This paper proposes a physical encryption scheme for discrete cosine transform (DCT) precoded OFDM-based visible light communication systems by employing chaos scrambling. In the proposed encryption scheme, the Logistic map is adopted for the chaos mapping. The chaos scrambling strategy can allocate the two scrambling sequences to the real (I) and imaginary (Q) parts of OFDM frames according to the initial condition, which enhance the confidentiality of the physical layer. The simulation experimental results prove the efficiency of the proposed encryption method for DCT precoded OFDM-based VLC systems. The experimental results show that the proposed security scheme can protect the DCT precoded OFDM-based VLC from eavesdropper, while keeping the advantage of the DCT precoding technique, which can reduce the PAPR and improve the BER performance of OFDM-based VLC.
Open Fund of the State Key Laboratory of Millimeter WavesK201214Natural Science Foundation of Zhejiang ProvinceLY13F0500051. Introduction
Visible light communication (VLC) using light emitting diodes (LEDs), where the LEDs are used for both illumination and data wireless transmission, has received increasing attention among the researchers worldwide [1, 2]. Its distinct advantages are the license-free light spectrum, immunity to radio frequency (RF) interference, safety to human body, and the use of inexpensive light emitting diodes (LEDs). VLC can be viewed as a complement to RF in the face of the looming spectrum crunch [3].
Due to the greater immunity to multipath fading and reducing the complexity of equalizer, orthogonal frequency division multiplexing (OFDM) is one of the most popular techniques for high data rate communication. It has been accepted in the IEEE802.11a local area network (LAN), IEEE802.16 WiMax, digital audio broadcasting (DAB), and digital video broadcasting (DVB) and next generation mobile technologies 3GPP LTE [4]. To achieve higher spectral efficiency, OFDM is being considered as a crucial technique for indoor VLC systems. The most practical communication scheme for VLC systems is intensity modulation (IM) along with direct detection (IM/DD), of which the transmitted signal is usually modulated on the instantaneous power of light emitting diodes (LEDs) at the transmitters and photodiodes (PDs) are used at photoelectric converters at the receivers. Therefore, the generated OFDM time domain signal in OFDM-based IM/DD should be real-valued and nonnegative. This can be achieved by enforcing Hermitian symmetry constraint on the input data of the IFFT at the transmitters in order to generate real-valued signal. Depending on how the real-valued signal is converted to a nonnegative signal, three schemes have been proposed: (1) DC-biased optical OFDM (DCO-OFDM), (2) Asymmetrically-Clipped optical OFDM (ACO-OFDM), and (3) pulse-amplitude-modulated discrete multitone (PAM-DMT). For DCO-OFDM scheme, a DC offset is added to the real-valued signal to obtain a nonnegative signal [5]. For improving the throughput and capacity and/or the power efficiency, MIMO techniques, which offer a spatial gain, have been used in VLC. Meantime, in order to achieve higher bit error rate (BER) performance, precoding technique has been employed for OFDM systems, such as DCT precoding and DFT precoding [6, 7].
On the other hand, with the dramatic growth in wireless network capacity and accessibility of wireless network, data privacy and confidentiality are becoming a major concern for users. In some public areas such as classrooms, hallway, and planes, the transmitted signals in VLC link are susceptible to the eavesdropping. Many security measures can be adopted at upper layer of the network stack via access control and end-to-end encryption. For instance, the use of encryption end decryption scheme (DES, AES, etc.) can be implemented in the application layer of communication networks. During the past few years, however, the use of physical layer security techniques has attracted wide attention of scholars. Some physical secure strategies have been proposed in wireless communication and optical OFDM communication systems for fiber link [8–12]. Among these proposed schemes, chaos mapping techniques have usually been employed to enhance the security of physical layer. Recently, some related works in [13–16] considered improving the confidentiality of VLC links via physical security methods. However, to the best of our knowledge, the secure researching on precoded OFDM-based VLC systems has not been reported.
Without loss of generality, we will focus on DCO-OFDM-based VLC based in this paper. We firstly propose a novel secure DCT precoded OFDM-based VLC using chaos scrambling technique. In the proposed DCT precoded and encrypted OFDM-based VLC, the transmission security can be realized by the chaos scrambling sequence while the reliability can be improved via using DCT precoding. The simulation results show that the transmitted signal cannot be recovered at the eavesdropper due to the unknown secure key consisting of the initial value, the bifurcation parameter, and iteration step. Thus, the approach can provide scalable secure strategy in DCT precoded OFDM-based VLC application.
