مخابرات پنهان ترکیبی با استفاده از روش طیف گسترده و اختلال کمک کننده
محورهای موضوعی : مهندسی برق و کامپیوترمرتضی شفیعی نیستانک 1 * , ایمان کاظمی 2
1 - دانشکده مهندسی برق و کامپیوتر، دانشگاه صنعتی مالک اشتر
2 - دانشکده مهندسی برق و کامپیوتر، دانشگاه صنعتی مالک اشتر
کلید واژه: مخابرات پنهان, طیف گسترده, دنباله مستقیم (DS), نویز مصنوعی, اختلال (جمینگ),
چکیده مقاله :
مخابره پنهان با هدف برقراری ارتباط LPD به سرعت در مخابرات تجاری و نظامی در حال توسعه می باشد. یکی از روشهای رایج برای این منظور استفاده از نویز مصنوعی است. اما ایجاد نویز مصنوعی در طیف فرکانسی یا بازه زمانی وسیع، چالشی مهم خواهد بود. همچنین برقراری همزمانی دقیق نویز مصنوعی به گونه ای که نویز محیط را شبیه سازی کند، بسیار دشوار می باشد. در این مقاله با استفاده از طیف گسترده به همراه نویز مصنوعی، روشی ترکیبی برای برقراری مخابره پنهان با رفع مشکلات فوق پیشنهاد داده ایم. گسترش طیف سیگنال ارسالی، ایجاد نویز مصنوعی با سطح توان و هزینه پایین و دائمی را امکانپذیر کرده و نیازی به برقراری همزمانی نیز نخواهد بود. نتایج نشان می دهد در شرایط JSR = -5 dB، استفاده از نویز مصنوعی باند جزئی، حاشیه اطمینان 1/8 dB و کیفیت قابل قبول مخابره را نتیجه خواهد داد. بررسی برای سایر انواع اختلال نشان میدهد غیر از اختلال چندتون امکان استفاده از انواع نویز مصنوعی برای روش پیشنهادی وجود دارد. به عنوان مثال اختلال تک تون نیز با ایجاد 2/6 dB حاشیه اطمینان، مخابره قابل قبول را ایجاد خواهد کرد.
Covert Communication technique is developed for LPD communication in military and civil applications. Artificial Noise (AN) is the method to confuse eavesdropper and assure data transmission. But, generating AN in wide range of frequencies and times is very challenging. Furthermore, it reveals the transmitter or challenges it for synchronization to confuse eavesdropper about environmental noise. This paper proposes a method based on Spread Spectrum as well as self-jamming as AN to solve the problems. By spreading the spectrum, we can generate AN in wide range of frequencies and times, at low power and cost-effective manner. Consequently, there is no need to synchronization. Simulation and numerical results indicate, partial band jammer, effectively confuse the eavesdropper by 1.8 dB margin at JSR = -5 dB. In the situations, transmitter and receiver may communicate at BER = 10^-3 for Eb/N > 8.3 dB. The paper simulates the proposed method for various types of jamming and reports the results where, multitone jamming is rejected for this application as artificial noise. Single-tone jammer also can confuse the eavesdropper by 2.6 dB margin at JSR = -5 dB and TRX communications quality equal to BER = 10-3 for Eb/N > 10.9 dB
[1]. Vaudenay, Serge. A classical introduction to cryptography: Applications for communications security. Springer Science & Business Media, 2005.
[2]. Shih, Frank Y. Digital watermarking and steganography: fundamentals and techniques. CRC press, 2017.
[3]. Peterson, Roger L., David E. Borth, and Roger E. Ziemer. An introduction to spread-spectrum communications. Prentice-Hall, Inc., 1995.
[4]. M. K. Simon, Jim K. Omura, Robert A. Scholtz, and Barry K. Levitt, Spread Spectrum Communications Handbook, McGraw-Hill, 1994.
[5]. Biswas, Ardhendu Shekhar, et al. "Orthogonal Coded Spread Spectrum Digital Beamforming-Based 5G Receiver." Arabian Journal for Science and Engineering (2022): 1-13.
[6]. Jung, Hyoyoung, et al. "Design of anti-jamming waveforms for time-hopping spread spectrum systems in tone jamming environments." IEEE Transactions on Vehicular Technology 69.1 (2019): 728-737.
[7]. Baek, Chang-Uk, Ji-Won Jung, and Dae-Won Do. "Study on the structure of an efficient receiver for covert underwater communication using direct sequence spread spectrum." Applied Sciences 8.1 (2018): 58.
[8]. He, Wenhui, et al. "Optimal Transmission Probabilities of Information and Artificial Noise in Covert Communications." IEEE Communications Letters 26.12 (2022): 2865-2869.
[9]. Simmons, Gustavus J. "The prisoners’ problem and the subliminal channel." Advances in Cryptology. Springer, Boston, MA, 1984.
[10]. Mazurczyk, Wojciech, and Luca Caviglione. "Steganography in modern smartphones and mitigation techniques." IEEE Communications Surveys & Tutorials 17.1 (2014): 334-357.
[11]. Lee, Seonwoo, et al. "Achieving undetectable communication." IEEE Journal of Selected Topics in Signal Processing 9.7 (2015): 1195-1205.
[12]. Safier, Pedro N., Ira S. Moskowitz, and Paul Cotae. "On the baseband communication performance of physical layer steganography." 2011 45th Annual Conference on Information Sciences and Systems. IEEE, 2011.
