Next Article in Journal
A True Process-Heterogeneous Stacked Embedded DRAM Structure Based on Wafer-Level Hybrid Bonding
Next Article in Special Issue
Secure Modern Wireless Communication Network Based on Blockchain Technology
Previous Article in Journal
A Key-Based Multi-Mode Clock-Controlled Stream Cipher for Real-Time Secure Communications of IoT
Previous Article in Special Issue
Cooperative Jamming with AF Relay in Power Monitoring and Communication Systems for Mining
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Design of Low Probability Detection Signal with Application to Physical Layer Security

1
School of Computer and Communication Engineering, University of Science and Technology Bei**g, Bei**g 100083, China
2
School of Information and Electronics, Bei**g Institute of Technology, Bei**g 100081, China
3
School of Cyberspace Science and Technology, Bei**g Institute of Technology, Bei**g 100081, China
*
Author to whom correspondence should be addressed.
Electronics 2023, 12(5), 1075; https://doi.org/10.3390/electronics12051075
Submission received: 31 January 2023 / Revised: 14 February 2023 / Accepted: 17 February 2023 / Published: 21 February 2023
(This article belongs to the Special Issue Security and Privacy for Modern Wireless Communication Systems)

Abstract

:
In this work, we mainly focus on low probability detection (LPD) and low probability interception (LPI) wireless communication in cyber-physical systems. An LPD signal waveform based on multi-carrier modulation and an under-sampling method for signal detection is introduced. The application of the proposed LPD signal for physical layer security is discussed in a typical wireless-tap channel model, which consists of a transmitter (Alice), an intended receiver (Bob), and an eavesdropper (Eve). Since the under-sampling method at Bob’s end depends very sensitively on accurate sampling clock and channel state information (CSI), which can hardly be obtained by Eve, the security transmission is initialized as Bob transmits a pilot for Alice to perform channel sounding and clock synchronization by invoking the channel reciprocal principle. Then, Alice sends a multi-carrier information-bearing signal constructed according to Bob’s actual sampling clock and the CSI between the two. Consequently, Bob can coherently combine the sub-band signals after sampling, while Eve can only obtain a destructive combination. Finally, we derived the closed-form expressions of detection probability at Bob’s and Eve’s ends when the energy detector is employed. Simulation results show that the bit error rate (BER) at Alice’s end is gradually decreased with the increase in the signal-to-noise ratio (SNR) in both the AWGN and fading channels. Meanwhile, the BER at Eve’s end is always unacceptably high no matter how the SNR changes.

1. Introduction

Cyber-physical systems (CPSs) are networked systems that integrate computation, communication, and control elements. The principal goal of CPSs is to monitor and (if necessary) change the behavior of a physical process to ensure that it functions correctly, reliably, and efficiently. Nowadays, it has been applied in various domains, such as smart grids, health management, vehicular management, and military applications [1]. As CPSs advance rapidly in the degree of informatization and intelligence, their security issues have attracted both scholarly and industrial attention. Security issues of CPSs cover various aspects, including sensing security, computing security, communication security, and control security [2,3]. For the CPSs that are networked in nature, information sharing and interactions should be built on secure and reliable links among various terminals. As a result, communication security is crucial to CPSs [4,5]. Due to the broadcast nature of radio propagation, secure wireless transmission is a challenge. Malicious attacks on communication systems in CPS are classified as passive attacks and active attacks. Passive attacks are those where the attacker listens to network traffic in order to gain access to sensitive information. Yulong Zou studies the intercept behavior of an industrial wireless sensor network, and propose an optimal sensor scheduling scheme aiming at maximizing the secrecy capacity of wireless transmissions from sensors to the sink [6]. In this paper, we develop a practical countermeasure for passive attacks and propose a physical layer security communication scheme for CPS applications.
A well-designed secure wireless link should have LPD and LPI properties with respect to illegal users [7,8]. The concept of perfect secrecy was first introduced in Shannon’s fundamental paper [9]. He also proposed that security of communication could be guaranteed only when the transmitter and receiver have a certain degree of cooperation, and perfect secrecy could be achieved if a one-time pad protocol were employed. Traditional encryption techniques are based on the complexity of mathematical tasks, such as the computation of discrete logarithms in large finite fields. With the rapid development of computer hardware and computing technologies, such as distributed computing and cloud computing, the security of traditional encryption techniques has become questionable [10]. Quantum communication can provide almost perfect security through the use of quantum laws to detect any possible information leak [11]. However, its application to wireless and mobile communications is confined because the line of sight for the transmission of optical quantum is not always available, particularly in urban areas crowded by large buildings. The classical spread spectrum communication systems have good LPD, and LPI characteristics and are widely used. However, the random and noise-like properties of pseudo-noise spreading sequences are usually deterministic and periodical in actual systems. With the rapid development of blind signal detection techniques [12], the spreading sequences may be cracked by illegal users. Then, the traditional spread spectrum techniques are also not as secure as expected.
Physical layer security is to develop a secure transmission that exploits the physical properties of transceivers without relying on source encryption [13]. Wyner introduced the concept of secrecy capacity over wire-tap channels [14]. In Wyner’s model, the wire-tap channel is a degraded version of the main channel; thus, the eavesdropper can only receive a noisy version of the signal received at the intended receiver. Wyner’s work was extended to single input multiple output (SIMO) systems in the presence of one eavesdropper [15]. Hero proposed an information theoretical framework to investigate information security in wireless multiple-input multiple-output links [16]. Another important line of research is the design of a practical system to achieve near-optimal physical layer security performance [17]. Zheng proposed a low-complexity polar-coded cooperative jamming scheme for the general two-way wire-tap channel, without any constraint on channel symmetry or degradation [18,19,20,21,22]. The research mentioned above is unexceptionally confined to the information-theoretic perspective, which only focuses on the LPI performance. Therefore, the main contribution of our work is to design an LPD signal waveform and investigate its application in physical layer security.
Motivated by achieving an LPD signal waveform, we previously proposed an under-sampling spectrum-sparse signal based on active aliasing [23]. In this work, we extend our earlier work to a more practical scenario. Application of the LPD signal for physical layer security is investigated, and a typical wire-tap channel model with three users, namely, the transmitter (Alice), the intended receiver (Bob), and the eavesdropper (Eve), is considered. Since the under-sampling method may be effective only when the sub-band signals are accurately aligned after the sampling process, Alice can shift the central frequencies of the transmitted sub-band signals according to the clock offset between Alice and Bob, to make sure that Bob can collect the signal power on all sub-carriers coherently. Furthermore, a precoding technique based on CSI can be employed to maximize Bob’s SNR at the sampling stage. The sampling clock frequency offset and CSI between Alice and Bob are treated as security keys which can be determined at Alice’s end according to the reciprocal principle. Meanwhile, Alice and Eve do not have a negotiation of compensation for the sampling rate and CSI; Eve can only use incoherent demodulation techniques. Finally, the LPD and LPI performance of the proposed scheme is evaluated by the detection probability of the received signal and BER, respectively.
The rest of this paper is organized as follows. Section 2 presents the construction of the LPD signal waveform, the principle of the signal detection method. Section 3 presents the application of the designed LPD signal for physical layer security. A practical secure transmission scheme based on channel reciprocity is proposed. Section 4 analyses the LPD performance of the designed signal in the Wire-tap channel. Section 5 investigates the signal and information security performance in terms of detection probability and BER at both Bob’s and Eve’s ends by simulations. Finally, the conclusions are drawn in Section 6.

2. LPD Signal Design and Detection Method

2.1. LPD Signal Waveform Design

The basic strategy of LPD signal design is to reduce the level of radio frequency energy; the DSSS signal is an example. In this section, an LPD signal waveform based on multi-carrier modulation is designed. The differences between our design and the traditional multi-carrier modulation method lie in the following aspects: signal structure and receiving method. In our design, signals modulated by the sub-carriers are the same, and the sub carriers should be equally spaced. Furthermore, under-sampling method based on active aliasing is employed for signal detection. The designed LPD signal can be expressed as
x ( t ) = k = L L + N 1 s ( t ) · α k exp ( k · j ω c t )
where the scaled factor α k satisfied power constraint as k = 1 N | α k | 2 = 1 , N implies the total number of sub-carriers. Thus, the mean power of signal x ( t ) is equivalent to that of signal s ( t ) , and L is the number of null subcarriers from the zero frequency to the first signal carrier. s ( t ) is the original modulated signal with bandwidth ω B . The carrier spacing can be given by ω c = D · ω B , where D is the ratio between the carrier spacing and baseband width of signal s ( t ) . The parameter D should be no less than 2, or aliasing may occur between adjacent channels. Moreover, artificial noise can be added over the gaps among useful sub-band signals to enhance the covertness of the transmitted signal. In such a case, D should be determined cautiously to avoid aliasing between artificial noise and useful signals.
The comparison diagram of the spectrum structure between the modulated signal s ( t ) and the proposed LPD signal x ( t ) is shown in Figure 1. The bandwidth of x ( t ) is N times of s ( t ) while the power is consistent. As a result, the power spectrum density of signal x ( t ) will be significantly reduced, which may be even lower than the background noise provided if N is large enough. Furthermore, x ( t ) also performs sparsity in the frequency domain when ω c ω B . These two characteristics are similar to that of direct sequence spread spectrum and frequency hop** signals.

2.2. Principle of Under-Sampling Method for Intended Receiver

As previously mentioned, the proposed LPD signal has a low power spectrum and is sparse in the frequency domain. Therefore, detecting the LPD signal at the intended receiver becomes a problem. In this part, the under-sampling method based on active aliasing is presented. The sampling rate is determined by the subcarrier spacing, and the sampling and combination for the proposed LPD signal can be finished simultaneously. For simplicity, the principle of the sampling process is explained in frequency domain. The complex-valued signal at the receiver can be given by
r ( t ) = k = L L + N 1 h k s ( t ) · α k exp ( k · j ω c t ) + w ( t )
where h k is the channel coefficient over the k t h sub-channel determined by the channel environment [24]. For the additive white Gaussian noise (AWGN) channel, channel coefficient h k is considered to be 1 for all k. For the fading channel, the channel coefficients can be given by h k = h k exp ( j φ k ) , which means the signal transmitted over the k t h sub-channel is scaled by the attenuation factor h k and phase-shifted by φ k . In this work, h k is subjected to Rayleigh distribution and φ k is subjected to uniform distribution. w ( t ) is the independent complex additive noise with power spectrum density N 0 . The sampling process can be modeled as a pulse modulation process, and the sampling pulse is a periodic ideal pulse sequence given by p ( t ) = n = + δ ( t n T s ) , where δ ( t ) is the unit impulse function. The sampling frequency can be calculated by f s = 1 1 T s T s .
The frequency representation of the proposed sampling process is illustrated in Figure 2. As shown in Figure 2a, signal X ( j ω ) consists of N sub-band signals S k ( j ω ) with sub-band spacing ω c , and the total bandwidth of X ( j ω ) is N ω c . The frequency domain representation of the sampling function is illustrated in Figure 2b. The spectrum of the sampled signal can be represented as a convolution of X ( j ω ) and P ( j ω ) . For each sub-band signal S k ( j ω ) , a replica of S k ( j ω ) remains at each integer multiple of ω s . If the sampling rate is chosen as f s = f c , replicas of sub-band signals S k ( j ω ) may be aligned and added coherently, as shown in Figure 2c. The mean power of the sampled signal increases by N times. Consequently, S ( j ω ) can be recovered from the sampled signal with an ideal low-pass filter. Otherwise, these sub-band signals would not be aligned as shown in Figure 2d if f s f c , aliasing between adjacent sub-band signals can hardly be eliminated.

2.3. Practical Receiver Design

As illustrated in the last section, the feasibility of the under-sampling method has been proved. However, the proposed LPD signal waveform does not exhibit a constant envelope. The sampling phase plays an important role in the sampling process. Here, a practical receiver-based on a multiphase clock [25,26] is presented. The block diagram of the receiver is shown in Figure 3. At the front end of the receiver, the pass band of the analog band pass filter (BPF) is [ ( L 1 / 2 ) ω c , ( L + N 1 / 2 ) ω c ] , and the bandwidth of the pass band is N ω c . Then, frequency contents out of the pass band will be filtered out by the analog BPF. The SNR of signal y ( t ) can be given by S N R y = P s / N N 0 ω c , where P s denotes the average transmit power. Thereafter, the multiphase clock, which can produce several sampling clocks with the same frequency but different phases, are employed. They can be modeled as p m ( t ) = n = + δ ( t n T s m Δ T s ) where m = 0 , 1 , 2 , , M 1 and Δ = 1 1 M M . Thus, a total of M sampled signals can be obtained. Comparing the mean power of these sampled signals, we can select the sampled signal with the maximum mean power as input for the LPF. The LPF is considered to be an ideal LPF with cut-off frequency ω B . It’s important to note that artificial noise (if it exists) will be filtered out by the LPF.
For the noise component, w ( t ) can be written by summation of N sub-band noise elements as w ( t ) = k = 0 N 1 w k ( t ) exp [ ( k + L ) · j ω c t ] , where w k ( t ) is an independent zero-mean band-limited AWGN with bandwidth ω c and power spectrum density N 0 . After sampling, these sub-band noises are added incoherently, and the power spectrum density becomes N N 0 . Following that, the SNR of signal s ˜ [ n ] can be given by
S N R d = E s ˜ 2 [ n ] N N 0 ω B = k = L L + N 1 1 / N · exp ( j 2 Δ k π ) 2 P s N N 0 ω B
and then the receiving gain can be achieved as
η = S N R d S N R y = D · k = L L + N 1 1 / N exp ( j 2 Δ k π ) 2
As a result, the maximum receiving gain becomes N D if the sampling phase is synchronized perfectly when Δ = 0 . Followed by the LPF, signal s ˜ [ n ] can be demodulated in traditional ways.

2.4. Complexity Analysis of Receiver

In this section, the complexity of the proposed receiver is investigated. For a spectrum sparse signal with bandwidth N D f B , the wideband bandpass filter is used for signal extraction. Different from the traditional receiver, the multiphase clock should be employed to obtain L-sampled copies. The sampled signal, which has the highest power, is chosen for processing in the following steps. Therefore, a total of M analog to digital converters(ADCs) is needed. Assuming the power of the sampled signal is calculated over Q samples, the selection combining step consumes Q M times multiplier, ( Q 1 ) M times add operation, and l o g 2 ( L ) times comparison operation.
There are also two other possible architectures of receivers for the designed LPD signal. The first receiver architecture uses parallel demodulators for each subcarrier and post-detection combining to recover the signal s ( t ) . Each demodulator needs a narrow band filter and ADC. The complexity and power consumption of the receiver will grow in direct proportion to the subcarrier number N. The second receiver architecture uses direct baseband sampling or radio frequency bandpass sampling method. The sampling rate should be at least twice the bandwidth of the LPD signal as 2 N D f B that performance requirements for ADCs will be ultra high. As mentioned above, the proposed under-sampling detection method has lower implementation complexity and hardware requirements.

3. Design of Physical Layer Security Communication System Using Proposed LPD Signal

The analyses in Section 2 show that the designed LPD signal can be exactly detected if and only if the sampling rate is synchronized perfectly. Otherwise, a different sampling rate may lead to a destructive combination after sampling. Then, the intrinsic sampling clock offset between the transmitter and the receiver can be used for secure transmission. In this section, the application of the designed LPD signal for physical layer security is discussed.

3.1. Wireless-Tap Channel Model

In this work, the typical wire-tap channel models consisting of Alice, Bob, and Eve are considered. The secure transmission model is shown in Figure 4, and details of the transmission protocol are presented as follows:
  • Bob sends a transmission request signal to Alice, followed by pilot signals in the same frequency that Alice is going to use for secure data transmission.
  • Alice estimates the sampling clock offset and CSI via the pilot signals.
  • According to the sampling clock offset between Alice and Bob, Alice shifts the central frequencies of sub-band signals to ensure that they are aligned at Bob’s side after sampling.
  • As the CSI of the channel from Bob to Alice has become known, the CSI from Alice to Bob can also be informed according to the channel reciprocal principle. Then, a precoding scheme is employed to enhance both capacity and security.
  • Alice securely transmits the modified LPD signal to Bob.
Details of the sampling clock compensation and precoding scheme for security enhancement are presented in this section. These two methods exploit the physical properties of the sampling clock and channel characteristics between Alice and Bob, respectively. For simplification, the sampling phase offset is considered to be Δ = 0 in what follows unless stated otherwise.

