Skip to main content
Log in

Modulated symbol-based one-time pad secure transmission scheme using physical layer keys

  • Research Paper
  • Published:
Science China Information Sciences Aims and scope Submit manuscript

Abstract

This paper proposes a novel modulated symbols-based one-time pad (SOTP) secure transmission scheme using physical layer keys. Unlike classical physical layer key generation and exclusive OR (XOR) encryption in the discrete binary space, we design a framework for modulated symbols-based one-time pad (OTP) encryption, where the cryptographic primitive and mathematical model of SOTP is given to build a practical cryptographic protocol. Compared with existing physical layer encryption (PLE) schemes, we provide rigorous proof that the framework can meet perfect secrecy and correctness requirements. In addition, we provide a specific scheme of physical layer OTP secure transmission for quadrature amplitude modulation (QAM) and phase-shift keying (PSK) symbols based on physical layer keys. This scheme realizes the unification of bit encryption and symbol encryption, which can adaptively select the quantization level according to the signal-to-noise ratio (SNR) to minimize the symbol error rate (SER). Further, we analyze the performance quantitatively and derive the closed-form expressions of SER, which indicates that the proposed scheme has a lower SER. Finally, simulation results verify that the proposed symbol-wise OTP secure transmission scheme can achieve perfect secrecy and high reliability.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Lv L, Li Z, Ding H Y, et al. Secure coordinated direct and untrusted relay transmissions via interference engineering. Sci China Inf Sci, 2022, 65: 182304

    Article  MathSciNet  Google Scholar 

  2. Vernam G S. Secret signaling system. U.S. Patent 1310719, 1919

  3. Shannon C E. Communication theory of secrecy systems. Bell Syst Technical J, 1949, 28: 656–715

    Article  MathSciNet  Google Scholar 

  4. Sun L, Du Q. Physical layer security with its applications in 5G networks: a review. China Commun, 2017, 14: 1–14

    Article  Google Scholar 

  5. Jin L, Hu X, Lou Y, et al. Introduction to wireless endogenous security and safety: problems, attributes, structures and functions. China Commun, 2021, 18: 88–99

    Article  Google Scholar 

  6. Gong S X, Tao X F, Li N, et al. Secret key generation over a Nakagami-m fading channel with correlated eavesdropping channel. Sci China Inf Sci, 2022, 65: 192304

    Article  MathSciNet  Google Scholar 

  7. Wan Z, Huang K, Lou Y, et al. Channel covariance matrix based secret key generation for low-power terminals in frequency division duplex systems. Electron Lett, 2021, 57: 324–327

    Article  Google Scholar 

  8. Zhang J, Duong T Q, Marshall A, et al. Key generation from wireless channels: a review. IEEE Access, 2016, 4: 614–626

    Article  Google Scholar 

  9. Li G, Zhang Z, Yu Y, et al. A hybrid information reconciliation method for physical layer key generation. Entropy, 2019, 21: 688

    Article  MathSciNet  Google Scholar 

  10. Peng L, Li G, Zhang J, et al. Securing M2M transmissions using nonreconciled secret keys generated from wireless channels. In: Proceedings of IEEE Globecom Workshops (GC Wkshps), 2018. 1–6

  11. Wan Z, Huang K. Non-reconciliation secret keys based secure transmission scheme using polar codes. In: Proceedings of IEEE 5th International Conference on Computer and Communications (ICCC), 2019. 1499–1504

  12. Li G, Zhang Z, Zhang J, et al. Encrypting wireless communications on the fly using one-time pad and key generation. IEEE Internet Things J, 2021, 8: 357–369

    Article  Google Scholar 

  13. Hu X, Jin L, Huang K, et al. A secure communication scheme based on equivalent interference channel assisted by physical layer secret keys. Secure Commun Networks, 2020. doi: https://doi.org/10.1155/2020/8840645

  14. Wang M, Huang K, Wan Z, et al. Non-reconciled physical-layer keys-assisted secure communication scheme based on channel correlation. Entropy, 2022, 24: 1167

    Article  MathSciNet  Google Scholar 

  15. Bang I, Kim T. Secure modulation based on constellation mapping obfuscation in OFDM based TDD systems. IEEE Access, 2020, 8: 197644–197653

    Article  Google Scholar 

  16. Chen B, Zhu C, Li W, et al. Original symbol phase rotated secure transmission against powerful massive MIMO eavesdropper. IEEE Access, 2016, 4: 3016–3025

    Article  Google Scholar 

  17. Althunibat S, Sucasas V, Rodriguez J. A physical-layer security scheme by phase-based adaptive modulation. IEEE Trans Veh Technol, 2017, 66: 9931–9942

    Article  Google Scholar 

  18. Loganathan L D, Rengaraj R, Konganathan G, et al. Physical layer security using an adaptive modulation scheme for improved confidentiality. IET Commun, 2019, 13: 3383–3390

    Article  Google Scholar 

  19. Bi S, Yuan X, Zhang Y J A. DFT-based physical layer encryption for achieving perfect secrecy. In: Proceedings of IEEE International Conference on Communications (ICC), 2013. 2211–2216

  20. Mao T, Wang Q, Wen M, et al. Secure single-input-multiple-output media-based modulation. IEEE Trans Veh Technol, 2020, 69: 4105–4117

    Article  Google Scholar 

  21. Husain M I, Mahant S, Sridhar R. CD-PHY: physical layer security in wireless networks through constellation diversity. In: Proceedings of IEEE Military Communications Conference, 2012. 1–9

  22. Chorti A. Masked-OFDM: a physical layer encryption for future OFDM applications. In: Proceedings of IEEE Globecom Workshops, 2010. 1254–1258

  23. Xi C, Gao Y, Nan S, et al. Constellation symbol obfuscation design approach for physical layer security. In: Proceedings of the 10th International Conference on Communication Software and Networks (ICCSN), 2018. 264–269

  24. Ma R, Dai L, Wang Z, et al. Secure communication in TDS-OFDM system using constellation rotation and noise insertion. IEEE Trans Consumer Electron, 2010, 56: 1328–1332

    Article  Google Scholar 

  25. Xiong T, Lou W, Zhang J, et al. MIO: enhancing wireless communications security through physical layer multiple intersymbol obfuscation. IEEE Trans Inform Forensic Secur, 2015, 10: 1678–1691

    Article  Google Scholar 

  26. Katz J, Lindell Y. Introduction to Modern Cryptography. 2nd ed. Boca Raton: Chapman and Hall/CRC, 2014

    Book  Google Scholar 

  27. Szabo Z. Information theoretical estimators toolbox. J Mach Learn Res, 2014, 15: 283–287

    Google Scholar 

Download references

Acknowledgements

This work was supported by National Natural Science Foundation of China (Grant No. U22A2001, 62301608) and National Key Research and Development Program of China (Grant Nos. 2022YFB2902202, 2022YFB2902205).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kaizhi Huang.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Hu, X., Wan, Z., Huang, K. et al. Modulated symbol-based one-time pad secure transmission scheme using physical layer keys. Sci. China Inf. Sci. 67, 112303 (2024). https://doi.org/10.1007/s11432-022-3768-8

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11432-022-3768-8

Keywords

Navigation