On the possibility of information protection in telecommunication OFDM-systems using multi-parameter orthogonal transformations
Abstract
Information security is one of the most important areas in wireless communication systems. Traditional information security methods are based on the upper layers of the open systems interconnection model (OSI) protocol stack, but their reliability is significantly reduced for scenarios where legitimate and illegitimate users share a common physical environment.
In this article we develop an OFDM (orthogonal frequency-division multiplexing) communication system where instead of traditional orthogonal transformations (OT), for example, Walsh, Haar, Fourier transforms, their fractional (FOT) or multiparameter implementations (MPOT) are used. Such transformations depend on a finite set of independent parameters (in case of fractional OT) or (in case of MPOT), which change their form. When , or the transformation takes the form of the classical OT, and when , or degenerates into the identical transformation. Successful information exchange requires knowledge of the parameters of the currently used FOT or MPOT, which may change periodically. The simulation results of OFDM system using single-parameter Fourier-Bargmann transform (FrFBT) show that the proposed OFDM system provides better security against unauthorized access to information compared to the traditional OFDM system.
Full Text:
PDF (Russian)References
Data Bank of Information Security Threats https://bdu.fstec.ru/threat/ubi.083
Data Bank of Information Security Threats https://bdu.fstec.ru/ubi/terms/terms/view/id/38
M. Bakulin, V. Kreindelin, A. Shloma, A. Shumov. “OFDM technology”, Telecom, 2015, 360 pp.
N. Ahmed, K Rao, “Orthogonal Transforms for Digital Signal Processing” Springer; Softcover reprint of the original 1st ed. 1975.
F. Renna, N. Laurenti, H. V. Poor, “Physical-layer secrecy for OFDM transmissions over fading channels”, IEEE Trans. Inf. Forens. Security, 2012, 7(4), pp. 1354-1367.
A. Chorti, H. V. Poor, “Faster than Nyquist interference assisted secret communication for OFDM systems”, Proceedings of the IEEE Asilomar Conf. Signals, Systems and Comput., 2011, pp. 183-187.
H. M. Wang, Q. Yin, X. G. Xia, “Distributed beamforming for physical-layer security of two-way relay networks”, IEEE Trans. Signal Process., 2012, 60(7), pp. 3532-3545.
V. Bargmann “On a Hilbert space of analytic functions and an associated integral transform. Part 1”, Commun. Pure Appl. Math., 1961, 14, pp.187–214.
A. Bultheel, and H. Martinez, “Computation of the Fractional Fourier Transform, preprint”.
H. M. Ozaktas, O. Arıkan, M. A. Kutay, and G. Bozdagi, “Digital computation of the fractional Fourier transform,” IEEE Trans. Signal Processing, vol. 44, pp. 2141–2150, Sept. 1996.
M. K. Gupta, S. Tiwari. “Performance evaluation of conventional and wavelet based OFDM System”, International Journal on Electronics and Communication, 2013, vol. 67, no.4, pp 348– 354.
M. J. E. Golay. Complementary series, IEEE Trans. Inform. Theory, 1961, 7, pp. 82–87.
T. A. Wilkinson, A. E. Jones. “Combined coding for error control and increased robustness to system nonlinearities in OFDM”, Proceedings of the IEEE 46th Vehicular Technology Conf., 1996, pp. 904-908.
C. E. Shannon 1949 Communication Theory of Secrecy Systems Bell Labs Technical Journal 28(4) 657-715.
A. D. Wyner, “The wiretap channel”, Bell Sys. Tech. J., 1975, 54(8), pp. 1355–1387.
E. Labunets, V. Labunets, “Fast fractional Fourier transforms”, Proc. of Eusipco-98, Rhodes, Greece, 8–11 Sept. 1998, pp. 1757–1760.
Refbacks
- There are currently no refbacks.
Abava Кибербезопасность IT Congress 2024
ISSN: 2307-8162