Professional Documents
Culture Documents
2022EBT0005
Publicized:2023/01/25
PAPER
Demonstration of chaos-based radio encryption modulation scheme
through wired transmission experiments
Kenya Tomita†a), Mamoru Okumura†, Nonmembers, and Eiji Okamoto†, Fellow
SUMMARY With the recent commercialization of fifth-generation protocols. Therefore, as communication infrastructures
mobile communication systems (5G), wireless communications are being change with 5G evolution and networks become more
used in various fields. Accordingly, the number of situations in which
sensitive information, such as personal data is handled in wireless complex in the future, security measures in the upper layers
communications is increasing, and so is the demand for confidentiality. will need to adapt to increasingly complex networks. This
To meet this demand, we proposed a chaos-based radio-encryption result is likely to be a strong constraint for protocols and a
modulation that combines physical layer confidentiality and channel coding high additional cost for the user. In addition, with the
effects, and we have demonstrated its effectiveness through computer
simulations. However, there are no demonstrations of performances using
practical application of quantum computers, it is likely that
real signals. In this study, we constructed a transmission system using cryptography based on computational security, such as
Universal Software Radio Peripheral, a type of software-defined radio, and Rivest-Shamir-Adleman (RSA), which is currently in use,
its control software LabVIEW. We conducted wired transmission will crack in the future [5].
experiments for the practical use of radio-frequency encrypted modulation. Therefore, physical layer security (PLS) with
The results showed that a gain of 0.45 dB at a bit error rate of 10 was
obtained for binary phase-shift keying, which has the same transmission information-theoretic security has attracted attention in
efficiency as the proposed method under an additive white Gaussian noise recent years [6]–[8], focusing on the concealing ability of
channel. Similarly, a gain of 10 dB was obtained under fading conditions. the propagation path. The first property of PLS is
We also evaluated the security ability and demonstrated that chaos information-theoretic security, which ensures
modulation has both information-theoretic security and computational
security.
confidentiality regardless of the eavesdropper's
key words: Physical layer security, radio-wave encrypted modulation, computational ability. This enables secure and reliable
software defined radio, chaos modulation. communication without being deciphered, even when there
is an eavesdropper with a sufficiently high computational
1. Introduction power in the same network. Second, PLS can be applied in
conjunction with existing upper-layer security technologies
Recently, the commercialization of fifth-generation mobile to enhance confidentiality because the physical layer
communication systems (5G) has begun. By applying its operates independently, separate from the upper layers.
characteristic requirements of ultra-high speed, high Several types of conventional PLSs have been proposed
capacity, ultra-reliability, low latency, and massive as follows:
simultaneous connections, 5G is expected to be used not (a)Directional modulation (DM) [9]:
only by wireless user terminals that have been targeted in The DM is a transmitter-side technique that sends an
long-term evolution (LTE) and fourth-generation mobile encoded signal in a pre-specified spatial direction and
communication systems (4G), but also by automotive, distorts the constellation of the same signal in other
industrial, home security, and other applications [1]. directions that are not specified. While a legitimate receiver
Accordingly, the demand for communication confidentiality can receive a normal signal, the eavesdropper receives a
is increasing in fields where important personal information signal with a distorted constellation, making normal
is exchanged, such as in medical and financial fields [2]. decoding difficult.
Traditionally, security technologies such as SSL/TLS [3], (b) Artificial noise (AN) [10]:
which provide public key certificate-based authentication, An AN is transmitted from the base station or is appended to
secure session key establishment, and symmetric key-based the transmitted signal. This contaminates the received signal
traffic confidentiality, and IPSec [4], which provide integrity, of the eavesdropper and therefore interferes with the normal
confidentiality, and authentication of data communications decoding. Because an AN is based on a legitimate user
over IP networks, have been used to meet these requirements. channel, only a legitimate receiver can remove the AN.
All of these technologies were performed using upper-layer (c) Radiofrequency fingerprinting (RFF) [11]
When a radio frequency (RF) signal is transmitted from a
transmitter, the RF signal exhibits transient behavior with
†Department of Electrical and Mechanical Engineering, respect to the instantaneous frequency and amplitude. The
Graduate School of Engineering, Nagoya Institute of behavior varies depending on various factors, including
Technology, Nagoya-shi, Aichi, 466-8555 Japan. differences in the transmitted signal and the circuit
configuration of the transmitter. The same transmitter may
a) E-mail: ckl14087@nitech.jp
exhibit different behaviors depending on manufacturing
Transmit control
TX1 amplifier
0°
90°
Ethernet
Low-noise Drive LPF ADC DDC
RX2 amplifier amplifier
Receive control
TX2
0°
90°
DUC : digital up converter DDC : digital down converter LPF : low-pass filter
DAC : digital-analog converter ADC : analog-digital converter VCO : voltage-controlled oscillator
RX : receiver TX : transmitter PLL : phase locked loop
256 symbols
48 2,000 Pilot: pilot signal |𝑟̂ | = |𝑟 | , (13)
symbols symbols Data: chaos modulated signal
1 subframe where 𝑟̂ ∈ ℂ , 𝑃 , 𝑃 , and 𝑃 are the compensated
received chaos signals, average transmitting power at the
500 subframes pilots, average received signal power at the pilots, and
Fig. 6 Framework of transmit signal. average received noise power, respectively. Here, 𝑃 is
measured when null signals with zero amplitude are
block for demodulation. transmitted in advance. The amplitude correction ratio
between the transmitted and received signals can be
3.3 Preamble signal composition and frame synchronization calculated using the square root of the power, and thus the
method equalization can be conducted by (13).
In this study, the 256 preamble symbols were composed of 4 Experimental results and performance evaluation
255 symbols of degree 8 M-sequence [37], calculated using
the following primitive polynomial 𝑓(𝑥) for a finite First, the frame synchronization, amplitude, and phase
variable 𝑥 and one zero symbol. correction performances were examined. Then, the BER
𝑓(𝑥) = 𝑥 + 𝑥 + 𝑥 + 𝑥 + 1. (10) characteristics of chaos modulation under additive white
At the receiver side, the cross-correlation [38] between the Gaussian noise (AWGN) and fading environments were
preamble signal and the received signal is calculated as measured to demonstrate that the channel coding effect was
follows: obtained. Finally, the information theory and computational
security of chaos modulation were evaluated experimentally.
𝐴 =∑ Re[𝑝 ]Re[𝑟 ] + Im[𝑝 ] Im[𝑟 ], (11)
4.1 Synchronization and equalization performance
where 𝑟 ∈ ℂ (0 ≤ 𝑘 ≤ 255, 𝑖 ∈ ℤ), 𝑝 ∈ ℂ, and 𝐴 ∈
ℝ are the (k+i)-th received signal, k-th preamble signal, and We evaluated the performance of the frame synchronization,
i-th cross-correlation value, respectively. The highest amplitude, and phase correction using the methods
correlation point with the maximum 𝐴 value can be described in Section 3. To obtain the pure characteristics of
determined as the starting point of the preamble in the the signal variations generated by the experimental
received signal, thereby allowing frame synchronization. equipment, the experiments were conducted in an AWGN
The cross-correlation values at the frame synchronization environment, where propagation channel variations are not
point are sharp and pulse-like, preventing misinterpretation. necessarily considered. The experimental conditions are
listed in Table 3. The cross-correlation function of the
3.4 Receiver-side equalization process using pilot signals received signal was measured when the average signal-to-
noise ratio (SNR) was 0 dB. The results in Fig. 7 show that
In the experiments, various factors caused amplitude and a pulse-like value can be found at a certain synchronization
phase distortions in the received signals. Pilot signal point near the 5,000 symbol index on the horizontal axis.
transmission was used to compensate for this. First, the
average phase value 𝜃 [rad] of the phase difference of Table 3 Experimental conditions under AWGN environment.
