{"title":"Parallel PAM for Secure Transmission","authors":"Hongliang He;Nengcheng Chen","doi":"10.1109/TIFS.2025.3552035","DOIUrl":null,"url":null,"abstract":"Physical layer security is a promising approach to enhancing the security of multi-user networks. However, user interference causes constellation points from different users to overlap, limiting both network reliability and security. To address this, we propose a parallel pulse amplitude modulation (PAM) scheme that ensures constellations are regularly superimposed at the legitimate receiver while appearing chaotic to the eavesdropper. Consequently, the eavesdropper experiences a consistently high bit/symbol error rate, whereas the legitimate receiver maintains a very low error rate. Furthermore, we extend the parallel PAM scheme to both the in-phase and quadrature components of the signal, forming a heterogeneous quadrature amplitude modulation (QAM) scheme. This enhances transmission efficiency while preserving security. We analyze the bit/symbol error rates at both the legitimate receiver and the eavesdropper, deriving a lower bound for the eavesdropper’s error rate. Finally, simulation results validate our theoretical analysis.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"20 ","pages":"3374-3386"},"PeriodicalIF":6.3000,"publicationDate":"2025-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Information Forensics and Security","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10929021/","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, THEORY & METHODS","Score":null,"Total":0}
引用次数: 0
Abstract
Physical layer security is a promising approach to enhancing the security of multi-user networks. However, user interference causes constellation points from different users to overlap, limiting both network reliability and security. To address this, we propose a parallel pulse amplitude modulation (PAM) scheme that ensures constellations are regularly superimposed at the legitimate receiver while appearing chaotic to the eavesdropper. Consequently, the eavesdropper experiences a consistently high bit/symbol error rate, whereas the legitimate receiver maintains a very low error rate. Furthermore, we extend the parallel PAM scheme to both the in-phase and quadrature components of the signal, forming a heterogeneous quadrature amplitude modulation (QAM) scheme. This enhances transmission efficiency while preserving security. We analyze the bit/symbol error rates at both the legitimate receiver and the eavesdropper, deriving a lower bound for the eavesdropper’s error rate. Finally, simulation results validate our theoretical analysis.
期刊介绍:
The IEEE Transactions on Information Forensics and Security covers the sciences, technologies, and applications relating to information forensics, information security, biometrics, surveillance and systems applications that incorporate these features