3.2. Sampling Clock Offset Compensation

The sampling clock offset for the same frequency ω c between Alice and Bob is defined as κ ω = ω B , c ω A , c , where ω A , c and ω B , c indicate the actual clock frequency of Alice and Bob, respectively. The sampling clock offset can be estimated nearly perfectly only if the SNR is sufficiently high or the number of pilot symbols is sufficiently large. According to the secure transmission protocol, κ ω can be estimated in step 2. Then, the LPD signal is modified as
x s ( t ) = k = L L + N 1 s ( t ) · α k exp k · j ( ω A , c + κ ω ) t
The central frequencies of sub-band signals are shifted according to κ ω , which is considered to be a shared key between Alice and Bob. As the sampling clock offset has been compensated at the transmitter, the sampling clock synchronization between Alice and Bob would be realized. When Bob sampled the received signal with sampling clock ω B , c , sub-band signals in the transmitted signal would be aligned naturally, as shown in Figure 3. Then, modulated signal s ( t ) may be recovered. Taking the weighted factor α k and the channel coefficients h k into account, the SNR of sampled signal s ˜ [ n ] at Bob is given by
S N R B , d = k = L L + N 1 α k h k exp ( j 2 Δ k π ) 2 · P s N N 0 ω B
For Eve, the sampling frequency can hardly be the same as that of Bob. Although the receiving method is known to Eve, sub-band signals cannot always be aligned at the baseband after sampling. The spectrum of the sampled signal at Eve would be the same as that in Figure 3. The sampled signal is a summation of sub-band signals with different carrier frequency offsets, which can hardly be eliminated. Such a sampled signal cannot be used for demodulation, and interception by Eve cannot be realized.

3.3. Precoding Scheme for Fading Channel

According to the proposed secure transmission protocol, the channel fading coefficients from Bob to Alice can be estimated by Alice. Then, the channel coefficient from Alice to Bob can also be known based on the channel reciprocal principle. Therefore, a precoding scheme that exploits the channel characteristics could be employed to improve the receiving gain at Bob. Meanwhile, the precoding scheme can also optimize the power allocation of sub-band signals. As stated, the SNR of the sampled signal at Bob is given by
S N R B , d = k = L L + N 1 α k h k 2 · P s N N 0 ω B
when Δ = 0 . Weighted factor α k and channel fading coefficient h k can be written as 1 × N vectors by α = [ α L , α L + 1 , , α L + N 1 ] and H = [ h L , h L + 1 , , h L + N 1 ] . The Cauchy–Schwarz inequality [27] states that for all vectors α and H of an inner product space, the following equation holds true:
| < α , H > | 2 || α || 2 · || H | | 2
where < α , H > denotes the inner product of vectors α and H , and the notion | | · | | denotes the Euclidean norm. Moreover, the equality holds only when α and H are linearly dependent. It can be written by α = λ H * , where λ is a nonzero constant. The superscript ∗ denotes a conjugate operation. In addition, the weighted factor is constrained by k = L L + N 1 | α k | 2 = 1 . In order to make the equality in Equation (8) hold true, the weighted factor α k should be given by α k = h k * / | | H | | . Then, the SNR of the sampled signal at Bob can be given by S N R B , d = | | H | | 2 · P s / ( N N 0 ω B ) . We can conclude that the optimal power allocation strategy for the frequency selective fading channel is to make the SNR over each sub-band identical.
Receiving gain η versus sampling phase offset Δ is shown in Figure 5. We assumed that channel coefficients for sub-band signals are independent, identically distributed, and subject to Rayleigh distribution. Let h ^ k denote the estimates of h k that can be written by h ^ k = h k + h k e . Two different scenarios are explored: (1) perfect CSI, the channel coefficients are perfectly known as h k e = 0 ; (2) imperfect CSI, h k e is supposed to be a Gaussian random variable with zero mean, and the estimation error is defined by ρ = E { | h k e | 2 | h k e | 2 | h k | 2 | h k | 2 } .
The simulation results show that the sampling phase offset plays an important role in the proposed scheme. It reveals that the accuracy requirement for sampling phase offset is higher with the increase in sub-carrier number N. In addition, an estimation error of CSI may result in inaccurate precoding on Alice’s side. It may lead to a performance loss of receiving gain on Bob’s side, but will not influence the effectiveness of the under-sampling method.

4. Performance Evaluation

In this section, we will investigate the signal security performance in terms of probability of detection at Bob’s and Eve’s ends. It is assumed that Bob uses the proposed under-sampling method, while Eve can only use the energy detection method because of the sampling clock offset and channel differences.

