• Chinese Optics Letters
  • Vol. 19, Issue 5, 050603 (2021)
Jie Zhong1, Ji Zhou2、*, Shecheng Gao2, and Weiping Liu2
Author Affiliations
  • 1School of Electronics and Information Technology, Sun Yat-sen University, Guangzhou 510006, China
  • 2Department of Electronic Engineering, College of Information Science and Technology, Jinan University, Guangzhou 510632, China
  • show less
    DOI: 10.3788/COL202119.050603 Cite this Article Set citation alerts
    Jie Zhong, Ji Zhou, Shecheng Gao, Weiping Liu. Secure orthogonal time-frequency multiplexing with two-dimensional encryption for optical-wireless communications[J]. Chinese Optics Letters, 2021, 19(5): 050603 Copy Citation Text show less

    Abstract

    This paper firstly, to the best of our knowledge, proposed two-dimensional (2D) encryption based on the Arnold transformation for implementing a secure DC-biased optical orthogonal time-frequency multiplexing (DCO-OTFM) in optical-wireless communications (OWCs). The encrypted data is transformed to the particular 2D matrix and decrypted by the only key to get the correct information. Meanwhile, the number of keys in 2D encryption is enormous, which prevents eavesdroppers from exhaustively searching secret keys rapidly to find the right decryption. Numerical results demonstrate that the secure DCO-OTFM based on 2D encryption can effectively prevent signal decryption from the eavesdropper, which has good secure performance for applying in OWC.

    1. Introduction

    As an emerging modulation technique, orthogonal time-frequency-space (OTFS) has been proposed to tackle the dynamics in multipath time-varying wireless channels[1]. Its main idea is to modulate the symbol onto two-dimensional (2D) orthogonal basis functions set in the delay-Doppler domain. Then, traditional modulations, such as orthogonal frequency division multiplexing (OFDM), deal with the signal in the time-frequency domain. This promising scheme, which simplifies detection and channel estimation in the high mobility scenarios, also improves bit error rate (BER) performance in systems through some static multipath channels, such as optical-wireless communications (OWCs). Recently, a series of researches have emerged to discuss performance improvement or new applicable scenarios with OTFS[24]. Schemes including novel channel estimation, equalization, and detection methods for OTFS were introduced[58]. An efficient method was proposed to reduce the peak-to-average power ratio (PAPR) in the OTFS network[9]. A robust beamforming was designed for the OTFS combined with a non-orthogonal multiple-access (NOMA) system[10]. A joint radar and communication system with OTFS was proposed[11]. Multiple-input multiple-output (MIMO) OTFS systems were investigated for underwater acoustic communication[12]. In our previous work, a 2D Hermitian symmetry was proposed for generating real-valued OTFS signals in OWC systems[13].

    Physical layer security techniques have been widely studied for optical OFDM systems. The data can be encrypted by a chaotic scrambling matrix based on a one-dimensional (1D) logistic map for OFDM[14]. 2D encryption was proposed for the OFDM signal to implement time-frequency domain encryption or dynamic secret key encryption[15,16]. The chaotic sequences of the key were used to encrypt time synchronization of the OFDM frame, perform subcarrier masking, and manage the fractional order of the fractional Fourier transform[17]. The encryption based on the Walsh–Hadamard transform not only enhanced the security of the OFDM signals but also reduced their PAPR[18]. The chaotic secret keys were used at discrete chaotic space or with a secure hash algorithm to encrypt the OFDM signals[19,20]. A chaotic method based on orthogonal matrix transform was designed to encrypt the pulse amplitude modulated symbols to generate real-valued OFDM signals[21]. Augmented communication was proposed for the OFDM system to realize both a high spectral efficiency and a security link[22]. The encryption algorithm scrambled both the quadrature amplitude modulation (QAM) constellations and subcarriers for the NOMA-OFDM systems[23]. The birefringent with Goos–Hanchen shifts was used to control space time holes for information cloaking[24].

