Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (13)

Search Parameters:
Keywords = physical layer security modulation technique

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
23 pages, 1292 KB  
Article
Hardware Validation for Semi-Coherent Transmission Security
by Michael Fletcher, Jason McGinthy and Alan J. Michaels
Information 2025, 16(9), 773; https://doi.org/10.3390/info16090773 - 5 Sep 2025
Viewed by 648
Abstract
The rapid growth of Internet-connected devices integrating into our everyday lives has no end in sight. As more devices and sensor networks are manufactured, security tends to be a low priority. However, the security of these devices is critical, and many current research [...] Read more.
The rapid growth of Internet-connected devices integrating into our everyday lives has no end in sight. As more devices and sensor networks are manufactured, security tends to be a low priority. However, the security of these devices is critical, and many current research topics are looking at the composition of simpler techniques to increase overall security in these low-power commercial devices. Transmission security (TRANSEC) methods are one option for physical-layer security and are a critical area of research with the increasing reliance on the Internet of Things (IoT); most such devices use standard low-power Time-division multiple access (TDMA) or frequency-division multiple access (FDMA) protocols susceptible to reverse engineering. This paper provides a hardware validation of previously proposed techniques for the intentional injection of noise into the phase mapping process of a spread spectrum signal used within a receiver-assigned code division multiple access (RA-CDMA) framework, which decreases an eavesdropper’s ability to directly observe the true phase and reverse engineer the associated PRNG output or key and thus the spreading sequence, even at high SNRs. This technique trades a conscious reduction in signal correlation processing for enhanced obfuscation, with a slight hardware resource utilization increase of less than 2% of Adaptive Logic Modules (ALMs), solidifying this work as a low-power technique. This paper presents the candidate method, quantifies the expected performance impact, and incorporates a hardware-based validation on field-programmable gate array (FPGA) platforms using arbitrary-phase phase-shift keying (PSK)-based spread spectrum signals. Full article
(This article belongs to the Special Issue Hardware Security and Trust, 2nd Edition)
Show Figures

Figure 1

29 pages, 4478 KB  
Article
Secrecy Rate Bounds in Spatial Modulation-Based Visible Light Communications under Signal-Dependent Noise Conditions
by Yahya M. Al-Moliki, Ali H. Alqahtani, Mohammed T. Alresheedi and Yahya Al-Harthi
Photonics 2024, 11(10), 934; https://doi.org/10.3390/photonics11100934 - 3 Oct 2024
Viewed by 1430
Abstract
This study examines the physical-layer security of an indoor visible light communication (VLC) system using spatial modulation (SM), which consists of several transmitters, an authorized receiver, and a passive adversary. The SM technique is applied at the transmitters so that only one transmitter [...] Read more.
This study examines the physical-layer security of an indoor visible light communication (VLC) system using spatial modulation (SM), which consists of several transmitters, an authorized receiver, and a passive adversary. The SM technique is applied at the transmitters so that only one transmitter is operational at any given time. A uniform selection (US) strategy is employed to choose the active transmitter. The two scenarios under examination encompass the conditions of non-negativity and average optical intensity, as well as the conditions of non-negativity, average optical intensity, and peak optical intensity. The secrecy rate is then obtained for these two scenarios while accounting for both signal-independent noise and signal-dependent noise. Additionally, the high signal-to-noise ratio (SNR) asymptotic behavior of the derived secrecy rate constraints is investigated. A channel-adaptive selection (CAS) strategy and a greedy selection (GS) scheme are utilized to select the active transmitter, aiming to enhance the secrecy performance. The current numerical findings affirm a pronounced convergence between the lower and upper bounds characterizing the secrecy rate. Notably, marginal asymptotic differentials in performance emerge at elevated SNRs. Furthermore, the GS system outperforms the CAS scheme and the US method, in that order. Additionally, the impact of friendly optical jamming on the secrecy rate is investigated. The results show that optical jamming significantly enhances the secrecy rate, particularly at higher power levels. Full article
(This article belongs to the Section Optical Communication and Network)
Show Figures

