sequences for Improved Quasi-Orthogonal FHMA Systems: Sequence Design and Performance Analysis. IEEE Trans. Commun. 2019, 67, 5336–5345. [Google Scholar] [CrossRef]
Figure 1. Schematic diagram of the transmission scheme with orthogonal sequences. (The frequency slots used for U s e r 1 is { f 4 , f 6 , f 3 , f 1 , f 4 , f 6 } and for U s e r 2 is { f 2 , f 3 , f 5 , f 4 , f 2 , f 5 }).
Figure 1. Schematic diagram of the transmission scheme with orthogonal sequences. (The frequency slots used for U s e r 1 is { f 4 , f 6 , f 3 , f 1 , f 4 , f 6 } and for U s e r 2 is { f 2 , f 3 , f 5 , f 4 , f 2 , f 5 }).
Electronics 14 01802 g001
Figure 2. Schematic diagram of the transmission scheme with NHZ sequences. (The frequency slots used for U s e r   3 is { f 4 , f 6 , f 3 , f 1 , f 4 , f 6 } and for U s e r 4 is { f 2 , f 5 , f 4 , f 5 , f 3 , f 2 }).
Figure 2. Schematic diagram of the transmission scheme with NHZ sequences. (The frequency slots used for U s e r   3 is { f 4 , f 6 , f 3 , f 1 , f 4 , f 6 } and for U s e r 4 is { f 2 , f 5 , f 4 , f 5 , f 3 , f 2 }).
Electronics 14 01802 g002
Figure 3. Illustration of the DS communication Network. (This DS network has 5 subnets and Subnet 1 consists of { C 1 , D 1 , D 2 , D 3 , D 4 }, Subnet 2 consists of { C 2 , D 5 }, Subnet 3 consists of { C 3 , D 4 , D 6 }, Subnet 4 consists of { C 4 , D 8 }, Subnet 5 consists of { C 5 , D 7 }).
Figure 3. Illustration of the DS communication Network. (This DS network has 5 subnets and Subnet 1 consists of { C 1 , D 1 , D 2 , D 3 , D 4 }, Subnet 2 consists of { C 2 , D 5 }, Subnet 3 consists of { C 3 , D 4 , D 6 }, Subnet 4 consists of { C 4 , D 8 }, Subnet 5 consists of { C 5 , D 7 }).
Electronics 14 01802 g003
Figure 4. The construction of BC-NHZ spectrum control sequence set.
Figure 4. The construction of BC-NHZ spectrum control sequence set.
Electronics 14 01802 g004
Figure 5. Collision probabilities vary with Γ .
Figure 5. Collision probabilities vary with Γ .
Electronics 14 01802 g005
Figure 6. Network throughputs vary with Γ .
Figure 6. Network throughputs vary with Γ .
Electronics 14 01802 g006
Figure 7. The FuEn test values vary with the length of watch sequence under different resolution parameters r.
Figure 7. The FuEn test values vary with the length of watch sequence under different resolution parameters r.
Electronics 14 01802 g007
Table 1. Parameters of comparisons among some known NHZ sequence sets and the proposed one.
Table 1. Parameters of comparisons among some known NHZ sequence sets and the proposed one.
LengthFamily SizeFrequency-Slot SizeNHZ WidthBasic SequenceReference
r ( v + 1 ) m m ( v + 1 ) v-[33]
r i = 1 I v i i = 1 I m i i = 1 I m i ( v i + 1 ) i = 1 I ( v i + 1 ) 1 Optimal NHZ sequence set in [33][34]
rm m ( v + 1 ) v-[36]
l c m ( p 1 , v ) m p p m ( v + 1 ) v-[38]
r ( v + 1 ) m m ( v + 1 ) vOptimal sequence sets in [32][39]
rm m ( v + 1 ) vBlock ciper sequenceThis paper
p is a prime; m , v , r , I , v 1 , v 2 , , v I are positive integers.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Gao, W.; Guan, L.; Hui, P.; Zhang, H.; Li, Z. Block-Cipher No-Hit-Zone Sequence-Assisted Spectrum Control Scheme for Distributed Systems. Electronics 2025, 14, 1802. https://doi.org/10.3390/electronics14091802

AMA Style

Gao W, Guan L, Hui P, Zhang H, Li Z. Block-Cipher No-Hit-Zone Sequence-Assisted Spectrum Control Scheme for Distributed Systems. Electronics. 2025; 14(9):1802. https://doi.org/10.3390/electronics14091802

Chicago/Turabian Style

Gao, Wendong, Lei Guan, Pei Hui, Hanwen Zhang, and Zan Li. 2025. "Block-Cipher No-Hit-Zone Sequence-Assisted Spectrum Control Scheme for Distributed Systems" Electronics 14, no. 9: 1802. https://doi.org/10.3390/electronics14091802

APA Style

Gao, W., Guan, L., Hui, P., Zhang, H., & Li, Z. (2025). Block-Cipher No-Hit-Zone Sequence-Assisted Spectrum Control Scheme for Distributed Systems. Electronics, 14(9), 1802. https://doi.org/10.3390/electronics14091802

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop