CHANNEL-DEPENDENT MC-CDMA UTILIZING ADAPTIVE SPREADING CODES AIDED PHYSICAL LAYER SECURITY
20230403094 · 2023-12-14
Inventors
Cpc classification
International classification
H04B1/692
ELECTRICITY
Abstract
Disclosed is a channel-dependent multi-carrier code division multiple access (MC-CDMA) technique with adaptive spreading codes. Adaptive spreading codes are used for each subcarrier per user which increase the security level of conventional MC-CDMA. Two different map designs are proposed: fixed and adaptive interval maps. These maps are shared among all nodes and gives information about the spreading code sequences for corresponding channel gains.
Claims
1. An operation method of Channel-Dependent MC-CDMA with Adaptive Spreading Codes Aided Physical Layer Security, comprising the steps of; Adaptive interval map design process; Starting from first window, distinguish the legitimate receivers (UEs)' channel gains with K different quantization levels, Defining of the UEs' channel gains in the window as H={H.sub.UE.sub.
H.sub.UE.sub.
2. The method according to claim 1, wherein said signal process for decoding comprises legitimate user decoding or illegitimate user decoding.
3. The method according to claim 1, wherein said legitimate user decoding in signal process comprising the steps of; Spreading of each user data per subcarrier by code chosen from the shared map based on its channel gain at that subcarrier index which is explained mathematically as follows: Defining the n-th symbol of the k-th UE, S.sub.k.sup.n, is spread across N subcarriers by the selected spreading code c.sub.i,
x.sub.k.sup.n=[x.sub.k,1.sup.n, . . . ,x.sub.k,N.sup.n]=S.sub.k.sup.nc.sub.i=[S.sub.k.sup.nc.sub.i,1, . . . ,S.sub.k.sup.nc.sub.i,N].sup.T Creating orthogonal frequency division multiplexing (OFDM) block signal for all users which contains N×1 main OFDM block defined as
x=[x.sub.1, . . . ,x.sub.N].sup.T=[x.sub.1.sup.(1), . . . ,x.sub.N.sup.(1), . . . ,x.sub.1.sup.(N), . . . ,x.sub.N.sup.(N)].sup.T After the inverse fast Fourier transform (IFFT) process and cyclic prefix (CP), representing of the broadcasted signal time-domain as;
Description
DEFINITION OF THE FIGURES OF THE INVENTION
[0023] The figures have been used in order to further disclose the Channel-Dependent MC-CDMA with Adaptive Spreading Codes Aided Physical Layer Security developed by the present invention which the figures have been described below:
[0024]
[0025] In
[0029]
[0030] In this figure (
[0036]
[0037]
[0038]
DETAILED DESCRIPTION OF THE INVENTION
[0039] The novelty of the invention has been described with examples that shall not limit the scope of the invention and which have been intended to only clarify the subject matter of the invention. The present invention has been described in detail below.
[0040] The invention is providing adaptive spreading codes for each subcarrier per user which increase the security level of conventional MC-CDMA. The picked spreading code sequence is based on the user's channel gain.
[0041] The considered scenario in this invention contains a transmitter communicates securely with K legitimate users (UEs) in the presence of a passive eavesdropper (Eve) as shown in
[0042] In this invention, the transmitter has the ability to estimate the channels with all UEs using the reference signals. Following the channel reciprocity property in TDD mode, the downlink channel is the same as uplink [8] so that there is no need to share the channel between the transmitter and any UE. The proposed method in this invention used MC-CDMA as a multiple access scheme.
[0043] A. Algorithms for Quantization Level Design:
[0044] The proposed method ensures security by designing a legitimate user channel-dependent map which includes quantization levels and the corresponding spreading code sequences. The map design is done at the transmitter side after the channel estimation stage. First, the transmitter looks to the channel frequency response (CFR) of all UEs. Then a window with specific length on CFR is defined. The window length is assumed to be one (for the sake of illustration) means in each window only one subcarrier exists. A quantization levels are designed to map the users' channel gains with the corresponding spreading codes. Based on the step size between two consecutive quantization levels, fixed and adaptive quantization levels are illustrated. Based on the quantization level index, the spreading code sequence is picked from pre-defined codebook in a scheduled manner.
[0045] 1) Fixed Interval Quantization Level
[0046] Fixed interval quantization level implies that the step size between any two consecutive levels are constant and the probability to have two or more users per window at same quantization level is high. To cope with this issue, the proposed method uses four techniques: [0047] Only strong subcarriers per user are used for data transmission, i.e. deep fade subcarriers are removed, which reduces the channel gains range and leads to shorter spreading code length. [0048] A minimum difference threshold (MDT) is pre-defined to keep in each window only the users with the difference between their channel gains is satisfied MDT and others are removed (e.g. if three UEs are active in the system and the difference between channel gains of two UEs is less than pre-defined MDT, both UEs are not allowed to be active in this window to avoid collision between these two UE's data while the third UE uses this window alone). [0049] For the sake of accurate detection, an extra map, i.e. scheduled map, needs to be publicly shared. In this scheduled map, each user learns how many users multiplexed per window.
[0050] An operation method of map design with fixed interval; [0051] 1. A window size (WS) is defined which shows total number of considered subcarriers in every window. [0052] 2. A threshold (Thr) is defined as a criteria to select strong subcarriers. This threshold can be the average of whole channel gains. If the considered subcarrier's channel gain is above Thr, it is considered as strong subcarrier. [0053] 3. Total number of subcarriers and window index are defined by Num-Sub and Idx, respectively. [0054] 4. Choosing the strong subcarriers, i.e. higher than a threshold, for each UE, [0055] 5. Initiate the Idx value with 1, [0056] 6. Checking the difference between all consecutive UEs' channel gains per each window, [0057] 7. If the difference between them is less than MDT, both related channel gains are removed, [0058] 8. Else, move to next step [0059] 9. Check if Idx is reach to the total number of windows which is defined as (Num_Sub/WS), if Yes, go to the next step. If No, increase Idx by 1 and go back to step 6. [0060] 10. Defining the maximum and minimum channel gains among all UEs' channel gains, denoted by Max and MM, respectively, [0061] 11. Defining the fixed interval (FI) quantization level as
[0067]
[0068] Issues related to fixed interval Quantization levels; [0069] 1. Requires an extra shared map (i.e. scheduled map) which can reduce the security level where Eve can try whole codes from the shared map to decode that specific symbol in case only one user using that window. [0070] 2. Losing spectral efficiency: [0071] Using only strong subcarriers for data transmission. [0072] Satisfying the MDT to have only one UE in each level per window. [0073] 3. Highly sensitive to imperfect channel estimation which degrades the UE performance [0074] 4. MDT selection is a critical issue, e.g. if MDT is very small to save more users per window, higher number of quantization levels and longer codes' length is required.
[0075] 2) Adaptive Interval Quantization Level
[0076] Adaptive interval quantization levels are proposed to solve all the aforementioned problems in fixed interval quantization levels. In this design, all multiplexed users use all the subcarriers for data transmission means no losses in spectral efficiency and no need for extra shared map (i.e. scheduled map) which improves the security level compared with fixed interval quantization levels.
[0077] Operation method of an adaptive interval map design; [0078] 1. A window size (WS) is defined which shows total number of considered subcarriers in every window. [0079] 2. Total number of subcarriers and window index are defined by Num-Sub and Idx, respectively. [0080] 3. Number of multiplexed users is defined as K. [0081] 4. Starting from first window (Idx=1), distinguish the UEs' channel gains with K different quantization levels, [0082] Define the UEs' channel gains in the window as H={H.sub.UE.sub.
[0090]
[0091]
[0092] Regarding to the mentioned drawbacks of fixed interval map, adaptive interval map is used in the following sections.