Figure 1

12 pages, 602 KB  
Article
Clipping Noise Compensation for Overlapped Time Domain Multiplexing toward Low Peak-to-Average Power Ratio
by Chongda Huang, Qianzhen Zhang, Xiaoyuan Li and Yue Xiao
Sensors 2024, 24(5), 1607; https://doi.org/10.3390/s24051607 - 1 Mar 2024
Viewed by 1493
Abstract
Overlapped Time Domain Multiplexing (OvTDM) is a high-rate transmission technology that employs the idea of superposition coded modulation (SCM) scheme for signal generation, aiming to achieve maximum channel capacity sharing. Meanwhile, it is also widely considered as a promising technique toward physical layer [...] Read more.
Overlapped Time Domain Multiplexing (OvTDM) is a high-rate transmission technology that employs the idea of superposition coded modulation (SCM) scheme for signal generation, aiming to achieve maximum channel capacity sharing. Meanwhile, it is also widely considered as a promising technique toward physical layer security. As a main drawback of such system, a high peak-to-average power ratio (PAPR) issue in this system, arising from multi-layer superposition, can be addressed through intentional clipping. However, the detection at the receiver side is vulnerable to nonlinear distortion caused by clipping, which can degrade the performance. To mitigate this distortion, this paper proposed an iterative scheme for estimating and partially canceling clipping distortion at the receiver. We managed to mitigate the impact of clipping noise as much as possible and minimize the cost of optimizing PAPR, thereby improving the transmission performance of OvTDM in the context of amplitude clipping. Full article
(This article belongs to the Special Issue Secure Communication for Next-Generation Wireless Networks)
Show Figures

Figure 1

18 pages, 18243 KB  
Article
Physical-Layer Security in Power-Domain NOMA Based on Different Chaotic Maps
by Mariam Abu Al-Atta, Karim A. Said, Mohamed A. Mohamed and Walid Raslan
Entropy 2023, 25(1), 140; https://doi.org/10.3390/e25010140 - 10 Jan 2023
Cited by 6 | Viewed by 2653
Abstract
Nonorthogonal multiple access (NOMA) is a relevant technology for realizing the primary goals of next-generation wireless networks, such as high connectivity and stability. Because a rising number of users are becoming connected, user data security has become a critical issue. Many chaotic communication [...] Read more.
Nonorthogonal multiple access (NOMA) is a relevant technology for realizing the primary goals of next-generation wireless networks, such as high connectivity and stability. Because a rising number of users are becoming connected, user data security has become a critical issue. Many chaotic communication systems have been established to address this important issue via exhibition of affordable physical-layer-security solutions. In this study, we propose a chaotic downlink NOMA (C-DL-NOMA) system over the additive white Gaussian noise and Rayleigh-fading channels to enhance the security of the DL-NOMA system. The proposed algorithm is based on a coherent analog modulation technique that combines various chaotic maps for chaotic masking of encrypted data. On the transmitter, chaotic encryption was used for transmitted data with fixed power-allocation-level control, whereas on the receiver, successive interference-cancellation demodulation was utilized to detect multiple users, after which chaotic decryption was performed. Simulation results were evaluated based on security analyses, such as statistical analysis (histogram and correlation analyses and information entropy), bit-error-rate performance, and achievable-data-rate performance. According to these security analyses and numerical results, the proposed C-DL-NOMA system outperformed traditional unencrypted NOMA systems. Full article
(This article belongs to the Section Complexity)
Show Figures