[13]. B. Bash, D. Goeckel, and D. Towsley, “Limits of reliable communication with low probability of detection on AWGN channels,” IEEE J. Sel. Areas Commun., vol. 31, no. 9, pp. 1921–1930, Sep. 2013.
[14]. He, Biao, et al. "On covert communication with noise uncertainty." IEEE Communications Letters 21.4 (2017): 941-944.
[15] Ta, Hien Q., and Sang Wu Kim. "Covert communication under channel uncertainty and noise uncertainty." ICC 2019-2019 IEEE International Conference on Communications (ICC). IEEE, 2019.
[16]. Sodagari, Shabnam. "Covert Communications Against an Adversary with Low-SNR Sensing Capability in Nakagami Fading." IEEE Sensors Letters 4.5 (2020): 1-4.
[17]. Li, Ke, Patrick A. Kelly, and Dennis Goeckel. "Optimal power adaptation in covert communication with an uninformed jammer." IEEE Transactions on Wireless Communications 19.5 (2020): 3463-3473.
[18]. Zheng, Tong-Xing, et al. "Wireless covert communications aided by distributed cooperative jamming over slow fading channels." IEEE Transactions on Wireless Communications 20.11 (2021): 7026-7039.
[19]. Huang, Ke-Wen, Hao Deng, and Hui-Ming Wang. "Jamming aided covert communication with multiple receivers." IEEE Transactions on Wireless Communications 20.7 (2021): 4480-4494.
[20]. T. -X. Zheng, H. -M. Wang, D. W. K. Ng and J. Yuan, "Multi-Antenna Covert Communications in Random Wireless Networks," in IEEE Transactions on Wireless Communications, vol. 18, no. 3, pp. 1974-1987, March 2019, doi: 10.1109/TWC.2019.2900915.
[21]. X. Chen et al., "Multi-Antenna Covert Communication via Full-Duplex Jamming Against a Warden with Uncertain Locations," in IEEE Transactions on Wireless Communications, vol. 20, no. 8, pp. 5467-5480, Aug. 2021, doi: 10.1109/TWC.2021.3068096.
[22]. O. Shmuel, A. Cohen and O. Gurewitz, "Multi-Antenna Jamming in Covert Communication," in IEEE Transactions on Communications, vol. 69, no. 7, pp. 4644-4658, July 2021.
[23]. Xiong, Wenhui, et al. "Covert communication with cognitive jammer." IEEE Wireless Communications Letters 9.10 (2020): 1753-1757.
[24]. Choi, Haeung, Sangjun Park, and Heung-No Lee. "Covert Anti-Jamming Communication Based on Gaussian Coded Modulation." Applied Sciences 11.9 (2021): 3759.
[25]. Arbi, Tarak, Benoit Geller, and Oudomsack Pierre Pasquero. "Direct-Sequence Spread Spectrum with Signal Space Diversity for High Resistance to Jamming." MILCOM 2021-2021 IEEE Military Communications Conference (MILCOM). IEEE, 2021.
[26]. S. N. Kirillov and A. A. Lisnichuk, "The Procedure of Multi-Criteria Synthesis of DSSS Radio Signals to Adapt Prospective Wireless Communication Systems to the Action of NarrowBand Interference," 2020 Moscow Workshop on Electronic and Networking Technologies (MWENT), 2020, pp. 1-5.
[27]. Bawahab, Fawzan Ghalib Abdul Karim, et al. "Performance evaluation and mathematical analysis of direct sequence and frequency hopping spread spectrum systems under wideband interference." International Journal of Advances in Intelligent Informatics 4.3 (2018): 180-191.
[28]. R. C. Dixon, Spread Spectrum Systems with Commerical Applications. John Wiley and Sons, Inc., 1994.
[29] Lathi, Bhagwandas Pannalal. Modern digital and analog communication systems. Oxford university press, 1998.
[30]. K. Grover, A. Lim, and Q. Yang, “Jamming and anti-jamming techniques in wireless networks: A survey,” Int. J. Ad Hoc Ubiquitous Comput., vol.17, no. 4, pp. 197–215, Dec. 2014.
[31]. Y. Wang, Y. Huang, Z. Chen, S. Fan, Z. Liu and H. Xu, "Complicated Interference Identification via Machine Learning Methods," 2021 IEEE 4th International Conference on Electronic Information and Communication Technology (ICEICT), 2021, pp. 400-405.
[32]. Milstein, L., Sorin Davidovici, and D. Schilling. "The effect of multiple-tone interfering signals on a direct sequence spread spectrum communication system." IEEE Transactions on Communications 30.3 (1982): 436-446.
[33]. Liang, Jhih-Jhong, Li-Der Jeng, and Chung-Hsuan Wang. "A new partial-band noise jamming model for frequency-hopped MFSK systems." 2005 2nd International Symposium on Wireless Communication Systems. IEEE, 2005.
[34]. Granlund, John. Interference in frequency modulation reception. Diss. Massachusetts Institute of Technology. Department of Electrical Engineering, 1950.
[35]. Jan MIKULKA, Stanislav HANUS, “CCK and Barker Coding Implementation in IEEE 802.11b Standard” 1-4244-0822-9/07, 2007 IEEE.
[36]. Finn, H. M and P. S. Johnson, “Adaptive detection mode with threshold control as a function of spatially sampled clutter estimation.” RCA Review, vol. 29, No 3, pp. 414-464, 1968