This paper is organized as follows. In Section 2, OFDM encryption scheme is introduced and described briefly. In Section 3, the system principle of encrypted and DCT precoded OFDM-based VLC is described. After that, simulation results and analysis are shown. Finally, Section 4 concludes this paper.
2. OFDM Encryption Scheme
In our proposed secure transmission scheme, the OFDM signal is encrypted using chaotic sequence. The chaos sequence is generated based on a Logistic map, which is controlled by the initial value and iteration parameter. A chaos model using Logistic map has the following iterative formula [17]:(1)xn+1=fxn=μxn1-xn,where n is a time index, x(0) is the initial value, x(n) is the nth state value of (2), x(n)∈-1,1, and μ∈1,4. μ is the bifurcation parameter or control parameter. When μ falls into the domain 3.569945<μ≤4, the behavior changing of x(n) will fall into chaos. To obtain a chaos sequence, a transform function is used to xn; it is expressed as (2)sn=-1,0≤xn≤0.5,1,0≤xn≤1,where s(n) is the nth element of the generated chaotic sequence. The chaos sequence can be obtained by (1) and (2). In the practical applications, some initial iterated values x(n),n=1,2,…,N are abandoned, where N is iteration step.
Based on (1) and (2), we can get two difference chaos sequences containing values form 1 and −1. The two chaos sequences are employed to encrypt the real and image parts of QAM symbol sequence, respectively. In this scheme, the secure key consists of the initial value x0, the bifurcation parameter μ, and iteration step N. We assume that a and b are the generated chaos sequences where a(m)∈-1,1 and b(m)∈-1,1, respectively.
In the transmitter end, the transmitted data vector S with M length after the encryption can be represented as follows:(3)Zm=realSm·am+imagSm∗bm,where m=1,2,…,M. This is shown in Figure 1(a).
(a) Encryption principle for transmitter. (b) Decryption principle for receiver.
The receiver can decrypt the encrypted data by using its own key sequence. The decryption process can be written as follows:(4)Sm=realZ′m·am+imagZ′m·bm,where Z′m is the output of the fast Fourier transform (FFT). The process is shown in Figure 1(b).
We assume that the M-order chaos scrambling sequence is generated to encrypt I and Q parts of frequency information signal. Here the randomness of Logistic chaos mapping can be evaluated in terms of autocorrelation and cross-correlation functions of the chaos sequence. The normalized autocorrelation and cross-correlation functions of a random sequence with length M are defined as(5)Rac=1M∑m=0M-1bjmbjm+k,-M-1≤k≤M-1,Rcc=1M∑m=0M-1bhmbjm+k,-M-1≤k≤M-1.
Figures 2 and 3 show the chaos behavior of two different chaos sequences, which are generated by two different initial conditions, for example, with μ=4,x0=0.329999, and N=2000 and μ=4,x0=0.329998, and N=2000. We can see that the difference between the two waveforms of sequences is random. Figures 4 and 5 show the autocorrelation functions of the two chaos sequences, respectively. It can be seen that when lag k≠0 the value of the autocorrelation function of the chaos sequences is very small. Figure 6 shows the cross-correlation function of the chaos sequences for x0=0.329999 and x0=0.329998 and N=2000. The values of cross-correlation functions are also around zero for all values of lag k. Therefore, the generated sequence by chaos mapping has very good random properties.
Chaos sequence for μ=4, x0=0.329999, and N=2000.
Chaos sequence for μ=4, x0=0.329998, and N=2000.
Autocorrelation of chaos sequence for μ=4, x0=0.329999, and N=2000.
Autocorrelation of chaos sequence for μ=4, x0=0.329998, and N=2000.
Cross-correlation of chaos sequences for x0=0.329998 and x0=0.329999, μ=4, and N=2000.
In our proposed scheme, the frequency information of OFDM signal is scrambled with chaos scrambling sequence to enhance the security of the physical layer of OFDM-based VLC. The scrambling sequence is generated from a Logistic mapping, in which the iteration parameters of Logistic mapping are used as security keys. Figure 7 illustrates the schematic of a DCT precoded OFDM-based visible light communications system with chaos scrambling sequence. The pseudorandom binary sequence (PRBS) information data is mapped into m-QAM data symbols and then goes through serial to parallel (S/P) transform. The generated complex vector of size M can be expressed as S=S0S1⋯SM-1T. After that the obtained m-QAM symbols are divided into I and Q parts. The encryption is performed by multiplying I and Q parts of the complex signal vector by a pair of chaos scrambling sequences separately according to (3).