Figure 1

11 pages, 2799 KB  
Article
Fabrication of Color Glass by Pearlescent Pigments and Dissolved EVA Film
by Seongmin Lim, Hyeon-Sik Ahn, Akpeko Gasonoo, Jae-Hyun Lee and Yoonseuk Choi
Materials 2022, 15(16), 5570; https://doi.org/10.3390/ma15165570 - 13 Aug 2022
Cited by 9 | Viewed by 3153
Abstract
In this paper, we propose a single-layer thin-film color glass manufacturing process for building-integrated photovoltaics (BIPV) with excellent aesthetics and high transmittance, through a solution process using pearlescent pigments. As a matrix for the color solution, ethylene vinyl acetate (EVA), which serves as [...] Read more.
In this paper, we propose a single-layer thin-film color glass manufacturing process for building-integrated photovoltaics (BIPV) with excellent aesthetics and high transmittance, through a solution process using pearlescent pigments. As a matrix for the color solution, ethylene vinyl acetate (EVA), which serves as an encapsulant and adhesive for the photovoltaic module (PV), was dissolved and used as a matrix for the color solution. The color glass produced is excellent in securing the aesthetics of buildings, has a high transmittance of 90% or more, outputs a maximum solar power generation efficiency of 91% from a solar cell, and can minimize the deterioration of power generation efficiency. In addition, the characteristics do not change over time, so it is suitable as color glass for BIPV. Through this study, the solution-based color glass manufacturing process for BIPV using dissolved EVA as a matrix forms a single-layer thin film with good color extensions. The choice of EVA as a matrix makes it possible for color glass to be easily attached to a solar panel using a heat press method. This proposed technique makes it easier and simpler to manufacture color glass as compared to the physical vapor deposition process. The adoption of this solution process technique to fabricate pearlescent pigment-based color glass can effectively reduce the time and cost of the process, so it is expected to be applied to the low-cost BIPV market with excellent aesthetics and high transmittance. Full article
Show Figures

Figure 1

17 pages, 1176 KB  
Article
Multi-User Hybrid Beamforming Design for Physical Layer Secured mmWave LOS Communications
by Jianguo Li, Neng Ye, Siqi Ma, Xiangyuan Bu and Jianping An
Electronics 2021, 10(21), 2635; https://doi.org/10.3390/electronics10212635 - 28 Oct 2021
Cited by 2 | Viewed by 2654
Abstract
This paper proposes a hybrid beamforming design algorithm for a multi-user physical layer security modulation technique. The hybrid beamforming scheme is used in the base station to generate multi-beams according to the direction angle of the target users. The base station first uses [...] Read more.
This paper proposes a hybrid beamforming design algorithm for a multi-user physical layer security modulation technique. The hybrid beamforming scheme is used in the base station to generate multi-beams according to the direction angle of the target users. The base station first uses a secure analog beamforming scheme to generate analog beams in multiple desired directions, then uses minimum mean square error (MMSE) to design the digital beamforming matrix to eliminate inter-beam interference. Due to randomly selecting a subset of antennas to transmit signals at the symbol rate, the base station transmits the defined constellation to the target users and projects the randomized constellation in the other angles. In addition, the superposition of signals is affected by a randomly selected antennas subset, resulting in higher sidelobe energy. However, due to the integer optimization target, the optimization problem of antenna subsets is non-trivial. Therefore, this paper proposes a cross-entropy iteration method to choose the optimal antenna combination to reduce the sidelobe energy. The simulation shows that the proposed method in this paper has about 10 dB lower sidelobe energy than the random selection method. Besides, the eavesdropper’s symbol error rate of QPSK is always 0.75, while the multi-target users meet the quality of service requirements. Full article
(This article belongs to the Section Microwave and Wireless Communications)
Show Figures