4.1. Energy Detection Method

The signal detection problem can be modeled as a binary hypothetical testing problem with hypotheses H 0 and H 1 defined as
H 0 : r = w H 1 : r = x + w
where H 0 represents the null hypothesis, and H 1 represents the alternative hypothesis that a useful signal exists. The energy of the received signal is calculated in a bandwidth of W Hz over a period of T int . Users are to detect whether H 0 or H 1 is true based on the test statistic V.
The performance of the ED method is always evaluated by two probabilities, P d and P f a . P d implies the probability of detection that H 1 is accepted when H 1 is true, while P f a is the false alarm probability that H 1 is assumed when H 0 is true. The probability density function of normalized decision statistic Y = 2 V 2 V N 0 N 0 has a central chi-square distribution with v = 2 T int W degrees of freedom when H 0 is true. It can be written by
P H 0 ( Y ) = 1 2 v v 2 2 Γ v v 2 2 y ( v 2 ) ( v 2 ) 2 2 e Y Y 2 2
where Γ ( u ) is Gamma function defined by Γ ( u ) = 0 t u 1 exp ( t ) d t .
Meanwhile, the decision statistic obeys a non-central chi-square distribution with v degrees of freedom and non-central parameter λ = 2 E 2 E N 0 N 0 when H 1 is true. The E implies the signal energy in the time period T int . The PDF can be written by
P H 1 ( Y ) = 1 2 Y λ ( v 2 ) ( v 2 ) 4 4 e ( Y + λ ) ( Y + λ ) 2 2 I ( v 2 ) ( v 2 ) 2 2 Y λ
where I n ( u ) is the Bessel function of the first kind of order n. Therefore, the performance of ED can be described by
P f a = 2 V T 2 V T N 0 N 0 P H 0 ( Y ) d Y
and
P d = 2 V T 2 V T N 0 N 0 P H 1 ( Y ) d Y
where V T denotes the decision threshold.
According to the central limit theorem, P H 0 ( Y ) and P H 1 ( Y ) will converge to a Gaussian distribution as v goes to infinity. The approximated PDF can be written by
P H 0 ( Y ) 1 2 π σ w e ( Y μ w ) 2 2 σ w 2
P H 1 ( Y ) 1 2 π σ s w e ( Y μ s w ) 2 2 σ s w 2
where μ w = 2 T int W , σ w 2 = 4 T int W , μ s w = 2 T int W + 2 E E N 0 N 0 and σ s w 2 = 4 T int W + 8 E E N 0 N 0 .

4.2. Detection Performance at Bob’s and Eve’s Ends

In order to verify the signal security of the designed waveform, detection performance at Bob’s and Eve’s ends will be analyzed in this section. It is assumed that both Bob and Eve use the ED method. However, the under-sampling method was employed at Bob’s end owing to the negotiation with Alice, and the sampling clock offset and CSI can be perfectly known. Moreover, the constant false alarm rate algorithm is applied.
From Equations (14) and (15), we can conclude that
P f a = 1 2 π σ w ψ exp ( Y μ w ) 2 2 σ w 2 d Y = Q ψ μ w σ w
P d = 1 2 π σ s w ψ exp ( Y μ s w ) 2 2 σ s w 2 d Y = Q ψ μ s w σ s w
where Q ( u ) is Q function defined by Q ( u ) = 1 2 π u + exp ( x 2 ) 2 d x . Given a predetermined false alarm probability P ^ f a , the decision threshold can be calculated by
ψ * = σ w Q 1 ( P ^ f a ) + μ w
where Q 1 ( u ) is inverse function of Q(u). Substituting Equation (18) for Equation (17), we can get
P d = Q ψ * μ s w σ s w = Q σ w Q 1 ( P ^ f a ) + μ w μ s w σ s w
For the intended user Bob, the time–bandwidth product is approximated as T int W = 1 when the under-sampling method is employed. Furthermore, the ratio of instance symbol energy and power spectrum density is
E E N 0 N 0 B o b = H 2 2 E s N N 0
where E s denotes the average symbol energy of s ( t ) . As a result, the decision threshold at Bob’s end is ψ B o b * = 2 Q 1 ( P ^ f a ) + 2 , and the detection probability is
P d , B o b = Q ψ B o b * μ s w σ s w = Q Q 1 ( P ^ f a ) E E N 0 N 0 B o b 1 + 2 · E E N 0 N 0 B o b
For the illegal user Eve, the time–bandwidth product is approximated as T int W = N D . Furthermore, the E E N 0 N 0 at Eve’s end can be written by
E E N 0 N 0 E v e = k = 1 N h k g k 2 H 2 2 · E s N N 0
where g k is the channel coefficient of the wire-tap channel that is independent of h k . In AWGN channel, g k = 1 ( k = 1 , 2 , , N ) and Equation (22) is simplified as E E N 0 N 0 E v e = E s E s N N 0 N N 0 . Furthermore, the decision threshold at Eve’s end can be given by ψ * = 2 N D Q 1 ( P ^ f a ) + 2 N D and the detection probability can be written by
P d , E v e = Q ψ * μ s w σ s w = Q N D Q 1 ( P ^ f a ) E E N 0 N 0 E v e N D + E E N 0 N 0 E v e

5. Simulation Results

In this section, a number of experiments are designed to evaluate both the reliability and security of the proposed secure transmission system. The receiving gain and BER are chosen as indicators to assess the feasibility and security of the proposed physical layer security communication system. The receiving gain, which was defined in section II implies the phenomenon of SNR improvement caused by the under-sampling method on Bob’s side. For secure wireless communication systems, it is desired that the BER at Bob’s side is decreased rapidly with the increase in received SNR, while the BER at Eve’s side is always unacceptably high. To illustrate the robustness of the proposed physical layer security communication system, simulations are conducted over both AWGN and fading channels. In simulations, the signal s ( t ) is assumed to be a BPSK-modulated signal with a bandwidth of 10MHz, which means f B = 10 MHz. Furthermore, the parameter L is set as L = 1 . It is noticed that all simulations in this work are implemented using Matlab. The diagram of system model simulations is shown in Figure 6.