DCT precoded OFDM-based VLC system with encryption and decryption.
The encrypted complex vector with size M can be written as Z=Z0Z1⋯ZM-1T. Then DCT precoding is applied to this complex vector which transforms this vector into new vector of length M that can be written as (6)Y=PZ=Y0Y1⋯YM-1T,where T denotes the matrix transpose and P is DCT matrix with M×M dimension. The DCT precoded matrix can be stated as follows:(7)P=p00p01⋯p0M-1p10p11⋯p1M-1⋮⋮⋱⋮pM-10pM-11⋯pM-1M-1.
The DCT kernel is real and can be expressed as(8)Plm=1M,l=0,0≤m≤M-1,2Mcos2m+1lπ2M,1≤l≤M-1,0≤m≤M-1,where l=0,1,…,M-1,m=0,1,…,M-1 and plm means lth row and mth column of DCT precoding matrix.
In the receiver end, after FFT and equalization operation the inverse DCT precoding matrix is employed in receiver to recover the original data symbols. Assume that the chaotic map and secure key at the receiver are identical to those of the transmitter; they can provide sufficient information to generate identical chaotic scrambling sequences for decryption easily. Without knowledge of the secure key, the data cannot be recovered from the received signal by an eavesdropper.
In our proposed scheme, I and Q parts of QAM signal are both encrypted independently by chaos sequences. Therefore, there are two secret keys in our encryption algorithm. Every secret key of this chaos system contains three members, initial parameter x0, control parameter μ, and iteration step N. By this, it can enhance secret key numbers and secret space. In our encrypted algorithm, the security keys can be expressed as x0I,μI,NI,x0Q,μQ,NQ, of which x0I,μI,NI and x0Q,μQ,NQ are the keys of I and Q parts of QAM signal, respectively.
The chaos state is highly sensitive to its initial values; only a slight change from the correct key value will fall into another absolute different chaotic state. This is beneficial for creating a huge key space which cannot be broken for illegal receiver. In our proposed system, there are four variables x0I,μI,x0Q, and μQ which are declared as Matlab type long. Every of the variables is scaled fixed point format with 15 digits precision for double. According to the IEEE floating-point standard [18], the computational precision of the 64-bit double-precision number is about 10−15. After considering parameters involved, the key space size is approximately 1015×4≈2199, which is much larger than 2100. Therefore, a sufficiently large key space is guaranteed in the proposed algorithm for application. The proposed encrypted scheme can efficiently resist the brute-force attack [19].
3. Simulation Results and Analysis
The chaos scrambling sequence is very import to ensure the security of the proposed encryption technique. In this work, we will evaluate the effect of scrambling sequence on the PAPR and BER performances of DCT precoded OFDM-VLC over multipath optical wireless channel by simulation. In the simulation setup, The OFDM frame structure has 192 data subcarriers and 8 pilot tones for channel estimation and equalization and 56 unused tones for the guard band. So the size of IFFT is 256. However, due to the Hermitian symmetry of input data of IFFT of DCO-OFDM systems, there are only 96 effective data subcarriers in OFDM frame. Therefore, the length of chaos scrambling sequence in the proposed scheme is set to 96. In the proposed encrypted scheme, the chaotic scrambling sequence can be generated based on Logistic map according to (1) and (2). In following simulation, the security keys of I or Q part of QAM signal can be fixed at 0.329999,4,2000 and 0.329998,4,2000.
3.1. PAPR Performance
One major drawback of OFDM is the peak-to-average power ratio (PAPR). It is verified that DCT precoding can reduce the PAPR and improve the BER performance of OFDM systems. In our proposed scheme, chaos scrambling is employed to improve security of physical layer of DCT precoded OFDM-based VLC. It is noteworthy to mention that the proposed encryption only changes the sign of the real and image parts of the transmitted symbols. Thus, the PAPR of the DCT precoded OFDM is kept unaffected. Therefore we mainly evaluated the effect of the chaos scrambling on the PAPR of OFDM signals in terms of the complementary cumulative distribution function (CCDF). Figure 8 shows the CCDF comparison of the PAPR of the scrambled and DCT precoded OFDM with that of conventional DCT precoded OFDM. From Figure 8 we can also see that the CCDF curves of the two cases are close to each other. Thus, the influence of the proposed encrypted scheme on the PAPR is negligible.
Comparison of the PAPRs of the precoded 16 QAM OFDM signals with and without chaos scrambling.
3.2. BER Performance
In following simulation experiment, the ceiling-bounce model developed by Carruthers and Kahn in [20] is chosen as the optical wireless channel model. This model is the most practical model and accurately represents the multipath dispersion of an indoor wireless optical channel. A single infinite-plane reflector with Lambertian reflectance is assumed. The continuous impulse response of an optical wireless link h(t) is defined as(9)hct=H06a6t+a7ut,where H(0) is the channel DC gain, u(t) is the step function, a=2H/c, H is the ceiling height above the transmitter, and c is the velocity of light. The delay spread of a channel is a remarkably accurate predictor of ISI-induced signal-to-noise ratio (SNR) penalties, which is independent of the particular time dependence of the impulse response of that channel. This channel h(n) was employed in the simulation. The sample rate of the channel is represented by the symbol rate Rs. We mainly study the BER performance of DCT precoded 16 QAM OFDM-based system with and without chaos scrambling for AWGN and multipath optical wireless channel. In our simulation, the main parameters are shown in Table 1.
Simulation parameters.
Rs
125 M symbols/s
Modulation
16 QAM
FFT size
256
Number of pilot data
8
Length of CP
32
Scrambling size
96
H
3.5 m
Figure 9 shows the BER performance demodulated by legitimate receiver and illegal receiver in the additive white Gaussian noise (AWGN) channel. The BER performance of the DCT precoded OFDM is almost the same as that of the conventional DCT precoded OFDM for the legitimate receiver. Therefore, the encryption measure does not influence the BER performance of legal receiver. We also see that DCT precoding technique does not improve the BER of OFDM systems over AWGN channel. However, for the illegal receiver, the BER is around 0.5 because illegal receiver does not know the right secret key.
BER performance for AWGN channel.
Figure 10 shows the BER performance comparison in a multipath VLC link. We can see that the BER performance of the encrypted and DCT precoded system is almost the same as that of the conventional DCT precoded system without encryption. For DCT precoded scheme with and without encryption, the improvement by DCT precoding can be clearly observed when the SNR is higher than 14 dB. At BER = 10−3, the BER performance of the proposed DCT precoded system with chaos scrambling can be improved by an approximately 1 dB gain compared with that of the original OFDM system. The using of the chaos encryption maintains the advantage of DCT precoding technique, which can reduce the PAPR and improve the BER performance in OFDM systems. Form Figure 10, we can also see that illegal receiver cannot demodulate out the correct data if it does not know the right encryption keys. For the illegal receiver without right encryption keys, the BER is around 0.5. It is shown that the proposed scheme can enhance both the reliability and security of OFDM-based VLC data transmission.
BER performance for multipath optical wireless channel.
From Figure 10, it can be seen that the improvement of BER performance of the proposed DCT precoded and encrypted system is due to obtaining frequency diversity by using DCT precoding. Furthermore, in order to further improve the BER performance of the proposed system, channel coding such as convolution code and turbo-codes can be employed.
Figures 11 and 12 show the received constellations of legitimate receiver and illegal receiver for 16 QAM DCT precoded and encrypted OFDM signals, of which the signal-to-noise ratio is 18 dB, respectively. The legitimate receiver adopts chaos scrambling encryption technique while the illegal receiver does not adopt chaos scrambling encryption. Though the illegal receiver can obtain the right constellation it cannot demodulate the transmitted information due to have not the right encryption key.
Received constellations of legitimate receiver for multipath optical wireless channel.
Received constellations of illegal receiver for multipath optical wireless channel.
4. Conclusions
In this paper, a physical layer encryption method is proposed to effectively enhance the security of a DCT precoded OFDM-based VLC system, where Logistic map is adopted to generate chaos scrambling sequences. The experimental results show that the chaos scrambling sequences can lead to a successful confidential data transmission in physical layer. Meanwhile, the proposed scheme does not influence the PAPR and BER performances of DCT precoded OFDM-based VLC. The advantage of DCT precoding technique can remain.
Competing Interests
The authors declare that they have no competing interests.
Acknowledgments
This work was supported in part by the Open Fund of the State Key Laboratory of Millimeter Waves (Southeast University, Ministry of Education, China) under K201214 and by the Zhejiang Provincial Natural Science Foundation of China under LY13F050005.
KarunatilakaD.ZafarF.KalavallyV.ParthibanR.LED based indoor visible light communications: state of the art20151731649167810.1109/comst.2015.24175762-s2.0-84940109515WangY.ChiN.WangY.TaoL.ShiJ.Network architecture of a high-speed visible light communication local area network201527219720010.1109/lpt.2014.23649552-s2.0-84937106943RohnerC.RazaS.PuccinlliD.VoigtT.Security in visible light communication: novel challenges and opportunities20151929915LiuJ.NoonpakdeeW.ShimamotoS.Design and performance evaluation of OFDM-based wireless services employing radio over optical wireless link201135173184TanJ.WangZ.WangQ.DaiL.Near-optimal low-complexity sequence detection for clipped DCO-OFDM201628323323610.1109/lpt.2015.2493169RanjhaB.KavehradM.Precoding techniques for PAPR reduction in asymmetrically clipped OFDM based optical wireless systemBroadband Access Communication Technologies VII, 86450RJanuary 2013International Society for Optics and PhotonicsProceedings of SPIE10.1117/12.2005670TaoL.YuJ.FangY.ZhangJ.ShaoY.ChiN.Analysis of noise spread in optical DFT-S OFDM systems2012302032883294629891910.1109/JLT.2012.22182182-s2.0-84867338486AllenT.Al-DhahirN.Performance analysis of a secure STBC with coherent and differential detectionProceedings of the IEEE Wireless Communications and Networking Conference (WCNC '15)March 2015New Orleans, La, USAIEEE52252710.1109/wcnc.2015.71275242-s2.0-84938718452HuoF.GongG.A new efficient physical layer OFDM encryption schemeProceedings of the 33rd IEEE Conference on Computer Communications (IEEE INFOCOM '14)May 2014Toronto, Canada1024103210.1109/infocom.2014.68480322-s2.0-84904438203LiuB.ZhangL.XinX.YuJ.Physical layer security in CO-OFDM transmission system using chaotic scrambling2013291798610.1016/j.optcom.2012.10.0562-s2.0-84872196462DengL.ChengM.WangX.LiH.TangM.FuS.ShumP.LiuD.Secure OFDM-PON system based on chaos and fractional fourier transform techniques201432152629263510.1109/jlt.2014.23310662-s2.0-84905189271ZhangW.ZhangC.JinW.ChenC.JiangN.QiuK.Chaos coding-based QAM IQ-encryption for improved security in OFDMA-PON201426191964196710.1109/LPT.2014.23436162-s2.0-84907202389MostafaA.LampeL.Physical-layer security for indoor visible light communicationsProceedings of the 1st IEEE International Conference on Communications (ICC '14)June 2014Sydney, Australia3342334710.1109/icc.2014.68838372-s2.0-84906993245Le MinhH.PhamA. T.GhassemlooyZ.BurtonA.Secured communications-zone multiple input multiple output visible light communicationsProceedings of the IEEE Globecom WorkshopsDecember 2014Austin, Tex, USA50551110.1109/GLOCOMW.2014.7063482ZhangB.RenK.XingG.FuX.WangC.SBVLC: secure barcode-based visible light communication for smartphonesProceedings of the 33rd IEEE Conference on Computer Communications (IEEE INFOCOM '14)May 2014Toronto, CanadaIEEE2661266910.1109/infocom.2014.68482142-s2.0-84904427833MostafaA.LampeL.Physical-layer security for MISO visible light communication channels20153391806181810.1109/jsac.2015.24325132-s2.0-84940056690ChenS.-L.HwangT. T.LinW.-W.Randomness enhancement using digitalized modified logistic map20105712996100010.1109/tcsii.2010.20831702-s2.0-78650419105IEEE Computer Society1985ANSI/IEEE Standards 1985-754AlvarezG.LiS.Some basic cryptographic requirements for chaos-based cryptosystems20061682129215110.1142/S0218127406015970MR2266006ZBL1192.940882-s2.0-33750542126CarruthersJ. B.KahnJ. M.Modeling of nondirected wireless infrared channels199745101260126810.1109/26.6346902-s2.0-0031258303