Figure 1

8 pages, 206 KB  
Editorial
Advanced Physical-Layer Technologies for Beyond 5G Wireless Communication Networks
by Waqas Khalid, Heejung Yu, Rashid Ali and Rehmat Ullah
Sensors 2021, 21(9), 3197; https://doi.org/10.3390/s21093197 - 4 May 2021
Cited by 24 | Viewed by 6115
Abstract
Fifth-generation (5G) networks will not satisfy the requirements of the latency, bandwidth, and traffic density in 2030 and beyond, and next-generation wireless communication networks with revolutionary enabling technologies will be required. Beyond 5G (B5G)/sixth-generation (6G) networks will achieve superior performance by providing advanced [...] Read more.
Fifth-generation (5G) networks will not satisfy the requirements of the latency, bandwidth, and traffic density in 2030 and beyond, and next-generation wireless communication networks with revolutionary enabling technologies will be required. Beyond 5G (B5G)/sixth-generation (6G) networks will achieve superior performance by providing advanced functions such as ultralow latency, ultrahigh reliability, global coverage, massive connectivity, and better intelligence and security levels. Important aspects of B5G/6G networks require the modification and exploitation of promising physical-layer technologies. This Special Issue (SI) presents research efforts to identify and discuss the novel techniques, technical challenges, and promising solution methods of physical-layer technologies with a vision of potential involvement in the B5G/6G era. In particular, this SI presents innovations and concepts, including nonorthogonal multiple access, massive multiple-input multiple-output (MIMO), energy harvesting, hybrid satellite terrestrial relays, Internet of Things-based home automation, millimeter-wave bands, device-to-device communication, and artificial-intelligence or machine-learning techniques. Further, this SI covers the proposed solutions, including MIMO antenna design, modulation detection, interference management, hybrid precoding, and statistical beamforming along with their performance improvements in terms of performance metrics, including bit error rate, outage probability, ergodic sum rate, spectrum efficiency, and energy efficiency. Full article
14 pages, 962 KB  
Article
Accurate and Efficient Evaluation of Bit Error Rate for Dynamic Directional Modulation for Standard Modulation Schemes
by Josep Parrón, Edith Cabrera-Hernandez and Alan Tennant
Electronics 2021, 10(7), 776; https://doi.org/10.3390/electronics10070776 - 25 Mar 2021
Viewed by 2748
Abstract
Directional modulation (DM) has been proposed as a technique to enhance physical layer security of wireless transmissions. In DM, the improvement of security is achieved by increasing the transmitted power in such a way that the bit error rate (BER) is degraded in [...] Read more.
Directional modulation (DM) has been proposed as a technique to enhance physical layer security of wireless transmissions. In DM, the improvement of security is achieved by increasing the transmitted power in such a way that the bit error rate (BER) is degraded in the observation angles out of the desired secure direction. The performance of DM in terms of BER is typically evaluated by transmitting a stream of symbols for every observation angle, but this approach can be time consuming. In this communication, we propose an approach to evaluate, accurately and efficiently, the BER of dynamic DM (DDM) for standard modulation schemes. Several DDM configurations will be tested to illustrate the benefits and limitations of the evaluation method. The proposed approach is also used to present a non-iterative DDM synthesis with restrictions in the BER response. Full article
Show Figures

Figure 1

21 pages, 5462 KB  
Article
A Wireless Covert Channel Based on Dirty Constellation with Phase Drift
by Krystian Grzesiak, Zbigniew Piotrowski and Jan M. Kelner
Electronics 2021, 10(6), 647; https://doi.org/10.3390/electronics10060647 - 11 Mar 2021
Cited by 20 | Viewed by 4094
Abstract
Modern telecommunications systems require the use of various transmission techniques, which are either open or hidden. The open transmission system uses various security techniques against its unauthorized reception, and cryptographic solutions ensure the highest security. In the case of hidden transmissions, steganographic techniques [...] Read more.
Modern telecommunications systems require the use of various transmission techniques, which are either open or hidden. The open transmission system uses various security techniques against its unauthorized reception, and cryptographic solutions ensure the highest security. In the case of hidden transmissions, steganographic techniques are used, which are based on the so-called covert channels. In this case, the transparency and stealth of the transmission ensure its security against being picked up by an unauthorized user. These covert channels can be implemented in multimedia content, network protocols, or physical layer transmissions. This paper focuses on wireless covert channels. We present a novel method of steganographic transmission which is based on phase drift in phase-shift keying or quadrature amplitude modulation (QAM) and is included in the so-called dirty constellation techniques. The proposed approach is based on the drift correction modulation method, which was previously used in the watermarking of audio-signals. The developed solution is characterized by a variable bit rate, which can be adapted to the used modulation type and transmission conditions occurring in radio channels. In the paper, we present the method of generating and receiving hidden information, simulation research, and practical implementation of the proposed solution using the software-defined radio platform for selected QAM. Full article
(This article belongs to the Special Issue Cybersecurity and Data Science)
Show Figures

Figure 1

17 pages, 4859 KB  
Article
Dynamic Rotated Angular Beamforming Using Frequency Diverse Phased-Array for Secure MmWave Wireless Communications
by Yuanquan Hong, Xiaojun Jing, Yuan He and Junsheng Mu
Electronics 2020, 9(1), 10; https://doi.org/10.3390/electronics9010010 - 21 Dec 2019
Cited by 4 | Viewed by 2804
Abstract
In this paper, we propose a new secure millimeter-wave wireless communication architecture called dynamic rotated angular beamforming (DRAB), to address the physical layer security (PLS) challenge for aligned transmitter, eavesdropper and target receiver in the mainlobe path, where the conventional angular beamforming (CAB) [...] Read more.
In this paper, we propose a new secure millimeter-wave wireless communication architecture called dynamic rotated angular beamforming (DRAB), to address the physical layer security (PLS) challenge for aligned transmitter, eavesdropper and target receiver in the mainlobe path, where the conventional angular beamforming (CAB) fails to provide satisfactory PLS performance. The proposed DRAB consists of a conventional phased-array and a set of frequency offset modulator. A frequency offset increment (FOI) set is intentionally introduced to control the dynamic rotation of DRAB’s mainlobe around the target user in the angle-range space. Thus, the average sidelobe of DRAB outside the target region is suppressed dramatically while the mainlobe inside the target region is a constant. We consider two cases of interests, i.e., with/without the location information of eavesdropping. For the known eavesdropping case, DRAB steer the zero gain sidelobes towards eavesdropper. The secrecy rate maximization problem is simplified to a form only depending on the FOI. As for the unknown eavesdropping case, we mainly depends on the beam rotating dynamically and randomly to hide the mainlobe path. Moreover, we propose inverted antenna subset technique to further randomize the sidelobes against sensitive eavesdropping. Numerical simulations demonstrate that the proposed DRAB can provide superior PLS performance over the existing CAB. Full article
(This article belongs to the Section Microwave and Wireless Communications)
Show Figures

Figure 1

26 pages, 1277 KB  
Article
Directional Modulation Technique Using a Polarization Sensitive Array for Physical Layer Security Enhancement
by Wei Zhang, Bin Li, Mingnan Le, Jun Wang and Jinye Peng
Sensors 2019, 19(24), 5396; https://doi.org/10.3390/s19245396 - 6 Dec 2019
Cited by 2 | Viewed by 4115
Abstract
Directional modulation (DM), as an emerging promising physical layer security (PLS) technique at the transmitter side with the help of an antenna array, has developed rapidly over decades. In this study, a DM technique using a polarization sensitive array (PSA) to produce the [...] Read more.
Directional modulation (DM), as an emerging promising physical layer security (PLS) technique at the transmitter side with the help of an antenna array, has developed rapidly over decades. In this study, a DM technique using a polarization sensitive array (PSA) to produce the modulation with different polarization states (PSs) at different directions is investigated. A PSA, as a vector sensor, can be employed for more effective DM for an additional degree of freedom (DOF) provided in the polarization domain. The polarization information can be exploited to transmit different data streams simultaneously at the same directions, same frequency, but with different PSs in the desired directions to increase the channel capacity, and with random PSs off the desired directions to enhance PLS. The proposed method has the capability of concurrently projecting independent signals into different specified spatial directions while simultaneously distorting signal constellation in all other directions. The symbol error rate (SER), secrecy rate, and the robustness of the proposed DM scheme are analyzed. Design examples for single- and multi-beam DM systems are also presented. Simulations corroborate that (1) the proposed method is more effective for PLS; (2) the proposed DM scheme is more power-efficient than the traditional artificial noise aided DM schemes; and (3) the channel capacity is significantly improved compared with conventional scalar antenna arrays. Full article
Show Figures