5.1. LPD Performance

The objective of LPD property is to guarantee the covertness of the signal waveform, which means Bob can detect the signals transmitted by Alice, while Eve can hardly detect the presence of the transmit signals. In this section, we will investigate the detection performance at Bob’s and Eve’s ends in both AWGN and fading channels. The detection method is as described in the last section, and the predetermined false alarm rate is P f a = 1 e 3 .
Simulation results in Figure 7 show that detection probability at Bob’s end is always superior to Eve’s when the channel signal-to-noise ratio is less than 10dB over the AWGN channel. There exists a security region depicted by the SNR, in which Bob’s detection probability is approaching 1, while that of Eve’s is at a low level. For example, when the SNR is in the [−3,4] (dB) interval, the detection probability of Bob is close to 1, while the detection probability of Eve is always lower than 0.1 given N = 10 and D = 4 . In practical applications, Alice can adjust the transmit power so that the received SNR is always in this region, thereby ensuring the covertness of the signal.
Furthermore, the range of the security region increases with the sub-carrier number N. This means a larger bandwidth may always lead to stronger security in signal covertness. Such a conclusion is completely consistent with how the larger the spread spectrum ratio is in DSSS, the better the security is in the direct sequence spread spectrum communication system.
Simulation results in Figure 8 show that Bob’s detection performance in fading channel is basically the same as that in the AWGN channel, and the precoding scheme is proved to be effective. However, for Eve, the weighted factor α k and channel coefficients g k are completely independent, and the SNR at Eve’s side is significantly reduced. Therefore, the security region is wider than that in the AWGN channel.

5.2. Comparison of BER Performance between Bob and Eve

The objective of the proposed physical layer security communication scheme is to simultaneously guarantee the LPD and LPI properties of wireless links. On the one hand, Bob can detect and demodulate the signals transmitted by Alice, while Eve can hardly detect the presence of the transmitted signals. On the other hand, although Eve can detect the transmitted signal, he can hardly extract useful information.
Arguably, BER is an effective and useful measure for both reliability and security. We hope the BER at Bob’s side is as low as possible; meanwhile, the BER at Eve’s side is (very close to) 0.5, so he essentially cannot recover any information transmitted by Alice. Simulation results demonstrate that the proposed scheme can guarantee that the BER at Eve will always be unacceptably high regardless of the received SNR, while the BER at Bob will be decreased significantly as the received SNR increases.
For the AWGN channel, the security of the proposed communication system is mainly determined by the sampling clock frequency offset between Bob and Eve. According to the communication protocol proposed in Section III, Bob can increase the transmit power or length of pilot signals in order to improve the estimation accuracy. In this way, the sampling clock offset can be estimated nearly perfectly as the SNR of the pilot signal is sufficiently high or the number of pilot symbols is sufficiently large. Meanwhile, the sampling frequency between Alice and Eve can hardly be synchronized because they have no negotiation for sampling frequency synchronization. The BER performance of Bob and Eve is shown in Figure 9. The parameters are set as D = 5 and N = 4 ; thus, the sampling frequency is 50 MHz. As the accuracy of the sampling clocks is always at PPM(parts per million) level, we can reasonably assume that the sampling clock offset between Alice and Eve is 1 Hz. The BER versus S N R y at Bob and Eve are illustrated in Figure 9. The sampling phase offset at Bob is set as Δ = 0 , 1 / 8 , 1 / 16 . A significant improvement in BER performance can be achieved when the sampling phase offset decreases. Simulation results show that the BER at Bob decreases rapidly as the SNR increases. Meanwhile, the BER at Eve stays at a high level, and decreases very slowly with the increase in SNR that he can hardly intercept useful information. When some artificial jamming signals are added to the LPD signal, simulation results in Figure 9 show that Bob can still detect and demodulate the LPD signal. The parameter γ in the figure is defined as γ = P x / P j , where P x denotes the transmit power of useful signals and P j denotes the transmit power of artificial jamming signals. As a result, the proposed secure communication scheme is proven effective in the AWGN channel.
Next, the BER performance of the proposed secure communication scheme over fading channels is shown in Figure 10. For Bob, both perfect CSI and imperfect scenarios are investigated. For the imperfect CSI scenario, the estimation error ρ is assumed to be 0.2 and 0.4. It is not surprising that the BER performance loss is induced by the increase in estimation error under the same channel condition. The results have clearly demonstrated that Bob can detect and demodulate the LPD signal effectively. The BER performance at Eve with different ξ f is also given in this figure, where ξ f denotes the sampling frequency offset between Alice and Bob. Simulation results show that the BER at Eve is about 0.5 even ξ f = 0 , which means the sampling clock offset between Alice and Eve does not exist. It reveals that Eve can hardly extract useful information only because he has different channel coefficients. It can be seen that Eve will obtain a BER of about 0.5 no matter how the SNR changes. As a result, the proposed secure communication scheme is also proven effective in the fading channel.