[0093] The shared map among all nodes is as follows;
[0094] Where each quantization level (QL) is mapped to a corresponding spreading code (c)
[0095] B. Signal Processing Analysis:
[0096] 1) Transmitter
[0097] After designing the map design with I-quantization levels and I corresponding spreading code sequence, each UE's symbol, S.sub.k.sup.n, spreads over all N subcarriers using the selected spread code sequence c.sub.i∈.sup.M×1, i∈{1, . . . , I} from a predefined set
={c.sub.1, c.sub.2, . . . , c.sub.I}. To enable low complexity detection at the receiver, the spreading codes in
should be mutually orthogonal, which limits the maximum size of
to be N. Then the n-th symbol of the k-th UE, S.sub.k.sup.n, is spread across N subcarriers by the selected spreading code c.sub.i, yielding
x.sub.k.sup.n=[x.sub.k,1.sup.n, . . . ,x.sub.k,N.sup.n]=S.sub.k.sup.nc.sub.i=[S.sub.k.sup.nc.sub.i,1, . . . ,S.sub.k.sup.nc.sub.i,N].sup.T (2)
[0098] where c.sub.i,n, n∈{1, . . . , N} is the n-th element of c.sub.i. After obtaining x.sub.k.sup.n for all K UEs, the users are multiplexed in such a way that x.sup.n=Σ.sub.k=1.sup.Kx.sub.k.sup.n. Then, the OFDM block creator concatenates them yielding N×1 main OFDM block as follows:
x=[x.sub.1, . . . ,x.sub.N].sup.T=[x.sub.1.sup.(1), . . . ,x.sub.N.sup.(1), . . . ,x.sub.1.sup.(N), . . . ,x.sub.N.sup.(N)].sup.T (3)
[0099] Afterwards, the remaining procedures are the same as those of classical OFDM. First, x is processed by the inverse fast Fourier transform (IFFT), yielding the time domain OFDM block
[0100] Where W.sub.N is the N×N DFT matrix with W.sub.N.sup.HW.sub.N=NI.sub.N. A length-L cyclic prefix (CP) is added to the beginning of x.sub.Time. After the parallel to serial ad digital to analog conversions, the data transmitted over the frequency selective Rayleigh fading channel, whose impulse response is given by h.sub.T=[h.sub.T,1, . . . , h.sub.T,v].sup.T, where v is the number of channel taps and each entry of h.sub.T is a circularly symmetric complex Gaussian random variable. Note that L is chosen to be larger than v to combat the inter-symbol interference.
[0101] 2) Receiver
[0102] The broadcasted signal is represented in time-domain as x.sub.Time. The received signal can be presented as follows.
r=XH+w (5)
[0103] Where X=diag(x), H is the N×1 frequency domain channel vector, and w∈.sup.N×1 is the noise vector in the frequency domain. After removing CP and applying serial-to-parallel (S/P) conversion on the time-domain received signal, FFT is applied on the resulting signal and zero-forcing channel equalization process is done to remove the effect of the channel. In practical systems, the channel vector H is estimated at the receiver as:
Ĥ=H+H.sub.e (6)
[0104] where H.sub.e∈.sup.N×1 represents the vector of channel estimation errors with the distribution
(0, σ.sub.e.sup.2I.sub.N) and it is independent of H.
[0105] Since the shared map and the transmitted signal are broadcasted any user can decode the data following the instructions,
[0106] To decode the n-th symbol: [0107] Check the channel gain at n-th subcarrier, [0108] Check the corresponding quantization level based on channel gain ranges. [0109] Select the corresponding spreading code based on the shared map. [0110] Divide the n-th transmitted OFDM symbol by the selected spreading code, [0111] Sum the outputs of division [0112] If the sum is positive, the transmitted symbol is 1, otherwise, its 0, BPSK modulation is assumed to be used.
[0113] Since, the transmitter did not take Eve' channel gain in the shared map design consideration, Eve cannot decode any of the symbols and cannot understand any message.
[0114] Depending on the all information above, the operation method of channel-dependent MC-CDMA with adaptive spreading codes aided physical layer security, comprising the steps of; [0115] Adaptive interval map design process; [0116] 1. Starting from first window, distinguish the UEs' channel gains with K different quantization levels, [0117] Defining of the UEs' channel gains in the window as H={H.sub.UE.sub.
[0126] According the method 1, wherein said signal process for decoding comprises legitimate user decoding or illegitimate user decoding.
[0127] Legitimate user decoding in signal process steps are explained below.
[0128] Data decoding process at receiver side comprising the steps of; [0129] each user data per subcarrier spreads by code chosen from the shared map based on its channel gain at that subcarrier index which is explained mathematically as follows: [0130] Defining the n-th symbol of the k-th UE, S.sub.k.sup.n, is spread across N subcarriers by the selected spreading code c.sub.i,
x.sub.k.sup.n=[x.sub.k,1.sup.n, . . . ,x.sub.k,N.sup.n]=S.sub.k.sup.nc.sub.i=[S.sub.k.sup.nc.sub.i,1, . . . ,S.sub.k.sup.nc.sub.i,N].sup.T (1) [0131] Creating orthogonal frequency division multiplexing (OFDM) block signal for all users which contains N×1 main OFDM block defined as
x=[x.sub.1, . . . ,x.sub.N].sup.T=[x.sub.1.sup.(1), . . . ,x.sub.N.sup.(1), . . . ,x.sub.1.sup.(N), . . . ,x.sub.N.sup.(N)].sup.T (2) [0132] After the inversing of fast Fourier transform (IFFT) process and cyclic prefix (CP), representing of the broadcasted signal time-domain as x,
r=XH+w (4) [0135] After removing CP and applying serial-to-parallel (S/P) conversion on the time-domain received signal, r, applying of fast Fourier transform (FFT) on the result signal, [0136] Processing of zero-forcing channel equalization to remove the effect of the channel, [0137] Since the shared map and the transmitted signal are broadcasted, any user can decode the data following the instructions, To decode the n-th symbol: [0138] Checking of the channel gain at n-th subcarrier, [0139] Checking of the corresponding quantization level based on channel gain ranges. [0140] Selection of the corresponding spreading code based on the shared map. [0141] Dividing of the n-th transmitted OFDM symbol by the selected spreading code, [0142] Summation the outputs of division [0143] If the summation is positive, the transmitted symbol is 1, otherwise, its 0,
REFERENCES
[0144] [1] Yoshimura, S., & Higuchi, K. (2011, May). Channel-dependent adaptive spreading code selection in downlink MC-CDMA. In 2011 IEEE 73rd Vehicular Technology Conference (VTC Spring) (pp. 1-5). IEEE. [0145] [2] Hamamreh, J. M., Basar, E., & Arslan, H. (2017). OFDM-subcarrier index selection for enhancing security and reliability of 5G URLLC services. IEEE Access, 5, 25863-25875. [0146] [3] Boyd, S. W., & Pursley, M. B. (2013). Adaptive direct-sequence spread-spectrum for packet radio networks. IEEE Transactions on Aerospace and Electronic Systems, 49(4), 2554-2569. [0147] [4] Hermanns, F. (2004). Cryptographic CDMA code hopping (CH-CDMA) for signal security and anti-jamming EMPS 2004. [0148] [5] Wang, Q. (2017, May). Using secret spreading codes to enhance physical layer security in wireless communication. In 2017 IEEE international conference on communications workshops (ICC workshops) (pp. 447-450). IEEE. [0149] [6] Kang, T., Li, X., Yu, C., & Kim, J. (2013). A survey of security mechanisms with direct sequence spread spectrum signals. Journal of Computing Science and Engineering, 7(3), 187-197. [0150] [7] X. Zhou, L. Song, and Y. Zhang, Physical Layer Security in Wireless Communications. CRC Press, 2016. [0151] [8] A. Goldsmith, Wireless Communications. Cambridge University Press, 2005. [0152] [9] Ipatov, Valeri P. Spread spectrum and CDMA: principles and applications. John Wiley & Sons, 2005.