Figure 1

24 pages, 531 KB  
Article
Directional Modulation-Enhanced Multiple Antenna Arrays for Secure and Precise Wireless Transmission
by Wei Zhang, Mingnan Le, Bin Li, Jun Wang and Jinye Peng
Sensors 2019, 19(22), 4833; https://doi.org/10.3390/s19224833 - 6 Nov 2019
Cited by 9 | Viewed by 3533
Abstract
Directional modulation (DM) technique has the ability to enhance the physical layer security (PLS) of wireless communications. Conventional DM schemes are usually based on a single antenna array with the basic assumption that eavesdroppers (Eves) and legitimate users (LUs) are in different directions. [...] Read more.
Directional modulation (DM) technique has the ability to enhance the physical layer security (PLS) of wireless communications. Conventional DM schemes are usually based on a single antenna array with the basic assumption that eavesdroppers (Eves) and legitimate users (LUs) are in different directions. However, it is possible that Eves are in the same direction as LUs in practical applications. As a result, signals received by Eves will be approximately the same or even in better quality than those received by LUs. To address the neighbor security issue, we introduce a multiple antenna arrays model at the transmitter side with the help of the artificial noise (AN)-aided DM technique to achieve secure and precise DM transmission in this paper. Meanwhile, to recover the mixed useful signals, two novel DM schemes based on single- and multi-carrier multiple antenna arrays model are proposed, respectively. In addition, the symbol error rate (SER), secrecy rate, and robustness performance of the proposed DM schemes were analyzed and simulated. Simulations validate the effectiveness of the proposed DM schemes and demonstrate that multiple antenna arrays model based DM methods outperform single antenna array model aided DM methods in security. Full article
Show Figures

Figure 1

13 pages, 4960 KB  
Article
Chaos Synchronization in Visible Light Communications with Variable Delays Induced by Multipath Fading
by Pep Canyelles-Pericas, Paul Anthony Haigh, Zabih Ghassemlooy, Andrew Burton, Xuewu Dai, Tran The Son, Hoa Le-Minh, Richard Binns and Krishna Busawon
Appl. Syst. Innov. 2018, 1(4), 45; https://doi.org/10.3390/asi1040045 - 9 Nov 2018
Cited by 5 | Viewed by 4117
Abstract
Visible Light Communication (VLC) uses light-emitting diodes to provide wireless connectivity in public environments. Transmission security in this emerging channel is not trivial. Chaotic modulation techniques can provide encryption directly in the physical layer based on the random-alike evolution and strong synchronization prospect [...] Read more.
Visible Light Communication (VLC) uses light-emitting diodes to provide wireless connectivity in public environments. Transmission security in this emerging channel is not trivial. Chaotic modulation techniques can provide encryption directly in the physical layer based on the random-alike evolution and strong synchronization prospect given by deterministic chaos. In secure chaotic inclusion or embedding methods, continuous-time chaos oscillator models need to be synchronized via a coupling carrier. Here we present a first numerical simulation study for the impact of the variable delays induced by line-of-sight and non-line-of-sight multipath fading in complete chaotic synchronization. More precisely, we analyze a chaotic Colpitts oscillator that is simultaneously transmitting the carrier to several mobile receivers via nine spotlights. Such induced delays depend on both the receiver position and the carrier frequency, influencing the complete synchronization required in modulation via chaotic inclusion. Correlation values for several receiver positions and carrier frequencies are presented, examining the progressive emergence of the multipath effect and its impact on chaotic synchronization. We show that, for the chaotic oscillator and coupling applied in the defined room settings, complete chaotic synchronization can be achieved and that it is robust up to the tens of MHz region. Full article
(This article belongs to the Special Issue Non-linear Devices, Systems, Networks and Their Applications)
Show Figures

Figure 1

Back to TopTop