6. Conclusions

In this work, a physical layer security communication scheme has been proposed for CPS applications. First, a structured LPD signal waveform is designed, and the detection method for the LPD signal is proposed. Analysis shows that the maximum receiving gain is given by N D and decreased with the increase in sapling phase offset. Then, a wireless wire-tap channel is presented, and a secure transmission protocol is proposed. The channel reciprocal principle is applied to achieve the sampling clock offset and CSI between Alice and Bob. Based on such information, the sampling clock compensation method and precoding scheme, which can maximize Bob’s SNR at the sampling stage, are proposed. To demonstrate the LPD property, detection probability at both Bob’s and Eve’s ends are derived with the energy detector model. Simulation results show that there exists a specific SNR interval where Bob’s detection probability is approaching 1, while Eve’s is well below 0.1. The range is approximately 7 dB and 17 dB in AWGN and fading channel, respectively, when N = 10 and D = 4 . In addition, simulation results in AWNG and fading channel also show that the BER at Bob’s end is always decreased with the increase in SNR or the number of sampling phases, while Eve’s BER has always been around 0.5 regardless of the SNR. As a result, both the effectiveness and security of the proposed scheme are verified.

Author Contributions

Conceptualization, L.L.; formal analysis, L.L., J.L., and Y.H.; supervision, L.L.; writing—original draft, X.M., Y.H., and J.F.; writing—review and editing, L.L. and J.L. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the Fundamental Research Funds for the Central Universities (FRF-TP-19-052A1) and the Foundation of Bei**g Engineering and Technology Center for Convergence Networks and Ubiquitous Services.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Xu, H.; Yu, W.; Griffith, D.; Golmie, N. A Survey on Industrial Internet of Things: A Cyber-Physical Systems Perspective. IEEE Access 2018, 6, 78238–78259. [Google Scholar] [CrossRef]
  2. Humayed, A.; Lin, J.; Li, F.; Luo, B. Cyber-Physical Systems Security–A Survey. IEEE Internet Things J. 2017, 64, 1802–1831. [Google Scholar] [CrossRef]
  3. Inayat, U.; Zia, M.F.; Mahmood, S.; Berghout, T.; Benbouzid, M. Cybersecurity Enhancement of Smart Grid: Attacks, Methods, and Prospects. Electronics 2022, 11, 3854. [Google Scholar] [CrossRef]
  4. Cheminod, M.; Durante, L.; Valenzano, A. Review of Security Issues in Industrial Networks. IEEE Trans. Ind. Inform. 2013, 9, 277–293. [Google Scholar] [CrossRef]
  5. Angueira, P.; Val, I.; Montalbán, J.; Seijo, Ó.; Iradier, E.; Fontaneda, P.S.; Fanari, L.; Arriola, A. A Survey of Physical Layer Techniques for Secure Wireless Communications in Industry. IEEE Commun. Surv. Tutor. 2022, 24, 810–838. [Google Scholar] [CrossRef]
  6. Zou, Y.; Wang, G. Intercept Behavior Analysis of Industrial Wireless Sensor Networks in the Presence of Eavesdrop** Attack. IEEE Trans. Ind. Inform. 2016, 12, 780–787. [Google Scholar] [CrossRef] [Green Version]
  7. Yan, S.; Zhou, X.; Hu, J.; Hanly, S.V. Low Probability of Detection Communication: Opportunities and Challenges. IEEE Wirel. Commun. 2019, 26, 19–25. [Google Scholar] [CrossRef] [Green Version]
  8. Shi, C.; Wang, F.; Salous, S.; Zhou, J. Low Probability of Intercept-Based Optimal OFDM Waveform Design Strategy for an Integrated Radar and Communications System. IEEE Access 2018, 6, 57689–57699. [Google Scholar] [CrossRef]
  9. Shannon, C.E. Communication Theory of Secrecy Systems. Bell Syst. Tech. J. 1949, 28, 656–715. [Google Scholar] [CrossRef]
  10. Loepp, S.; Wootters, W.K. Protecting Information From Classical Error Correction to Quantum Cryptography; Cambridge University Press: Cambridge, UK, 2006. [Google Scholar]
  11. Simon, C. The Foundations of Quantum Information and Feasible Experiments. Ph.D. Dissertation, University Wien, Vienna, Austria, 2000. [Google Scholar]
  12. Zhang, H.G.; Gan, L.; Liao, H.S.; Wei, P.; Li, L.P. Estimating Spreading Waveform of Long-code Direct Sequence Spread Spectrum Signals at a Low Signal-to-noise ratio. IET Signal Process. 2012, 6, 358–363. [Google Scholar] [CrossRef]
  13. Zhou, X.; Song, L.; Zhang, Y. Physical Layer Security in Wireless Communications; CRC Press: Boca Raton, FL, USA, 2013. [Google Scholar]
  14. Wyner, A.D. The Wire-tap Chennel. Bell Syst. Tech. J. 1975, 54, 1355–1387. [Google Scholar] [CrossRef]
  15. Csiszár, I.; Körner, J. Broadcast Channels With Confidential Messages. IEEE Trans. Inf. Theory 1978, 24, 339–348. [Google Scholar] [CrossRef] [Green Version]
  16. Hero, A.O. Secure Space-time Communication. IEEE Trans. Inf. Theory 2003, 49, 3235–3249. [Google Scholar] [CrossRef]