Center frequency 5.015 GHz
the pilot signals between the transmitter and receiver was IQ rate 4 MS/s
calculated as follows, and the phase of the following 2,000 Receiver gain [0, 30] dB
chaos symbols was rotated by −𝜃 to correct the phase Transmitter gain [0, 30] dB
distortion. Data length 10 bit
No. of samples per symbol 4
1 Chaos block length 𝑁 10
𝜃 = 𝜃 , −𝜑 , . (12) No. of chaos processing iterations 60
𝑀
Channel model AWGN
Here, 𝑀(= 48), 𝜃 , , and 𝜑 , are the number of pilot
IEICE TRANS. ELECTRON., VOL.XX-X, NO.X XXXX XXXX
6
8.E-06 0.8
6.E-06 0.6
Cross correlation function
4.E-06
0.4
it does not change during the operation and remains constant, Transmitted in-phase chaos signal
Transmitted quadrature-phase chaos signal
allowing for correction by pilot signals. On the other hand, 0.06
𝜃 , is caused by ambiguity in the phase-locked loop
Amplitude [V]
1.E-01
BPSK simulation
Bit error rate
unencrypted
encrypted
1.E-03 1.E-02
0 5 10 15 20 25 0 5 10 15 20 25 30
Avg. received SNR [dB] Avg. received SNR [dB]
Fig. 12 Experimental results of BER characteristics in fading Fig. 13 BER characteristics of eavesdroppers.
environment.
IEICE TRANS. ELECTRON., VOL.XX-X, NO.X XXXX XXXX
8
0.25
software-defined-radio-device/latest/specs-usrp-2921/specs
[35] Ettus Research, “Synchronization and MIMO Capability with USRP
0.20
Devices,”
[Online] Available: 0.15
https://kb.ettus.com/Synchronization_and_MIMO_Capability_with
_USRP_Devices 0.10
[36] Ettus Research, “Loop Back Cable Kit,”
[Online] Available: https://www.ettus.com/all-products/lpbk-kit 0.05
[37] Z. Xinyu, “Analysis of M-sequence and Gold-sequence in CDMA
system,” IEEE 3rd International Conference on Communication 0.00
Software and Networks, pp. 466-468, 2011. 0 20 40 60 80 100
No. of chaos processing iterations I
[38] A. Fort, J. Weijers, V. Derudder, W. Eberle, and A. Bourdoux, “A
performance and complexity comparison of auto-correlation and Fig. 15 Average distance characteristics of generated signal versus
cross-correlation for OFDM burst synchronization,” 2003 IEEE number of chaos processing iterations I.
International Conference on Acoustics, Speech, and Signal
Processing, 2003. Proceedings. (ICASSP '03)., pp .341-344, Apr.
2003.
Kenya Tomita received the B.E. and M.S.
[39] C. D. Moffatt, and J. Hoffmann, “Low PAPR preamble for improved
degrees in Electrical and Mechanical
channel estimation,” MILCOM 2008 - 2008 IEEE Military
Communications Conference, pp. 1-7, Nov. 2008. Engineering from Nagoya Institute of
[40] J. E. Volder, “The CORDIC Trigonometric Computing Technique,” Technology in 2020 and 2022, respectively.
IRE Transactions on Electronic Computers, vol.EC-8, no. 3, pp. 330- His research interests are in the area of
334, Sept. 1959. wireless communication technologies and
[41] J. R. Van der Merwe, et al., “Multi-channel software defined radio their experiments, including chaos
experimental evaluation and analysis.” Proc. Instituto Tecnologico modulation.
de Aeronautica (ITA), 2014.
[42] S. Corum, J. D. Bonior, R. C. Qiu, N. Guo, and Z. Hu, “Evaluation
of phase error in a software-defined radio network testbed,” 2012
Proceedings of IEEE Southeastcon, pp. 1-4, Mar. 2012.
[43] C. E. Shannon, “Communication theory of secrecy systems,” Bell
System Technical Journal, vol. 28, pp. 656-715, Oct. 1949.
[44] Q. Dang, “Recommendation for Applications Using Approved Hash
Algorism,” NIST Special Publication 800-107, pp. 1-22, Aug. 2012.
IEICE TRANS. ELECTRON., VOL.XX-X, NO.X XXXX XXXX
10