    In this paper, we exploit the 2D characteristic of orthogonal time-frequency multiplexing (OTFM) signals, which can be directly encrypted by 2D encryption. We produce the real-valued OTFM signal with a 2D Hermitian symmetry, which makes sure the OTFM is suitable for the DC-biased OWC. Then, the 2D signal is encrypted with an Arnold transformation extended from the traditional transform[25]. Finally, a new secure DC-biased optical OTFM (DCO-OTFM) with 2D encryption is proposed. The legitimate user transforms the received signal to the particular 2D matrix and deciphers them with the correct key. The number of secret keys in the 2D encryption is enormous. Therefore, it is almost impossible for the eavesdropper to exhaustively search all keys to find out the right decryption. Simulation results are introduced to verify our design.

    Annotations: All through the paper, we use normal letters, lowercase boldface, and uppercase boldface to denote scalar, vector, and matrix, respectively. Conjugate, transpose, and conjugate transpose operations are indicated by the superscripts (·)*,(·)T, and (·)H. The matrix operators FM and FMH are set to denote the M-point discrete Fourier transform (DFT) and the inverse DFT (IDFT) operations, respectively.

    2. Secure DCO-OTFM System

    A DCO-OTFM system over the optical-wireless channel contains a single transmitter and receiver set as Alice and Bob, which is shown in Fig. 1, and the signals can be easily intercepted by the eavesdropper due to the openness of wireless communications. In order to provide good performance in the physical layer security, we propose the secure DCO-OTFM scheme with 2D encryption. An OTFM symbol consisting of MN samples is transmitted by M subcarriers, where Ts is the sampling interval, so each symbol duration is NTs. In Alice, the real-valued OTFM is generated with inverse symplectic finite Fourier transform (ISFFT), 2D Hermitian symmetry method, and Heisenberg transform. We cipher the OTFM with the 2D encryption based on Arnold transformation. The encrypted OTFM matrices convert to vector signals with the cycle prefix (CP) addition. After DC bias addition and zero clipping, the encrypted DCO-OTFM signals sE(t) are converted into optical signals and transmitted, in which the optical-wireless channel response h(τ) is defined in the following expression: h(τ)=p=0Phpδ(ττp),where hp denotes the channel coefficient, τp is the delay associated with the pth propagation path, and the channel contains P+1 propagation paths. The optical-wireless channel model should be suitable for multiple common OWC scenarios, in which both the line of sight and non-directed channels are considered. Thus, the ceiling-bounce (CB) model is exploited to study the multipath effect[26]. So, Eq. (1) in the CB model defines the impulse response as hcb(τ)=6a6(τ+a)7u(τ),where a=1211/13D, D denotes the root-mean-square (RMS) delay spread caused by multiple reflections, and the unit step function is set as u(τ). So, we represent the encrypted signal at the receiver as yE(t)=hcb(τ)*sE(t)+n(t).

    Block diagram of secure DCO-OTFM system for OWC. E/O, electro/optic; O/E, optic/electro.

    Figure 1.Block diagram of secure DCO-OTFM system for OWC. E/O, electro/optic; O/E, optic/electro.

    In Bob, the encrypted signals are transformed into the particular 2D matrix after frequency channel estimation. Then, the matrix can be deciphered with the only correct key and demodulated to get the correct information. Meanwhile, the data on the Eve side cannot be converted to the right matrix or decrypted with the right key. The details of our encryption scheme will be introduced in the following paragraphs.

    3. 2D Encryption for OTFM

    We introduce OTFM modulation in this part. As shown in the Alice part of Fig. 1, the information bits of OTFM are firstly transformed into QAM signals. Then, the signal vector will be reshaped as a 2D matrix before the ISFFT transform. We define each element in the original matrix as xo(k,l), where k[0,N1] and l[0,M/22] are integers based on the subcarriers and samples in an OTFM symbol. Thus, the element of the modulated matrix with ISFFT is represented as Xo(n,m)=2N(M2)k=0N1l=0M/22xo(k,l)ej2π(nkN2mlM2),where n[0,N1] and m[1,M/21] are integers. A 2D Hermitian symmetry is proposed for OTFM to guarantee that the time-domain information is real-valued before transmission, which is similar to the Hermitian symmetry for optical OFDM. The N×M matrix X is defined as {X(n,0)=X(n,M/2)=0,n[0,N1],X(n,m)=Xo(n,m),n[0,N1],m[1,M22],X(n,m)=Xo*(n,Mm),n[0,N1],m[M+22,M1].

    The matrix X is modulated to the OTFM matrix after the Heisenberg transform, which is implemented by the M-point IDFT operation[12] and denoted as X¯=MFMHXT.

    Each element in this time-domain matrix X¯ is expressed as x¯(m,n)=1Mm=0M1XT(n,m)ej2πmlM=2Mm=1M/21[a(m,n),b(m,n)][cosφsinφ],where X(n,m)=a(n,m)+jb(n,m), φ=2πml/M; thus, the M×N matrix X¯ is a real-valued matrix. The matrix can be ciphered with 2D encryption presented in the next part.

    Conventional Arnold transformation is usually applied for the scrambling transform of the 2D M×M image matrix. All image pixels keep their gray values and change their coordinates in each Arnold transformation with the regulation in the following equation: [mn]=[1ab1+ab][mn]mod(M),where a and b should be positive integers, and (m,n),(m,n) represent the original and new coordinate values, respectively. The periodicity of Arnold transformation was proved existent, which means that the encryption and decryption can be executed in one expression. The periodicity varies with the change of parameters a,b,M; thus, we can set different secret keys with proper security parameters.

    The periodicity of Arnold transformation has been proved to exist in 2D encryption for the non-equilateral matrix[27]. The coordinate scrambling expression is shown as [mn]=[1abq1+abq][mn]mod[MN],where the parameter q is defined as q=Ngcd(M,N).

    The operator gcd(A,B) presents the greatest common divisor of A and B, and other parameters have the same definition as in Eq. (8). Once we set a,b,M,N, we can get the Arnold transformation periodicity TAr. After we choose a proper parameter TE, which defines the number of transformations operated in encryption and is less than TAr, the secret key SE=(a,b,q,TE) is set. With SE, we encrypt the OTFM matrix X¯ by operating TE times in Eq. (9) to get the ciphered 2D signal X¯E.

    Before we convert the 2D matrix to 1D data, we employ the biasing and clipping procedure to generate unipolar signals. A proper DC bias should be added to the bipolar signal to ensure all elements in X¯E are positive. With parallel to serial (P/S) conversion, each matrix X¯E transforms into the encrypted vector X¯E. Then, the symbol vector is added with a CP of length L. The OTFM frame SE formed by K vectors turns to the baseband signal SE with P/S conversion, which is transmitted after electro-optic conversion. We introduce the process of the decryption scheme in the subsequent section.

    4. 2D Decryption for OTFM

    On the legal receiver of the OTFM system, yE turns into 1D encrypted signals after the DC average component removal and serial to parallel conversion. The lower part of Fig. 1 briefly depicts the channel estimation diagram, where frequency domain equalization with CP removal is employed to eliminate the inter-symbol interference (ISI). The first I symbols in yE are set as the training symbols. In consideration of the reduction in the training symbols' overhead, we apply the method of intra-symbol frequency-domain averaging (ISFA) to acquire the reckoned channel response H^ISFA[28]. With yE and H^ISFA, the time-domain vector X^E is obtained, which is then transformed into 2D matrix X^E. The M×N dimension of X^E should be the same as that of X¯E, which ensures that the data can be decrypted correctly.

    In Bob, we set the decryption key SD=(a,b,q,TD), where TD is defined as TD=TArTE,and other parameters stay the same as those in SE. The key SD indicates that we execute TD times scrambling in Eq. (9) for each X^E to get the deciphered matrix X^D.

    Next, we demodulate X^D, and the operation is similar to that in our previous work[13]. We first apply the inverse of the Heisenberg transform and the Wigner transform on X^D. Thus, the frequency domain signal is achieved by X˜=1MFMX^D,where X˜ is the Hermitian symmetry because of the definition in Eq. (5). Then, we use the effective data in X˜ to form matrix X˜o, and the element of X˜o is defined as X˜o(u,v)=X˜T(n,m),n[0,N1],m[1,M/21],where u[0,N1] and v[0,M/22]. X˜o turns into the QAM signals with symplectic finite Fourier transform (SFFT), where we obtain the constellation value by x˜o(k,l)=u=0N1v=0M/22X˜o(u,v)ej2π(ukN2vlM2),where k[0,N1] and l[0,M/21]. The decrypted bits are achieved after constellation demapping.

    5. Simulation Setup and Results

    In the following part, the simulation setup and the superiority of the 2D secret key are introduced. Then, we display the performance of secure DCO-OTFM with different decryption keys for two QAM modes. One OTFM symbol consists of 4096 samples in all of the simulations. CP is set as L=16 to counteract ISI, which is 1/256 of the length of each symbol period. Each DCO-OTFM frame contains K=128 symbols, where the first I=4 symbols are used for training symbols, and the information payload is transmitted in the remaining 124 symbols.

    We analyze the relationship between the periodicity value TAr of Arnold transformation and parameters M,N at first. According to the principle of Arnold transformation, when M,N are fixed, no matter how we set a,b, the range of TAr is confirmed. Table 1 shows all values of TAr when we set N=16, M=256, or M=512, which means both q=1. We find that TAr has 16 choices when M=256 and 18 choices when M=512. If the eavesdropper intends to find out the right secret key, he first needs to get the correct parameters M,N of the 2D OTFM signals to derive the right TAr. However, the OTFM signals can be modulated in the arbitrary 2D matrix theoretically and optical signals are transmitted in the 1D mode through the OWC channel. The optional number of the 2D matrix pattern is large in practical modulation. It is difficult for the eavesdropper to find out the correct TAr by exhaustively searching all possible M,N. Thus, he cannot get the only decryption key of 2D encryption rapidly. So, the 2D encryption enhances the physical layer security of the OTFM.

     Periodicity Value
    M = 256256192128966448
    322416128
    64321
    M = 51251238425619212896
    644832241612
    864321

    Table 1. All Possible Periodicity Values TAr for Different M, with N = 16, q = 1 and a, b as the Arbitrary Integers

    Next, we further discuss the relationship between TAr and parameters a,b. In Table 2, we set M=256, N=16, and a=1, and demonstrate partial values of TAr by different b. For example, nine different b can get the periodicity TAr=192, which means that even if the eavesdropper gets the right TAr or M,N, he cannot find the right key at once and decrypt the data correctly. In fact, for each specific TAr, the number of related a and b couples can be up to the 105 level. We sum up the analysis from Tables 1 and 2 and conclude that the size of the key space for SE depending on different a,b,M,N is at least in the 1012 level. It would be tough work for the eavesdropper to find the only right SE from the tremendous secret key pool in a short time.

    b12345
    TAr19212819225696
    b678910
    TAr6496256192128
    b4142434445
    TAr19212819225648
    b4647484950
    TAr3248256192128
    b297298299300301
    TAr19212819225648
    b302303304305306
    TAr3248256192128

    Table 2. Values of TAr Depend on Different b, with M = 256, N = 16, q = 1, and a = 1

    We then show the BER performance of secure OTFM schemes. In simulations, each OTFM symbol is transmitted in N=16 sampling time interval durations by M=256 subcarriers. The signals’ transmission rate is set to 100 Mbit/s, the DC bias is set to 7 dB, and RMS delay spread is set to 10 ns in the CB channel. Figure 2 illustrates the performance of BER for three decryption modes in different QAM modes. The BER performance of unencrypted DCO-OTFM signals is set as the benchmark, and the required SNR should reach or be lower than threshold of BER 1×103.

    Performance of BER versus SNR for deciphered signals with different keys through CB channel; w/o, without. (a) BER and decoded constellations for 4QAM signals. (b) BER and decoded constellations for 16QAM signals.

    Figure 2.Performance of BER versus SNR for deciphered signals with different keys through CB channel; w/o, without. (a) BER and decoded constellations for 4QAM signals. (b) BER and decoded constellations for 16QAM signals.

    In Fig. 2(a), we illustrate the performance contrast between Bob and the eavesdropper with 4QAM signals. When the transmission SNR32dB, Bob succeeds in signal decryption and achieves the communication requirement. The performance of a secure DCO-OTFM scheme has a little loss compared with the unencrypted system. An OTFM symbol is transmitted through N time slot, which is different from an OFDM symbol transmitted in one time slot. The elements in one row of the OTFM matrix are processed together in the 2D demodulation. These elements are in the same time slot for unencrypted OTFM. However, each row of the encrypted OTFM matrix contains multi-time slot elements after 2D decryption. The correlations of noise among different time slots are usually weaker than that of one time slot in common sense. This leads to more deviations between each row of the received decrypted data and original data than those of unencrypted data. The loss caused by 2D decryption will further make more errors with the encrypted data in the demodulation, which brings out BER loss after demapping. We do not need to raise any SNR to reach the transmission threshold. On the other hand, the eavesdropper demodulates the signals directly or deciphers them with a wrong decryption key. He cannot get the correct data with any SNR. The constellation coordinates on the right side of the figure also compare the effect of the secret key. In Fig. 2(b), we find that for the 16QAM encrypted signal, the SNR of secure OTFM communication needs to raise about 8 dB to reach the same performance of unencrypted signals, which is the reason for the loss being the same as that for 4QAM signals. The secure DCO-OTFM scheme brings out partial performance loss for high-order modulation signals. Both subfigures demonstrate good secure performance in our proposed system with 2D encryption.

    6. Conclusion

    In this paper, a secure DCO-OTFM in OWC was firstly implemented with 2D encryption. A 2D Hermitian symmetry is utilized in the modulation to generate the real-valued OTFM matrix, and then the signals were encrypted with a 2D Arnold transformation. In the signal recovery of the legal user, we applied the proper equalization method, transformed the signals to the particular 2D matrices, and deciphered them with the right key. As a result, the data could be demodulated correctly. The number of keys in 2D encryption is enormous, which was analyzed to verify the superiority of 2D encryption. Consequently, it is nearly impossible for the eavesdropper to get the right cipher key. Numerical results showed that our proposed schemes can prevent signal decryption from the eavesdropper. All of the results revealed that our secure DCO-OTFM based on 2D encryption has good secure performance for applying in OWC.

    References

    [1] R. Hadani, S. Rakib, M. Tsatsanis, A. Monk, A. J. Goldsmith, A. F. Molisch, R. Calderbank. Orthogonal time frequency space modulation. 2017 IEEE Wireless Communications and Networking Conference (WCNC), 1(2017).

    [2] A. Farhang, A. RezazadehReyhani, L. E. Doyle, B. Farhang-Boroujeny. Low complexity modem structure for OFDM-based orthogonal time frequency space modulation. IEEE Wireless Commun. Lett., 7, 344(2018).

    [3] P. Raviteja, E. Viterbo, Y. Hong. OTFS performance on static multipath channels. IEEE Wireless Commun. Lett., 8, 745(2019).

    [4] S. Tiwari, S. S. Das. Circularly pulse-shaped orthogonal time frequency space modulation. Electron. Lett., 56, 157(2020).

    [5] W. Yuan, Z. Wei, J. Yuan, D. W. K. Ng. A simple variational Bayes detector for orthogonal time frequency space (OTFS) modulation. IEEE Trans. Veh. Technol., 69, 7976(2020).

    [6] X. Wu, S. Ma, X. Yang. Tensor-based low-complexity channel estimation for mm wave massive MIMO-OTFS systems. J. Commun. Inf. Netw., 5, 324(2020).

    [7] G. D. Surabhi, A. Chockalingam. Low-complexity linear equalization for OTFS modulation. IEEE Commun. Lett., 24, 330(2020).

    [8] Y. Liu, S. Zhang, F. Gao, J. Ma, X. Wang. Uplink-aided high mobility downlink channel estimation over massive MIMO-OTFS system. IEEE J. Sel. Areas Commun., 38, 1994(2020).

    [9] S. Gao, J. Zheng. Peak-to-average power ratio reduction in pilot-embedded OTFS modulation through iterative clipping and filtering. IEEE Commun. Lett., 24, 2055(2020).

    [10] Z. Ding. Robust beamforming design for OTFS-NOMA. IEEE OJ-COMS, 1, 33(2020).

    [11] L. Gaudio, M. Kobayashi, G. Caire, G. Colavolpe. On the effectiveness of OTFS for joint radar parameter estimation and communication. IEEE Trans. Wireless Commun., 19, 5951(2020).

    [12] M. J. Bocus, A. Doufexi, D. Agrafiotis. Performance of OFDM-based massive MIMO OTFS systems for underwater acoustic communication. IET Commun., 14, 588(2020).

    [13] J. Zhong, J. Zhou, W. Liu, J. Qin. Orthogonal time-frequency multiplexing with 2D Hermitian symmetry for optical-wireless communications. IEEE Photon. J., 12, 7901110(2020).

    [14] L. Zhang, X. Xin, B. Liu, Y. Wang. Secure OFDM-PON based on chaos scrambling. IEEE Photon. Technol. Lett., 23, 998(2011).

    [15] L. Zhang, X. Xin, B. Liu, X. Yin. Physical secure enhancement in optical OFDMA-PON based on two-dimensional scrambling. Opt. Express, 20, B32(2012).

    [16] T. Wu, C. Zhang, H. Wei, K. Qiu. PAPR and security in OFDM-PON via optimum block dividing with dynamic key and 2D-LASM. Opt. Express, 27, 27946(2019).

    [17] L. Deng, M. Cheng, X. Wang, H. Li, M. Tang, S. Fu, P. Shum, D. Liu. Secure OFDM-PON system based on chaos and fractional Fourier transform techniques. J. Lightwave Technol., 32, 2629(2014).

    [18] A. A. E. Hajomer, X. Yang, W. Hu. Chaotic Walsh–Hadamard transform for physical layer security in OFDM-PON. IEEE Photon. Technol. Lett., 29, 527(2017).

    [19] B. Liu, L. Zhang, X. Xin, N. Liu. Piecewise chaotic permutation method for physical layer security in OFDM-PON. IEEE Photon. Technol. Lett., 28, 2359(2016).

    [20] H. S. Gill, S. S. Gill, K. S. Bhatia. A novel chaos-based encryption approach for future-generation passive optical networks using SHA-2. J. Opt. Commun. Netw., 9, 1184(2017).

    [21] Z. Hu, C. Chan. A real-valued chaotic orthogonal matrix transform-based encryption for OFDM-PON. IEEE Photon. Technol. Lett., 30, 1455(2018).

    [22] M. H. Khadr, H. Elgala. Augmented communications: spectral efficiency and security enhanced visible light communications by design. Chin. Opt. Lett., 18, 090601(2020).

    [23] Y. Yang, C. Chen, W. Zhang, X. Deng, P. Du, H. Yang, W. Zhong, L. Chen. Secure and private NOMA VLC using OFDM with two-level chaotic encryption. Opt. Express, 26, 34031(2018).

    [24] H. Khan, M. Haneef, . Space–time cloaks through birefringent Goos–Hänchen shifts. Chin. Opt. Lett., 17, 032701(2019).

    [25] Z. Shang, H. Ren, J. Zhang. A block location scrambling algorithm of digital image based on Arnold transformation. Proceedings of the 9th International Conference for Young Computer Scientists, 2942(2008).

    [26] J. B. Carruthers, J. M. Kahn. Modeling of nondirected wireless infrared channels. IEEE Trans. Commun., 45, 1260(1997).

    [27] L. Shao, Z. Qin, B. Liu, H. Gao, J. Qin. 2D bi-scale rectangular mapping and its application in image scrambling. J. Comput.-Aided Des. Comput. Graphics, 21, 1025(2009).

    [28] X. Liu, F. Buchali. Intra-symbol frequency-domain averaging based channel estimation for coherent optical OFDM. Opt. Express, 16, 21944(2008).

    Jie Zhong, Ji Zhou, Shecheng Gao, Weiping Liu. Secure orthogonal time-frequency multiplexing with two-dimensional encryption for optical-wireless communications[J]. Chinese Optics Letters, 2021, 19(5): 050603
    Download Citation