  17. Hong, Y.W.P.; Lan, P.C.; Kuo, C.C.J. Enhancing Physical-Layer Secrecy in Multiantenna Wireless Systems: An Overview of Signal Processing Approaches. IEEE Signal Process. Mag. 2013, 30, 29–40. [Google Scholar] [CrossRef]
  18. Zhang, W.; Chen, J.; Kuo, Y.; Zhou, Y. Artificial-Noise-Aided Optimal Beamforming in Layered Physical Layer Security. IEEE Commun. Lett. 2019, 23, 72–75. [Google Scholar] [CrossRef]
  19. Sun, C.; Fei, Z.; Li, B.; Wang, X.; Li, N.; Hu, L. Secure Transmission in Downlink Non-orthogonal Multiple Access based on Polar Codes. China Commun. 2021, 18, 221–235. [Google Scholar] [CrossRef]
  20. Pfeiffer, J.; Fischer, R.F.H. Multilevel Coding for Physical-Layer Security. IEEE Trans. Commun. 2022, 70, 1999–2009. [Google Scholar] [CrossRef]
  21. Zheng, M.; Tao, M.; Chen, W.; Ling, C. Secure Polar Coding for the Two-Way Wiretap Channel. IEEE Access 2018, 6, 21731–21744. [Google Scholar] [CrossRef]
  22. Li, J.; Ye, N.; Ma, S.; Bu, X.; An, J. Multi-User Hybrid Beamforming Design for Physical Layer Secured mmWave LOS Communications. Electronics 2021, 10, 2635. [Google Scholar] [CrossRef]
  23. Li, L.; An, J.; Wang, Z.; Li, X. Under-sampling Spectrum-sparse Signals based on Active Aliasing for Low Probability Detection. Secur. Commun. Netw. 2015, 8, 4087–4097. [Google Scholar] [CrossRef]
  24. Proakis, J.G.; Salehi, M. Digital Communications, 5th ed.; McGraw-Hill: New York, NY, USA, 2007. [Google Scholar]
  25. Dhawan, S.K. Time Measurement With a Multiphase Clock. IEEE Trans. Nucl. Sci. 1983, 30, 293–296. [Google Scholar] [CrossRef]
  26. Yao, C.; Willson, A.N. A 2.8-3.2GHz Fractional-N Digital PLL With ADC-Assisted TDC and Inductively Coupled Fine-Tuning DCO. IEEE J. -Solid-State Circuits 2013, 48, 698–710. [Google Scholar] [CrossRef]
  27. Gilbert, S. Linear Algebra and Its Application, 4th ed.; Cengage Learning: Stamford, CT, USA, 2005. [Google Scholar]
Figure 1. Comparison diagram of the spectrum between s ( t ) and x ( t ) . (a) Spectrum of modulated signal s ( t ) . (b) Spectrum of the proposed LPD signal x ( t ) .
Figure 1. Comparison diagram of the spectrum between s ( t ) and x ( t ) . (a) Spectrum of modulated signal s ( t ) . (b) Spectrum of the proposed LPD signal x ( t ) .
Electronics 12 01075 g001
Figure 2. Frequency domain representation of proposed sampling method. (a) Spectrum of x ( t ) . (b) Spectrum of sampling function. (c) Spectrum of sampled signal with f s = f c . (d) Spectrum of sampled signal with f s f c .
Figure 2. Frequency domain representation of proposed sampling method. (a) Spectrum of x ( t ) . (b) Spectrum of sampling function. (c) Spectrum of sampled signal with f s = f c . (d) Spectrum of sampled signal with f s f c .
Electronics 12 01075 g002
Figure 3. Block diagram of receiver.
Figure 3. Block diagram of receiver.
Electronics 12 01075 g003
Figure 4. Secure communication system model.
Figure 4. Secure communication system model.
Electronics 12 01075 g004
Figure 5. Receiving gain η versus sampling phase offset Δ over fading channel.
Figure 5. Receiving gain η versus sampling phase offset Δ over fading channel.
Electronics 12 01075 g005
Figure 6. Diagram of the system model in simulations.
Figure 6. Diagram of the system model in simulations.
Electronics 12 01075 g006
Figure 7. Signal detection performance of Bob and Eve over AWGN channel.
Figure 7. Signal detection performance of Bob and Eve over AWGN channel.
Electronics 12 01075 g007
Figure 8. Signal detection performance of Bob and Eve over fading channel.
Figure 8. Signal detection performance of Bob and Eve over fading channel.
Electronics 12 01075 g008
Figure 9. BER performance of Bob and Eve over AWGN channel for D = 5 and N = 4 .
Figure 9. BER performance of Bob and Eve over AWGN channel for D = 5 and N = 4 .
Electronics 12 01075 g009
Figure 10. BER performance of Bob and Eve over fading channel for D = 5 and N = 4 .
Figure 10. BER performance of Bob and Eve over fading channel for D = 5 and N = 4 .
Electronics 12 01075 g010
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Li, L.; Lv, J.; Ma, X.; Han, Y.; Feng, J. Design of Low Probability Detection Signal with Application to Physical Layer Security. Electronics 2023, 12, 1075. https://doi.org/10.3390/electronics12051075

AMA Style

Li L, Lv J, Ma X, Han Y, Feng J. Design of Low Probability Detection Signal with Application to Physical Layer Security. Electronics. 2023; 12(5):1075. https://doi.org/10.3390/electronics12051075

Chicago/Turabian Style

Li, Lintao, Jiayi Lv, **n Ma, Yue Han, and Jiaqi Feng. 2023. "Design of Low Probability Detection Signal with Application to Physical Layer Security" Electronics 12, no. 5: 1075. https://doi.org/10.3390/electronics12051075

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop